Get new jobs by email
- ...Job Title: Security Engineer Experience: 46 Years Location: Pakistan (Hybrid) Employment Type: Full-Time Job Summary... ...incidents and lead response activities Perform vulnerability assessments and coordinate remediation efforts Develop and maintain security...
- ...Job Title: Cloud Security Architect Location: Riyadh, Kingdom of Saudi Arabia (Onsite) Industry: Banking / Financial Services... ...and zero-trust architecture. Conduct threat modeling, risk assessments, and security design reviews. Define cloud security governance...
- ...Haves Experience with machine learning, artificial intelligence, or data analytics Knowledge of cybersecurity principles and secure coding practices Certification in software engineering or related fields Open-source project contributions or personal projects...
- ...points and verify IDs. Patrol areas to prevent theft or damage. Respond to emergencies and report incidents. Monitor CCTV and security equipment. Support junior security staff when needed. Follow all security rules and discipline. Prepare daily security...
- ...engineering capacity to product and engineering teams to ensure security is baked into the product from the design phase creating a... ...ensuring security stories are prioritised against feature goals Assess SDLC security gap risks and propose remedies Consult Instruct...
- ...As the Chief Information Security Officer (CISO) for HugoBank, a cloud-native digital bank operating in Pakistan, one will play a pivotal... ...decision-making. Risk Management & Compliance Identify, assess, and prioritize security risks, implementing measures to...
- ...forward and everyone pulls in the same direction to make a dent in the universe bigger than ourselves. We are now hiring a Cloud Security Engineer that will sit at the forefront of our AI Innovation! About the role This is a pivotal hands-on technical role where...
- ...HRSI is looking for a Plant Security Officer for one of its leading clients. Key Responsibilities Patrol plant grounds, buildings, and restricted areas to deter and detect security threats Monitor surveillance systems (CCTV, alarms, access control...
- ...resolving access issues. Assist in license tracking and user type classification for compliance with SAP licensing terms. Document security-related changes and follow defined procedures for audit readiness. Monitor system alerts or access failures and escalate issues...
- ...strategic partners. Job Description: Aqovia is seeking a Security Officer to lead and enhance our Information Security... ...ISO 27001, NIST CSF and OWASP ASVS.. Conduct regular risk assessments, audits, monitoring and compliance reviews and reports to meet...
- ...Our client Fulcrum is hiring Secure Lending Expert to work remotely with them. Location: Remote Experience: 12 Years Employment Type: Contract (1 Year) Immediate Joiners Preferred About the Role: We are looking for a detail-oriented Secure...
- ...seeking a Cybersecurity Analyst to monitor, analyze, and triage security alerts, ensuring a proactive defense against evolving threats... ...Response: Perform initial triage and incident handling to assess potential threats. Conduct root cause analysis to determine...
- ...Job Title: SDLC Security Operations Engineer (DevSecOps) Experience: 79 Years Location: Pakistan - Remote (UAE Business Hours) Employment Type: Full-Time Job Summary We are looking for a hands-on SDLC Security Operations Engineer to embed security controls...
- ...appointment accreditation any residency or visa requirements and security clearances. CONDITIONS OF SERVICE A competitive... ...mappings . Candidates may be requested to provide performance assessments and authorization to conduct verification checks of past and present...
- ...experienced cybersecurity professional eager to take on a key role in securing Digital Retail Banking (DRB) operations? We are looking for a... .... If you have a passion for threat management, vulnerability assessments, and security architecture, this is your chance to make a real...
- ...Key Responsibilities: Develop and implement information security policies and procedures. Conduct regular risk assessments and vulnerability assessments. Monitor and respond to security incidents and breaches. Manage and maintain security tools and technologies...
- ...world of digital banking? We’re seeking a dynamic Information Security Administrator to take charge of securing our cutting-edge Digital... .... Threat Prevention & Awareness: Conduct risk assessments and proactively manage vulnerabilities before they become threats...
- ...Job Overview: As a Senior Information Security Analyst you will play a critical role in safeguarding CureMDs information systems and sensitive data. You will conduct security assessments manage risk and ensure compliance with industry regulations. You will also work...
- ...Implement organization security policies and procedures Monitor internal control system to ensure that appropriate security clearance is maintained within the organization Develop and implement local security programs and procedures consistent with corporate standards...
- ...Jordan. We have offices in Riyadh, Jeddah, Madinah, Dammam, Khobar, Amman, Lahore, and Karachi. Job Brief: The Lead IT Security and Compliance Officer will establish and oversee Jeeny’s security and compliance program, ensure alignment with ISO 27001, SOC 2...
- ...experience in ICS/OT networks industrial automation or control systems security. ~ Experience working with major PLC vendors such as Siemens... ...RTUs DCS and SCADA systems. Conduct OT/ICS cybersecurity assessments aligned with NIST 800-82 and IEC 62443 standards. Implement...
- ...Job Title: Cyber Security Specialist (SOC / Incident Response) Experience: 79 Years Location: Pakistan (Hybrid) (UAE Business Hours) Employment Type: Full-Time Job Summary We are seeking a Cyber Security Specialist to support day-to-day cybersecurity operations...
- ...visitor logs. Patrol the area regularly to prevent theft damage or any suspicious activity. Respond quickly to emergencies or security incidents and report them to supervisors. Ensure CCTV cameras and security equipment are working properly. Follow company...
- ...have specialized in providing managed IT services and managed security services for our clients. which are made up of small to medium... ...well for clients and/or candidates who have strong experience in assessing and implementing SIEM and other operational tools and...
- ...closely with portfolio manager, product managers, developers, and security engineers to ensure that security is embedded throughout the... ...for compliance with global security standards. Perform assessments and develop roadmaps for assigned for clients and product based...
- ...international efforts to defeat hunger. FAOs goal is to achieve food security for all and ensure that people have regular access to enough... .... Perform other duties as required. CANDIDATES WILL BE ASSESSED AGAINST THE FOLLOWING Minimum Requirements University...
- ...capabilities, stakeholder management skills, and the ability to assess both commercial and technical talent effectively. The ideal... ...technical roles , including NOC (Network Operations Center) and SOC (Security Operations Center) positions, preferably. Partner with...
- ...use on productivity and incomes. The Agricultural Economist will assess supply chains, demand trends, and constraints affecting... ...mission is to reduce poverty, enhance food, water, and nutritional security, as well as environmental health in the face of global challenges...
- ...communication skills. ~ Ability to negotiate payment plans and secure commitments effectively. ~ Strong active listening and... ...resolution skills. ~ Analytical and problem-solving abilities to assess accounts and determine recovery strategies. ~ Strong organizational...
- ...international efforts to defeat hunger. FAOs goal is to achieve food security for all and ensure that people have regular access to enough... ...and analyse data from various sources (program MEAL 5Ws assessments Govt etc.) ensuring accuracy and completeness. Review of data...
