b' Responsibilities: Identify, qualify and close cybersecurity related product/services Be responsible for executing business plans and strategies for International business to expand client base and perform sales/business activities in the assigned area Excel in delivering sales target and revenue for…
Duties & Responsibilities: Stay abreast of the current threat landscape and cyber security events Develop and deploy security hardening guidelines based on best practices Perform analysis of vulnerability results & work with principal vendor to ensure remediation Propose and enforce…
Responsibilities: Supports the development and execution of strategy for clients and reports to the Head of Consulting Works across business and technology stakeholders to ensure the alignment of business direction Supports cross functional projects that require resources from multiple business…
Duties & Responsibilities: Engage clients to identify requirements relating to Data Loss Protection cyber security solutions Propose, scope and size technical solutions for clients Deploy Data Loss protection related projects and provide consultation to clients with regard to the deployment…
Job Description The incumbent is responsible for delivering information security projects that are related to Ensign\xe2\x80\x99s Endpoint Security (ES) competency tower, including the execution of all project implementation activities. The competency tower\xe2\x80\x99s portfolio includes: Endpoint Security Extended Detection & Response…
The professional will be joining a top team in delivering complex Cyber Security solutions to defend against cyber threats of the world. We are looking for a dedicated and meticulous team player who wants to make a career in the…
Responsibilities Engage clients to identify requirements relating to cyber security solutions for GRC, VMS, DLP or Data Protection Proposal, scope and size technical solutions for clients Deploy competency\xe2\x80\x99s related projects and provide consultation to clients with regard to the deployment…
b' Act as Incident first responder for a 24/7 staffed SOC, reviewing and verifying system alerts Assist with the development of incident response plans, workflows, and SOPs Maintain security sensors and tools Monitor security sensors and review logs to identify…
b' You will be the first line of defence in managing day to day security risks identified throughout a project\xe2\x80\x99s System Development Lifecycle (SDLC). The role allows you to take on risk management and mitigation measures. Roles & Responsibilities: Stay…
b' Responsibilities Conduct independent research on assigned cyber topic of interest Based on the outcome of the research, develop a proof of concept Participate in client engagements for projects assigned as a member of a larger consulting team Assist in…
b' Duties & Responsibilities: Stay abreast of the current threat landscape and cyber security events Develop and deploy security hardening guidelines based on best practices Perform analysis of vulnerability results & work with principal vendor to ensure remediation Propose and…
b' Responsibilities Produce intelligence outputs to provide an accurate depiction of the current threat landscape and associated risk through the use of customer, community, and open source reporting Produce actionable intelligence information for delivery to colleagues and customers in the…
b' Roles & Responsibilities Responsibilities Act as Incident first responder for a 24/7 staffed SOC, reviewing and verifying system alerts Assist with the development of incident response plans, workflows, and SOPs Maintain security sensors and tools Monitor security sensors and…
b' The incumbent is responsible for delivering information security projects that are related to Access & Identity (AI), specifically Privileged Access Management (PAM) & Public Key Infrastructure (PKI) related technologies, including the execution of all project implementation activities. Responsibilities Carry…
b' As a Cyber Security Researcher, you will be conducting research and development work to deliver comprehensive security assessment on cyber security technologies (e.g. network based and host based threat detection and protection systems). Specifically, successful applicants will: Evaluate the…