part of MATAR-IT Cyber Security and Risk Management team, with ... primary role to manage information security management system (ISMS) across MATAR ...
UP SHIFTERS FOR SOCIAL MEDIA APPLICATIONS DEVELOPMENT & MANAGEMENTDubai, UAE
Monitoring security cameras and other surveillance equipment to detect and prevent unauthorized activities.Overseeing and managing access to buildings, facilities, and events to ensure security
Responding to alarms, incidents, and emergencies, and taking appropriate action to address them.Recording comprehensive logs and reports of security activities, encompassing incidents, observations,
and Subcontractor executes Telecommunication and Security Systems activities and delivers systems ... and milestones.• Provides Telecommunication and Security Systems expertise,...
duties of the security guards providing safety and security for the property ... , Implement security programs and processes ... to reduce and control security risks, Delegate...
Urgent need for well-known company in KSA/ Al Khobar for the following position:Chief information security officerSaudi Nationality Job Purpose:To integrate security policies and protection
Monitoring security cameras and other surveillance equipment to detect and prevent unauthorized activities.Recording comprehensive logs and reports of security activities, encompassing incidents,
Looking for Security ManagerSix months Contractual Job Looking for a Freelance or Family Visa Candidate who can join immediately.Valid QID and Passport copy is must.
Job Title: Sr. Network Security EngineerLocation: Riyadh, KSAThe Network Security Engineer will be ... and procedures in support of security monitoring, incident response, vulnerability
Senior Network Security Engineer L3Location: Riyadh, KSARole Type: ... , which is responsible for network security, Endpoint security, functions and services related ...
, configure, implement, and maintain all security platforms and any other related ... other network component policiesGuarantee network security best practices are executed through ...
Monitoring security cameras and other surveillance equipment to detect and prevent unauthorized activities. Recording comprehensive logs and reports of security activities, encompassing
Monitoring security cameras and other surveillance equipment to detect and prevent unauthorized activities. Recording comprehensive logs and reports of security activities, encompassing
Monitoring security cameras and other surveillance equipment to detect and prevent unauthorized activities. Recording comprehensive logs and reports of security activities, encompassing
defining and delivering the Cyber Security strategic roadmap to identify ... required future state security capabilities, working with different stakeholders ...
to develop and implement information security, risk management, regulatory and governance ... promote activities to create information security awareness within the organization.Key...
; Experience • Strong understanding of security architecture best practices, standards and ... , with emphasis on application security architecture and authorization approaches (role...