PREMIUM
... or more relevant security certifications: · Certified Information Systems Security Professional (CISSP) - (ISC)²· Certified Cloud Security Professional (CCSP) – Associate of (ISC)² designation· Systems Security Certified Practitioner (SSCP ...
open.app.jobrapido.com
PREMIUM
... Hacker (CEH), GIAC Certified Detection Analyst (GCDA), CompTIA Security+, GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), AWS Certified ...
open.app.jobrapido.com
PREMIUM
... Hacker (CEH), GIAC Certified Detection Analyst (GCDA), CompTIA Security+, GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), AWS Certified ...
open.app.jobrapido.com
PREMIUM
... Automation: Recommend, implement, and manage security tools and automation to enhance security efficiency and effectiveness. For example, a Security Information and Event Management (SIEM ) system that’s appropriate for a fully ...
open.app.jobrapido.com
PREMIUM
... , who are very passionate about information security. The security team consists of 30 people with diverse skills in the security area. It is challenging, fast ... infrastructure critical to the payments system, all of which contribute to ...
open.app.jobrapido.com
... Information Security Management System. Responsibilities include, but are not limited to: Act as a champion for Information Security best practice and policies. Act as an intermediate escalation point and technical mentor for other members of the analyst ...
au.talent.com
... Information Security Management System. Responsibilities include, but are not limited to: Act as a champion for Information Security best practice and policies. Act as an intermediate escalation point and technical mentor for other members of the analyst ...
au.talent.com
... . Provide leadership and oversight over security information collection and sharing across the ... . Identify and develop strategic regional security networks to share information on security issues affecting humanitarian operations in ...
au.talent.com
... external bodies in relation to Information Security, as required; • Perform annual security reviews of information technology systems and supporting IT operational processes; • ...
au.talent.com
... incident trends via GEA reporting system, review incoming reports and provide guidance to close incidents. Security incident investigation leader, receive and evaluate information on security-related adverse incidents and make ...
au.talent.com