Get new jobs by email
- ...Industrial Defender, and Microsoft Sentinel, supporting managed security services, threat detection, vulnerability management, and... ...behavior, unauthorized changes, baseline deviations, and potential cyber threats. • Validate alerts, reduce false positives, and perform...
- ...workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA As a Cyber Security & Network Security Engineer at NTT DATA, you’ll be at the center of designing, implementing, and safeguarding secure network...
- ...believe in: Immersive One is the leading cyber resilience solution across the globe. Build... ...with serious vulnerabilities, in a secure environment, as soon as they emerge.” Head... ...practitioner or consulting role as well as time spent working in a Customer Success or similar...
- ...Job Description: Job Title: Senior Cyber Security Service Development Specialist Posting Date: 31 Mar 2026 Requisition ID: 3613 Location: Barakah Posting Status: Active Recruitment Job Purpose Provides direct technical oversight and support for critical...
- Greetings from NES Fircroft !!! Role:Â OT Cyber Security Engineer Location: Â Dubai Contract Duration:Â 12 months, renewable -Long term contract OT Cyber security engineer Certified in IEC/ISA 62443 standards with work experience in process and energy control...
AED15000 per month
...Full job description BCS is seeking a dynamic and results-driven Cyber Security & IT Infrastructure - Sales Account Manager with a proven track record in selling cybersecurity... ...and provide solutions to clients in a timely manner Qualifications Bachelor's degree...- ...Job Summary The Department of Legal Studies at Zayed University is inviting applications for full time positions in Administrative Law, Civil procedures Law & Criminal Law. Candidates should hold a doctorate in Law or a Law & Islamic Sharia from credit university and...
$1000 - $1500 per month
...companies and individuals. For the first time in history since the invention of banking, customers – not banks – can have full ownership of their money. . Thanks to our... ...difference. We have validated the vision and secured the capital from both recurring revenues and...- ...We are seeking a Cyber Security Manager to lead infrastructure modernization, strengthen cybersecurity governance, and ensure efficient IT operations across our +65 hotels and corporate offices throughout the region Key Responsibilities: Lead IT operations, vendor...
- ...Job Description: Job description: Join Burberry Mall of The Emirates – Emirati Client Advisor (Full-Time & Part-Time Opportunities) Are you ready to be at the forefront of luxury fashion in the heart of Dubai? Burberry is looking for passionate Emirati Client...
- ...Job description / Role This is a hands on cyber senior mandate to build the cyber and information security function from the ground up. You will define the organisation's cyber, information security, and data protection posture across corporate environments, operating...
- ...looking for a talented and enthusiastic Security Analyst who will have a strong knowledge... ...assistance with managed services. Respond in a timely manner (within documented SLA) to support... ...product experience. Knowledge of Cyber Kill Chain and MITRE ATT&CK frameworks....
- ...strong English skills (B2–C2) and looking to grow your career with a well-established global digital services company? This is a full-time customer support role serving international users in German and English. Key Responsibilities Handle customer enquiries...Remote job
- ...Solutions will be deployed on various platforms in an automated, secure, and efficient manner, adopting Agile and DevSecOps practices.... ...analytics. Provide support for production issues and ensure timely problem resolution. Provides assistance/support/training to end...
- ...As part of our Cyber Technology Consulting team, you will handle leading and managing Cyber... ...Manage multiple engagements, ensuring timely delivery, quality assurance, and adherence... ...threats, vulnerabilities, and offensive security techniques, and incorporate these insights...
- ...React, JavaScript (ES6+), HTML5, and CSS3. • Knowledge of object-oriented programming. • Understanding accessibility and security compliance. • Understanding fundamental design principles behind a scalable application. • Integration of multiple data sources...
- ...Job Description: We are seeking a highly skilled Full Stack Architect to lead the design and development of business agility layer... ...architecture of mobile app backend systems, ensuring scalability, security, and high performance. Develop and maintain APIs,...
- ...RUSSIAN-SPEAKING PERMANENT FULL-TIME LIVE-IN OR LIVE-OUT NANNY | PALM JUMEIRAH, DUBAI, UAE SALARY: NEGOTIABLE PHS JOB 3324 Perfect... ...staffing agency has been assisting professional Nannies in securing exceptional domestic roles for over 15 years. We are one of...
- ...Description ABOUT KATIM: KATIM is a leader in the development of innovative secure communication products and solutions for governments and businesses. As part of the Space & Cyber Technologies cluster at EDGE, one of the world’s leading advanced technology groups...
- ...for a reliable Timekeeper to record and manage employee attendance, working hours, and overtime. The candidate will ensure accurate time records and support the payroll process. Responsibilities: Record daily attendance of employees and workers Maintain accurate...
- .... Collaborate with AI/ML teams to integrate intelligent features and services into the product stack. Optimize performance, security, and maintainability across frontend and backend components. Lead code reviews, enforce engineering best practices, and contribute...
AED5000 per month
...Full job description It required SIRA certification with UAE experience. UAE Driving... ...be held directly responsible to the Security Manager. Perform duties according to the... ...plan Problem-solving handling issues in time Extensive job-related experience in managing...- ...Description: External Job Description We are seeking a Mid-Level Full Stack Developer to take ownership of ZENITH, our geospatial... ...maintain containerized microservices in Kubernetes using Docker. Security & Identity: Maintain strong security posture through penetration...
- ...Full job description Key Responsibilities: Monitor and patrol premises regularly. Control access to buildings and facilities.... ...High school diploma or equivalent. Proven experience as a security guard preferred. Strong observational and decision-making skills...
- ...servers and storage systems Ensure the team’s DFIR Lab adheres to security, privacy and data integrity standards Implement access... ...incident response engagements Execute lab tasks in support of cyber incident response engagements Proficiency with Digital...
- ...company: from developing solar, wind and hydrogen projects to real-time power trading and distributed energy installations. By selling... .... We are looking for a motivated and detail-oriented Security Engineer to support and strengthen our security posture as we scale...
- ...Job Summary The Security Specialist is responsible for the day to day delivery of high-quality written and verbal travel security briefings... ...Willingness to work outside of normal duty hours, in support of team operations, particularly in time of crisis or emergency...
- ...We are looking for a strong Full-Stack Developer to execute product features and contribute to our core platform development. Your focus... ...What we offer ~€2,500–3,500/month (contractor) ~ Full-time ~ Remote-friendly ~ Clear technical leadership and structured...
- ...CASABOT is looking for a Senior / Mid Full-Stack Engineer to help build and scale the... ...will work on modern web applications, real-time product experiences, backend services,... ...requirements Implement authentication and security mechanisms including OAuth, JWT, and 2FA...
- ...interviews with the client We are looking for a Senior Identity Security Engineer to take ownership of the organisation's identity... ..., and Identity Governance . The role sits within the Cyber Engineering & Architecture function and focuses on ensuring...