Search Results: 240 vacancies
...such as computer science, computer engineering, or information security.
Extensive knowledge of IT security concepts and the... ...vulnerabilities and how to deal with them.
Ability to provide technical consultations and develop effective security policies and procedures based...
...Science or related field, advanced certifications in information security such as CISSP, CISM, or CEH preferred.
Extensive IT... ...management, and access control.
Ability to provide technical consultations and develop security policies and procedures based on best practices...
...Education and experience:
Bachelor's or Master's degree in computer science, information security, or related field.
At least 5-7 years of experience in application security or cybersecurity.
Technical knowledge:
Deep understanding of application and software...
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt...
...of current networks as per business requirements
Managing NGFWs that includes Palo alto, CISCO, Fortigate , ISE/ASA and other Security Components
enforce security policies and procedures to mitigate risks and safeguard sensitive data.
Secure network systems by...
...information
Do
# Ensuring customer centricity by providing aptcybersecurity
# Monitoring and safeguarding the log sources and security access
# Planning for disaster recovery in the event of any securitybreaches
# Monitor for attacks, intrusions and unusual,...
...degree in information technology, cybersecurity, or similar field. Recognized cybersecurity certifications such as CISSP, CEH, CompTIA Security+ are preferred.
Experience: Practical experience in the field of cybersecurity. Regular jobs may require two to five years of...
...Hold a bachelor's degree in architecture or a related field.
Deep knowledge of architectural and security systems design concepts and their applications in different environments.
Deep understanding of cybersecurity concepts and best practices for protecting systems...
Holds a high school diploma or equivalent.
Good physical strength and ability to work in harsh conditions.
Good communication skills.
Ability to deal with emergency situations effectively.
Compliance with security laws and regulations.
...At least a high school diploma, preferably a graduate certificate in the field of security.
Knowledge of security procedures and techniques used in maintaining security and safety.
Ability to use surveillance systems and security technology, such as surveillance...
...Education and qualifications:
Bachelor's degree in computer science, information security, computer engineering, or related field.
Recognized cybersecurity certifications such as CEH (Certified Ethical Hacker), CISSP (Certified Information Systems Security Professional...
...Minimum high school diploma; A university degree or professional training in security or business administration is preferred.
Strong knowledge of security concepts and principles, including preventative measures and emergency management.
Ability to analyze risks...
...deal with emergency situations and take necessary actions quickly and effectively.
Compliance with laws and regulations related to security and safety.
Ability to use specialized security devices and technology, such as surveillance cameras and alarm systems....
...University degree in a related field such as cybersecurity, electronic security, computer science, or equivalent.
Practical experience in the field of security, especially in security coordination, preferably prior experience in areas such as design and implementation...
The ability to work together and cooperate with the work team.
Proficiency in oral and written communication skills.
Possessing creativity and creating appropriate solutions to problems.
Flexibility and ability to face work pressures and challenges.
Commercial...
...University degree in a related field such as information technology, cybersecurity, security management, or a related field.
Deep knowledge of cybersecurity methods and best practices in the field of security.
A comprehensive understanding of network systems and...
...University degree in a related field such as cybersecurity, risk management, engineering, or any related discipline.
Deep knowledge of security incident and event management methods and related regulatory frameworks, such as NIST, ISO 27001, or other standards.
Ability...
Education and Specialization: Bachelor's degree in Dentistry with a specialty in Conservative Dentistry. A postgraduate degree (Master's or Doctorate) in the field of conservative dentistry is preferred.
Licensing and Registration: The applicant must be registered and...
Deep understanding of business processes and functional processes in a specific field.
Ability to analyze customer needs, identify problems and opportunities, and provide appropriate functional solutions.
Effective communication skills to interact with customers ...
...a Master of Business Administration (MBA) or specialized certifications.
Work experience: Previous experience as a functional consultant or in the field of business analysis, and a deep understanding of business processes and technical processes, if any.
Analysis...