...Requisition ID: COM000741
Information Technology Risk Management and Security has become an essential component of the current IT enterprise that provides IT & Automation support to the Pharmaceutical Research, Supply Chain and Marketing organizations. Increased risks...
...world’s most dynamic companies.
Our services help organizations address evolving and pervasive issues such as identity theft, data security breaches, data leakage, cyber intelligence & security, and system outages across organizations of various sizes and industries, with...
...gain access, and expand access to remote systems.
# Document technical issues and recommend mitigation controls identified during security assessments.
# Research cutting edge security topics and new attack vendors
# Conduct compliance testing on web based application...
The Regional Security Architect will ensure proper governance over the design and implementation of security solutions and operations, ensuring they adequately meet the Group Security requirements defined/communicated by the Regional Information Security...
...oasis for the well-travelled.
- Visitors and contractors management. Verifies the visit of allvisitors and contractors, and issues security pass upon verification.
- Daily perimeter patrolling for crime prevention and to report of anyincidents, disputes disturbances or...
~Perform security functions at assigned posts in the gaming and non-gaming areas.
~Escort, or carry valuables as assigned or directed. Valuables may include the transportation of chips and cash as well as documentation.
~Respond to all emergencies and...
~Provide advisory to other teams on technical/process concepts related to security.
~Taking care of security applications (ArcSight SIEM, CyberArk PIM, Oracle IAM Suite etc).
~Operate, enhance and maintain (break/fix) tools owned by the security operations...
...Cyber Security Consultant handling risk assessments,pen testing,phishing simulation exercises,threat intelligence gathering,awareness policy reviews.
The role will be a Cyber Security Consultant who holds a critical position of conducting cyber security risk...
CBRE has entered into a global contract by the Client (the Account), to lead the delivery of all day-to-day operational security requirements to protect the Account’s personnel and property.
The primary functions of this role:
• Responsible for the oversight and delivery...
~Implement and update security procedures in accordance to information security policies and guidelines.
~Manage and operates security solutions. Syslog servers, SIEM, Privilege user management.
~Review and conduct risk assessment on firewall and VPN access...
I am currently looking for a Security Administrator with a strong Networks background. My client is an MNC IT Consulting company and this role will be based at their client side.
Responsible for day-to-day administration of security...
~Serves as the primary person responsible for all matters with regards to workplace security operations.
~Manage, plan, co-ordinate, schedule, organize, quality control, on-site attendance of all the works required under workplace security including software...
Security Officer | Closing date: September 30, 2018
Department: Property Management
~Carry out security operational duties at office/commercial buildings
~Traffic control and car park duties to maintain smooth vehicular traffic at the premises
...SOC systems and infrastructure
~Manage and fine-tune SOC systems and infrastructure
~Configure and troubleshoot security infrastructure devices.
~Prepare and document standard operating procedures and protocols.
~Identify and define system security...
...Diploma / Degree in Computer Science /Information Technology or equivalent.
~At least 2 years of relevant working experience in Network/Security
~Manage and Coordinate between customers and third party vendors for fault resolution where necessary.
~Has good knowledge in VPN,...
Perform change request across all security technologies based on new design standards and business requirements.
Provide security fault investigation, troubleshooting, resolution, recovery and root cause analysis.
Review and implement complex changes and...