Get new jobs by email
- ...Job Summary Lead Information Security projects and report regularly on their progress. Coordinate and provide expert technical support by integrating Cyber & Information Security requirements into ICT projects, OT and Infrastructure projects, and review and validate...
- ...Job Summary Information Security Monitoring Analyst is an alert management analyst, responsible for monitoring, analysing and responding to information and operational security alerts triggered by Security Information and Event Management (SIEM) and Threat intelligence...
- ...Department CORPORATE SECURITY Primary Purpose of the Job Lead QatarEnergy International Security Program, inclusive of the... ...Strong analytical skills with the ability to synthesise complex information from multiple sources and generate actionable intelligence....
- ...Job Summary Flight Security Officers are sufficiently trained and qualified to conduct... ...As a Security Training and Risk/Threat Analyst your overall responsibilities will be continuous... ...accordingly. Prepare briefing information specific to locations where enhanced security...
- ...mselect is looking to hire a Senior Information Security Engineer for an Aerospace & Defence manufacturing client in Doha, Qatar . Candidates must have a minimum of 5-8 years of proven experience in information security roles. Fluency in English is a must. Job...
- ...Job Summary The Senior SOC analyst will be responsible of analyzing and investigating security related logs against security threats and defined IoC’s. HE/She... ...Entity or incident response team Review attack information in preparation for release to or onward review...
- ...Job Purpose ~ Support the Lead of Cyber Security in developing and communicating Corporate Information Security Policies and Procedures. Conduct business risk and vulnerability assessments for QatarEnergy LNG Information Systems and provides authoritative advice...
- ...recruiting for an established technology solutions and services provider i n Doha, Qatar. Our client is seeking an experienced Information Security Officer to lead and manage the Data Security program . You will be responsible for designing, implementing, and managing...
- ...Department CORPORATE SECURITY Primary Purpose of the Job Lead and implement QatarEnergy Corporate Security Program and management systems, lead assurance, standardization of security operations for commercial, industrial, international assets. Monitor geopolitical...
- ...Job Description: The Digital Information Coordinator will play a crucial role in delivering the engineering digital transformation... ...Manage the collaboration platform to ensure the accurate and secure management of digital information and data outputs from initiatives...
- ...risk measurement & analysis, and operational risk reporting. Guide the process of applying internal controls (mitigation). Establish security policies, procedures and standards and ensure that reviews of operational documentation is carried out at planned intervals to...
- ...best practices, regulations, and organization objectives. Information Protection: Develop and implement a comprehensive strategy for... ...sensitive information, data assets and access management. Security awareness and training: Develop and deliver training programs...
- ...Job Summary The Application Analyst is responsible for the administration, maintenance... ...optimal system performance, reliability, and security while aligning technology solutions with... ...availability within the organization’s information systems. Collaboration & Project...
- ...Responsibilities Promote a set of technology solutions ranging from Hardware, Unified Communications, Cybersecurity, Networking, Information management, Cloud infra, IoT solutions, ..etc Achieve quarterly and yearly set sales targets Develop a good functional...
- ...As a Security Officer, you will play a vital role in ensuring the safety and security of the hotel property, guests, colleagues, and assets. Your role involves patrolling designated areas, monitoring access control, and responding to security incidents. Key Job Responsibilities...
- ...defense. Make an impact by connecting and securing critical operations across the globe,... ...secure. Job Description LOGISTICS ANALYST Keep operations on track and your career... ...to accomplish the mission ● Process information requests, access a range of data sources...
- ...Job Summary The Senior Information Management Expert is responsible for defining, leading, and executing enterprise-wide Information Management (IM) and Information Governance (IG) strategies. The role ensures the effective lifecycle management of organizational information...
- ...mselect is looking to hire a System Security Engineer for an Aerospace & Defence manufacturing... ...: ~ Bachelor’s degree in information security or computer engineering ~ Qualifications... ...Practitioner (SSCP) CyberSecurity Analyst (CySA+) Certified Information Systems...
- ...Responsibilities Implementation and maintenance of various Security Tools and systems include Vulnerability management systems, Endpoint... ...Qualifications: High school at minimum, Bachelor Degree in information technology is good to have Familiarity with part/all of...
- ...environmental development inQatar and beyond. Department INFORMATION & COMMUNICATION TECHNOLOGY Primary purpose of job The... ...alignment with the data governance, data architecture, data security and overall business strategy. Continuous collaboration with...
- ...Job Summary University is seeking a candidate for Security Engineer.Reporting to the Senior Manager Network AV, the Security Engineer... ...devices, identifying best practices for network devices information systems, overseeing the vulnerability management process developing...
- ...Job Summary This opportunity is for a senior security professional within Ciscos Customer Experience (CX) organization to help drive... ...personality with a can-do mentality Minimum 10 years in information security, ideally with an advisory consulting background in Big...
- ...PHP web based applications (nice to have)Good working knowledge of: Server platforms (UNIX, Windows etc.), networking technologies, security (Firewalls, IDS IPS, proxy systems etc.), storage devices. Good understanding of System Development Life cycle, REGular...
- ...Job Summary In this role you will provide security operational support, coordination and management across the Passenger Terminal... ...Bomb Threat, Hijack and any acts of terrorism, you will provide information support and coordinate with Flight Operations and Security Duty...
- ...programs. Creating and updating cyber security awareness/educational content. Assess... ...Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related... ...Associate (CCNA) CompTIA Cybersecurity Analyst (CySA+) Computer Hacking Forensic Investigator...
- ...IT Security Specialist Job Summary The IT Security Specialist is responsible for safeguarding the organization’s IT infrastructure... ...points of access Qualifications § Bachelors in Information Technology or Relevant. § Relevance will be reviewed and...
- ...of experience. Responsibilities Formulation of safety, security and enforcement systems and the formulation and monitoring of... ...security standards. Development of enforcement procedures, information and data, records system, implementation manuals and associated...
- ...~ Data protection certifications preferred, such as Certified Information Privacy Manager (CIPM), Certified Information Privacy Professional... ...expertise in computer networking concepts, protocols, and network security methodologies. Excellent communication skills....
- ...Business Analyst Review, analyze and evaluate business systems and user needs. Document requirements, define scope and objectives... ...operational objectives by studying business functions; gathering information; evaluating output requirements and formats Construct...
- ...environmental development inQatar and beyond. Department INFORMATION & COMMUNICATION TECHNOLOGY Primary purpose of job... ...Flexibility to adapt to changing business needs, information security practices, and technological advancement while effectively...

