Head of Security Operations
Contract: Full-time
Reporting to: Head of Cyber Security... ...essential to be hands on. Your Senior Security Analyst or Blue Team experience will...
...Providing subject matter expertise within the area of Information Security Risk and Supplier Risk Management
Maintain standards and procedures in relation to information security risk and supplier risk management...
...years. As recognized leaders around the globe in the corporate risk management industry, you can rest assured that joining us now means moving... ...that are currently available.
Job Summa...
...the complex puzzles you've been dreaming of as our Consulting Security Lead. If you have a passion for innovation in tech, we want you... ...delivery
Follow and completes programs and proc...
...JOB DESCRIPTION
Job Purpose
The Engineer, Information Security GRC is part of a team responsible for the global Information Security program. The role would gain exposure to the full suite of businesses and pr...
...As a Web Application Security Assessment Specialist, you will be responsible for supporting the ADCI Governance team in conducting web application security assessments
Your main focus will be on Threat and Vulner...
Chief information security officer
Responsibilities
A Chief Information Security Officer (CISO) consultant is a professional who provides expert advice and guidance to organizations on matters related to information security. Their...
Callaway Digital Technologies is looking for Application Security to join our dynamic team and embark on a rewarding career journey
Security... ...monitoring and assessment of application security ...
Company Description
INFINITI Building Solutions Pvt Ltd is a system integration company based in Hyderabad that provides enterprise clients with fire safety, electronic security systems, building management systems, lighting automation, and audio...
...the software development lifecycle (SDLC) and ensure secure coding standards are followed.
Manage and maintain security tools and technologies such as firewalls, intrusion detection/prevention systems (IDS/IPS), ...