Get new jobs by email
- ...Job Summary Information Security Monitoring Analyst is an alert management analyst, responsible for monitoring, analysing and responding to information and operational security alerts triggered by Security Information and Event Management (SIEM) and Threat intelligence...
- ...Job Summary Lead Information Security projects and report regularly on their progress. Coordinate and provide expert technical support by integrating Cyber & Information Security requirements into ICT projects, OT and Infrastructure projects, and review and validate...
- ...mselect is looking to hire a Senior Information Security Engineer for an Aerospace & Defence manufacturing client in Doha, Qatar . Candidates must have a minimum of 5-8 years of proven experience in information security roles. Fluency in English is a must. Job...
- ...following up on customers' requests Specific for Multimedia: Inform Department Manager of unavailable and nonperforming products... ...items/shipments, as well as accurate stock keeping preventing security risks and thefts by performing physical and electronic inventory...
- ...procedures, compare them with best practices, and ensure they meet the agency’s objectives. Develop the internal audit plan for information security based on risk assessment results. Conduct internal audits according to the approved audit plan, submit reports and...
- A leading IT services provider in Qatar is seeking an experienced information security manager to implement policies, conduct audits, and ensure compliance with internal standards. The ideal candidate will have a bachelor’s degree, relevant certifications, and 5-7 years...
$600 per year
# Senior Information Security Engineer (SOC) RemoteFull-timeIT & Security## About the positionWe are looking for a Senior SOC Engineer to strengthen our Security Operations capabilities. In this role, you will help design and improve SOC processes, lead complex incident...- ...Job Description: The Digital Information Coordinator will play a crucial role in delivering the engineering digital transformation... ...Manage the collaboration platform to ensure the accurate and secure management of digital information and data outputs from initiatives...
- ...policies across: ~ Company (holding company), and its majority-owned joint ventures. You will design, implement, and run a secure, scalable, Microsoft-centric IT environment that supports: A small but growing organisation (currently Distributed teams...
- ...Job Summary University is seeking a candidate for Security Engineer.Reporting to the Senior Manager Network AV, the Security Engineer... ...devices, identifying best practices for network devices information systems, overseeing the vulnerability management process developing...
- ...Job Summary This opportunity is for a senior security professional within Ciscos Customer Experience (CX) organization to help drive... ...personality with a can-do mentality Minimum 10 years in information security, ideally with an advisory consulting background in Big...
- ...Responsibilities Implementation and maintenance of various Security Tools and systems include Vulnerability management systems, Endpoint... ...Qualifications: High school at minimum, Bachelor Degree in information technology is good to have Familiarity with part/all of...
- ...of experience. Responsibilities Formulation of safety, security and enforcement systems and the formulation and monitoring of... ...security standards. Development of enforcement procedures, information and data, records system, implementation manuals and associated...
- ...great service. We’re looking for a skilled and service-oriented Information Technology Specialist to support and maintain our... ...IT equipment Monitor and maintain network performance and security systems Troubleshoot system errors and implement timely solutions...
- ...operations of the Reading Room and the collaborative planning and implementation of next-generation library services, managing the information services team members, providing guidance on work distribution and processes, establishing and monitoring team best practices and...
- ...have a bachelor degree or equivalent with essential of qualified security area. Minimum of 4 years operation experience in Aviation... ...Bomb Threat, Hijack and any acts of terrorism, you will provide information support and coordinate with Flight Operations and Security Duty...
- ...PHP web based applications (nice to have)Good working knowledge of: Server platforms (UNIX, Windows etc.), networking technologies, security (Firewalls, IDS IPS, proxy systems etc.), storage devices. Good understanding of System Development Life cycle, REGular...
- ...Cyber Security Team Job Purpose : Looking for a cybersecurity professional, experienced in implementing and managing core security... ...Essential qualifications include a degree or diploma in Information Technology or related fields with 5+ years of hands-on experience...
- ...provider in Doha, Qatar. Our client is looking to hire a Network Security Architect who will be responsible for designing, implementing,... ...secure network architectures to protect organizational information assets from internal and external threats, while ensuring compliance...
- ...Job Summary Systems Security Administrators must demonstrate technical knowledge of data systems and security procedures, as well as a familiarity with systems hardware and software. They require good communication skills and the ability to work well in a team setting...
- ...Job Summary The Senior Information Management Expert is responsible for defining, leading, and executing enterprise-wide Information Management (IM) and Information Governance (IG) strategies. The role ensures the effective lifecycle management of organizational information...
- ...Job Description We are currently looking Identity Security Consultant our Qatar operations. Required Experience & Skills • 8+ years in Identity Security / Security Engineering • Deep hands‑on experience with: penetration test (pentest) • Active Directory...
- ...Job Summary Implement and operate Information Security controls within the Industrial Control Systems (ICS) / Operational Technology (OT) environment, including developing procedures, to manage cyber security risks to acceptable operational levels and increase operational...
- ...mselect is looking to hire a System Security Engineer for an Aerospace & Defence manufacturing client in Doha, Qatar . Candidates... ...Requirements Qualifications: ~ Bachelor’s degree in information security or computer engineering ~ Qualifications should include...
- ...Job Summary A highest level of security awareness. Abilty to report to duty 24/7 on short notice. Investigations and surveillance skills. Be well groomed and presentable. VVIP/VIP Protocol and cultural awareness. A Military/Police/Aviation Security background...
- ...educational assistance is on offer for the right candidate. Scope of work To provide, operate, and maintain “best practice‟ safety and security strategies and systems for NOC General Services division. To provide safety and Security reporting and improvement of these...
- ...Job Summary This is an exciting opportunity to be part of Qatar Airways Group Security. As the Security Operations Manager, you will be involved in providing security support across Qatar Airways (QR) Network. The first point of contact for all day to day security related...
- ...Responsibilities Promote a set of technology solutions ranging from Hardware, Unified Communications, Cybersecurity, Networking, Information management, Cloud infra, IoT solutions, ..etc Achieve quarterly and yearly set sales targets Develop a good functional...
- ...Job Summary Flight Security Officers are sufficiently trained and qualified to conduct all aspects of their role. As a Security Training... ...-specific recommendations accordingly. Prepare briefing information specific to locations where enhanced security measures are...
- ...Job Summary Individuals interested in a Network Security Administrator position require a strong technical background, including a working knowledge of network management protocols, networking architecture, authentication practices, and security administration. It is...
