
Search by job, company or skills
Showing 9 jobs
Skills:
Vulnerability Assessments, Penetration Testing, Rpa Tools, Iso 27001, Owasp Top 10, MAS, PDPA, XDR, SOAR, MITRE ATT CK, Security Audits, TRM, ML-based detection, AI-based security tools
Skills:
security plus , Pci Dss, Ceh, Vulnerability Management, Iso 27001, Firewalls, PDPA, Microsoft Entra ID, Phishing simulations, Identity platforms, Security awareness programs, CrowdStrike, Security alert monitoring, Incident triage, ManageEngine, Cissp, Remediation tracking
Skills:
Incident Response, risk management, forensic tools, security governance, Security Audits, ISO IEC 27001
Skills:
Gdpr, Sailpoint, Iso 27001, PowerShell, Ldap, Rest Apis, AWS, Python, Servicenow, Azure Ad, Active Directory, cloud IAM, ITSM platforms, IdentityNow, IdentityIQ, MAS guidelines, SCIM
Skills:
Threat Intelligence, Cloud Operations, Incident Response, Certifications, Vulnerability Exploitation Research, Detection Technologies
Skills:
Incident Response, DevSecOps, PowerShell, Log Analysis, forensic evidence handling, Security Operations, threat investigation, Microsoft Azure security, NIST CSF, scripting automation, CIS
Skills:
Azure Log Analytics, AWS Security Hub, Monitoring Tools, Vulnerability Management, AWS CloudWatch, Cloud, Cloud security architecture, Cloud security assessments, Security Operations, Microsoft Defender for Cloud, CSPM tools
Skills:
information security governance , NIST Framework, Iso27001, Cism, Penetration Testing, Ceh, Incident Management, Application Security, vulnerability assessment, Web Security, information security tools, Forensics, Cissp, IEC62443, CSA Code of Practice CCoP, system architecture and design, business continuity, Investigations, Cisa, Threat detection, risk management controls, Compliance, CRISC, legal and industry IT OT and cyber security best-practices
Skills:
Security Documentation, Iso 27001, Security Controls, Vulnerability Assessments, Incident Response, third-party vendor risk assessments, cybersecurity risk management frameworks, Security Audits, compliance with regulatory requirements, risk assessments, security awareness training
