Get new jobs by email
- Security System Maintenance Technician Region: Yanbu (Remote Sites) Job Description: We are looking for a skilled and dedicated Security System Maintenance Technician to join our team. The candidate will be responsible for the maintenance, troubleshooting, and servicing...
- ...Consultant _IT Security & Risk Management Job Title: Consultant IT Security & Risk Management Experience: Must have Big 4 experience About the Role Our client is seeking an experienced consultant in IT Security and Risk Management for a short-term remote...
- A consulting firm is seeking an experienced Consultant in IT Security & Risk Management for a short-term remote engagement. The role will involve supporting risk management initiatives, performing security self-assessments, and creating analytics for stakeholders. Candidates...
- ...UK, Immersive Labs has progressed to the global stage and has secured over €170 million of funding. “The speed at which Immersive Labs... ...from pottery painting and paper mask making, to movie nights and escape rooms While this is a remote position, we do all...
- ...Bristol, UK, Immersive has progressed to the global stage and has secured over €170 million of funding. “The speed at which Immersive... ...from pottery painting and paper mask making, to movie nights and escape rooms While this is a remote position, we do all...
- ...executing projects at the highest level and supporting every stage of the digital journey. Work when and where you want - early bird or night owl, your choice. We care about your health with benefits like life insurance and flexible dress code. Enjoy our Multisport...
- ...projects are executed at the highest level, providing support at every stage of the digital journey. Are you an early bird or a night owl? Choose when and where you work. We care about you. We want to meet your healthcare needs. Life insurance We are thinking...
- ...Asian languages are a strong plus, especially Japanese, Korean, Mandarin, or Hindi. Familiarity with data privacy and enterprise security reviews common across APAC, for example Singapore PDPA, Japan APPI, Korea PIPA, Australia’s Privacy Act, and India’s DPDP Act....
- ...and complex medical conditions. Deliver high‑quality medical consultations to patients Utilize telehealth tools (video, phone, secure messaging) to assess, diagnose, and manage patients. Ensure safe prescribing practices and appropriate use of digital monitoring...
- ...applicable privacy regulations, ensuring that personal data across Unifonic’s CPaaS, SaaS, and AI products is processed lawfully, securely, and transparently. The DPO acts as the independent privacy oversight function and advisor to management on data protection risks...
- ...promote and sell its services to new customers, targeting SME and large businesses across the region of operation. # Continuously secure new business opportunities to meet and exceed monthly/annual revenue and gross profit targets. # Generate leads, pursue potential...
- ...About Delinea: Delinea is a pioneer in securing human and machine identities through intelligent, centralized authorization, empowering organizations to seamlessly govern their interactions across the modern enterprise. Leveraging AI-powered intelligence, Delinea’s leading...
- ...intelligence of AI to enable everyone to accelerate the results that matter. By taking advantage of all structured and unstructured data — securing and protecting private information more effectively — Elastic’s complete, cloud-based solutions for search, security, and...
- ...be contributing to the technology stack, covering web development, API development, DB communication/ handshake, performance, and security measures You will help to make sure systems are operational, visible, and designed for auto-recovery in case of disaster Responsible...
$112000 - $140000 per year
...Performance (Webflow) Webflow Management: Own and manage the entire corporate website infrastructure on Webflow, ensuring stability, security, performance (speed/uptime), and scalability. Site Optimization: Continuously monitor and improve website performance for core...- ...transformation across the globe. We give the world’s largest businesses, service providers, governments, and consumer brands the ability to securely deliver every app, anywhere—with confidence. We do this by working collaboratively in an innovative environment, helping each...
- ...close sales. Global IT network ~ A sound knowledge of all capabilities, systems, services, and network: broadband, unique WiFi security Cisco IP Phones, Call Manager, Worksmart call screen, Intercept, Least Cost Routing Unified Communications, Onefone, Onefax...
- ...authorization to work in selected job location ? * Yes No Yes, I give WSO2 permission to use my personal data for recruitment purposes only. I would like to receive emails from WSO2 to learn about new releases, security announcements, and other updates. #J-18808-Ljbffr...
- ...accordance with HIPAA regulations Maintain proficiency in utilizing the designated telehealth platform, including video conferencing, secure messaging, and electronic health records (EHR) integration Maintain complete, accurate, and timely electronic medical records...
$2000 per year
...Technical Manager, Automotive and Industrial with a passion for open source and precision engineering. Today, Canonical is providing secure and reliable products to our industrial and automotive partners. Our solutions are bridging the gap between Open-Source innovation...$2000 per year
...connected devices and industrial PCs. Our newer edition of Ubuntu for IoT, called Ubuntu Core, represents the state of the art in security and resilience for high‑end appliances and equipment. Our customers include global brands in consumer and industrial electronics as...- ...requirements and deliver fit‑for‑purpose data solutions Implement data quality checks and ensure the consistency, accuracy, and security of datasets Develop and manage data models and schemas to support analytics and reporting functions Optimize performance of...
- ...implementing Enterprise level APIs for large scale organizations using APIGEE. Extensive experience with APIGEE Policies related to Security, Throttling, Data Transformation…etc . Strong experience and knowledge of API Securities such as Basic Auth, oAuth2 flows, SSL...
- ...rabilités existantes, ainsi que connaître les principales vulnérabilités, comme celles présentes dans le top 10 OWASP. En tant que security champion vous accompagnerez nos clients dans une meilleure prise en compte de la sécurité au sein de leurs pratiques de dé...
- ...IT stakeholders in Arabic and English. Design solution architectures aligned with customer business objectives, IT landscape, security, and compliance requirements. Prepare technical and functional proposals, solution architecture documents, compliance matrices,...
- ...operations. We provide hosting space, future-proof upgrades, and 24/7 support through our smart or remote hands, ensuring seamless, secure, and sustainable service. Our fully remote, round-the-clock management frees businesses from supervision hassles, setting new...
- ...reporting skills for incident logs, performance metrics, and network configurations. Strong communication skills for coordinating with security, system administration, application, and IT support teams. Ability to work under pressure and respond quickly to network-...
- ...conferencing, and collaboration tools for Cisco, Avaya, GrandStream and any other potential voice system, ensuring seamless connectivity, security, and performance across all environments in addition to other IT solutions offered by SamaWave Solutions. This role requires a...
SAR 12000 per month
...The ideal candidate will have a degree in Engineering or IT and 1-3 years of experience in similar operations. Key skills include knowledge of electrical systems, HVAC, and physical security controls. The position offers a monthly salary of 12,000 SAR. #J-18808-Ljbffr...- ...Proficiency in scripting and automation (e.g., Bash, Python, Ansible) for managing containerized environments Experience implementing security best practices for containers, including image security, network security, and access control Familiarity with logging,...
