Search Results: 5,342 vacancies
...Primary purpose of job Governance and execution of the Information Security Management System (ISMS) including developing policies, standards and procedures required for the corporate information security in both an information technology (IT) and operational technology...
...Information Security Architect – Duties And Experience
Domain Architect
Responsible for current and target security architecture for group
Work with group stakeholders, technical teams, external vendors and partners
DevSecOps
Work with technical...
...Job Summary
The purpose of this role is to develop and implement information security, risk management, regulatory and governance policies and procedures. In this role you will initiate, facilitate, and promote activities to create information security awareness within...
...Cybersecurity engineering with experience that includes configuring and managing Web Application Firewalls.
Web Application Firewall/Security Experience:
• Excellent understanding of DDoS techniques and mitigation mechanisms
• Solid understanding of web applications,...
...Technology/Engineering(Computers)
Nationality
Any Nationality
Vacancy
1 Vacancy
Job Description
Position: Senior Information Security OfficerCompany: Qatar Shipyard Technology SolutionsLocation : RAS LAFFAN, Qatar** PREFERENCE WILL BE GIVEN TO QATARI...
Our talented employees bring software development, systems engineering, and advanced analytics expertise.
We offer numerous prime contract opportunities with customers headquartered in Maryland, Virginia, and the District of Columbia, as well as subcontract opportunities...
...Summary
The purpose of this role is to develop and implement information security, risk management, regulatory and governance policies and... ...Experience
Preferred Candidate
Years of Experience Min: 3 Max: 5
Degree Bachelor's degree / higher diploma...
...with internal and external stakeholders .
Main Duties and Responsibilities
Technical and Operations
- I de ntify, secure and negotiate opportunities for expansion and growth through research, field visits and outsourced services;
- Detect new markets...
...Requirements For The Role
✔ 7+ years of experience in Information Security
✔ Develop and monitor a strategic, comprehensive enterprise information /
cyber security risk management program to ensure protection of digital and
data assets
✔ Implement and lead...
...Job Purpose
· Perform document control and information management activities for the NFXP Offshore NFW scope.
· Provide cost estimation and cost control support to the NFXP Offshore Projects.
Project Key Accountabilities
(Duties include but not limited...
Suncoast Drivers is seeking Local Class A Drivers to join our team in the Perryville area!
Delivering all medical supplies except pharma to hospitals and surgical centers. All automatics no manuals. Dock deliveries, lift gate and breakdown skids. Will be some touch...
...corporate proxy
Maintenance and Administration of Trend Micro Office Scan
Maintenance and Administration of Data Leakage Prevention (DLP)
Make sure all corporate Desktops and Servers are properly updated
Perform Application and Network security assessments...
...Provide Security direction, guidance and leadership to Onshore PMT and (On Plot) CONTRACTOR and SUBCONTRACTOR(s) (ON PLOT) across the... ...Security programs.
Security and/or Emergency Response related diploma; or 10 years' experience in lieu of degree.
FEMA...
...SENIOR INFORMATION SECURITY RISK ANALYST (Governance, Risk & Compliance)
Primary Purpose of Job
The Senior Information Security Risk Analyst is tasked with enhancing the information security posture of QatarEnergy in both IT and OT environments by assessing and managing...
...large ICS & ICT environments in the Energy sector, preferably in Oil & Gas.
~ Experience with and understanding of customized information security management systems.
~ Experience in information security awareness initiatives and community building.
~ Knowledge of...
...strategies. Controlling the securityoperations budget, monitoring expenses, and documentingprocesses. Supervising, recruiting, andtraining security personnel. Gathering securityintelligence and implementing preventativemeasures. Developing work schedules, allocatingtasks, and...
...Value:
Experience working in DoD classified operating and/or laboratory environments
Experience with various information system security tools that address vulnerability analysis and mitigation. These may include Splunk, Forcepoint, Ivanti, Tenable, ACAS, HBSS...
Candidates from Europe and Caspian region preferred
Job Title: Lead of Cyber Security
Department: Information Technology
Location: Doha, Qatar
Key Job Accountabilities:
• Lead and oversee business risk and vulnerability assessments for Qatargas Information...
...Position Responsibilities:
Performs security analysis of operational and development environments, threats, vulnerabilities... ...processes under the Risk Managed Framework (RMF) for new and existing information systems
Facilitates development of Memorandums of...
...Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of secure networking, computing, and enclave environments
Apply knowledge of IA policy, procedures, and workforce...