Search Results: 421 vacancies
...that includes Palo alto, CISCO, Fortigate , ISE/ASA and other Security Components
enforce security policies and procedures to... ...during technical deployment, configuration, integration and administration of security technologies
# Demonstrate experience around ITIL...
...information
Do
# Ensuring customer centricity by providing aptcybersecurity
# Monitoring and safeguarding the log sources and security access
# Planning for disaster recovery in the event of any securitybreaches
# Monitor for attacks, intrusions and unusual,...
...Title: SmartPlant Foundation Administrator
Objectives:
● Work as fulltime SmartPlant Foundation administrator for the projects service, locating in Jubail, Saudi Arabia.
● As part of the DDTS SP Tools global supporting team to provide a reliable solution of...
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt...
...Hold a bachelor's degree in business administration or a related field.
Good organization and planning skills to manage administrative activities effectively.
Ability to handle information quickly and effectively and use technology to improve administrative processes...
...Hold a bachelor's degree in architecture or a related field.
Deep knowledge of architectural and security systems design concepts and their applications in different environments.
Deep understanding of cybersecurity concepts and best practices for protecting systems...
...Minimum high school diploma; A university degree or professional training in security or business administration is preferred.
Strong knowledge of security concepts and principles, including preventative measures and emergency management.
Ability to analyze risks...
...Hold a bachelor's degree in a related field such as computer science, computer engineering, or information security.
Extensive knowledge of IT security concepts and the various techniques used to protect systems and data.
A deep understanding of potential information...
...At least a high school diploma, preferably a graduate certificate in the field of security.
Knowledge of security procedures and techniques used in maintaining security and safety.
Ability to use surveillance systems and security technology, such as surveillance...
...Bachelor's degree in Computer Science or related field, advanced certifications in information security such as CISSP, CISM, or CEH preferred.
Extensive IT security experience with a deep understanding of threats, vulnerabilities and defensive techniques.
In-depth...
...Education and qualifications:
Bachelor's degree in computer science, information security, computer engineering, or related field.
Recognized cybersecurity certifications such as CEH (Certified Ethical Hacker), CISSP (Certified Information Systems Security Professional...
...deal with emergency situations and take necessary actions quickly and effectively.
Compliance with laws and regulations related to security and safety.
Ability to use specialized security devices and technology, such as surveillance cameras and alarm systems....
Extensive experience using and managing the Microsoft SharePoint platform.
Ability to plan and design advanced and customized SharePoint sites according to business needs.
Strong technical skills in configuring and customizing various components and features in SharePoint...
the conditions:
1- Obtaining a bachelor's degree or higher.
2- Educational specialization is required for teaching jobs.
3- The job applied for is suitable for the specialization.
4- Minimum two years of experience in the same field.
...Education and experience:
Bachelor's or Master's degree in computer science, information security, or related field.
At least 5-7 years of experience in application security or cybersecurity.
Technical knowledge:
Deep understanding of application and software...
Education and training:
Degree in computer science or related field. Recognized networking certifications such as Cisco Certified Network Professional (CCNP) or Juniper Networks Certified Internet Specialist (JNCIS) are a valuable addition.
Experience:
Previous...
...University degree in a related field such as cybersecurity, electronic security, computer science, or equivalent.
Practical experience in the field of security, especially in security coordination, preferably prior experience in areas such as design and implementation...
...degree in information technology, cybersecurity, or similar field. Recognized cybersecurity certifications such as CISSP, CEH, CompTIA Security+ are preferred.
Experience: Practical experience in the field of cybersecurity. Regular jobs may require two to five years of...
Education and experience:
Have a degree in a related field such as real estate management or real estate business. Previous experience in real estate management is a valuable addition.
communication skills:
Strong communication skills to negotiate with tenants...
...multiple tasks and priorities.
Written and oral language:
Proficiency in written and oral language, with the ability to express clearly and effectively.
Use of technology:
Skills in using computers, Office programs, and modern administrative techniques....