Search Results: 18,724 vacancies
...Information Technology / Computer Science.
Certification: Microsoft Azure Security/Architecture, Firewall, IPS, Email Gateways, WAF and/or other Security Certifications
Good knowledge of IT systems configuration and log analysis
Strong understanding of...
...outdated and position may be filled
• Configure and troubleshoot security infrastructure devices and Security tools
• Must understand,... ...to implement and document SOP for Security procedures and train IT Teams to conduct the same
• Identify and define system...
...Role: IT security Analyst
Location: Dubai
Manage the installation and configuration of IT security solutions internally, ensuring a high level of system security.
Client Details : A prominent entity in the UAE actively seeking hands-on security
Description...
...Monitor and respond with centrally-deployed IT security tools to alerts raised throughout the GAC Group’s 60+ offices around the world, within the given SLA.
Improve IT Security tools configurations to industry standards to achieve optimal protection from cyber-attacks...
...The job posting is outdated and position may be filled
VAM Systems is currently looking for IT Security Engineer for our UAE operations with the following skillsets & terms and conditions: Responsibility: 1.Talented and enthusiastic individual to join the IT Security...
...Position Overview: The Cyber Security Analyst plays a critical role in safeguarding the digital assets and information of a FastMoving... ...and penetration testing to identify weaknesses in the companys IT infrastructure applications and systems.
Prioritize and remediate...
...Upgrading the entire system to enable compatible software on all computers.
Installing and upgrading anti-virus software to ensure security at the user level.
Disclaimer: Drjobs.ae is only a platform that connects job seekers and employers. Applicants are advised to...
...Consulting with IT managers and other departments as required.
Providing IT assistance to staff and customers.
Training end-... ...hardware and systems.
Maintaining databases and ensuring system security.
Documenting processes and performing diagnostic tests....
...IT Security Analyst Jobs in Dubai, UAE by HR Source | ArabJobs.com
IT Security Analyst
HR Source
- Dubai, UAE
Posted In 23/6/2013 Apply For Job
Applicants 24
Views 6166
Job Description Great opportunity for an experienced IT Security Analyst to...
...In Ihrer neuen Rolle fokussieren Sie sich auf die sicherheitskritischen Aspekte des Systems, wobei Ihr Fokus auf der IT-Security liegt.
Sie analysieren internationale Kundenanforderungen hinsichtlich Security-Gesichtspunkten und stimmen diese darüber hinaus auf...
...GAC Group IT’s dedication to providing top-notch solutions to 6000+ users worldwide... ...our team, we are actively seeking an IT Security Engineer to bring their technological proficiency... ...and Azure Cloud.
Guide GAC branch offices to improve their IT security.
Monitor...
...Cyber Security Officer
About Us:
Orion Funded is committed to advancing secure trading practices. We're seeking a meticulous Cyber Security Officer to join our remote team. If you're dedicated to safeguarding our digital landscape and ensuring the highest levels...
...posting is outdated and position may be filled
Examine internal IT controls, evaluate the design and operational effectiveness,... ...exposure to risk, and develop remediation strategies.
Troubleshoot security and network problems.
Respond to all system and/or network...
...The job posting is outdated and position may be filled
Responsibilities:
• Develop and implement security policies, protocols, and procedures
• Define the IT Security software stack needed to fulfill the company’s security goals
• Create Security Awareness campaigns...
...YOUR TALENT:
3-5 years of experience in implementing secure cloud projects (IaaS, PaaS, DevOps) or working on a similar position
Deep Microsoft Azure cloud knowledge (Enterprise Scale/CAF, Azure AD, Defender for Cloud, Azure Monitor, WAF(OWASP))
Hands-on experience...
...and faulty codes in the program
Continue to provide continuous support and development
Provide the necessary protection and security for data
Access to and continuous updating of programming methods and methods
Provide the necessary training and explain the...
...Governance and Compliance Develops and owns overall security strategy.
Owns and manages process for Incident Detection, Containment... ...Analysis and Response
valuates new cybersecurity threats and IT trends and develops effective security controls.
Oversees...
...• Prepare daily incident reports, requisitions and other inter office memos and ensure that all allegations of the crime and other incidents... ...recorded
• Ensure that all hotel properties are adequately secured at all times
• Coordinate with external police authorities in...
...The job posting is outdated and position may be filled
Planning, implementing, managing, monitoring, and upgrading security measures for the protection of the organization's data, systems, and networks.
Troubleshooting security and network problems.
Responding...
...operations and data backups when required.
Protecting data, software, and hardware by coordinating, planning, and implementing network security measures.
Troubleshooting, diagnosing, and resolving hardware, software, and other network and system problems.
Replacing...