Get new jobs by email
Search Results
- ...internal use): 09 S&P Global – Corporate About the Role: Cyber Risk Analyst - This role helps reduce the cyber risk posed by third... ...Management Any prior exposure to vendor risk management and/ or privacy laws and regulations is a plus. Demonstrable understanding of the...SuggestedSide jobWorldwideFlexible hoursUS shift
- Key Responsibilities • Program Management: Plan and execute program deliverables, ensuring alignment with organizational goals. • Cross-Functional Collaboration: Work closely with stakeholders, tool owners, and leaders to ensure effective communication and program alignment...Suggested
- ...In IT&D, you'll be a force for good, whether you're championing cyber security, defining how we harness the power of technology to improve... ...identity, gender expression, and transgender identity; protected veteran status; size or any other basis protected by appropriate law....SuggestedLocal area
- Risk Identification and Assessment : Conduct risk assessments to identify vulnerabilities in IT systems, processes, and policies. Assist in the identification and evaluation of risks associated with third-party vendors and partners. Maintain the IT risk register, ...SuggestedShift work
- UltraViolet Cyber is seeking a Cyber Security Analyst to add to our existing team. Primary responsibilities will require: (i) in-depth analysis of intrusions in diverse computing environments; (ii) thorough packet analyses; (iii) implementing/optimizing changes to security...Suggested
- Role & responsibilities Develop policies in DLP system to monitor data exchange to external environment through emails, endpoints and web upload Investigation and conclusion of violation cases where data was exchanged externally Continuous improvement in existing DLP...Suggested
- ...requirements gathering for large-scale projects. Ability to develop a cyber security strategy and input into detail-oriented operational... ...protection. Deep knowledge of security risks, data privacy laws, and fraud prevention techniques relevant to Financial Services, FinTech...SuggestedHybrid work
- ...information, and financial transactions. Reporting to the Head of Cyber Security Middle East & Africa, you will develop and enforce... ...endpoint protection. Deep knowledge of security risks, data privacy laws, and fraud prevention techniques relevant to Financial Services,...SuggestedHybrid work
- ...Position Title: Information & Cyber Security Specialist Mode: 100% Remote Contract: Full-time Compensation: Upto ₹70,000 per month Working Days: Monday to Saturday Shift Timing: 03:00 PM – 12:00 AM IST Experience Required: 5+ Years Job Description:...SuggestedFull timeContract workWork at officeRemote jobShift workSaturday
- ...We are seeking a Senior Cyber Security Consultant with extensive experience in enterprise IT security, risk management, and cloud-based security solutions. The ideal candidate will have a deep understanding of managing cyber security risks during digital transformations and...Suggested
- ...planning and testing and liaison activities. Understanding of Identity, Lifecycle and Governance capabilities, intersection with other cyber security domains, products and industry practices. Identify and assess cybersecurity risks through business analysis and propose...SuggestedLong term contractFlexible hours
- Biological E. Limited is looking for a Legal Professional to join their Corporate Legal team . They need someone who is skilled in drafting and reviewing contracts and has 2-4 years of relevant experience . Key Responsibilities: Drafting, reviewing, and finalizing...SuggestedContract work
- ...responsible for providing legal counsel to the company on various matters and ensuring that all business activities comply with relevant laws and regulations. The ideal candidate will have a strong background in corporate law, excellent analytical and communication...SuggestedContract workPart timeWork at office1 day week
- ...compliance processes Supporting any other (internal/external) requests Preferred candidate profile You have a University degree in Law, Finance or Economics. You have ideally 1 or 2 years of experience in Fund Administration and/or Corporate Service Compliance You...Suggested
- Key Responsibilities: Monitor network traffic for suspicious activity. Investigate and respond to security incidents. Conduct vulnerability assessments and penetration tests. Install and manage firewalls, antivirus, and encryption tools. Develop and enforce security...Suggested
- Required Skills & Qualifications: ~ Bachelor's degree in Computer Science, IT, Cybersecurity, or related field ~2+ years of experience in cybersecurity or information security ~ Proficiency in tools like SIEM (Splunk, QRadar, etc ), IDS/IPS, and antivirus systems ~ ...
- ...experienced Advocate to represent the company in legal matters, provide strategic legal counsel, and ensure compliance with all applicable laws and regulations. This is a flexible, remote opportunity ideal for legal professionals looking to work on dynamic, high-impact projects....Hourly payContract workFreelanceRemote jobFlexible hours
- Skills: Strong hands-on experience in setting up and configuring vulnerability management scans for internal and external networks. Expertise in identifying, prioritizing, and remediating security vulnerabilities across IT assets. Proficiency in recommending and implementing...For contractors
- ...attendance and working hours. This position requires a detail-oriented individual who can ensure compliance with company policies and labor laws. Responsibilities Monitor and record time and attendance for all employees. Should have the experience on maintenance of...
- ...limited to, transaction activity reviews, suspicious activity, fraud referral, investigations, fulfillment of information sharing and law enforcement requests, and filing of Suspicious Activity Reports ( SAR ). Preferred Qualifications: Ability to work independently and...