Search Results: 19,952 vacancies
...Technology Enablement, IT Outsourcing, Cyber security, Digital Infrastructure, Hybrid Cloud,... ...technology system integration, consultancy, operation, managed services, and IT outsourcing... ...coordinate and facilitate the implementation of OT Security Solutions and maintain OT...
...Responsibilities:
# Ideate, Test, Design and Launch a Complete Offering Portfolio for OT Cyber Security
# Identify business opportunities in the market for the company's OT Cyber Security Offerings
# Establish partnerships with relevant third parties in the OT Marketspace...
What We Offer.
Hybrid working concept in an international environment
Development opportunities for both personal and professional grow
An environment where everyone can bring their whole self to work and feel a sense of belonging
Broal range...
...Required Skills:
~5+ years’ IT endpoint security experience at enterprise scale in an operational technology (OT) manufacturing environment
~ Knowledge of industry leading USB and removable media security controls practices for endpoints
~ Knowledge...
...Immediate Opening
Sectrio is a technology market leader on the Internet of Things (IoT), Operational Technology (OT), Information Technology (IT), and 5G Security products for securing most critical assets, data, networks, supply chains, and device architectures for...
...Cyber Security OT Assurance Senior Specialist
The job posting is outdated and position may be filled
Planning, implementing, managing, monitoring, and upgrading security measures for the protection of the organization's data, systems, and networks.
Troubleshooting...
...services.
Lead client engagements in security advisory at the highest strategic level.... ...identify the client's problems and use common consulting management skills such as facilitation,... ...C-level panels to provide exceptional IT/OT/Cloud/Physical security, compliance,...
...is outdated and position may be filled
A- Build and deploy security infrastructure and automate security operations for customers.... ...tools, reference architectures, and white papers to help our consultants, partners, and customers build on the work we deliver.
Disclaimer...
...Responsibilities:
Collaborating with department managers to determine security needs.
Planning and implementing comprehensive security strategies.
Controlling the security operations budget, monitoring expenses, and documenting processes.
Supervising...
...Job Description:
Conduct cybersecurity risk assessments and vulnerability assessments of OT systems and networks. Design and deploy security controls and technologies to safeguard OT assets, including firewalls, intrusion detection/prevention systems, antivirus software...
...Responsible to drive cyber security business across the UAE region across customer segments with special emphasis on BFSI, Energy &... ...Cyber Practitioners and grow the team
Build, manage and lead a consulting team to support your growing consultancy business
Working...
...to quality and innovation. They have chosen Dautom as their trusted partner for their upcoming projects.
Job Title: Security Project Consultant
Responsibilities:
Ensuring the scopes and schedules of command controls projects are achievable within the given...
...Principal OT Security Solution Architect
• The role is crucial to our client’s success in the market and strongly sales-focused to ensure increased business. Main duties are pre-sales activities including client meetings solution positioning, requirements gathering,...
...The job posting is outdated and position may be filled
Testing and analyzing assets for potential security threats.
Identifying possible security threats and determining the best security measures.
Designing, implementing, and maintaining security protocols,...
...The job posting is outdated and position may be filled
One of our clients, a global IT consulting firm is looking for a Network Security Consultant to be based in Dubai.UAE experienced candidates are preferred.
Network Security Skills
Good understanding of...
...Around 5-7 years experience, KPI tracking, ISMS management meetings.
Experience in ISMS policies, auditing, end to end information security experience.
Experience in privacy framework will be added advantage.
Data and privacy experience will be added advantage....
...The job posting is outdated and position may be filled
Testing and analyzing assets for potential security threats.
Identifying possible security threats and determining the best security measures.
Designing, implementing, and maintaining security protocols,...
...Lead Information Security review and audit projects.
Assess compliance and alignment with best practices and propose remediation... ...(2-5) years of related work experience in security in similar consulting practice is preferred.
Hands on experience on technical testing...
...assistance service support for IT in Certification Authority (CA) Registration Authorities (RA) and other PKI components to meet the security requirements
Understand the different regulatory and industry best practices of implementing PKI solution and ensures these...
...implementation lifecycles.
• Knowledge of integrated processes in SAP system, SAP authorization & User Management in complex SAP Security Environment.
• SAP security knowledge in basic SAP Modules like MM, FICO, SD, PP and HR is preferable
• Candidate should have...