Search Results: 28,126 vacancies
...We are seeking an experienced Information Security Manager to lead and oversee the development, implementation, and management of our information security and business continuity programs. This role is crucial in safeguarding our organization's sensitive data, ensuring...
...The job posting is outdated and position may be filled
~ Security Engineer job description should include the responsibility ofcompleting... ..., thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice,...
...standards and procedures of the organization
Performs system security administration on designated technology platforms, including... ...experience for a senior security administrator
Bachelor's degree in information systems, or equivalent work experience
Certifications from...
...microservice architecture and we will constantly be creating new ones.
What You'll Do
~ IS Governance: Assist in Developing information security policies, procedures and necessary documents in compliance with applicable standards and regulations.
IS Compliance...
...certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.
Dr.Job is an online platform...
...The Information Security Specialist Will Be Responsible For
Taking ownership of Security Incidents, remediating and investigation incidents
Monitor, detect and report vulnerabilities
Assist with the Azure migration, inc. new security toolings...
...deliver ambitious and highly technical projects, in 120 offices across 50 countries worldwide.
We are looking to recruit an Information Security Consultant to join our existing Information Security team.
Working with the Information Security team to provide advice...
Day-to-Day Responsibilities:
# Responsible for the development, implementation, and overall direction of the assigned university area/initiative/program, including fiscal/budget management.
# May be responsible for developing policies and academic research/programs...
...with users to discuss computer data access needs, to identify security threats and violations, and to identify and recommend needed programming... ...to conceal and protect transfers of confidential digital information.Develops and implements plans to safeguard digital data from...
Job Description: Recruiter at Dr.Job FZ LLC
About the Company:
Dr.Job FZ LLC is a company that aims to make hiring as easy as possible for both employers and job seekers. We provide AI-powered recruiting and job search solutions to find the right talent for every...
...experts and consultants for short periods to work in AMF headquarter or to participate in AMF missions to member countries.
Information Security Officer
Organization
BUNA
Opening Date
Thursday, November 26, 2020 - 12:00 - Tuesday, December 31, 2024 - 12:00...
...position may be filled
Testing and analyzing assets for potential security threats.
Identifying possible security threats and... ...Meeting with clients to discuss security measures, provide information, and explained the designed system.
Running risk assessment...
...o Investigate and analyze security incidents to identify root causes and limit potential damage.
o Coordinate with internal and... ...Qualifications:
.
Bachelor's degree in computer science, information security, or related field.
.
4-5 years of experience...
...Desired Skills:
SOC experience : The candidate should have experience working in a Security Operations Center (SOC) and be familiar with the tools and techniques used to monitor and respond to security incidents.
Incident Response experience: The candidate...
...Around 5-7 years experience, KPI tracking, ISMS management meetings.
Experience in ISMS policies, auditing, end to end information security experience.
Experience in privacy framework will be added advantage.
Data and privacy experience will be added advantage...
...techniques for verification and protection of Critical Program Information (CPI) per DoDI 5200.39
~ Systems Administrator, Software... ...Network Engineering Experience
~ Significant knowledge of Security Technical Implementation Guides (STIGs)
~ Master’s Degree in...
...Responsibilities• Develop and implement an organization-wide information security strategy, policies, and procedures.• Identify and assess potential risks and vulnerabilities in information systems and infrastructure.• Establish security controls and measures to protect...
...planning and acquiring the correct technology.
Analyzing IT security threats in real-time and mitigating these threats.
Ensuring... ..., thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice,...
...Leading Bank hiring Information Security Manager
Job Summary:
Manage the analysis, design, development, test, documentation, and implementation of information and network security solutions. Take a leadership role in the development of new security strategies and...
...Required Skills/Experience
Security certification (CompTIA Security+ or better and must be current)
IT team and project leadership with an emphasis on security
Security policy, procedure, plan, and report writing
Stakeholder communication and...