Search Results: 39,999 vacancies
...Develop an information security management strategy that is aligned to service and operational requirements and develop information security design criteria and templates.
Review service level and business requirements to develop service methodologies and an information...
...document SoC activities and create reports highlighting the IT security issues, gaps, concerns, criticalities and co-ordinate security... ...Experts (SMEs) and Security Leader.
Safeguard Gulftainer Informations as per Information Security Management System (ISMS) protocols...
...techniques for verification and protection of Critical Program Information (CPI) per DoDI 5200.39
~ Systems Administrator, Software Engineering, and/or Network Engineering Experience
~ Significant knowledge of Security Technical Implementation Guides (STIGs)
~ Master’s...
...or to participate in AMF missions to member countries.
Information Security Officer
Organization
BUNA
Opening Date
Thursday... ...architectures
Manage the daily operations for InfoSec architecture, engineering, operations center, secure development lifecycle, and...
...Define and facilitate the information security risk assessment process in accordance with the enterprise risk management framework, including the reporting and oversight of risk treatment efforts.
Liaise with tech teams, project managers and business units to facilitate...
...experience is beneficial.
University Degree in Computing, Engineering or
PMP, PRINCE II, Agile Scrum certifications are... ...Consulting background and has experience of working on Information Security and Technology projects etc.
On site experience with clients...
...Leading Bank hiring Information Security Manager
Job Summary:
Manage the analysis, design, development, test, documentation, and implementation of information and network security solutions. Take a leadership role in the development of new security strategies and...
...Development of the Information Security Strategy and to other strategies
As a subject matter expert, participate in the development of all required Group digital strategies, including but not limited to digital growth strategy, storage strategy, infrastructure strategy...
Notre m tier consiste transformer les r ves de nos clients acqu reurs en r alit , de les accompagner sur lensemble de leur parcours dachat immobilier : du conseil, la recherche, en passant par les visites, la n gociation, ladministratif et ce, jusqu leur emm
Nous ...
...with users to discuss computer data access needs, to identify security threats and violations, and to identify and recommend needed programming... ...to conceal and protect transfers of confidential digital information.
Develops and implements plans to safeguard digital data...
...certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page. Dr. Job is an online platform...
...Continuously monitor security systems, Dashboards, logs, and alerts to detect and respond to potential security incidents.
Analyze... ..., thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please...
...lateral movement
Seek out indicators of compromise and update security devices such as Firewalls, Web Application Firewalls, Email... ...incidents promptly
Collate security incidents data & prepare Information Security Dashboard on regular basis
Continuously review and...
This service is set to disconnect automatically after {0} minutes of inactivity. Your session will end in {1} minutes. Click OK to reset the timer to {0} minutes.
You have been signed out. This service is set to sign out after {0} minutes of inactivity.
@2018 Smart...
...across the UAE, KSA, Kuwait, Bahrain, and Qatar, and runs its engineering hub in Krakow, Poland, its robotics hub in Denmark, and its... ...What You'll Do
~ IS Governance: Assist in Developing information security policies, procedures and necessary documents in compliance...
...Locations
Posting Date
04/22/2024, 12:32 PM
Job Schedule
Full time
Job Description
As a Senior Director Information Security, you will be part of the information Security Team and responsible for the management, implementation and monitoring of secure...
...deeply rooted in our core values of Prosperity, Integrity, Partnership and Community.
Key responsibilities
and Manage Information Security Risk Assessments and Serves as an internal auditor for Security Issues
and Implement Security Policies and Procedures for...
~ Analyst Information Security Risk Department
Analyst Information Security Risk Department
Experience and proficiency in managing network and enterprise security.
Ability to administer security technologies like PAM, Vulnerability scanners, IPS, SIEM, Patching...
...Collaborating with department managers to determine security needs.
Planning and implementing comprehensive security strategies.... ..., thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please...
~ Manager - Information Security Risk and Compliance
Manager - Information Security Risk and Compliance
Implement risk management processes and capability to enable continuous monitoring of control effectiveness and key risk indicators.
Identify, assess, and...