...implementing, and managing cloud-based solutions that are scalable, secure, and aligned with business goals. With expertise in automation,... ...audits to identify and mitigate potential vulnerabilities and risks.
Participating in on-call rotations and providing 24/7 support...
...diverse business goals with improved agility, reduced costs & built in security.
1.Project Planning: Define project scope, objectives, and... ....
Assign roles and responsibilities to team members
3. Risk Management: Identify potential risks and issues that may arise during...
...evaluating performance (e.g. writing reports, analyzing data)
Keep track of business revenue
Research ways to increase profitability and lower risk
Create and give presentations
Desired Skills:
Strong communicationLeadershipteam...
...and IT teams to gather requirements and provide project updates.
Manage expectations and address any concerns or issues promptly.
Risk Management:
Identify potential project risks and develop mitigation strategies.
Monitor project risks and implement contingency...
...part of the focused team to activities related to cyber strategy for various clients across the MENA region. Cyber security is one of the few most important risks facing businesses today. We are looking for trusted consultants to enhance the capability. Also, as...
...with cross-functional teams, including product management, design, and QA, to ensure seamless project execution.- Identify and mitigate risks and obstacles that may impact project success.Technical Leadership :- Provide technical expertise and guidance to the engineering team...
...our company’s offices and contributes in driving sustainable growth.
Responsibilities
Coordinate office activities and operations to secure efficiency and compliance to company policies
Supervise administrative staff and divide responsibilities to ensure performance
Manage...
...help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.
Security Technology – Cross Function Security Technology– Support Engineer
EY Technology
Technology has always been at the heart of what...
...for yourself, and a better working world for all.
Perimeter Security Specialist.
Today’s world is fueled by vast amounts of... ...and build client trust.
Within Information Security we blend risk strategy, digital identity, cyber defense, application security and...
...Active Directory solutions, including domain design and group policy management.
Manage and optimize Office 365 services, ensuring security and compliance.
Design and implement advanced workstation management solutions, including automation and scripting.
Lead the...
...Job Description
Prime Function:
Supervise, instruct and coordinate the activities of Security Associates.
Monitor and arrange shift activities according to schedule requirements and team availability.
Ensure all personnel are present & have assumed their duties...
...build an exceptional experience for yourself, and a better working world for all.
Supplier Risk Assurance Analyst – Associate
EY Technology:
Global Information Security (Info Sec) – Our mission is to protect and enable the Firm to confidently utilize technology...
...web applications.
Ability to work with wireframe designs to develop applications.
Proficiency in implementing and maintaining security measures.
Excellent time management skills and the ability to meet deadlines.
Effective communication skills, both technical and...
...Security Operation Center - Manager
Cochin (India) | immediately
Grow and shape a secure future together with us!
To reinforce... ...identification and communication of relevant Cyber Security-related issues, risks, and events in the Enterprise Services organization.
Ensures...
...experience for yourself, and a better working world for all.
Risk Consulting - Protect Tech - Manager (IT audit – General skills)... ...evaluate, and enhance information systems to develop and improve security at procedural and technology levels.
Assist with cultivating...
...optimize environmental compliance applications and tools.
• Develop and deploy policies, specifications, processes, and procedures to secure a robust product environmental compliance management system across Energy Business Unit.
• Develop and train TE colleagues on...
...International's Corporate Strategies and brand standards, whilst meeting employee, guest and owner expectations. The Team Leader - Security is responsible to assist in the smooth operations of the security operations of the Security
Qualifications
Ideally with a professional...
...opportunity for someone with 1 to 2 years of experience in ServiceNow platform administration and a basic understanding of Governance, Risk, and Compliance concepts. The role involves supporting the implementation and maintenance of GRC solutions within the ServiceNow platform...
...Experience Working with CMDB, IP Admin
Good understanding of Security Operation domains, tools and processes including IT Asset lifecycle... ...relevant certifications like ISO 27001/CISSP etc
Governance, Risk and Compliance professional with specialisation in Information Security...
...The Security Operations Engineer is responsible for day-to-day operations of information security-related systems, including installing, running, and managing services, advising the Information Security and Operations teams, and making recommendations on security functions....
...Job Description
Description
It’s an exciting time to be at Infoblox. Named a Top 25 Cyber Security Company by The Software Report and one of Inc . magazine’s Best Workplaces for 2020, Infoblox is the leader in cloud-first networking and security services. Our solutions...
...SME/ Security Architect – Palo Alto
Grow and shape a secure future together with us!
mispa Technologies is an innovative IT security... ...Plan and execute changes to IT solutions, assessing and mitigating risks during implementation.
• Design and integrate Palo Alto-based...
...experience for yourself, and a better working world for all.
Risk Consulting - Protect Tech – Senior IT Risk - SAP
Your key... ...evaluate, and enhance information systems to develop and improve security at procedural and technology levels.
Assist with cultivating business...
...Flexibility is required to address customer needs, identify the problem at the site and ensure timely completion of the Job in a safe and secure manner.
Gilbarco Veeder-Root (GVR) requires that all associates comply with the GVR Health, Safety and Environment (HSE) Policy...
...DESCRIPTION
The primary objective of the SLP Coordinator is to provide security services, investigation and asset protection in designated area... ...high quality and timely support to Business teams. Conduct risk assessment and process audit for the respective sites and work in...
...rate in finding flourishing careers and financial independence.
Role Description
This is a full-time on-site role for a Cyber Security Instructor located in Kochi. The Cyber Security Instructor will be responsible for delivering high-quality training and education in...
...Job Description
Description
It’s an exciting time to be at Infoblox. Named a Top 25 Cyber Security Company by The Software Report and one of Inc . magazine’s Best Workplaces for 2020, Infoblox is the leader in cloud-first networking and security services. Our solutions...
...techniques to manage changes in project scope, schedule and costs.
Create and maintain comprehensive project documentation.
Manage risks and issues and undertake recovery actions as necessary to minimize project risks
Bridge between product/BA & technology department....
...Own the design, implementation, documentation, assessment, and monitoring of internal control framework, including policies and key risks to ensure that the company has adequate controls to prevent unintentional and intentional errors in financial reporting, processes, and...
...and build an exceptional experience for yourself, and a better working world for all.
CMS-TDR Senior
As part of our EY-cyber security team, who shall work as Senior analyst who will assist clients in detecting and responding to security incidents with support of...