The Opportunity As a Project Manager / PMO within EY's Digital Engineering team, you will be responsible for driving the successful execution…
What You'll Do Conduct comprehensive cybersecurity risk assessments across enterprise systems. Identify vulnerabilities and recommend mitigation and control strategies. Develop, implement, and…
Job Description: About GBG Enabling safe and rewarding digital lives for genuine people, everywhere We make it our mission to ensure more…
What You'll Do Manage and execute cybersecurity risk assessments and audit management processes. Ensure organizational compliance with ISO 27001 and other regulatory…
We are seeking a highly motivated and knowledgeable individual to join our academic team as a Lecturer in Cyber Security. The successful…
About us At ExxonMobil, our vision is to lead in energy innovations that advance modern living and a net zero future. As…
Job Responsibilities: To deliver high quality teaching, research, and professional services in IT and Cybersecurity under the Computing programme standard (MQA), ensuring…
CYBER SECURITY Analyst Jobs Responsibilities Responsible for the overall IT ( CYBER SECURITY ) SOC operations, including ( IT CYBER SECURITY )…
Whole industries have been disrupted and transformed in recent years by digital technology. As a Technology Consulting Professional, you will help businesses…
ABOUT US We're the world's leading provider of secure financial messaging services, headquartered in Belgium. We are the way the world moves…
ABOUT US We're the world's leading provider of secure financial messaging services, headquartered in Belgium. We are the way the world moves…
In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our…
OUR COMPANY Mediexpress (M) Sdn Bhd Who We Are At Mediexpress (M) Sdn Bhd, we're proud to be one of Malaysia's leaders…
Fit gap analysis: Review existing IT security architecture, identify design gaps, and recommend security enhancements by using security by design approach Participate…