Get new jobs by email
- ...Job Summary As the successful candidate you will hold a bachelor’s degree in criminal justice, homeland security, political science, international studies, or related subjects. An advanced degree in business, national security, criminal justice, or other field related...
- ...Job Summary The Business System Analysts primary role is to implement proper information security controls to safeguard the organization’s information assets in accordance with company procedures and guidelines, and execute the Data Protection and Data Leakage Programs...
- 1. Cybersecurity Analyst – Security Operations Center Leader "We are seeking a highly experienced Cybersecurity Security Operations Center (SOC) Lead to join our team. The SOC Lead will be responsible for leading and managing the day-to-day operations and ensuring the...
- ...Cybersecurity Specialist acritical role is safeguarding digital assets. Implement and manage robust cybersecurity measures, monitor security incidents, and conduct vulnerability assessments. Provide training to enhance security awareness across the admin area. Your...
- ...Senior Network & Network Security Architect Position Network Architect (10+ Years of Experience) Location Work Pattern Full-time, in-person Interview Remote Job Summary The organization is seeking a highly experienced Senior Network & Network...
- ...Nationality : Saudi Technical Requirements • Basic knowledge of cybersecurity frameworks and standards • Understanding of network security protocols and devices (e.g., firewalls, intrusion detection systems) • Proficiency in operating systems (Windows, Linux) and...
- ...companies in the world, as well as amongst the top five global companies by market capitalization. Overview We are seeking a Security Investigator to join our Corporate Security Department (CSD). CSD is responsible for providing highly specialized professional,...
- ...employees. Preference will be given to Saudi nationals and all applicants must have excellent English language skills. Data Privacy Security Management Business Cherwell Service Management (CSM) Regulatory Requirements Cyber-security Risk Management...
- ...experience with cyber risk management across 3rd party engagement lifecycle ~ Cyber assessment ~ Framework testing Required Cyber Security Third-Party Risk Managment Consultant who passionate professional provide the highest quality services and training. Designing &...
- ...data whenever and wherever they need it. Veeam provides data resilience through data backup, data recovery, data portability, data security, and data intelligence. Based in Seattle, Veeam protects over 550,000 customers worldwide who trust Veeam to keep their businesses...
- ...Asian languages are a strong plus, especially Japanese, Korean, Mandarin, or Hindi. Familiarity with data privacy and enterprise security reviews common across APAC, for example Singapore PDPA, Japan APPI, Korea PIPA, Australia’s Privacy Act, and India’s DPDP Act....
- ...at least four (4) years experience as Chief Engineer on the type of Vessel they are assigned (Non DP - Crew Boat / Offshore Security Patrolling Boats) The Port Engineer shall at all times be able to take over as temporary Chief Engineer on their assigned...
- ...and complex medical conditions. Deliver high‑quality medical consultations to patients Utilize telehealth tools (video, phone, secure messaging) to assess, diagnose, and manage patients. Ensure safe prescribing practices and appropriate use of digital monitoring...
- ...and AI initiatives. Design data models, database structures, and data flow processes to ensure data integrity, availability, and security. Design and oversee the implementation of advanced analytics solutions, including machine learning models and algorithms....
- ...The Security Solution Analyst will be responsible for establishing and maintaining cybersecurity governance frameworks, policies, and procedures, ensuring compliance with cybersecurity laws, regulations, and industry standards. This role will oversee internal reviews...
- ...Comply with Cubic’s values and adherence to all company policy and procedures. In particular comply with the code of conduct, quality, security and occupational health, safety and environmental policies and procedures.* In addition to the duties and responsibilities listed,...
- ...accordance with HIPAA regulations Maintain proficiency in utilizing the designated telehealth platform, including video conferencing, secure messaging, and electronic health records (EHR) integration Maintain complete, accurate, and timely electronic medical records...
- ...for the next many years. You will be working alongside some of the best engineers in the industry working on the largest and most secure projects in the world of oil and gas. This position offers an exceptional salary and benefits package. Key Requirements Minimum...
- ...will receive a competitive salary, rent free accommodation and access to free recreation facilities, all available within Company secured accommodation. In addition, a generous leave and travel allowance makes this an opportunity not to be missed. On successfully securing...
- ...including firewalls antivirus encryption protocols intrusion detection systems access management systems network monitoring solutions security operations center systems and other cybersecurity resources to ensure they are reliable stable scalable secure and perform...
- ...IT stakeholders in Arabic and English. Design solution architectures aligned with customer business objectives, IT landscape, security, and compliance requirements. Prepare technical and functional proposals, solution architecture documents, compliance matrices,...
- ...datasets and complex models. Automate infrastructure provisioning and deployment using Infrastructure as Code (IaC) tools. Ensure security, compliance, and reliability of AI infrastructure. Monitor system performance and troubleshoot issues to minimize downtime and...
- ...will receive a competitive salary, rent‑free accommodation, and access to free recreation facilities, all available within company‑secured accommodation. In addition, a generous leave and travel allowance makes this an opportunity not to be missed. On successfully securing...
- ...Summary To assist the Security Manager in developing, implementing, monitoring and evaluating the hotel’s safety and security procedures, including fire safety, employee and asset protection. Qualifications Ideally with a professional diploma or certificate in...
- ...will receive a competitive salary, rent free accommodation and access to free recreation facilities, all available within Company secured accommodation. In addition, a generous leave and travel allowance makes this an opportunity not to be missed. On successfully securing...
- ...Conduct the design, implementation, and maintenance of enterprise-wide Technology systems, ensuring scalability, reliability, and security and seek approval from the Master Data Quality Manager on the same. Conduct regular assessments and audits to ensure compliance...
- ...experience with log analysis and SIEM tools General knowledge of vulnerability scanning tools Basic understanding of offensive security techniques and the attack lifecycle Certifications Required ~ CompTIA Security+ or CEH Education ~ Bachelor’s degree...
- ...competitive salary, rent‑free accommodation and utilities, with access to free recreation facilities, all available within company secured accommodation. In addition, a generous leave and travel allowance makes this an opportunity not to be missed. On successfully securing...
- ...About Delinea: Delinea is a pioneer in securing human and machine identities through intelligent, centralized authorization, empowering organizations to seamlessly govern their interactions across the modern enterprise. Leveraging AI-powered intelligence, Delinea’s leading...
- ...intelligence of AI to enable everyone to accelerate the results that matter. By taking advantage of all structured and unstructured data — securing and protecting private information more effectively — Elastic’s complete, cloud-based solutions for search, security, and...

