Get new jobs by email
- ...The Senior Cybersecurity Certification & QMS Specialist is responsible for managing and continuously improving the quality management system (QMS) that governs cybersecurity certification schemes. The role ensures compliance with international standards and regulatory...
- ...Key Responsibilities: Designing and delivering cybersecurity training programs. Creating and updating cyber security awareness/educational content. Assess the training needs and evaluate the current security awareness level of organizations. Develop customized...
- ...and regulatory compliance Experience in strategy development and implementation Knowledge of national and international cybersecurity governance best practices Soft skills: Excellent stakeholder management and negotiation skills Effective...
- ...Management Professional (PMP) or ITIL certification Experience with IT financial management and budget optimization Knowledge of cybersecurity principles and application security best practices Familiarity with agile development methodologies and DevOps practices...
- ...experience in: DCS / ESD / PLC systems Industrial Control Systems (ICS) Turbo Machinery Control & Protection Systems Cybersecurity and industrial networking Proven experience in: Maintenance and troubleshooting of automation systems Commissioning and...
- ...Job description: We are seeking a Cybersecurity Incident Response Specialist to manage and respond to security incidents across the organization. The role focuses on detecting threats, analyzing security events, and executing effective response strategies to protect...
- ...The Senior IT Security Certification Specialist is responsible for leading and executing cybersecurity product and system certification activities in alignment with internationally recognized standards, particularly Common Criteria. The role involves evaluating security...
- ...of Zero Trust, SD-WAN, and SASE architectures - Strong analytical and problem-solving abilities - Deep understanding of cybersecurity frameworks and modern attack vectors - Ability to communicate technical concepts to diverse stakeholders - Strong documentation...
- ...Cyber Security Team Job Purpose : Looking for a cybersecurity professional, experienced in implementing and managing core security solutions such as Multi-Factor Authentication (MFA), Privileged Access Management (PAM), Secure Remote Access (SRA), Application Whitelisting...
- ...Implement cloud security baselines, identity management, and monitoring strategies. - Ensure compliance with regulatory, audit, and cybersecurity requirements. Cloud Cost Management & FinOps - Lead cost governance initiatives including budgeting, forecasting, and...
- ...Stay updated on the latest trends and developments in network security and technology, as the field is continually evolving. Cybersecurity Ethics: • An understanding of ethical hacking and an appreciation for the ethical and legal considerations of cybersecurity....
- ...data classification policies and submit periodic performance reports to decision-makers. · Lead national initiatives to assess cybersecurity risks resulting from improper classification of sensitive data at the state level. · Ensure alignment of different entities’...
- ...its ventures. Manage licensing, security baselines, and access models. IT Security, Risk & Resilience Own internal cybersecurity posture and controls. Implement and manage: Identity and access management, Endpoint and device management (e.g. Intune...
- ...of cyber defense strategies, policies, and risk mitigation measures. Ensure compliance with the security standards, national cybersecurity frameworks, and international best practices. Requirements Qualifications & Experience ~ Bachelor’s degree in Cybersecurity...
- ...informed by the latest insights and best practices from around the globe. Role Overview: In this role, you will lead and deliver cybersecurity projects across multiple sectors, including both private and public organizations. You will play a critical role in...
- ...family and you get to work towards a world safe for exchanging digital information. ABOUT TREND MICRO Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat...
QAR 4000 - 7000 per month
...AI/ML integration or recommendation systems. Familiarity with data scraping and large-scale data processing. Knowledge of cybersecurity best practices. Why Join Us? : Work on cutting-edge technologies and impactful projects. Gain opportunities for learning,...- ...and control systems are operational and provide first-line support to operators . Comply with strict utility regulations and cybersecurity guidelines for Operational Technology (OT) Requirements 1. Tele-control / SCADA Technician (Water Control System)...
- ...control systems . Coordinates commissioning and testing activities for the Water Control System . Ensures compliance with cybersecurity standards and HSE policies . 2. Tele-control / Substation Control System (SCS) Engineer Ensures the daily operation,...
- ...Candidates must have at least 5+ years of experience in Windows infrastructure security, including AD, Exchange, and endpoint hardening/cybersecurity. Fluency in English is a must. Key Responsibilities Active Directory (LDAP, Kerberos, ADFS, Group Policy) Exchange...
- ...We are hiring Manager – IT & Management Consulting Key Responsibilities: Design and implement cybersecurity frameworks , privacy management systems , and business continuity programs tailored to client environments. Lead data privacy compliance assessments...
- ...in sales is a plus Responsibilities Promote a set of technology solutions ranging from Hardware, Unified Communications, Cybersecurity, Networking, Information management, Cloud infra, IoT solutions, ..etc Achieve quarterly and yearly set sales targets Develop...
- .... Work closely with OEMs, consultants, and internal teams for improvements and escalations. Support activities related to cybersecurity, asset lifecycle, and system upgrades. What You'll Bring ~5–6 years of hands-on SCADA maintenance experience (infrastructure...
- ...PI/PO Administration • Database certifications (highly desirable), such as Oracle, SAP HANA, or MS SQL administration. • Cybersecurity certifications supporting vulnerability management and patch governance (optional but valuable): o CompTIA Security+ o CISSP...
- ...frameworks. This position requires both technical expertise and strong stakeholder influence — enabling you to translate complex cybersecurity concepts into actionable strategies that enhance operational efficiency and data assurance. The successful candidate will...
- ..., standards, and reference implementations for APIs, data models, observability, and deployment ~Partner with R&D, regulatory, cybersecurity, and operations to ensure clinical readiness, scalability, and compliance The Successful Applicant ~10+ years' experience...
- This Operational Technology security expert role is critical, project focused role. It is a dedicated role to ensure the resilience of Industrial Control Systems (ICS), SCADA and other OT environments across all major projects, including plant upgrades, system modernization...
- ...implementation of integrity and surveillance programmes for critical electrical systems Ensure reliability, availability, safety, and cybersecurity of electrical systems Provide technical input to multidisciplinary teams and project functions Supervise and review...
- ...~ Major challenges are, (1) requires deep understanding of ethical hacking, penetration testing methodologies and offensive cybersecurity tactics (2) supporting the Information Risk Management Division Manager in dealing with an increased cybersecurity risk due to the...
- ...I ~ Major challenges: (1) requires deep understanding of ethical hacking, penetration testing methodologies and offensive cybersecurity tactics (2) supporting the Information Risk Management Division Manager in dealing with an increased cybersecurity risk due to the...
