Get new jobs by email
- ...you will hold a bachelor’s degree in criminal justice, homeland security, political science, international studies, or related subjects... ...specialty. A minimum of 10 years of experience within the intelligence field, with emphasis on intelligence collection, intelligence...
- ...Job Summary The Business System Analysts primary role is to implement proper information security controls to safeguard the organization’s information assets in accordance with company procedures and guidelines, and execute the Data Protection and Data Leakage Programs...
- .... Implement and manage robust cybersecurity measures, monitor security incidents, and conduct vulnerability assessments. Provide training... ..., Risk Management, Red Teaming, Emerging Threat Analysis and Intelligence, Security Automation, Data Analytics & Machine Learning....
- 1. Cybersecurity Analyst – Security Operations Center Leader "We are seeking a highly experienced Cybersecurity Security Operations Center (SOC) Lead to join our team. The SOC Lead will be responsible for leading and managing the day-to-day operations and ensuring the...
- ...Senior Network & Network Security Architect Position Network Architect (10+ Years of Experience) Location Work Pattern Full-time, in-person Interview Remote Job Summary The organization is seeking a highly experienced Senior Network & Network...
- ...whenever and wherever they need it. Veeam provides data resilience through data backup, data recovery, data portability, data security, and data intelligence. Based in Seattle, Veeam protects over 550,000 customers worldwide who trust Veeam to keep their businesses running....
- ...driven solutions that leverage advanced analytics and artificial intelligence to empower business decisions across various projects in the... ...flow processes to ensure data integrity, availability, and security. Design and oversee the implementation of advanced analytics...
- ...digital forensics tools and procedures Familiarity with threat intelligence platforms and threat hunting Basic experience with log... ...vulnerability scanning tools Basic understanding of offensive security techniques and the attack lifecycle Certifications Required...
- ...Fortune 500, brings together the precision of search and the intelligence of AI to enable everyone to accelerate the results that matter... ...By taking advantage of all structured and unstructured data — securing and protecting private information more effectively — Elastic’...
- ...About Delinea: Delinea is a pioneer in securing human and machine identities through intelligent, centralized authorization, empowering organizations to seamlessly govern their interactions across the modern enterprise. Leveraging AI-powered intelligence, Delinea’s leading...
- ...UK, Immersive Labs has progressed to the global stage and has secured over €170 million of funding. “The speed at which Immersive... ...prospect to close Desired Traits Empathy, high emotional intelligence, and heightened listening skills to really get to the crux of...
- ...Bristol, UK, Immersive has progressed to the global stage and has secured over €170 million of funding. “The speed at which... ...will display the following traits: Empathy, high emotional intelligence, and heightened listening skills to really get to the crux of...
- ...and negotiation skills ~ Knowledge of the physical or cyber security market will be an advantage ~ Fluent in English and Arabic... ...surveillance, access control, intercom, and audio systems, enhanced by intelligent analytics applications. With around 6000 committed employees...
- ...source solutions designed to anticipate cyber threats, identify security gaps, and strengthen organizational security posture.... ...of experience in the cybersecurity sector, especially threat intelligence ~ Fluent in Arabic and English ~ Based in Saudi Arabia with...
- ...source solutions designed to anticipate cyber threats, identify security gaps, and strengthen organizational security posture.... ...understand the products’ features, software architecture, and threat intelligence domain. Team player with collaboration skills, capable of working...
- ...evolving and winning multiple awards, with funding for next phase secured, and commercial traction demonstrated, we are now looking to... ...per locations, segments, and service lines. Provide market intelligence feedback. Support generic business planning and general...
- ...metrics, and reporting requirements. Ensure data governance, security, and compliance standards are followed. Document data... ...~5+ years of experience in Data Warehousing, ETL, or Business Intelligence projects. ~ Strong hands‑on experience with Microsoft Fabric...
- ...Nationality : Saudi Technical Requirements • Basic knowledge of cybersecurity frameworks and standards • Understanding of network security protocols and devices (e.g., firewalls, intrusion detection systems) • Proficiency in operating systems (Windows, Linux) and...
- ...processes. - Excellent analytical, planning and organizational skills. Organizationally savvy, with situational and contextual intelligence of the political climate of the enterprise and how to navigate obstacles and politics. - Balances the long-term (“big picture”...
- ...the desire to solve critical challenges facing our customer’s secure environment, so you’re prepared to connect them with a solution... ..., white‑space territories and accounts. Deep knowledge of the intelligence community. Possess a successful track record selling complex...
- ...water flooding, reservoir surveillance, SCAL, PVT, geochemical analysis, and fluid’s compatibility. Expertise in Artificial Intelligence, Machine Learning, and data analytics are preferred. History of using modern reservoir management practices for oil reservoirs...
- ...companies in the world, as well as amongst the top five global companies by market capitalization. Overview We are seeking a Security Investigator to join our Corporate Security Department (CSD). CSD is responsible for providing highly specialized professional,...
- ...employees. Preference will be given to Saudi nationals and all applicants must have excellent English language skills. Data Privacy Security Management Business Cherwell Service Management (CSM) Regulatory Requirements Cyber-security Risk Management...
- ...experience with cyber risk management across 3rd party engagement lifecycle ~ Cyber assessment ~ Framework testing Required Cyber Security Third-Party Risk Managment Consultant who passionate professional provide the highest quality services and training. Designing &...
- ...a dynamic, expanding company with exciting opportunities in language/culture, training/education/instruction, IT, cyber security, and intelligence (analysts, CI, HUMINT, SIGINT, etc.). We are seeking a Healthcare Facility Manager for a position at Al-Udeid Air Base...
- ...migration of data from legacy systems to a new system architecture, including integration into an existing data warehouse for business intelligence, analytics, and reporting. Your expertise in data migration techniques and tools will be essential to ensure data integrity,...
- ...knowledge of programming, especially Python , experience or prior exposure to Odoo ERP , and a basic understanding of Artificial Intelligence (AI) concepts. The candidate will join our technical team to contribute to building and maintaining practical and scalable...
- ...smarter, faster, and more connected. Our Global Reach JD.com is expanding its international footprint through a digitally intelligent, cross-border supply chain and world-class logistics network, supported by platforms such as Joybuy, which brings trusted products...
- ...Asian languages are a strong plus, especially Japanese, Korean, Mandarin, or Hindi. Familiarity with data privacy and enterprise security reviews common across APAC, for example Singapore PDPA, Japan APPI, Korea PIPA, Australia’s Privacy Act, and India’s DPDP Act....
- ...and R. Experience with data visualization tools, such as Tableau or Power BI. Knowledge of machine learning and artificial intelligence techniques, including predictive analytics and data mining. Certification in business analysis, such as Certified Business...

