Search Results: 2,625 vacancies
...Security Consultant
Lasifaint, Saudi Arabia
Degree in Engineering / Information Technology or related ,CISSP, CISM, CISA , GIAC... ...Finanical / Telecom / Govt. operations
- Multiple Operating Systems knowledge
- Scripting and programming knowledge
- Security...
...Nationality
Vacancy
1 Vacancy
Job Description
1) System Analysis: Analyzes information to develop, improve, and modify... ...Design system flow and procedures to ensure optimum control and security of data and efficient use of resources based on application standard...
...by market capitalization.
Overview
We are seeking a Cyber Security Specialist to join our Global Manufacturing Excellence... ...Operations, Incident Response, Forensics, Penetration Testing, Network, Systems and Application Security, Risk Management, Red Teaming,...
...rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive... ...analysis to identify unauthorized or unacceptable access to data or systems
# Conduct security assessments, risk analysis and root cause...
...NGFWs that includes Palo alto, CISCO, Fortigate , ISE/ASA and other Security Components
enforce security policies and procedures to mitigate risks and safeguard sensitive data.
Secure network systems by defining access control using Cisco ISE.
Deploying and...
...capitalization.
Overview
We are seeking a Petroleum Engineer System Specialist to join the Data Management & Digital Solution... ...processed and interpreted technical data to better address the security, quality and availability of the Petroleum Engineering technical...
...Functional Area
~ Business Development
Keywords
~ Business System Analyst
Disclaimer: Naukrigulf.com is only a platform to... ...or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice...
...aptcybersecurity
# Monitoring and safeguarding the log sources and security access
# Planning for disaster recovery in the event of any... ...toidentify unauthorized or unacceptable access to data or systems
# Conduct security assessments, risk analysis and root causeanalysis...
We are currently seeking a highly qualified individual to join our team in the new position of Cyber Security System Specialist. As our company continues to expand and evolve, it is imperative that we have a dedicated and skilled professional to ensure the safety and security...
...Information Technology
The Job
Establish and maintain information security policy or standards to meet business, legal and regulatory requirements.
Perform risk assessment on IT systems or new projects to identify potential security weaknesses and non-...
...peers (e.g., enterprise, business, information, solutions and security architects) to analyze enterprise business context (business strategy... ...or infrastructure development projects to harmonize systems or infrastructure with the enterprise Communications architecture...
...About the job Business System Analyst
Position Description:
Digital Finance is responsible for the coordination, development, and management of information systems used in financial accounting, treasury, financial planning & forecasting, performance management...
...Purpose of the Role
The purpose of this role is to perform system engineering activities related to industrial automation systems... ...personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or...
...tuning and recovery procedures for mission critical enterprise systems. Serves as a technical expert in the area of system administration... ...procedures, and system performance monitoring tools; systems security,effective project management techniques; principles and...
...Quraishi & Brothers Company (AZAQ)
Senior Specialist - Cyber Security
Khobar, Saudi Arabia
Cyber Security
08 January 2024
Job... ...with AZAQ Group Cyber Security team in the delivery of secure systems and implement proportionate controls by working with various...
...'- 8 years of Security experience and exposure to most current Security standards and operations
- At least 3 years in consulting, auditing and optimizing Security for medium & large Enterprises
CERTIFICATIONS:CISSP
- CISM
- CISA
- GIAC - Audit
- CFE Job...
...operational risks, increasing revenue and optimizing cost across all sites worldwide, through:
Expertise deployment for Safety Systems and Functional Safety solutions & improvements
Development and deployment of world class practices and functional expertise
Identifying...
...GovernmentAffairs
Important keywords
· Research and Development (R&D): Conducting research and participating in the development of sensor systems including radar, vision systems or IoT.
· Project Management : Planning, scheduling, monitoring, and reporting on various...
...Lead Security Engineer, Detection and Response
Circle
Circle is building the largest, most widely used stablecoin network so billions... ..., nearly instantly and less expensively than legacy settlement systems. This ground-breaking new internet layer opens up previously...
...We are seeking a Senior Red Team Expert to join the Information Security Compliance Division (ISCD) of Information Security Department (... ...potential vulnerabilities in company's infrastructure, systems, and applications.
• Develop and execute detailed red teaming...