Search Results: 10,766 vacancies
...Requirements For The Role
✔ 7+ years of experience in Information Security
✔ Develop and monitor a strategic, comprehensive enterprise information /
cyber security risk management program to ensure protection of digital and
data assets
✔ Implement and lead the...
...Job Purpose
· Perform document control and information management activities for the NFXP Offshore NFW scope.
· Provide cost estimation and cost control support to the NFXP Offshore Projects.
Project Key Accountabilities
(Duties include but not limited...
...Job Scope
The Business Development Manager is accountable for researching and identifying new opportunities to grow, develop business... ...Technical and Operations
- I de ntify, secure and negotiate opportunities for expansion and growth through research...
...Primary purpose of job Governance and execution of the Information Security Management System (ISMS) including developing policies, standards and procedures required for the corporate information security in both an information technology (IT) and operational technology...
...6 years of experience in Cybersecurity engineering with experience that includes configuring and managing Web Application Firewalls.
Web Application Firewall/Security Experience:
• Excellent understanding of DDoS techniques and mitigation mechanisms
• Solid understanding...
...Vacancy
1 Vacancy
Job Description
Position: Senior Information Security OfficerCompany: Qatar Shipyard Technology SolutionsLocation... ...and PurposeDrive a strong and robust information security management system in the organization through threat/vulnerability detection...
...Job Summary
The purpose of this role is to develop and implement information security, risk management, regulatory and governance policies and procedures. In this role you will initiate, facilitate, and promote activities to create information security awareness within...
...Information Security Architect – Duties And Experience
Domain Architect
Responsible for current and target security architecture for group
Work with group stakeholders, technical teams, external vendors and partners
DevSecOps
Work with technical...
...Responsibilities: Collaboratingwith department managers to determine securityneeds. Planning and implementing comprehensivesecurity strategies... ...and documentingprocesses. Supervising, recruiting, andtraining security personnel. Gathering securityintelligence and implementing...
Our talented employees bring software development, systems engineering, and advanced analytics expertise.
We offer numerous prime contract opportunities with customers headquartered in Maryland, Virginia, and the District of Columbia, as well as subcontract opportunities...
...least 10 years in Materials / Logistics management;Graduate with excellent communication... ...dispatch, etc;W...
Provides financial information to management by researching and... ...operational changes with a focus on information security requirement adherence;Specialized...
...Facilitate development of Memorandums of Understanding (MOU), Interconnection Security Agreements (ISA), and Risk Acknowledgement Letters (RAL)
Oversee the development and deployment of program information security for all program systems to meet the program and enterprise...
...Job Description
Job Summary
The purpose of this role is to develop and implement information security, risk management, regulatory and governance policies and procedures. In this role you will initiate, facilitate, and promote activities to create information security...
Suncoast Drivers is seeking Local Class A Drivers to join our team in the Perryville area!
Delivering all medical supplies except pharma to hospitals and surgical centers. All automatics no manuals. Dock deliveries, lift gate and breakdown skids. Will be some touch...
...Job Purpose
· Provide Security direction, guidance and leadership to NFXP Onshore PMT... ...and SUBCONTACTOR(s) Security performance management process to ensure Project and... ...Interpersonal Skills (4)
· Communication and Information Sharing (4)
· Problem Solving (3)
·...
...Plan, resource, and manage delivery of assigned audits projects
Ensure all assignments are conducted in accordance with standards and methodology
Present and hold discussions with business stakeholders throughout the audit engagements
Undertake complex or sensitive...
...Responsiblity:
Conducting a thorough data analysis of clients' information and storage systems.
Creating or implementing a digital... ...other digital sources.
Importing and transferring data to a secure central database.
Performing regular data integrity and...
...corporate proxy
Maintenance and Administration of Trend Micro Office Scan
Maintenance and Administration of Data Leakage Prevention (DLP)
Make sure all corporate Desktops and Servers are properly updated
Perform Application and Network security assessments...
...productive use of the applications.
Support the configuration, administration, monitoring, maintenance, and security of applications and databases.
Create, manage, and maintain database objects to be used for applications and reports.
Implement software development...
...SENIOR INFORMATION SECURITY RISK ANALYST (Governance, Risk & Compliance)
Primary Purpose of Job
The Senior Information Security Risk Analyst... ...QatarEnergy in both IT and OT environments by assessing and managing cyber and information security risks. He/She actively...