Search Results: 35,182 vacancies
...position may be filled
Testing and analyzing assets for potential security threats.
Identifying possible security threats and... ...Meeting with clients to discuss security measures, provide information, and explained the designed system.
Running risk assessment...
...Develop an information security management strategy that is aligned to service and operational requirements and develop information security design criteria and templates.
Review service level and business requirements to develop service methodologies and an information...
...experience : The candidate should have experience working in a Security Operations Center (SOC) and be familiar with the tools and... ..., thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please...
...Define and facilitate the information security risk assessment process in accordance with the enterprise risk management framework, including the reporting and oversight of risk treatment efforts.
Liaise with tech teams, project managers and business units to facilitate...
...be filled
Assessing the status of company IT, network, and security systems.
Designing and implementing security networks and protocols... ..., thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice,...
...standards and procedures of the organization
Performs system security administration on designated technology platforms including... ...experience for a senior security administrator
Bachelors degree in information systems or equivalent work experience
Certifications from...
...Responsibilities• Develop and implement an organization-wide information security strategy, policies, and procedures.• Identify and assess potential risks and vulnerabilities in information systems and infrastructure.• Establish security controls and measures to protect...
...with users to discuss computer data access needs, to identify security threats and violations, and to identify and recommend needed programming... ...to conceal and protect transfers of confidential digital information.
Develops and implements plans to safeguard digital data...
...certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.
Dr. Job is an online...
...The job posting is outdated and position may be filled
~ Security Engineer job description should include the responsibility ofcompleting... ..., thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice,...
...document SoC activities and create reports highlighting the IT security issues, gaps, concerns, criticalities and co-ordinate security... ...Experts (SMEs) and Security Leader.
Safeguard Gulftainer Informations as per Information Security Management System (ISMS) protocols...
...Development of the Information Security Strategy and to other strategies
As a subject matter expert, participate in the development of all required Group digital strategies, including but not limited to digital growth strategy, storage strategy, infrastructure strategy...
...planning and acquiring the correct technology.
Analyzing IT security threats in real-time and mitigating these threats.
Ensuring... ..., thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice,...
...experts and consultants for short periods to work in AMF headquarter or to participate in AMF missions to member countries.
Information Security Officer
Organization
BUNA
Opening Date
Thursday, November 26, 2020 - 12:00 - Tuesday, December 31, 2024 - 12:00...
Day-to-Day Responsibilities:
# Responsible for the development, implementation, and overall direction of the assigned university area/initiative/program, including fiscal/budget management.
# May be responsible for developing policies and academic research/programs...
...microservice architecture and we will constantly be creating new ones.
What You'll Do
~ IS Governance: Assist in Developing information security policies, procedures and necessary documents in compliance with applicable standards and regulations.
IS Compliance...
...Leading Bank hiring Information Security Manager
Job Summary:
Manage the analysis, design, development, test, documentation, and implementation of information and network security solutions. Take a leadership role in the development of new security strategies and...
...Collaborating with department managers to determine security needs.
Planning and implementing comprehensive security strategies.... ..., thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please...
Notre m tier consiste transformer les r ves de nos clients acqu reurs en r alit , de les accompagner sur lensemble de leur parcours dachat immobilier : du conseil, la recherche, en passant par les visites, la n gociation, ladministratif et ce, jusqu leur emm
Nous ...
...Security certification (CompTIA Security+ or better and must be current)
IT team and project leadership with an emphasis on security... ..., thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice,...