Search Results: 529 vacancies

 ...We are looking for a dedicated and experienced Security Supervisor to join our team in Jubail, Saudi Arabia. The ideal candidate will...  ...technologies and trends. # Manage and maintain security equipment and systems. # Assist in the recruitment and selection of security... 

Oil Support Services

Jubail
4 days ago
 ...NGFWs that includes Palo alto, CISCO, Fortigate , ISE/ASA and other Security Components  enforce security policies and procedures to mitigate risks and safeguard sensitive data. Secure network systems by defining access control using Cisco ISE. Deploying and... 

Wipro Technologies

Jubail
1 day ago
 ...aptcybersecurity # Monitoring and safeguarding the log sources and security access # Planning for disaster recovery in the event of any...  ...toidentify unauthorized or unacceptable access to data or systems # Conduct security assessments, risk analysis and root causeanalysis... 

Wipro Limited

Jubail
4 days ago
 ...An exciting opportunity is available for Sr Specialist I, OT System Admin, Located in Jubail, KSA POSITION SUMMARY: To support...  ...the Operational Technology Infrastructure & implement cyber security controls to assure safe and reliable operations. KEY TASKS... 

Tasnee

Jubail
4 days ago
 ...Recognized cybersecurity certifications such as CISSP, CEH, CompTIA Security+ are preferred. Experience: Practical experience in the field...  ...of information security concepts, networks, operating systems, malware, hacking techniques and how to prevent them. Analysis... 

tasnee

Jubail
5 days ago
 ...rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive...  ...analysis to identify unauthorized or unacceptable access to data or systems # Conduct security assessments, risk analysis and root cause... 

Wipro Technologies

Jubail
20 hours ago
 ...operational risks, increasing revenue and optimizing cost across all sites worldwide, through: Expertise deployment for Safety Systems and Functional Safety solutions & improvements Development and deployment of world class practices and functional expertise Identifying... 

Bounty Hunter World

Jubail
2 days ago
 ...Hold a bachelor's degree in architecture or a related field. Deep knowledge of architectural and security systems design concepts and their applications in different environments. Deep understanding of cybersecurity concepts and best practices for protecting systems... 

Alfanar saudi

Jubail
23 days ago
 ...in a related field such as computer science, computer engineering, or information security. Extensive knowledge of IT security concepts and the various techniques used to protect systems and data. A deep understanding of potential information security threats and... 

Alfanar saudi

Jubail
23 days ago
 ...school diploma, preferably a graduate certificate in the field of security. Knowledge of security procedures and techniques used in maintaining security and safety. Ability to use surveillance systems and security technology, such as surveillance cameras and fire... 

NWC

Jubail
a month ago
 ...Recognized certifications in various disciplines of information systems operation may be preferred. Technical skills: Experience in...  ...managing networks, operating systems, databases, and information security. These skills may include operating and maintaining various... 

tasnee

Jubail
5 days ago
 ...APQ INSTRUMENT \U0026AMP; CONTROL SYSTEMS ENGINEER COMPANY PROFILE Air Products Qudra is a regional development and investment joint venture (JV) between Air Products and Qudra Energy, a subsidiary of Vision Invest. Air Products is a world-leading industrial gases... 

Air Products Middle East Industrial Gasses LLC

Jubail
20 hours ago
 ...On Bonus of $5,000 for Solo Drivers $2,000 to each driver after completion of first dispatch $3,000 to each driver at 60 days Alpha Freight Systems Class A CDL 12 Months Recent Tractor Trailer Truck Driving Experience Clean Driving Record Clean Background

Nahdi Medical Pharmacies Company

Jubail
9 days ago
 ...qualifications: Bachelor's degree in computer science, information security, computer engineering, or related field. Recognized...  ...as CEH (Certified Ethical Hacker), CISSP (Certified Information Systems Security Professional), or CompTIA Security+. Practical experience... 

Alfanar

Jubail
28 days ago
Holds a high school diploma or equivalent. Good physical strength and ability to work in harsh conditions. Good communication skills. Ability to deal with emergency situations effectively. Compliance with security laws and regulations.

IHG Hotels & Resorts

Jubail
1 day ago
 ...deal with emergency situations and take necessary actions quickly and effectively. Compliance with laws and regulations related to security and safety. Ability to use specialized security devices and technology, such as surveillance cameras and alarm systems.... 

NWC

Jubail
a month ago
 ...knowledge of code versioning tools [such as Git, Bitbucket or SVN ] is a plus Working knowledge of/on different Operating Systems like Linux, Unix, Windows Experience/Knowledge in creating tables, partitioning, bucketing, loading, and aggregating data using... 

Nahdi Medical Pharmacies Company

Jubail
9 days ago
 ...Bachelor's degree in Computer Science or related field, advanced certifications in information security such as CISSP, CISM, or CEH preferred. Extensive IT security experience with a deep understanding of threats, vulnerabilities and defensive techniques. In-depth... 

Alfanar saudi

Jubail
23 days ago
 ...Hold a bachelor's degree in computer engineering, electrical engineering, or a related field. Deep knowledge of information systems concepts and embedded design. Advanced understanding of embedded systems and extensive knowledge of electronic systems components and... 

Alfanar saudi

Jubail
23 days ago
 ...a related field such as information technology, cybersecurity, security management, or a related field. Deep knowledge of cybersecurity...  ...field of security. A comprehensive understanding of network systems and technology used in cybersecurity. Ability to analyze... 

NWC

Jubail
a month ago