Get new jobs by email
- ...This position is posted by Jobgether on behalf of a partner company. We are currently looking for a Senior Software Engineer (Security) in Saudi Arabia. In this role, you will design, develop, and maintain advanced security features for large-scale web platforms, ensuring...
- ...participating in industry events. The ideal candidate will have an engineering degree, strong problem-solving capabilities, and at least 5 years of relevant experience in a technological or security setting. Bilingual in Arabic and English is a requirement. #J-18808-Ljbffr...
- ...needs Source and evaluate suppliers based on quality, cost, and delivery speed Negotiate contracts and terms with suppliers to secure advantageous deals Monitor and track procurement activities to ensure compliance with company policies Identify opportunities...
- ...data whenever and wherever they need it. Veeam provides data resilience through data backup, data recovery, data portability, data security, and data intelligence. Based in Seattle, Veeam protects over 550,000 customers worldwide who trust Veeam to keep their businesses...
- ...product development. This role combines strategic leadership with hands-on technical involvement, ensuring high-quality, scalable, and secure software solutions. You will work closely with Product, Design, and other departments to align engineering initiatives with...
- ...transformation across the globe. We give the world’s largest businesses, service providers, governments, and consumer brands the ability to securely deliver every app, anywhere—with confidence. We do this by working collaboratively in an innovative environment, helping each...
- ...identity and access management for 12,000 organizations around the world, managing 25 million enterprise identities and providing secure, convenient access to millions of users. RSA specializes in empowering security-first organizations in financial services, healthcare...
- ...description #127757; Genetec - Protect the everyday We are a global Canadian company with a broad solutions portfolio encompassing security , intelligence, and operations. We serve customers within various industries including transportation, education , and...
- ...sites. Job Description Raffles & Fairmont the Red Sea is seeking a highly experienced and visionary Cluster Director of Security to oversee all aspects of security operations for our luxury properties in Umluj, Saudi Arabia. This key leadership role will be...
- ...work augmentation. Implement intelligent document processing for structured and unstructured data. Ensure proper governance, security, and compliance for AI implementations. Evaluate and pilot emerging automation technologies. Integration & Operations...
- ...B Contract) in Saudi Arabia. This role offers the opportunity to design and scale backend systems that play a critical role in securing modern software ecosystems. You will work in a fast-paced, engineering-driven environment alongside highly skilled peers, contributing...
- ...blockchains. By harnessing the power of blockchain technology, Tether enables you to store, send, and receive digital tokens instantly, securely, and globally, all at a fraction of the cost. Transparency is the bedrock of everything we do, ensuring trust in every transaction...
- ...reporting skills for incident logs, performance metrics, and network configurations. Strong communication skills for coordinating with security, system administration, application, and IT support teams. Ability to work under pressure and respond quickly to network-...
- ...About Delinea: Delinea is a pioneer in securing human and machine identities through intelligent, centralized authorization, empowering organizations to seamlessly govern their interactions across the modern enterprise. Leveraging AI-powered intelligence, Delinea’s leading...
- ...with a proactive approach. Its mission is to develop innovative open-source solutions designed to anticipate cyber threats, identify security gaps, and strengthen organizational security posture. Filigran solutions are now trusted by over 6,000 public and private...
- ...promote and sell its services to new customers, targeting SME and large businesses across the region of operation. # Continuously secure new business opportunities to meet and exceed monthly/annual revenue and gross profit targets. # Generate leads, pursue potential...
- ...customers. The role involves assessing customer requirements, leading technical discovery sessions, and ensuring solutions adhere to security and compliance best practices. Candidates should have extensive experience in data protection and backup, strong problem-solving...
- ...enhance its fast-growing tech operations. The role involves designing scalable systems, developing core backend services, and ensuring security and compliance. Ideal candidates will have 5+ years in backend development with expertise in PHP and experience working with SQL/...
- ...leading technology firm in Saudi Arabia seeks an IT Monitoring Center – Network Monitoring Specialist to ensure the performance and security of their network. Ideal candidates will have a diploma or bachelor's degree in IT and 1-2 years of experience in networking....
- ...based on your experience and skills. We value your passion to discover, invent, simplify and build. Protecting your privacy and the security of your data is a longstanding top priority for Amazon. Please consult our Privacy Notice ( ) to know more about how we collect,...
- ...blockchains. By harnessing the power of blockchain technology, Tether enables you to store, send, and receive digital tokens instantly, securely, and globally, all at a fraction of the cost. Transparency is the bedrock of everything we do, ensuring trust in every transaction...
- ...analytics, our products empower governments, financial institutions, and crypto businesses to combat illicit activity and global security threats. At TRM, you'll join a mission-driven, fast-paced team made up of experts in law enforcement, data science, engineering, and...
- ...blockchains. By harnessing the power of blockchain technology, Tether enables you to store, send, and receive digital tokens instantly, securely, and globally, all at a fraction of the cost. Transparency is the bedrock of everything we do, ensuring trust in every transaction...
- ...experiences Implementing workflows and business processes using Power Automate or SharePoint Designer Configuring and managing security settings, permissions, and user access controls within SharePoint Online Migrating content and data from on-premises SharePoint...
- ...Sicherheit von Industrieanlagen in Zeiten rasant zunehmender Vernetzung von Komponenten und Maschinen –Stichwort Operational Technology Security – ebenso wie für die Energieerzeugung, -nutzung und -verteilung,sowie die Infrastruktur und den Netzausbau. Unsere...
- ...Participate in the recruitment, onboarding, and performance evaluation of housekeeping colleagues. Implement and reinforce safety and security measures within the housekeeping department. Foster a positive and collaborative work environment to boost team morale and...
- ...sales calls, client visits, site inspections, and familiarization (FAM) trips. Maintain excellent relationships with partners to secure repeat and long-term business. Qualifications Bachelor’s degree in Business Administration, Marketing, or related field (Master...
- ...~ Pre-Opening & System Setup. Actively assist the DOF in the financial setup phase, including establishing bank accounts, securing necessary permits, and finalizing the accounting software structure (e.g., SAP, SunSystems) tailored for a cluster operation. Develop...
- ...&B outlets, Spa & Boutique as per policy. · Ensure that all merchandise are stored properly in locked storage areas and monitor security control of key for such areas · Ensure proper issuance for F&B items from the Store · Establish and maintain a cost allocation...
- ...anticipated business, operating budgets and standards of service To recruit and select Banquet employees Ensure proper care, security and maintenance of Banquet equipment through proper supervision of service personnel, including outside contractors Assume...
