Philippines says it all! What You’ll Do? In this role, you’ll oversee the Compliance to the TTEC Information Security Policy... departments takes place to drive calibration across the infrastructure. You'll report to Manager, Information Security. You’ll...
Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide... identity and access logs, user activity, and security events to identify potential security threats and vulnerabilities...
Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide...: As a CyberArk Administrator, you will be responsible for implementing and maintaining the CyberArk Privileged Access Security...
Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide... identity and access logs, user activity, and security events to identify potential security threats and vulnerabilities...
with the Network and Systems Engineers to create, maintain and enforce security plans and policies effecting the network... guidance in own area of knowledge. Job Description Core Responsibilities Monitors security safeguards to the Company's IP...
Responsibilities Security Strategy and Governance: Develop, implement, and maintain a comprehensive information... security strategy aligned with the organization's objectives. Establish and enforce security policies, standards...
Responsibilities - Expertise in cyber security frameworks such as ISO27001, NIST 800-53, NIST CSF, PCI-DSS, ISO22301... security domains such as information security management and governance, systems and network security, Physical and logical IT...
Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide...: As a CyberArk Administrator, you will be responsible for implementing and maintaining the CyberArk Privileged Access Security...
Certified Information Security Manager (CISM) Certified Cloud Security (AWS, Azure) Certified ISO 27001, PCI DSS..., HiTrust CompTIA Security+ CompTIA PenTest+ CompTIA Cybersecurity Analyst (CySA+) CompTIA Advanced Security Practitioner...
on business critical infrastructure including internal servers, networks and applications to identify and resolve security flaws... servers, networks and applications to identify and resolve security flaws. Experiments with various methods attackers...
technologies and strong partnerships, we aim to make travel easy and rewarding for everyone. Get to Know our Team: The Security... Department oversees security, compliance, GRC, and security operations for all Agoda. We are vigilant in ensuring there is no...
internal servers, networks and applications to identify and resolve security flaws. Career Level - IC3 Responsibilities... and applications to identify and resolve security flaws. Experiments with various methods attackers could use to exploit information...
their full potential. Job Description The Avaloq Security team is an international team of analysts, senior and expert software... engineers and architects. The Avaloq Security team develops and maintains central application security frameworks and tools...
KEY RESPONSIBILITIES: Collaborate with Sales Teams to Understand Customer Requirements and Propose Network and Security... with Customers to Understand their Technical Requirements and Design Network and Security-Based Solutions to Meet their Needs Assist...
security devices, and coordinated protection across Member Firms. NIS Cyber Defence management and operations of the global... consistent security methodologies are applied across all firewall platforms, as well as a holistic lifecycle management approach...
Design, implement, and maintain security measures for infrastructure components including but not limited to Docker... configuration and management of security controls. Administer and harden operating system (OS) and database (DB) platforms...
Primary Details Time Type: Full time Worker Type: Employee Deploy and maintain Cyber Security Infrastructure services... across QBE globally in line with QBE strategy, business requirements, and security processes and policies. The role holder...
configuration changes, server hardening and compliance 'Go-to' person for anything Qualys, security vulnerabilities and patching... and processes (e.g., Active Directory users, computers, groups, email) Familiarity on the following security concepts and/or program...
Information Security or related fields. (Non-negotiable) Must have experience with Docker and OpenShift. (Non-negotiable..., and other orchestrators. (Non-negotiable) Must have experience with using and configuring security tools and other technologies such as SIEM...
Who We Are Verkada is the largest cloud-based B2B physical security platform company in the world. Only Verkada offers... six product lines - video security cameras, access control, environmental sensors, alarms, workplace and intercoms...