Get new jobs by email
- ...PHP web based applications (nice to have)Good working knowledge of: Server platforms (UNIX, Windows etc.), networking technologies, security (Firewalls, IDS IPS, proxy systems etc.), storage devices. Good understanding of System Development Life cycle, REGular...
- ...and maintain cybersecurity infrastructure through regular system health checks, updates, and security validations in accordance with established standards. · Contribute to Cyber Security FEED studies for projects upgrades by supporting security planning and design...
- ...Job Summary Implement and operate Information Security controls within the Industrial Control Systems (ICS) / Operational Technology (OT) environment, including developing procedures, to manage cyber security risks to acceptable operational levels and increase operational...
- ...motivatedacademics to join our College of Computing and Data Science. Successfulcandidates will contribute to the delivery of our MSc Cyber Security_Oryx andother computing-related programmes, jointly offered with LJMU. About the Role We areseeking Senior Lecturers /...
- ...experience working with threat intelligence. Roles and Responsibilities Develop and implement comprehensive security strategies to protect against cyber threats. Conduct thorough risk assessments and vulnerability testing to identify potential weaknesses....
- ...Madre Integrated Engineering | Full time We are looking for a motivated and detail-oriented Cyber Security Engineer with 3–5 years of experience to support and strengthen the organization’s security operations. The role involves monitoring security events, responding...
- ...cybersecurity expert to perform maintenance and monitor infrastructure across various facilities. The role requires a bachelor's degree in Cyber Security or related fields and a minimum of 6 years of experience in OT Cyber Security. Candidates with relevant OT cybersecurity...
- ...Perform advanced monitoring, analysis, and investigation of security alerts and incidents. Act as an escalation point for complex... ...cybersecurity operations or SOC roles. ~ Strong understanding of cyber threats, attack vectors, and MITRE ATT&CK framework. ~ Hands‑...
- ...Primary Purpose of the Job Act as a SME subject matter expert in Cyber Security team to provide proactive support to detect, distinguish, isolate, interrupt, suppress, advanced threats that evade existing security solutions. Responsible for handling cyber security...
- ...academics to join our College of Computing and Data Science. Successful candidates will contribute to the delivery of our MSc Cyber Security_Oryx and other computing-related programmes, jointly offered with LJMU. About the Role We are seeking Senior Lecturers /...
- ...Madre Integrated Engineering | Full time We are looking for a Cyber Security Analyst with strong CCNA-level networking expertise to secure, monitor, and defend enterprise network infrastructure. The role focuses heavily on network traffic analysis, Cisco security technologies...
- An international engineering services company in Doha is seeking an Automation Engineer to manage maintenance of Industrial Control Systems. The ideal candidate will have over 10 years of experience in maintenance, particularly in Petrochemical or Fertilizer sectors. Responsibilities...
- ...Job Summary Lead Information Security projects and report regularly on their progress. Coordinate and provide expert technical support by integrating Cyber & Information Security requirements into ICT projects, OT and Infrastructure projects, and review and validate...
QAR 6000 - 7500 per month
...: QAR 6,000 – QAR 7,500 per month Job Type: Full-Time Job Overview IIQAF Group is seeking a vigilant and professional Security Guard in Doha to ensure the safety and security of our hospitality facilities. The ideal candidate will have experience in patrolling...- ...Job Summary Information Security Monitoring Analyst is an alert management analyst, responsible for monitoring, analysing and responding... ...and remediate security incidents;11. Demonstrate knowledge of Cyber Security principles, techniques and technologies such as SANS...
- A university in Qatar is seeking experienced Senior Lecturers / Lecturers in Cyber Security to teach and mentor students, drive curriculum development, and engage in research. Ideal candidates will have a PhD and a passion for teaching in a multicultural environment. This...
- A Higher Education Institution in Doha seeks Senior Lecturers / Lecturers in Cyber Security to teach and mentor students, contributing to the development of innovative computing programs. The ideal candidates will hold a PhD in Computer Science or a related field and have...
- ...Job Summary Systems Security Administrators must demonstrate technical knowledge of data systems and security procedures, as well as a familiarity with systems hardware and software. They require good communication skills and the ability to work well in a team setting...
- A leading energy company based in Doha is seeking a Cyber Security Subject Matter Expert. The role involves managing incident responses for IT and OT environments on a 24/7 basis. Candidates should have 10+ years of experience in Information Security and a strong background...
- ...IT Security Specialist Job Summary The IT Security Specialist is responsible for safeguarding the organization’s IT infrastructure, networks, systems, and data against cyber threats and security breaches. The role involves day-to-day security operations, firewall...
- A leading engineering firm in Doha is seeking a motivated Cyber Security Engineer to enhance its security operations. The ideal candidate will monitor security events, respond to incidents, and manage security tools. With 3–5 years of experience in cybersecurity roles,...
- ...Job Summary Responsibilities Implementation and maintenance of various Security Tools and systems include Vulnerability management systems, Endpoint detection and response. The Security Engineer is expected to stay up-to-date on the latest tools features updates...
- ...Job Summary University is seeking a candidate for Security Engineer.Reporting to the Senior Manager Network AV, the Security Engineer is responsible for ITS systems network security, uses all available security tools to identify and remediate electronic security threats...
- ..., Safety Engineering or related field required More than 15 years of experience. Responsibilities Formulation of safety, security and enforcement systems and the formulation and monitoring of public transport security standards. Development of enforcement procedures...
- ...Job Summary A highest level of security awareness. Abilty to report to duty 24/7 on short notice. Investigations and surveillance skills. Be well groomed and presentable. VVIP/VIP Protocol and cultural awareness. A Military/Police/Aviation Security background...
- ...educational assistance is on offer for the right candidate. Scope of work To provide, operate, and maintain “best practice‟ safety and security strategies and systems for NOC General Services division. To provide safety and Security reporting and improvement of these...
- ...Job Summary This is an exciting opportunity to be part of Qatar Airways Group Security. As the Security Operations Manager, you will be involved in providing security support across Qatar Airways (QR) Network. The first point of contact for all day to day security related...
- ...Primary Purpose of the Job Responsible for managing QatarEnergy IT and OT / Industrial Cyber Security centralized security log management (SIEM-Security Information Event Management/ SOAR, EDR other SOC platforms) functions. Use variety of tools to analyse and investigate...
- ...independently and also should be a team player Monitoring and reporting skills Strong knowledge and experience in Linux & Open Source security solutions Ability to evaluate network security posture and provide recommendations for security tools and best practices...
- ...Job Summary Individuals interested in a Network Security Administrator position require a strong technical background, including a working knowledge of network management protocols, networking architecture, authentication practices, and security administration. It is...
