Search Results: 52,417 vacancies
...available for night shift and early mornings. Some layovers in hotel will be required 5 days per week, 2 days off. Must be flexible to work some weekends! 2-4 stops per delivery.
Pay: $25.00/hour.
Qualifications:
#-Previous 1 year experience in truck driving or...
...Responsibilities:
Collaborating with department managers to determine security needs.
Planning and implementing comprehensive security... ...and implementing preventative measures.
Developing work schedules, allocating tasks, and monitoring personnel...
...Cyber Security Officer
About Us:
Orion Funded is committed to advancing secure trading practices. We're seeking a meticulous Cyber Security... ...cyber threats, security trends, and best practices.
Remote Work Advantage:
Harness the flexibility of remote work to...
...position may be filled
Responsibilities:
• Enhance application security framework, review existing applications’ architecture, and... ...CERT Secure Coding to address common coding vulnerabilities.
• Work with business and product teams to incorporate security controls...
...Responsible to drive cyber security business across the UAE region across customer segments with special emphasis on BFSI, Energy & Utilities... ...team to support your growing consultancy business
Working with global and local teams, help organize project approaches...
...position may be filled
As Director of Consulting, you will be responsible for the growth of an outstanding organisation of 40 Security Professionals delivering solutions across EMEA.
• The Consulting director will be responsible for effectively managing projects,...
...The job posting is outdated and position may be filled
Planning, implementing, managing, monitoring, and upgrading security measures for the protection of the organization's data, systems, and networks.
Troubleshooting security and network problems.
Responding...
...posting is outdated and position may be filled
Safeguards information system assets by identifying and solving potential and actual security problems.
Protects system by defining access privileges, control structures, and resources.
Recognizes problems by...
...degree in information technology, cybersecurity, or similar field. Recognized cybersecurity certifications such as CISSP, CEH, CompTIA Security+ are preferred.
Experience: Practical experience in the field of cybersecurity. Regular jobs may require two to five years of...
...ResponsibilitiesDevelop and implement cyber security strategies and protocols to protect sensitive information and systems.Conduct regular vulnerability assessments and penetration testing to identify and address potential security risks.Monitor and analyze network traffic...
• seeking to build in security during the development stages of software systems, networks and data center
• Checking for vulnerable situation and risks in hardware and software
• Seeking and find the way to secure the IT infrastructure of an organization
• Building...
...scope and propose improvements. Closely working with other SOC teams, and assisting them... ...services.
Lead client engagements in security advisory at the highest strategic level.... ...security trends and methods for pinpointing cyber and physical security solutions that fit...
...The job posting is outdated and position may be filled
Implements security controls, risk assessment framework, and program that align to regulatory requirements, ensuring documented and sustainable compliance that aligns and advances College business objectives....
...Position: Senior Cyber Security Engineer
The Senior Cyber Security Engineer plays a crucial role in safeguarding the organization's digital... ...can be beneficial.
Some travel and possible project work at customers' offices
Some out-of-hours work
#J-18808-Ljbffr
...may be filled
A thorough understanding of the organization's technology and IT systems.
Planning, researching, and designing security architectures.
Developing, reviewing, and approving the installation requirements for LANs, WANs, VPNs, routers, firewalls, and...
...Job Description:
To work with control system SMEs and operational staff to design, implement and support the security of ICS networked systems including but not limited to;security... ...national regulation with regard to ICS cyber security.
Participate in ICS security...
...the new features and functionality. We are a technology group, working to develop and advance the best SaaS/PaaS solutions for large enterprises... ...applications with core Java, Spring Framework (MVC, Data JPA, Security, etc), Spring-boot, JPA (EclipseLink/Hibernate/etc...
Ensure that guests sign in upon arrival and exit.
Make guests aware of rules that must be adhered to.
Remove trespassers or unwanted individuals from the property.
Contact the relevant authorities if a crime is committed or an accident occurs.
Report to supervisors...
...Ensuring customer centricity by providing aptcybersecurityMonitoring and safeguarding the log sources and security accessPlanning for disaster recovery in the event of any securitybreachesMonitor for attacks, intrusions and unusual, unauthorized orillegal activityPerforms...
...Responsible to help define and ensure the effectiveness of the Information Security Management Systems.
Coordinate the Cyber Security Engineers in their projects and assignment work execution in accordance with the delivery schedule, contractual requirements, and...