Get new jobs by email
- Security System Maintenance Technician Region: Yanbu (Remote Sites) Job Description: We are looking for a skilled and dedicated Security System Maintenance Technician to join our team. The candidate will be responsible for the maintenance, troubleshooting, and servicing...
- ...Consultant _IT Security & Risk Management Job Title: Consultant IT Security & Risk Management Experience: Must have Big 4 experience About the Role Our client is seeking an experienced consultant in IT Security and Risk Management for a short-term remote...
- A consulting firm is seeking an experienced Consultant in IT Security & Risk Management for a short-term remote engagement. The role will involve supporting risk management initiatives, performing security self-assessments, and creating analytics for stakeholders. Candidates...
- ...resilience through data backup, data recovery, data portability, data security, and data intelligence. Based in Seattle, Veeam protects over... ...protected by federal, state or local law. All your information will be kept confidential. Please note that any personal data...
- ...Mandarin, or Hindi. Familiarity with data privacy and enterprise security reviews common across APAC, for example Singapore PDPA, Japan... ..., disability status, pregnancy, parental status, genetic information, political affiliation, or any other status protected by the laws...
$2000 per year
...benefits may apply depending on the work location and, for more information on these, please ask your Talent Partner. Fully remote... ...trustworthiness of the company. Remember, your personal and financial security is paramount, and taking preventive measures is crucial to...- ...enable everyone to accelerate the results that matter. By taking advantage of all structured and unstructured data — securing and protecting private information more effectively — Elastic’s complete, cloud-based solutions for search, security, and observability help...
$2000 per year
...for IoT, called Ubuntu Core, represents the state of the art in security and resilience for high end appliances and equipment. Our... ...aspect of our solutions and products and expect a thoughtful, well-informed answer. We always want to do the best thing for our partners and...- ...UK, Immersive Labs has progressed to the global stage and has secured over €170 million of funding. “The speed at which Immersive Labs... ...for doing great work and living our values and behaviours Informal or formal flexible working options, e.g. flexible start and finish...
- ...capabilities, systems, services, and network: broadband, unique WiFi security Cisco IP Phones, Call Manager, Worksmart call screen,... ...returning to your location and actively training your team with the information. Report regularly and honestly to your Manager....
- ...~ English-fluent Employment type: ~ Full Time Salary Range: 4000 - 6000 S.R. Benefits and Other Informations: - A rewarding salary determined according to experience - Health insurance - Paid annual vacations - Motivating work environment...
- ...opportunities. Then you will update, maintain and share all the major information within the accounts through Salesforce. Most important, we are... ...and negotiation skills ~ Knowledge of the physical or cyber security market will be an advantage ~ Fluent in English and Arabic...
- ...architectures aligned with customer business objectives, IT landscape, security, and compliance requirements. Prepare technical and... ...~ Bachelor’s degree in Engineering, Computer Science, Information Systems, or related field. ~10+ years of experience in SAP consulting...
- ...other potential voice system, ensuring seamless connectivity, security, and performance across all environments in addition to other... ...Bachelor's degree in Computer Engineering, Network Engineering, or Information Technology . Minimum 3–5 years of hands-on experience in...
- ...Monitoring Specialist Education: Diploma or Bachelor’s degree in Information Technology, Computer Science, Network Engineering, or related... .... Strong communication skills for coordinating with security, system administration, application, and IT support teams....
- ..., comme celles présentes dans le top 10 OWASP. En tant que security champion vous accompagnerez nos clients dans une meilleure prise... ...mensuelles pour échanger avec votre équipe, transmettre des informations stratégiques et fédérer autour d’objectifs communs. Vous serez...
- ...Containerization Platform Education: Bachelor’s Degree in Information Technology, Computer Science, Software Engineering, or related... ...containerized environments Experience implementing security best practices for containers, including image security, network...
- ...Support & Account Growth** + Partner with Sales to identify and secure new business, leveraging deep market insights and executive... ...age 40 and over, color, disability, gender identity, genetic information, military or veteran status, national origin, race, religion,...
- ...source solutions designed to anticipate cyber threats, identify security gaps, and strengthen organizational security posture.... ...product and service quality Track success metrics and use data to inform customer strategy and engagement Who You’ll Work With You...
- ...cloud, self-hosted, hybrid, and data residency needs. Run security and compliance threads common in APAC. Prepare crisp responses... ...status, disability status, pregnancy, parental status, genetic information, political affiliation, or any other status protected by the laws...
- ...Education Bachelor’s Degree in Information Technology, Computer Science, or related field Experience 3–5 years of hands-on experience... ...Knowledge of user/group account management , policies, and security controls Understanding of NCA, NIC, and cybersecurity...
$2000 per year
...understanding of networking - TCP/IP, DHCP, Basic understanding of security best practices in IoT or server environments Good... ...benefits may apply depending on the work location and, for more information on these, you can ask in the later stages of the recruitment process...- ...servers. The ideal candidate should possess a Bachelor's degree in Information Technology and 3–5 years of hands-on experience with Windows... ...involves performing OS patching, ensuring compliance with security best practices, and managing user accounts and policies. #J-18...
- ...metrics, and reporting requirements. Ensure data governance, security, and compliance standards are followed. Document data... ...platform operations. Qualifications ~ Bachelor’s degree in Information Systems, Data Science, or Software Engineering. ~5+ years of...
- ...Amplitude recruiters and/or hiring managers. Amplitude will never ask for financial information or payment, or for personal information such as bank account number or social security number during the job application or interview process. Any emails from the Amplitude...
- ...hardware, and network configurations. Implement and enforce security best practices within Linux environments, including firewalls,... ...Degree: Bachelor’s degree in Computer Science, Information Technology, or a related field. Years of Experience: 3-5+...
- ...Manage Mentoring tools Team Education: Bachelor’s degree in Information Technology, Computer Science, Software Engineering, Network... ...rules to identify incidents, performance degradation, or security-related anomalies. Collaborate with incident response teams...
- ...introductions to job opportunities within the SAP Ecosystem to help secure a position after the training. Please note this program does... ...in a field related to Business Administration / Management Information Systems / Engineering / Data Science / AI; Candidates will...
- ...the desire to solve critical challenges facing our customer’s secure environment, so you’re prepared to connect them with a solution... ...or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical...
- ...in language/culture, training/education/instruction, IT, cyber security, and intelligence (analysts, CI, HUMINT, SIGINT, etc.). We... ...national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason...
