...Job Description
Job description for Cyber Security Engineer:A Cyber Security Engineer is responsible for protecting an organization from cyber threats and ensuring the security of its networks, systems, and data. This role requires in-depth knowledge of cybersecurity...
Description
As a Cyber Security Manager, you will play a critical role in safeguarding the organization’s digital assets and ensuring the confidentiality, integrity, and availability of information.
You will lead a team of cybersecurity professionals, develop and...
...ArabiaNationalities permitted to apply: Europeans We are seeking a Cyber Security Specialist to join our Global Manufacturing Excellence... ...acritical role is safeguarding digital assets. Implement and manage robust cybersecurity measures, monitor security incidents, and...
...decision-makers, including C-level executives, IT professionals, and procurement managers.
Solution Selling:
Conduct thorough needs assessments to understand clients' cyber security requirements and challenges.
Collaborate with technical teams to tailor solutions...
...Job Description
Roles and responsibilities:Monitor security access and report suspicious activity to a higher level or team members... ...the root cause.Generate reports for IT administrators, business managers, and security leaders. These reports serve as an input to evaluate...
...Job Description
Job Summary: We are looking for a security professional to join our Security team as Cyber Security Specialist on a permanent basis.Core... ...providing security input in designing, deploying, and managing cloud infrastructure.Experience in supporting development...
...Job Description
1. Manage the cyber security management resources and ensure proper segregation of functions and capacity management to support different business and technology initiatives/requirements.
2. Lead The information security analysis function to ensure...
...Job Description
Cyber security engineerCyber security engineer with an analytical mind and a detailed understanding of cybersecurity... ...have proven hands-on experience on SIEM design, deployment and management, and have understanding of events, related fields in log records...
...Description
Developing firewalls for network infrastructure, cyber security policies, organization-wide security measures & improving... ...detection and response, virus protection, and identity and access management.
working on tracking all endpoint activities within your...
...individual differencesYou will be working as Technical Sales Lead for Cyber Security, will be part of Process Automation Business Area for Energy... ...software, encryption methods, identifying and accessing management solutions, etc.Adapting at conducting thorough assessments of...
...Job Description
Role Purpose
To run and manage the User Access review as mandated in Cyber security policies as well as perform complete health check to VF’s critical assets
Key Accountabilities & Decision Ownership
• Responsible for (UAR) User Access...
...Job Description
Cyber Security Engineer is required to design, implement, maintain information system security controls over the campus... ...WAF.
undertake the vulnerability assessment as needed.
Manage security endpoints implementation and administration.
Plans...
...Job Description
At Bevatel, we are dedicated to safeguarding our digital assets and enhancing our security frameworks. We are seeking a skilled Cyber Security Engineer to focus on DevSecOps, Penetration Testing, and Web Security using Cloudflare. If you are passionate...
...Job Description
Cyber Security Analyst
JOB\_DESCRIPTION.SHARE.HTML CAROUSEL\_PARAGRAPH
JOB\_DESCRIPTION.SHARE.HTML
Al Jubail, Saudi Arabia Tech Hiring 3068601
Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific...
...across multiple projects to define systems, security, and data architectures.Assessment of... ...for improving enterprise-wide cyber security.Support the architecture, analysis... ...security, identity credential and access management trends.Qualifications:Must have TS/SCI clearance...
...procedures. This is a one-year commitment with the potential for extension, offering an exciting opportunity to contribute to the security posture of our organization in a dynamic and challenging environment.
Job Requirements
# Bachelor’s degree in Computer Science...
...Job Description
Cyber Security Incident Response Team (CSIRT)
Adecco Middle East is hiring a "Cyber Security Incident Response Team... ...and operating systems.
Policy and Standards, Incident Management, Prioritization, Technologies, Security, Testing, Monitoring,...
...yearly strategic plans and reports for management, ensuring adherence to regulatory compliance... ..., NCA, STC, etc.).Develop and implement security awareness plans and conduct activities... ...Computer Science, Information Systems, Cyber Security, or equivalent.At least 5 years...
...teams to review new features and suggest new features that improve security.
Drive S-SDLC in our cycles and review security acceptance... ...tools, and incidents and drive needed changes.
Support in managing our Bug-bounty program and security channels.
Conduct vulnerability...
...to move around, order food and groceries, manage payments, and more. Careem is led by a... ...from Morocco to Pakistan.
Careem’s Cyber fusion center team is the cybersecurity incident... .... Cyber fusion center team responds to security incidents and mitigates security threats...
...Acquisition:
Identify and prospect potential clients in the cyber security sector.
Understand client requirements and pain points to... ...profitability with competitiveness.
Client Relationship Management:
Build and maintain strong, long-lasting client relationships...
...Cybersecurity Consultant, you will play a pivotal role in ensuring the security and integrity of our clients' digital assets. You will... ...penetration testing tools, vulnerability assessment, and risk management.Certifications such as CISSP, CISM, or CISA are highly...
...Job Description
Key Responsibilities: security alerts and incidents, analyze data, and respond to security events.initial triage, investigation, and escalation of security incidents.with cross-functional teams to implement security measures and incident response procedures...
...-oriented, and possess strong analytical and problem-solving skills.
Responsibilities :
Assist in monitoring and analyzing security alerts and events from various sources, including SIEM tools, IDS/IPS systems, and firewall logs.
Conduct vulnerability assessments...
...prevention, detection, and response. Additional job titles include security consultant, computer security consultant, network security... ...as needed
Job Requirements
~ Proven work experience as a Cyber Security Specialist or similar role
~15+ years of experience...
...concepts, with specific experience in implementing and managing Fidelis and HX platforms.
· Proficiency in... ...Processing Language (SPL).
· Experience in cyber threat detection, incident response, and endpoint security.
· In-depth knowledge of cybersecurity principles...
...Job Description
Role Title: Cyber Security Architecture Lead
Location: Riyadh, Saudi Arabia
About Accenture
Accenture is... ...strategy, digital identity, cyber defense, application security and managed services. Using the coolest next-gen tech, you’ll have every...
...and provide recommendations on changes to security controls to detect and/or protect... ...Supervise the timely collection of technical cyber threat intelligence including the advanced... ...and hunting reports to senior management, highlighting actionable insights, recommended...
We are looking for a competent Security manager to organize and oversee all security operations of our company. Security personnel will be under your command while you develop and implement policies and procedures to maintain security standards.
As security manager,...
Planning and implementing comprehensive security strategies. Controlling the security operations budget, monitoring expenses, and documenting processes. Supervising, recruiting, and training security personnel. Gathering security intelligence and implementing preventative...