Get new jobs by email
- ...level Industry Financial Services Employment Type Full-time Job Functions Information Technology The Senior Cybersecurity Analyst will assist the Head of Information Technology in day-to-day activities and operations of the team. The analyst should have complete...
- ...Summary Skills Threat Management Cyber Threat Hunting (CTH) Cybersecurity... ...development of features and capabilities for secure sharing of cybersecurity related information... ...Deploy threat intelligence analysts on client premises to evaluate the effect...
- ...nationals and all applicants must have excellent English language skills. Data Privacy Security Management Business Cherwell Service Management (CSM) Regulatory Requirements Cyber-security Risk Management Network Security Information Security Management...
- ...Architect to lead the design and implementation of enterprise-wide security architectures. This strategic role requires deep technical... ...to senior management and board-level stakeholders Mentor junior security engineers and provide technical leadership across the...
- ...Job Summary Experience ~1+ years experience with cyber risk management across 3rd party engagement lifecycle ~ Cyber assessment ~ Framework testing Required Cyber Security Third-Party Risk Managment Consultant who passionate professional provide the highest...
- ...Job Summary As the successful candidate you will hold a bachelor’s degree in criminal justice, homeland security, political science, international studies, or related subjects. An advanced degree in business, national security, criminal justice, or other field related...
- ...their GRC team. The role focuses on developing and maintaining security governance frameworks, policies, and procedures to ensure alignment... ...of security with business operations. Strong understanding of cyber resilience principles. Regulatory & Standards Expertise :...
- ...Job Summary The person should have good understanding of a wide range of security technologies in domain of network security, endpoint security, data security, email security and web security. As a team lead ensure that the security solutions are always available and...
- Role Overview We are looking for an Implementation Governance Specialist to oversee the governance, compliance, and controlled delivery of cybersecurity and IT initiatives. The successful candidate will ensure that projects are implemented in accordance with internal ...
- ...Summary Possess 1-3 years of experience in the Information Security domain specifically in security operations center and, demonstrable... .... Develop professional working relationship with fellow analysts. Analyze cybersecurity alerts and data for false positive/true...
- ...Job Summary The Business System Analysts primary role is to implement proper information security controls to safeguard the organization’s information assets in accordance with company procedures and guidelines, and execute the Data Protection and Data Leakage Programs...
- ...assets. Implement and manage robust cybersecurity measures, monitor security incidents, and conduct vulnerability assessments. Provide... ...Additionally, you’ll provide technical leadership in the overall Cyber Defense by ensuring Security Design & Architecture, Security...
- 1. Cybersecurity Analyst – Security Operations Center Leader "We are seeking a highly experienced Cybersecurity Security Operations Center (SOC) Lead to join our team. The SOC Lead will be responsible for leading and managing the day-to-day operations and ensuring the...
- ...About the Role We are looking for a Data Analyst with at least one year of experience to join our growing Data & AI team at Tarmeez Capital. In this role, you will work closely with product, business, and data stakeholders to analyze data, build dashboards,...
- ...The Security Solution Analyst will be responsible for establishing and maintaining cybersecurity governance frameworks, policies, and procedures... ...and security controls to protect the organization against cyber threats. Detailed Responsibilities: ~ Establish and maintain...
- ...live Qualification Bachelor or Master Degree in computer science, Information technology, etc. Knowledge/experience in cyber security, information security etc. A track record of strong academic performance Ability to meet travel requirements, when...
- ...Job Summary We are seeking a Cyber GRC Manager to lead and mature the company’s cyber governance, risk, and compliance (GRC) program. The successful candidate will partner with Security, IT, Legal, Risk, and business stakeholders to design, implement, and operate...
- ...advisor relationships with clients, and understand current and future client security needs, such as cybersecurity strategy, privacy and data protection strategy, cybersecurity risk management, and cyber technology implementation services, in the context of market dynamics....
- ...Job Summary We are seeking a Cyber GRC Specialist to support and advance the company’s cybersecurity governance, risk management... ...GRC) initiatives. The successful candidate will collaborate with Security, IT, Legal, Privacy, Compliance, and business teams to identify...
- ...at schedule and driver labor / capacity plans and into areas to secure customer services delivery. Manage inventory levels to target... ...Mentoring / coaching within the platform team supply planners on junior planning level. Extensive communication with many functions...
- ...Description Job Summary The Security Officer is responsible for maintaining site security and ensuring strict access control for personnel, vehicles, and visitors. The role involves monitoring site entry and exit points, preventing unauthorized access, and ensuring...
- ...Job description / Role The Business Analyst is responsible for delivering high quality... ...effective outcomes. • Ensure reliability security and performance of platforms and systems.... ...Telecommunication, Information Technology, Cyber Security, Banking, Energy, Utilities and...
- ...Job description / Role We are looking for a Microsoft Security Engineer with expertise in Microsoft 365 (M365) security to design, implement... ...organizations, in Telecommunication, Information Technology, Cyber Security, Banking, Energy, Utilities and various other industry...
- ...experience) Requirements: Bachelor’s in Computer Science / Cybersecurity or related field 5+ years experience in SOC / Information Security (Leadership role) Certifications (SANS / Offensive Security / eLearn Security) preferred Strong knowledge of SIEM, IDS/IPS,...
- ...Description Job Description: Coffee Labs is looking for a motivated and detail-oriented Junior Accountant to join our growing team in Jeddah. The ideal candidate will support daily accounting operations and ensure accuracy in financial processes. Requirements...
- ...global companies by market capitalization. Job Purpose We are seeking an experienced Transition Minerals Strategy Analyst to lead our efforts in securing, managing, and optimizing the sustainable use of transition minerals critical to the global energy transition....
- ...Job Summary Security Controls Cyber-security Analytical Skills Information Technology Information Systems CISA Problem Solving Project Management Data Leakage Database Monitoring This role administers security controls management systems...
- ...Description We are looking for a detail-oriented and motivated Junior Accountant to join our team. This position is open exclusively to candidates of Filipino or Indonesian nationality Requirements: Filipino or Indonesian nationality (required) Bachelor’s...
- Create your
- ...shared accommodation, transportation, and 1 duty meal Location: Riyadh, Saudi Arabia Job Role: We are looking for a dedicated Junior Cook (Commis Chef) to help our kitchen team in Riyadh. In this role, you will work under the senior chefs to prepare fresh...