This is a 12 months contract assigned to our clientWork Location: To be confirmedSalary Range : $6,000 $8,000Job Description1. SAP Basis +…
\ The Opportunity: * Opportunity to work in IT industry * Working hours: Mon Fri (9:00 AM 6:00 PM) * Job type:…
Duties & Responsibilities: Engage clients to identify requirements relating to Data Loss Protection cyber security solutions Propose, scope and size technical solutions…
\ Maintains existing business solution in SAP Security and GRC application support and enhancements Builds professional relationships with clients, management and team…
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture…
Job Summary:You will participate in a variety of engagements, focusing on targets that may include network equipment, servers, applications, APIs, wireless infrastructures,…
\ Managing Consultant, Cyber Security\ Our Client is a leading cybersecurity service provider in Asia has an extensive track record of delivering…
\ At EY, you\\xe2\\x80\\x99ll have the chance to build a career as unique as you are, with the global scale, support, inclusive…
\ At EY, you\\xe2\\x80\\x99ll have the chance to build a career as unique as you are, with the global scale, support, inclusive…
Job Summary:You will participate in a variety of engagements, focusing on targets that may include network equipment, servers, applications, APIs, wireless infrastructures,…
WithSecure (formerly known as F Secure) delivers research led cyber security to defend organizations, society and people from real world attacks and…
The professional will be joining a top team in delivering complex Cyber Security solutions to defend against cyber threats of the world.…
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture…
b\'Job Summary:You will participate in a variety of engagements, focusing on targets that may include network equipment, servers, applications, APIs, wireless infrastructures,…
\ Deliver independent penetration testing, source code reviews, vulnerability assessments, and other technical information security consulting services. \ \ \ We are…
The incumbent is responsible for delivering information security projects that are related to Access & Identity (AI), specifically Privileged Access Management (PAM)…
Deliver independent penetration testing, source code review, vulnerability assessments, and all other information security consulting services offered by the Company. Ensure that…
Job Summary:You will participate in a variety of engagements, focusing on targets that may include network equipment, servers, applications, APIs, wireless infrastructures,…
Cloud Security Consultant Key deliveries on job/Qualifications: * Lead Security Design Workshop for Cloud implementation. * Design hardening policy for operation system,…
\ We are looking for experienced security professionals who can help our clients achieve a secured environment for their applications and web…