Search Results: 211 vacancies
...development goals.
Expertise in analysis: the ability to evaluate a client's capabilities and weaknesses and determine appropriate training plans.
Communication Skills: Ability to communicate effectively with clients and direct them clearly and supportively....
sennder is Europe s leading digital freight forwarder. In a traditional industry, we are moving fast to digitize and automate all road logistics processes. We are a growing team looking for a Chef Comptable to help us on our journey to revolutionize road freight logistics...
...Hold a bachelor's degree in architecture or a related field.
Deep knowledge of architectural and security systems design concepts and their applications in different environments.
Deep understanding of cybersecurity concepts and best practices for protecting systems...
...Minimum high school diploma; A university degree or professional training in security or business administration is preferred.
Strong knowledge of security concepts and principles, including preventative measures and emergency management.
Ability to analyze risks...
...Bachelor's degree in Computer Science or related field, advanced certifications in information security such as CISSP, CISM, or CEH preferred.
Extensive IT security experience with a deep understanding of threats, vulnerabilities and defensive techniques.
In-depth...
Preparing regular reports for senior management.
Maintain budgets and optimize expenses.
Ensure that employees follow health and safety regulations.
Representing the institution in various conferences and meetings.
Providing various solutions to problems that...
...Education and experience:
Bachelor's or Master's degree in computer science, information security, or related field.
At least 5-7 years of experience in application security or cybersecurity.
Technical knowledge:
Deep understanding of application and software...
...Education and qualifications:
Bachelor's degree in computer science, information security, computer engineering, or related field.
Recognized cybersecurity certifications such as CEH (Certified Ethical Hacker), CISSP (Certified Information Systems Security Professional...
...deal with emergency situations and take necessary actions quickly and effectively.
Compliance with laws and regulations related to security and safety.
Ability to use specialized security devices and technology, such as surveillance cameras and alarm systems....
...At least a high school diploma, preferably a graduate certificate in the field of security.
Knowledge of security procedures and techniques used in maintaining security and safety.
Ability to use surveillance systems and security technology, such as surveillance...
The ability to work together and cooperate with the work team.
Proficiency in oral and written communication skills.
Possessing creativity and creating appropriate solutions to problems.
Flexibility and ability to face work pressures and challenges.
Commercial...
...Hold a bachelor's degree in a related field such as computer science, computer engineering, or information security.
Extensive knowledge of IT security concepts and the various techniques used to protect systems and data.
A deep understanding of potential information...
...University degree in a related field such as cybersecurity, electronic security, computer science, or equivalent.
Practical experience in the field of security, especially in security coordination, preferably prior experience in areas such as design and implementation...
...University degree in a related field such as information technology, cybersecurity, security management, or a related field.
Deep knowledge of cybersecurity methods and best practices in the field of security.
A comprehensive understanding of network systems and...
...University degree in a related field such as cybersecurity, risk management, engineering, or any related discipline.
Deep knowledge of security incident and event management methods and related regulatory frameworks, such as NIST, ISO 27001, or other standards.
Ability...
...in developing and implementing governance frameworks and compliance programs.
Cybersecurity Policy Management
Cybersecurity Training & Awareness
Cybersecurity Regulatory & Policy Compliance
Privacy and Data protection
Cybersecurity Matrix, Risk Register,...
...Certified Data Security Specialist
Primary Responsibilities :
# Cisco ESA, WSA, AMP
# Tenable Nessus
# Imperva WAF, DDOS
# SecurelyShare (Watermark) & Titus
# RSA Netwitness
# Cisco Threat Grid (TG)
Secondary Responsibilities :
# Palo Alto Firewall...
...keep it updated with the new
Can review and approve Microsoft security patches prior to
Do required OS support and VMware... ...professional certification in VMware, Hyper-V, and/or
Has at least training or one professional certification in VMware vSAN: Management and...
...experienced Project Manager to lead and manage our Airport ICT,Security Systems and Special Airport Systems projects for Red Sea Airport... ..., diversity, and innovation.
· Market specific training and on-going personal development.
If this is your dream role...
...project - these are responsibilities that will grow with the role - training will be provided by the Client
Assist with development of... ..., or Oracle Integration Cloud
Experience with basic network security and topology concepts, to include enterprise VPNs and firewalls...