Search Results: 13,881 vacancies
...TS Controller (Cyber Security an...
- Doha, Qatar*TS Controller (Cyber Security and Risk Management)
- Doha, Qatar Posted 57 minutes ago 1 open position Be the First to... ...ensure security compliance.Evaluate proposed project and operational changes with a focus on...
...Cyber Security Programme Manager – Duties & Experience:
Outsourcing functions to ensure best use of internal resource
Knowledge on how to outsource programmes
Technical background – manage cyber security programmes
NIST / ISO27001 experience
Risk...
...specific improvement measures that help in the security posture of the organization by protecting... ...Liaise with stakeholders in relation to cyber security issues and provide future... ...Internal
Technical Lead/ Project Lead
Regular reporting & updates...
...Candidates from Europe and Caspian region
Job Title: Lead of Cyber Security
Department: Information Technology
Location: Doha, Qatar... ...authoritative advice and guidance on security strategies to manage identified risks and ensure adoption, and adherence to, Qatargas...
...NOTE: Only Arabic nationalities can apply
Responsibilities:
Lead the design, implementation, and management of cyber security solutions to protect our organization’s IT systems, networks, applications, and data from potential cyber threats. compliance with industry...
...About Role You would be part of the Cyber Security – Security Operations Center (SOC) team with an operational lead role to detect, prevent... ...the Security Incident Response procedures laid down by the Manager Cyber Security. • Develop Cyber Security Incident Response Plan...
...Advanced Advanced Cyber Security Architect Engineer
Bachelors in Computer Application(Computers... ...Control
5+ years Leading Security Projects and performing audits/assessments.... ...systems, backup & restore solutions, system management
Company Industry
~ Other...
...Bachelor’s degree in Computer Science, Information Technology, Cyber security, or
related field.
• Minimum of 6-8 years of experience... ...cyber security, with a focus on designing,
implementing, and managing cyber security solutions.
• Strong knowledge of cyber...
...Responsiblity:
Planning, implementing, managing, monitoring, and upgrading security measures for the protection of the organization's data, systems, and networks.
Troubleshooting security and network problems.
Responding to all system and/or network security...
...support monitoring and assessing implementation of national cyber security strategies and policies.
BS or MA in Business, IT, Computer... ...Governance, ISMS
Deep knowledge and wide expertise in strategic management
Experience with information security management frameworks...
...Infoverity, the expert company in the implementation of Master Data Management solutions (MDM and PIM), we are growing our team in Valencia,... ...work in a multicultural environment with 90% of international projects, this is the place for
Requirements
~4 years of...
...the architectural production actions related to ETL
Analyze the needs of large systems and breaking them down into smaller manageable parts
Plan and design the structure of technology systems, discuss these with the client
Communicate system requirements...
...Job DetailsDescriptionRequisition #: CYBER004046Job Title: Cyber Security Manager (H)Location: Al Udeid Air Base, Doha, QatarClearance Level: Active DoD - Top Secret SCIRequired Certification(s):• DoD IAM Level III Certification.SUMMARYThe contractor shall support management...
...senior research scientist you design IAM security modules and security architectures for... ...technologies.
You apply R&D results in projects with Siemens business units and Siemens... ...industrial and infrastructure solutions.
You manage research and customer projects, e.g., in...
..., and maintaining good working relationships with co-workers, management, individuals, outside agencies, and others with whom the individual... ...in a heavy-duty transportation environment.
• Develops project statements for a technology definition for a specific...
...Respond to security events, requests and incidents logged in management systems.
Monitor the security posture of the IT estate and identify anomalous activity and behaviours by the use of monitoring tools.
Perform in-depth analysis of log files, systems, and network...
Hello visionary!
We empower our people to stay resilient and relevant in a constantly changing world. We’re looking for people who are always searching for creative ways to grow and learn. People who want to make a real impact, now and in the future. Does that sound ...
...to find out just how far.... We're a proactive, agile in approach, driven team always looking to protect Vodafone from cyber and information security risks which affects our people, technology and customers. With us you will: This role provides operational and conformance...
...Excellent attention to detail and accuracy
Ability to work independently and as part of a team
Good organizational and time management skills
Benefits:
We offer very competitive salary and other benefits package.
Remote work
Flexible working hours...
...years of experience
~ Must have a PHD in a relevant field
~ Experience in academic leadership and administration
~ Background in cyber secruity or IT
~ Strong understanding of curriculum development, assessment, and accreditation processes.
~ Willing to relocate...