Search Results: 57,105 vacancies
...We are seeking an experienced Information Security Manager to lead and oversee the development, implementation, and management of our information security and business continuity programs. This role is crucial in safeguarding our organization's sensitive data, ensuring...
...Utilize Dr.Job's AI-powered recruiting platform to source and screen candidates for open positions
Work closely with hiring managers and clients to understand their needs and preferences for each job opening
Conduct phone and in-person interviews with potential...
...Leading Bank hiring Information Security Manager
Job Summary:
Manage the analysis, design, development, test, documentation, and implementation of information and network security solutions. Take a leadership role in the development of new security strategies and...
...limitation in closing any of the observations mainly to security projects in first point.
• To implement and manage M365 security products.
• To evaluate,... ...IS management on risk issues that are related to information security and recommend actions in support of the...
...mobile apps, each touch point leads to delighting the customer.
What you'll be doing:
We are seeking an experienced Information Security GRC Manager to work in the Information Security function of the group. You will play a key role in safeguarding the group’s...
...Role : Information Security Programs Manager
Location : Abu Dhabi
Role Purpose:
The main purpose of the role is to ensure Governance and delivery of cybersecurity programs/initiatives/projects within planned target dates, budget and quality and agreed SLAs....
...Project Manager Cyber and Information Security
The job posting is outdated and position may be filled
Our client is a UAE based bespoke IT services provider with a solid client base in Abu The company is at the forefront of adopting the latest technological platforms...
...exciting mandate by our client a leading manufacturing company in the UAE. They are looking for a qualified and experienced Information Security Manager. In this role you will develop risk management processes and oversee the implementation of these new policies. On a...
~ Manager Information Security Governance Remote
Manager Information Security Governance Remote
Monitoring and maintaining networks and servers.
Upgrading, installing and configuring new hardware and software to meet company objectives.
Implementing security...
...of the organization
Performs system security administration on designated technology... ...Performs installation and configuration management of security systems and applications,... ...administrator
Bachelor's degree in information systems, or equivalent work experience...
...personalized selling apps (web & mobile), through the kitchen management system, customer service, delivery, control, and business... ...What You'll Do
~ IS Governance: Assist in Developing information security policies, procedures and necessary documents in compliance...
...the development, implementation, and overall direction of the assigned university area/initiative/program, including fiscal/budget management.
# May be responsible for developing policies and academic research/programs for a center, institute, interdisciplinary...
...headquarter or to participate in AMF missions to member countries.
Information Security Officer
Organization
BUNA
Opening Date
Thursday,... ...of the Information Security Officer include developing and managing Buna’s information security policies & strategy to protect...
...Job Requirements:
Around 5-7 years experience, KPI tracking, ISMS management meetings.
Experience in ISMS policies, auditing, end to end information security experience.
Experience in privacy framework will be added advantage.
Data and privacy experience will...
...verification and protection of Critical Program Information (CPI) per DoDI 5200.39
~ Systems... ...~ Significant knowledge of Security Technical Implementation Guides (STIGs)... ...~ Experience with DOORS requirements management software
~ Experience in eMASS and...
...The job posting is outdated and position may be filled
~ Security Engineer job description should include the responsibility ofcompleting... ..., thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice,...
...units to determine possible risks and risk management processes.
Business development... ...the correct technology.
Analyzing IT security threats in real-time and mitigating these... ...sharing any personal or bank-related information with any third party. If you suspect fraud...
...Description:.
The Information Security Manager is responsible for protecting the university’s computers, servers, network, applications, and data against information security threats, such as security breaches, computer viruses, cyber-attacks, etc. Suggests strategies...
...position may be filled
Testing and analyzing assets for potential security threats.
Identifying possible security threats and... ...Meeting with clients to discuss security measures, provide information, and explained the designed system.
Running risk assessment...
...Desired Skills:
SOC experience : The candidate should have experience working in a Security Operations Center (SOC) and be familiar with the tools and techniques used to monitor and respond to security incidents.
Incident Response experience: The candidate...