Monitoring security cameras and other surveillance equipment to detect and prevent unauthorized activities. Recording comprehensive logs and reports of security activities, encompassing
Monitoring security cameras and other surveillance equipment to detect and prevent unauthorized activities. Recording comprehensive logs and reports of security activities, encompassing
Monitoring security cameras and other surveillance equipment to detect and prevent unauthorized activities. Recording comprehensive logs and reports of security activities, encompassing
Saudi Petroleum Services PolytechnicDammam, Saudi Arabia
availability and readiness of all security equipment in his work locations ... , he should use high-technology security and access control equipment (e ...
Hamdan Global Recruitment and Labor Supply LLCMuscat, Oman
maintain the organization's information security policies, standards, and procedures ... Conduct regular risk assessments and security audits to identify vulnerabilities, threats ...
defining and delivering the Cyber Security strategic roadmap to identify ... required future state security capabilities, working with different stakeholders ...
safeguarding the log sources and security accessPlanning for disaster recovery in ... access to data or systemsConduct security assessments, risk analysis and root ...
to develop and implement information security, risk management, regulatory and governance ... promote activities to create information security awareness within the organization.Key...
Job SummaryThe purpose of this role is to develop and implement information security, risk management, regulatory and governance policies and procedures. In this role you will initiate, facilitate,
to the application security teamManage application security team to conduct security assessments of ... all code platforms.Manage application security team to scan, identify...
Providing technical leadership, guidance, and direction to the Network security teamDesign and implement network security solutions, including firewall configuration, VPN, and intrusion
United Nations Volunteers (UNV) programmeTripoli, Libya
governance systems- Women have income security, decent work and economic autonomy ... , humanitarian action and peace, and security. Placing women’s rights at ...
University of Doha for Science and Technology (UDST)Doha, Qatar
within Data Science and Cyber Security. Particular areas of interest include ... , Industrial Control Systems (ICS) Security, and Cyber Security Policy & Governance; but ...
Senior Engineer, Cyber Security - South Africa, will assist in ... , operation, and support IT/OT security systems and controls to ensure ... awareness. Follow up on cyber security
Senior Engineer, Cyber Security - Morocco, will assist in design ... , operation, and support IT/OT security systems and controls to ensure ... awareness. Follow up on cyber security
Senior Engineer, Cyber Security - Oman, will assist in design ... , operation, and support IT/OT security systems and controls to ensure ... awareness. Follow up on cyber security