Search Results: 300 vacancies
...gaps identified at the solutions.
• Conduct threat hunting when receiving indicators from threat intel ensuring our
• environment is secure and free from vulnerabilities.
• Manage vulnerabilities on a continuous basis and work with patch management team to ensure...
...removal of property
Report any accidents that happened within the Hotel
Create security and fire safety awareness among staff and guests
Inspect all areas for safety and fire hazard & report on findings
Handle work place incidents and do investigations
Job Requirements...
...Hilton where we never forget the reason we're here: to delight our guests, Team Members, and owners alike.
Position Statement
A Security Officer maintains the order and security of the hotel, its guests and team members.
What will I be doing?
As the Security...
...Responsibilities:
Manage and oversee the technical aspects of security system projects, specifically CCTV systems.
Lead and supervise a team of technicians and engineers in the installation, maintenance, and troubleshooting of CCTV systems.
Collaborate with...
...Hilton where we never forget the reason we're here: to delight our guests, Team Members, and owners alike.
Position Summary
The Security Team Leader assists the Security Executive in guiding the Security Officers on duty to ensure that hotel work procedures and...
...about the company
Our client is an established global securities brokerage firm.
about the job
Carry out KYC/CDD reviews on high risk clients
Conduct transaction and trade surveillance to detect potential market abuse
Other reviews include Suspicious Transaction...
...The Team
Our Cyber team helps some of the largest global firms and most recognizable local brands solve their cyber security challenges. With diverse services from the strategic, advisory, and tactical levels, we help our clients understand the threat, reduce...
Responsibilities:
Develop and implement sales strategies for the logistics industry, with a focus on new business acquisition.
Identify and target potential clients in the logistics sector to expand the company's client base.
Build and maintain strong relationships...
...Your Role and Responsibilities
The Security Architect must serve as technology and solution advisers with pragmatic experience in both IT Security, OT Security, Cloud Security and other Emerging security technologies. These architects will act in many ways as technology...
...Responsibilities:
Develop and implement sales strategies to drive revenue growth in the IT and security industry.
Manage and lead a team of network sales representatives to achieve sales targets and objectives.
Identify and develop new business opportunities...
...ensure manage and assist the organization in creating good workplace experience for employees through maintaining the facilities and security in accordance to Roche requirement and local legal guidelines.
What you do
Appointed Deputy Site Security Officer
Manage implementation...
...facing role
Strong teamwork skills
Attention to detail
Preferred:
PMP certification
Experience in corporate security
Control Risks is committed to a diverse environment and is proud to be an equal opportunity employer. All qualified applicants...
...As a Team Leader of the Google Cloud Security Team at Teleperformance, you will be the link to our client’s success, you will lead a team of specialized executives in charge of the commercial growth within your business unit. You will work with your fellow team leaders to further...
JOB SCOPE
The role of the Senior Security Officer/Security Officer is to maintain the safety and security levels of all hotel guests, customers, employees and service vendors.
JOB RESPONSIBILITIES
Conduct random checks on goods and staff entering/leaving the hotel premises...
...analysts and data scientists.
Implement best practices in data security throughout the lifecycle of analytical data.
Requirements... ..., and transfer the personal data of our candidates. Here you can find how you can request for access, correction and/or withdrawal of your...
...Git, Jenkins, and Bamboo.
~ Understanding of the concept of Secure-By-Design Lifecycle for Agile and the utilisation of technologies... ..., and transfer the personal data of our candidates. Here you can find how you can request for access, correction and/or withdrawal of your...
...Portal and Portlet development
n-Tier Architecture
Java Web Security/LDAP
JEE Security
JEE Transaction
XML
Web... ..., and transfer the personal data of our candidates. Here you can find how you can request for access, correction and/or withdrawal of...
...and Accessibility optimisation
Experience with application security tools such as SonarQube, Fortify SCA or Web Inspect (or equivalent... ..., and transfer the personal data of our candidates. Here you can find how you can request for access, correction and/or withdrawal of your...
...characteristics protected by law.
Protecting your privacy and the security of your data are longstanding top priorities for Activate... ..., and transfer the personal data of our candidates. Here you can find how you can request for access, correction and/or withdrawal of your...
...Portal and Portlet development
n-Tier Architecture
Java Web Security/LDAP
JEE Security
JEE Transaction
XML
Web... ..., and transfer the personal data of our candidates. Here you can find how you can request for access, correction and/or withdrawal of...