Get new jobs by email
- ...Job Title: Cyber Security Expert Engagement Type: Consultant – Project Management & Consulting (PMC) and Technical Support Project Phase: Phase 3 – Implementation, PMC, and Technical Support Reporting To: Project Director / Client Representative...
- ...Requirements: The L3 Senior Network Security Engineer is responsible for designing, operating, and securing enterprise network and security infrastructure, while ensuring governance, risk, and compliance (GRC) alignment. The role covers L3 support for firewalls...
- ...telecom systems, including: Fiber optic and copper cabling systems PAGA (Public Address & General Alarm) systems CCTV, access control, and security systems Telephone systems (IP and analog) Radio communication systems (VHF/UHF/TETRA) Data networks and...
- ...Public Address & General Alarm) Systems TETRA Radio Systems VHF/UHF Radio Communication Systems Audio Visual (AV) Systems CCTV Surveillance Systems Access Control Systems Communication networks and associated infrastructure ~ Maintain Driver Virtual...
- ...into production environments (MLOps). Ensure monitoring, version control, and lifecycle management of AI models. Governance, Security & Compliance Ensure AI solutions comply with data privacy, security, and regulatory requirements. Support implementation...
- ...A Security Officer patrols, monitors, and observes security procedures to ensure a safe Guest and Member experience while investigating... ...receipt of departmental keys Operate, check and monitor the CCTV system Patrol the hotel on a regular basis ensuring fire walks...
- ...oversight, and technical support during Phase 3 of the project. The role is responsible for overseeing the implementation, integration, security, and optimization of cloud infrastructure platforms, ensuring compliance with approved architectures, project timelines, security...
- ...validate logical and physical data models, data integration designs, and implementation documents. Ensure scalability, performance, security, and reliability of the Data Warehouse solution. Data Integration & Quality Oversee integration of data from multiple...
- ...ensure compliance. Distribute documents to stakeholders as required, ensuring timely communication. Ensure confidentiality and security of sensitive information and compliance with company policies. Assist in preparing reports, project correspondence, and...
- ...Department CORPORATE SECURITY Primary Purpose of the Job Lead and implement QatarEnergy Corporate Security Program and management systems, lead assurance, standardization of security operations for commercial, industrial, international assets. Monitor geopolitical...
- ..., access permissions, and system onboarding/offboarding. Ensure all IT support activities comply with Museums’ IT policies and security standards. Maintain accurate documentation of issues, solutions, and best practices. Provide training or guidance to end users...
- ...with other IT sections to ensure smooth implementation of system updates, deployments, and upgrades. Ensure compliance with IT security standards and operational procedures. Support IT projects and contribute to system improvement initiatives as required. Qualifications...
- ...Department CORPORATE SECURITY Primary Purpose of the Job Lead QatarEnergy International Security Program, inclusive of the Policies , Procedures and Management Systems. Assess and mitigate security risks associated with International Security Program ensuring...
- ...manage, monitor, troubleshoot, and maintain enterprise network infrastructure, ensuring high availability, performance, and security. Key Responsibilities Cisco-Focused Responsibilities (Primary) Configure, monitor, and support Cisco network devices...
- ...Support IT projects, deployments, and upgrades across museum locations. Ensure all helpdesk activities comply with IT policies, security guidelines, and operational standards. Foster a customer-focused culture and ensure high levels of user satisfaction....
- ...Cyber Security Team Job Purpose : Looking for a cybersecurity professional, experienced in implementing and managing core security solutions such as Multi-Factor Authentication (MFA), Privileged Access Management (PAM), Secure Remote Access (SRA), Application Whitelisting...
- ...Required skills and qualifications: Bachelors degree in information security, Computer Science, or a related field. 10+ years of demonstrable experience as a Information Security Officer or in a similar senior-level cybersecurity role. Extensive knowledge...
- ...and warranty services as needed. Provide guidance and training to end users on IT systems and tools. Ensure adherence to IT security standards and operational procedures. Qualifications & Experience: ~ Diploma or Bachelor’s degree in Information Technology...
- ...services. Provide user training and best-practice guidance to enhance IT awareness and efficiency. Ensure all work adheres to ’ IT security policies, standards, and operational processes. Participate in IT projects, contributing technical expertise to improve system...
- ...Department OPERATIONAL EXCELLENCE Primary Purpose of the Job Implement and operate Information Security controls within the Industrial Control Systems (ICS)/ Operational Technology (OT) environment, including developing procedures, to manage cyber security risks...
$10000 per hour
...Role Summary Engineer, integrate, commission, and support Safety & Security / ELV systems across multiple vendor brands, including Fire Alarm (FAS), Building Management (BMS), Central Battery System (CBS), Emergency Management System (EMS), Lighting Control (LCS),...- ...operations. We provide hosting space, future-proof upgrades, and 24/7 support through our smart or remote hands, ensuring seamless, secure, and sustainable service. Our fully remote, round-the-clock management frees businesses from supervision hassles, setting new...
- ...Job Objective: Evaluate proposals and projects related to food security in both its developmental and relief aspects, ensuring that interventions comply with humanitarian and development standards, the quality of food items, and their suitability for beneficiaries’...
- ...risk measurement & analysis, and operational risk reporting. Guide the process of applying internal controls (mitigation). Establish security policies, procedures and standards and ensure that reviews of operational documentation is carried out at planned intervals to...
- ...AFMAN 13-24v2 Chapter 2. Ability to obtain and maintain a US CENTCOM Medical Exam. Must be able to obtain/maintain a Secret Security Clearance. Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment...
- ...everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are. We also believe in supporting our employees by...
- ...Associates degree in Computer Science or related field; or ~4+ years of IT domain knowledge experience; AND ~ DoD 8570 IAT Level 2 (Security+) or higher; and ~ Microsoft Certified Solution Associate (MCSA) or equivalent certification SUMMARY Perform standard...
- ...Education:- B.E or B.Tech Locally available candidates in Qatar with freelance visa Key Roles and Responsibilities: Network Security : Design and implement security measures for networks to prevent unauthorized access, attacks, or other threats (e.g.,...
- ...is recruiting for an established technology solutions and services provider in Doha, Qatar. Our client is seeking an experienced Security Operations Officer – Security Assessment & Assurance Specialist who will play a critical role in evaluating, strengthening, and assuring...
- ...testing using industry-leading methodologies (OWASP, PTES, etc.). Conduct network penetration testing and infrastructure security assessments. Execute Vulnerability Assessment and Penetration Testing (VAPT) engagements, document findings, and recommend...
