Get new jobs by email
- 1. Cybersecurity Analyst – Security Operations Center Leader "We are seeking a highly experienced Cybersecurity Security Operations Center (SOC) Lead to join our team. The SOC Lead will be responsible for leading and managing the day-to-day operations and ensuring the...
- ...Cybersecurity Specialist acritical role is safeguarding digital assets. Implement and manage robust cybersecurity measures, monitor security incidents, and conduct vulnerability assessments. Provide training to enhance security awareness across the admin area. Your...
- ...Senior Network & Network Security Architect Position Network Architect (10+ Years of Experience) Location Work Pattern Full-time, in-person Interview Remote Job Summary The organization is seeking a highly experienced Senior Network & Network...
- A military medical institution in Dhahran is seeking a Networking Technologist with 3 to 5 years of experience and a B.Tech or MCA degree. The role involves supporting networking tasks as part of a team. Candidates should have strong networking knowledge and a proven track...
- ...Nationality : Saudi Technical Requirements • Basic knowledge of cybersecurity frameworks and standards • Understanding of network security protocols and devices (e.g., firewalls, intrusion detection systems) • Proficiency in operating systems (Windows, Linux) and...
- ...companies in the world, as well as amongst the top five global companies by market capitalization. Overview We are seeking a Security Investigator to join our Corporate Security Department (CSD). CSD is responsible for providing highly specialized professional,...
- ...at least four (4) years experience as Chief Engineer on the type of Vessel they are assigned (Non DP - Crew Boat / Offshore Security Patrolling Boats) The Port Engineer shall at all times be able to take over as temporary Chief Engineer on their assigned...
- ...Asian languages are a strong plus, especially Japanese, Korean, Mandarin, or Hindi. Familiarity with data privacy and enterprise security reviews common across APAC, for example Singapore PDPA, Japan APPI, Korea PIPA, Australia’s Privacy Act, and India’s DPDP Act....
- ...Summary To assist the Security Manager in developing, implementing, monitoring and evaluating the hotel’s safety and security procedures, including fire safety, employee and asset protection. Qualifications Ideally with a professional diploma or certificate in...
- ...The Security Solution Analyst will be responsible for establishing and maintaining cybersecurity governance frameworks, policies, and procedures, ensuring compliance with cybersecurity laws, regulations, and industry standards. This role will oversee internal reviews...
- ...and complex medical conditions. Deliver high‑quality medical consultations to patients Utilize telehealth tools (video, phone, secure messaging) to assess, diagnose, and manage patients. Ensure safe prescribing practices and appropriate use of digital monitoring...
- ...data whenever and wherever they need it. Veeam provides data resilience through data backup, data recovery, data portability, data security, and data intelligence. Based in Seattle, Veeam protects over 550,000 customers worldwide who trust Veeam to keep their businesses...
- ...for the next many years. You will be working alongside some of the best engineers in the industry working on the largest and most secure projects in the world of oil and gas. This position offers an exceptional salary and benefits package. Key Requirements Minimum...
- ...including firewalls antivirus encryption protocols intrusion detection systems access management systems network monitoring solutions security operations center systems and other cybersecurity resources to ensure they are reliable stable scalable secure and perform...
- ...successful systems and applications. Program in C#, web development, .NET, and crystal reports. Comply with and enforce information security and confidentiality policies. Possess preferably healthcare experience. Qualifications Bachelor of Science in...
- ...IT stakeholders in Arabic and English. Design solution architectures aligned with customer business objectives, IT landscape, security, and compliance requirements. Prepare technical and functional proposals, solution architecture documents, compliance matrices,...
- ...experience with log analysis and SIEM tools General knowledge of vulnerability scanning tools Basic understanding of offensive security techniques and the attack lifecycle Certifications Required ~ CompTIA Security+ or CEH Education ~ Bachelor’s degree...
- ...datasets and complex models. Automate infrastructure provisioning and deployment using Infrastructure as Code (IaC) tools. Ensure security, compliance, and reliability of AI infrastructure. Monitor system performance and troubleshoot issues to minimize downtime and...
- ...be contributing to the technology stack, covering web development, API development, DB communication/ handshake, performance, and security measures You will help to make sure systems are operational, visible, and designed for auto-recovery in case of disaster Responsible...
$2000 per year
...activities, and seek credible sources or reviews to assess the trustworthiness of the company. Remember, your personal and financial security is paramount, and taking preventive measures is crucial to safeguarding your information from potential risks and unauthorized use...- ...authorization to work in selected job location ? * Yes No Yes, I give WSO2 permission to use my personal data for recruitment purposes only. I would like to receive emails from WSO2 to learn about new releases, security announcements, and other updates. #J-18808-Ljbffr...
- ...close sales. Global IT network ~ A sound knowledge of all capabilities, systems, services, and network: broadband, unique WiFi security Cisco IP Phones, Call Manager, Worksmart call screen, Intercept, Least Cost Routing Unified Communications, Onefone, Onefax...
$112000 - $140000 per year
...Performance (Webflow) Webflow Management: Own and manage the entire corporate website infrastructure on Webflow, ensuring stability, security, performance (speed/uptime), and scalability. Site Optimization: Continuously monitor and improve website performance for core...- ...brand reputations. Founded in 2017 from a cargo container in Bristol, UK, Immersive has progressed to the global stage and has secured over €170 million of funding. “The speed at which Immersive produces technical content is hugely impressive, and this turnaround...
$2000 per year
...connected devices and industrial PC's. Our newer edition of Ubuntu for IoT, called Ubuntu Core, represents the state of the art in security and resilience for high end appliances and equipment. Our customers include global brands in consumer and industrial electronics...- ...accordance with HIPAA regulations Maintain proficiency in utilizing the designated telehealth platform, including video conferencing, secure messaging, and electronic health records (EHR) integration Maintain complete, accurate, and timely electronic medical records...
- ...Security Architecture Development Design and implement a comprehensive cybersecurity architecture framework that aligns with business objectives and mitigates risks. Create security guidelines and best practices to ensure the confidentiality, integrity, and availability...
- ...Perform data analysis tasks to optimize processes and inform business decisions Ensure compliance with data governance and security policies. Provide training and support to teams on MIS and data analysis tools. Assist in improving data collection procedures...
- ...~ Strong communication (verbal, listening, written), presentation and negotiation skills ~ Knowledge of the physical or cyber security market will be an advantage ~ Fluent in English and Arabic ~ Well-structured in forecasting and delivering results What Axis...
- ...with policies and procedures. A Bachelor's Degree in Information Technology, along with certifications such as CISSP and CompTIA Security+, is required. The role requires a minimum of 3 years of relevant experience and fluent English communication skills. #J-18808-Ljbffr...

