Search Results: 25 vacancies

 ...Office 365, Microsoft Intune / EMS, Online Protection, DLP, Information Protection Suite, Azure MFA Server, Azure AD Sync, ADFS Proxy & Windows Azure application and services. Active Directory, Group Policies, IIS, Microsoft PKI Certificates, PowerShell, Scripting... 

Nair Systems

Doha
3 days ago
 ...processes and procedures, and provide instructions to subordinates to ensure their proper implementation. Others: 27. Act as the proxy of the company at various industry forums as may be required. 28. Monitor and analyze guarantee claims and recommend on response.... 

Qatar Gas Transportation Company (Nakilat)

Doha
1 day ago
 ...Computer Science 12 years experience in designing and implementing security technologies (Cisco ASA firewalls Juniper Blue Coat proxies IPS ISA and McAfee) 5 years in ICT security in the financial sector Deep understanding of network security Experience in Windows... 

Global Search Arabia

Doha
4 days ago
 ...proper implementation to support achieving the different set targets and plans, hence Nakilat strategy. Others: 24. Act as a proxy for the company at various industry forums as well as other working groups and committees of charterers, operators, joint owners, etc... 

Nakilat

Doha
1 day ago
 ...security, and performance. Develop and maintain DataPower services, including XML Firewall, Multi-Protocol Gateway, and Web Service Proxy Develop and maintain API Gateway policies, including security policies, traffic management policies, and transformation policies... 

Reflections Info Systems

Doha
14 hours ago
 ...experience in designing, developing, and supporting IBM DataPower Gateway X3 appliances Good experience in implementation of Web Service Proxy, Multi-Protocol Gateway, XML Firewall service Good experience in AAA (authentication, authorization, auditing) and Customization... 

Novel Overseas Corporation

Doha
3 days ago
 ...on experience with scalability technologies like Memcached, Hadoop, Hive, Pig,Solr, Lucene, Sphinx, Kafka and understanding of web proxies and caching technologies like Varnish, Squid and relative load balancing technologies. • Familiar with configuration management and... 

People Dynamics

Doha
4 days ago
 ...team meetings Ensure a strong, candid team dynamic with productive, professional dialogue Be a strategic adviser, confidant and proxy for the VP of Global Support Clarify and oversee connection points and initiatives across departments Optimise processes by... 

Canonical

Doha
3 days ago
 ...operational best practices Operate and monitor security tools such as Antivirus, VA scan, WAF, PAM, DNS, Certificate, Firewall and Proxy Manage and support security requests and incidents through ITSM Manage security operations, perform problem and root cause... 

Robert Walters

Doha
23 days ago
 ...environment and lead all agile ceremonies. Build and maintain good strong relationships with clients and stakeholders and act as a proxy for the client to the development teams. Manage the product development life cycle of define / build / release / measure end-to-... 

SWAN GLOBAL

Doha
more than 2 months ago
 ...CORE COMPETENCIES Active Directory, Exchange 2016, Exchange 2019, Office 365, Azure AD, Office 365, Microsoft Intune / EMS, Online Protection, DLP, Information Protection Suite, Azure MFA Server, Azure AD Sync, ADFS Proxy & Windows Azure application and services.... 

NAIR SYSTEMS

Doha
a month ago
 ...experience selling network infrastructure-based security appliances, including but not limited to: Firewalls, SSL/IPSec VPNs, Security Proxies and Caches • Familiarity working with Channel partners and understanding of a channel-centric market approach • Previous work in... 

Palo Alto Networks

Doha
a month ago
 ...of maintaining a secure enterprise network through configuring and managing typical Security Enforcing Devices, such as Firewalls, Proxies, IDS/IPS devices, HIDS/EPO. Knowledge of Sourcefire/Snort Prior experience automating interactions between systems using APIs Industry... 

HYUNDAI ENGINEERING & CONSTRUCTION CO LTD

Doha
a month ago
 ...Experience Must -Solid understanding of Object-Oriented Design Methodology and Design Patterns like Singleton, Factory, Observer, Proxy, Demand, -Expertise in Core Java concepts, such as OOP Design, Multi-Threading, Generics, Exception Handling, Collections, Java... 

شبكة الجزيرة الإعلامية

Doha
more than 2 months ago
 ...Organize and support the annual Long-Range Planning (LRP) efforts. Drive outcomes and initiatives, leveraging partners from other BUs. Proxy as CIO in key leadership meetings, while providing leadership and direction on key initiatives. Optimize IT cadence to ensure... 

Gartner

Doha
more than 2 months ago
 ...Administration of VPN both user and tunnels Trouble shooting network related problems Maintenance and Administration of corporate proxy Maintenance and Administration of Trend Micro Office Scan Maintenance and Administration of Data Leakage Prevention (DLP)... 

Mekdam Holding Group

Doha
more than 2 months ago
 ...processes & procedures and provide instructions to subordinates to ensure their proper implementation. Others:. 19. Act as a proxy for procurement section at various meetings with internal NAKILAT departments JV partners and affiliates as well as external partners... 

Talent Pal

Doha
29 days ago
 ...that understanding both in written and verbal forms . Displays familiarity with detail of web application protocols ( - including proxying and cookies - SSL, SOAP etc). Logging and reporting. F5 BIG-IP Local Traffic Manager (LTM). F5 BIG-IP Global Traffic... 

The Group Securities

Doha
a month ago
 ...Administration of VPN both user and tunnels Trouble shooting network related problems Maintenance and Administration of corporate proxy Maintenance and Administration of Trend Micro Office Scan Maintenance and Administration of Data Leakage Prevention (DLP)... 

Mekdam Holding Group

Doha
more than 2 months ago
 ...solutions, IDS/IPS, anti- virus technologies, SIEM technologies, host forensics and malware analysis, web application firewalls and proxy solutions. Manage real time threat detection technologies to identify and quarantine threats, Monitor Endpoint Security; alerts and... 

EY

Doha
more than 2 months ago