Search Results: 3,956 vacancies

 ...Job Description Job description for Cyber Security Engineer:A Cyber Security Engineer is responsible for protecting an organization from cyber threats and ensuring the security of its networks, systems, and data. This role requires in-depth knowledge of cybersecurity... 

High5

United Arab Emirates
15 hours ago
 ...Job Description Job Summary: We are looking for a security professional to join our Security team as Cyber Security Specialist on a permanent basis.Core function of the role is to provide key hands-on input in supporting the security function of our infrastructure... 

Qoyod

Saudi Arabia
12 days ago
 ...Job Description Location: Saudi ArabiaNationalities permitted to apply: Europeans We are seeking a Cyber Security Specialist to join our Global Manufacturing Excellence Organization under the technical support team.The technical support is a multi-disciplinary team... 

ICM People do Brasil

Saudi Arabia
18 days ago
 ...Job Description Cyber security engineerCyber security engineer with an analytical mind and a detailed understanding of cybersecurity methodologies,and should have proven hands-on experience on SIEM design, deployment and management, and have understanding of events... 

Safe Decision Co. LLC

Saudi Arabia
9 days ago
 ...What You'll Do Work closely with the product and engineering teams to review new features and suggest new features that improve security. Drive S-SDLC in our cycles and review security acceptance criteria and threat modeling. Guide and train the team to cover... 

Thndr

Cairo
10 days ago
 ...Job Description Developing firewalls for network infrastructure, cyber security policies, organization-wide security measures & improving proposed or existing systems. Provides guidance on design, implementation, administration, and enforcement of information security... 

Carina Wear

New Cairo
17 days ago
 ...Job Description Cyber Security Engineer is required to design, implement, maintain information system security controls over the campus endpoint and infrastructure. As a member of the IT team, the candidate is responsible for Monitoring the university networks for... 

Egypt University of Info...

Cairo
25 days ago
 ...Job Description Cyber Security Analyst JOB\_DESCRIPTION.SHARE.HTML CAROUSEL\_PARAGRAPH JOB\_DESCRIPTION.SHARE.HTML Al Jubail, Saudi Arabia Tech Hiring 3068601 Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific... 

HealthPlan Services, Inc...

Saudi Arabia
20 days ago
 ...procedures. This is a one-year commitment with the potential for extension, offering an exciting opportunity to contribute to the security posture of our organization in a dynamic and challenging environment. Job Requirements # Bachelor’s degree in Computer Science... 

AeliaSoft

Saudi Arabia
a month ago
 ...direction, and guidance across multiple projects to define systems, security, and data architectures.Assessment of technology solutions; and...  ...standards and advancements for improving enterprise-wide cyber security.Support the architecture, analysis, and prototyping of... 

iHR (International Human...

Saudi Arabia
a month ago
 ...Job Description 1. Manage the cyber security management resources and ensure proper segregation of functions and capacity management to support different business and technology initiatives/requirements. 2. Lead The information security analysis function to ensure... 

SSC

Egypt
a month ago
 ...join our team and provide expert guidance on protecting operational technology systems from cyber threats.The ideal candidate will have extensive experience in network security, risk assessment, and incident response, with a proven track record of successfully securing... 

Cyberani | سيبراني

Saudi Arabia
a month ago
 ...Job Description Role Purpose To run Front line; online activities and actively monitors security systems and provides early alerting and basic troubleshooting when needed. Key Accountabilities & Decision Ownership •    Provides 24/7 monitoring and alerting... 

Vodafone - Egypt

Cairo
15 days ago
 ...across the organization (CST, NCA, STC, etc.).Develop and implement security awareness plans and conduct activities across the organization....  ...:Master’s degree in Computer Science, Information Systems, Cyber Security, or equivalent.At least 5 years of experience in... 

Norconsult Telematics

Saudi Arabia
11 days ago
 ...Job Description We are seeking a highly skilled and experienced Security and Infrastructure Architect to join our team on a part-time basis. As a Security and Infrastructure Architect, you will be responsible for designing and reviewing infrastructure and security... 

SIGMA

Cairo
a month ago
Description As a Cyber Security Manager, you will play a critical role in safeguarding the organization’s digital assets and ensuring the confidentiality, integrity, and availability of information.  You will lead a team of cybersecurity professionals, develop and... 

Halan

Sheikh Zayed City
more than 2 months ago
 ...Job Description Cyber Security Incident Response Team (CSIRT) Adecco Middle East is hiring a "Cyber Security Incident Response Team (CSIRT)" for one of our prestigious clients based in Abu Dhabi, UAE. Job Title: - Cyber Security Incident Response Team (CSIRT... 

Adecco

United Arab Emirates
16 hours ago
 ...70 cities across 10 countries, from Morocco to Pakistan. Careem’s Cyber fusion center team is the cybersecurity incident response body at Careem. Cyber fusion center team  responds to security incidents and mitigates security threats across the company. The Cyber... 

Careem

Cairo
7 days ago
 ...Job Description Key Responsibilities: security alerts and incidents, analyze data, and respond to security events.initial triage, investigation, and escalation of security incidents.with cross-functional teams to implement security measures and incident response procedures... 

2P Perfect Presentation

Saudi Arabia
a month ago
 ...-oriented, and possess strong analytical and problem-solving skills. Responsibilities : Assist in monitoring and analyzing security alerts and events from various sources, including SIEM tools, IDS/IPS systems, and firewall logs. Conduct vulnerability assessments... 

Middlesex University Dub...

United Arab Emirates
3 days ago