198 Information Security jobs in Qatar

SR. SECURITY ANALYST

Doha, Doha Qatar Energy

Posted 14 days ago

Job Viewed

Tap Again To Close

Job Description

full time
Overview
Lead and implement QatarEnergy Corporate Security Program and management systems, lead assurance, standardization of security operations for commercial, industrial, international assets.

Monitor geopolitical and security incidents, threats, and internal and external security risks to then evaluate, analyse, and create risk advice and business intelligence disseminated to all levels of QatarEnergy, Joint Ventures, governmental agencies in Qatar and overseas.

Guide and support QatarEnergy, Joint Ventures and governmental agencies in security response planning, security emergencies, business continuity and crisis management and provide best practice advise for security design and practice.

Experience
At least 15 years working experience with 10 years of in Operational Security, military, police; prefer experience in energy sector.

Qualifications
Bachelor's degree in Engineering/Science/Security or relevant discipline from an internationally recognized university; professional qualifications in Security highly desirable.
Exposure and good understanding of cyber security.
Excellent communication skills in English and preferably Arabic.
Strong leadership, management, decision making, networking, and influencing skills.
Ability to influence and guide senior management in QatarEnergy, external stakeholders.
Good understanding of the geopolitical security risks.
This advertiser has chosen not to accept applicants from your region.

SR. INDUSTRIAL CONTROL SYS SECURITY ENGR

Al Wakra Qatar Energy

Posted 14 days ago

Job Viewed

Tap Again To Close

Job Description

full time
Overview
Implement and operate Information Security controls within the Industrial Control Systems (ICS)/ Operational Technology (OT) environment, including developing procedures, to manage cyber security risks to acceptable operational levels and increase operational Information Security risks maturity in line with corporative Information Security policies and standards.

Experience
  • Seven (7) years of relevant professional experience.
  • Experience in large ICS/OT and ICT environments in the Energy sector, preferably in Oil & Gas.
  • Strong, hands-on technical experience with Industrial Control System solutions (e.g., Distributed Control Systems, SCADA, etc).
  • Strong, hands-on technical experience with network technologies (e.g., Cisco) and diverse Information Security technologies (e.g., firewalls, anti-malware, etc).
  • Professional certifications in information security management such as CISSP, CISA, GIAC, GICSP, GRID or others.
  • Excellent written and verbal business communication skills capable of interacting with various levels of business and technical leadership (English).

    Qualifications
    Bachelor degree in engineering, information security or computer science.
This advertiser has chosen not to accept applicants from your region.

Offshore HSE & Security Advisor

Doha, Doha Orion Engineering Services Limited

Posted 14 days ago

Job Viewed

Tap Again To Close

Job Description

full time
We have a current opportunity for a HSEQ-Offshore HSE & Security Advisor on a temporary basis. The position will be based in Doha. For further information about this position please apply.

Offshore HSE & Security Advisor
Start Date : 01 October 2025
End Date : 31 December 2027
Location : Qatar, 28/28 Offshore Rotational

Must have Min 10 years experience in Military/law enforcement , preferably Special Forces.

QUALIFICATIONS & EXPERIENCE REQUIRED

Military/law enforcement experience, preferably Special Forces (min. 10 years)
Offshore & Maritime experience.
BOSIET trained and hold an in-date certificate.
H2S trained and hold an in-date certificate.
Large experience on similar activities at equivalent position
Fluent in English (spoken/written)
HSE Trainings: OPITO H2S / T-BOSIET / AGT / NEBOSH International Certificate or NEBOSH Oil & Gas Certificate (or equivalent)

ACCOUNTABILITIES

The job holder is accountable for the following activities during offshore work execution:

SECURITY activities:
Responds to crisis and emergency situations on a 24 hour, 7 days a week basis.
Implement Security Measures to ensure safety and security of entire staff and crews.
Participate in facility security audits as required on all platforms and CCR rooms.
Maintain general security education in the following areas: travel, security, and other ongoing training as
needed.
Build and maintain the offshore security plan as well as Security Risk Assessment
Organize security drills/exercises.
Conduct weekly security patrols of Block 5 and conduct penetration tests on locations.
Provide a monthly security report, including Unauthorized Vessel entry, breaches in security, drone
sightings and situational awareness withing the operating area.
Facilitate personnel requests for security clearance and support the acquisition process as needed.
Process all incoming and outgoing VIP visits.
Ensure compliance with information systems security requirements.
Responsible for the liaise with the national authorities offshore

HSE activities:
Promoting HSE policies & practices, culture and objectives
HSE supervision of the activities at Sites
Attend location specific TBT within their assigned area of coverage
Ensure adequate HSE coverage and compliance with PTW and supporting documents (inclusive of JSA)
Coach CTR HSE Officers & monitor their activity
Conduct HSE activities delegated by HSE Superintendent (i.e attending JUB Hygiene inspection, provide
HSE induction, etc…)


Our role in supporting diversity  and inclusion
As an international workforce business, we are committed to sourcing personnel that reflects the diversity and values of our client base but also that of Orion Group. We welcome the wide range of experiences and viewpoints that potential workers bring to our business and our clients, including those based on nationality, gender, culture, educational and professional backgrounds, race, ethnicity, sexual orientation, gender identity and expression, disability, and age differences, job classification and religion. In our inclusive workplace, regardless of your employment status as staff or contract, everyone is assured the right of equitable, fair and respectful treatment.

This advertiser has chosen not to accept applicants from your region.

Information Security Officer

Doha, Doha Management Solutions International MSI

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Primary responsible for planning, coordinating, and organizing Information Security activities.

Enforce and monitor the implementation and compliance with IT Information Security Policy.

Develop and manage the implementation of Information Security Policies and Procedures.

Ensure Risk Assessments are conducted on all information systems such as people, process, technology, and information processing facilities.

Ensure implementation of all Information Security controls, as set forth in the Risk Treatment Plan, to ensure adequate security for the respective system.

Conduct Information Security communications and outreach by leveraging the Information Security Management System (ISMS) committee.

Establish appropriate measures to assess operational capabilities and determine compliance and effectiveness levels with Information Security Policy.

Supervise other related assurance functions, as necessary.

Ensure the compliance of Information Security Policies in the organization.

Develop and ensure implementation of Information Security procedures.

Develop and ensure implementation of incident handling and reporting.

Follow-up, escalate, and report the resolution of Information Security issues identified during security assessments, penetration tests, and audits.

Develop, implement, and maintain Disaster Recovery (DR) procedures and infrastructure in relation to the Business Continuity Plan (BCP) / IT Service Contingency Plan.

Conduct and coordinate Information Security awareness and orientation programs.

Responsible for conducting Committee meetings.

Security Incident Management

Establish a formal procedure for internally reporting and tracking security incidents. Ensure incident response and escalation procedures are followed, and inform all employees, contractors, and third-party users of their responsibility to report security incidents.

Incident Handling :

Participate and / or oversee the investigation and management of information security events and policy violations and track them to conclusion.

Incident Notification and Reporting :

Follow policy for the notification and reporting of incidents immediately upon discovery.

Corrective / Preventive Actions :

Develop and document corrective action plans and implement preventive actions to mitigate recurrence.

Analyze a security incident to detect an underlying problem that exists or is likely to exist.

Categorize and prioritize the problem based on the frequency, severity, and impact of the incident.

Investigate and diagnose the root cause of the problem.

Test and apply temporary workarounds.

Document the known error record.

Create a formal process to address risk through the coordination and control of activities regarding each risk.

Conduct formal vulnerability assessments of the environment on a regular basis.

Create a formal process to mitigate vulnerabilities and more.

Qualifications

Experience

8+ years in IT work experience

5+ years in a similar role

Education

Bachelor of Engineering

Or Bachelor of IT

Or Bachelor of Computer Science

Certifications

CRISC - Certified in Risk and Information Systems Control

Or ISO / IEC 27001 Lead Implementer or Lead Auditor

Or CISSP - Certified Information Systems Security Professional

Required Skillset

Expertise in implementation of security frameworks such as NIST , ISO / IEC 27001 , and other local regulations and frameworks.

Expertise in compliance requirements like GDPR , HIPAA , PCI DSS , SOX , and other relevant laws and regulations.

Expertise in conducting risk assessments , identifying security risks, evaluating impact, and implementing mitigation strategies.

Expertise in developing policies , procedures , and processes .

Expertise in creating and managing security awareness and training programs to educate employees on cybersecurity threats and best practices.

Information Security Officer • Doha, ad-Dawhah, Qatar

This advertiser has chosen not to accept applicants from your region.

ICS Cyber Security Technician

Doha, Doha Arab Solutions

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Job Description: ICS Cybersecurity Technician

Role Summary

The ICS Cybersecurity Technician is responsible for supporting the security, monitoring, and protection of Industrial Control Systems (ICS) and Operational Technology (OT) environments. This hands-on role involves implementing security controls, troubleshooting issues, assisting in incident response, and ensuring compliance with cybersecurity standards in industrial facilities.

Qualifications

Education

  • Bachelor's degree in Engineering, Computer Science, IT, Electrical, Instrumentation, Automation, Mechatronics, Cybersecurity, Electronics, or a related discipline.
  • Diploma in the above fields may be considered with relevant experience.

Experience

  • Required: Minimum 3 years' experience in ICS/OT Cybersecurity within Oil & Gas, Petrochemical, or Chemical facilities.
  • Preferred: 5+ years' experience in ICS/OT Cybersecurity in heavy industrial environments.

Certifications (Preferred)

  • CCNA / Network+
  • CEH / CompTIA Security+ / CySA+
  • At least one recognized Cybersecurity certification is highly desirable.

Skills & Competencies

  • Hands-on knowledge of ICS/OT cybersecurity technologies, standards, and practices.
  • Experience in configuring, testing, and troubleshooting security tools, hardware, and software.
  • Strong understanding of threat intelligence, vulnerability management, and incident response.
  • Ability to manage and document system configurations, upgrades, and cybersecurity procedures.
  • Familiarity with cloud, virtual, and on-premises security platforms.
  • Strong communication, collaboration, and problem-solving skills.
  • Ability to operate in a 24/7 industrial environment with fieldwork responsibilities.

Key Responsibilities

  • Configure, test, and maintain cybersecurity technologies and tools across ICS/OT environments.
  • Troubleshoot and resolve cybersecurity and data-related issues.
  • Perform hardware and software upgrades, and document configurations and system specifications.
  • Maintain accurate records and documentation of security operations, incident response, and system changes.
  • Provide technical cybersecurity support to users and teams.
  • Evaluate and recommend new security tools, systems, and processes.
  • Monitor external threat intelligence feeds, escalate alerts, and coordinate vulnerability patching.
  • Maintain and enhance security systems, processes, and monitoring tools.
  • Support the implementation of security measures across on-premises, virtual, and cloud environments.
  • Promote and support a cybersecurity awareness culture within the organization.
  • Assist in internal and external audits to ensure compliance with cybersecurity policies and standards.

Skills: cybersecurity,threat intelligence,cloud,incident response,security tools,software,premises
This advertiser has chosen not to accept applicants from your region.

Information Security Officer (ISO)

Doha, Doha Lesha Bank

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Role Purpose

The Information Security Officer (ISO) will be responsible for developing, implementing, and overseeing the bank's information security strategy, policies, and controls. The role ensures that the bank's data, systems, applications, and infrastructure are safeguarded against internal and external threats while meeting local regulatory requirements (QCB, QFCRA, NCSA-Q) and international standards (ISO 27001, NIST, GDPR, PCI-DSS as relevant).

Key Responsibilities

Governance & Compliance

  • Establish, maintain, and enforce the bank's information security framework, aligned with QCB, QFCRA, and local cybersecurity regulations.
  • Ensure compliance with international standards (ISO 27001, NIST CSF, COBIT, PCI-DSS) and conduct regular gap analyses.
  • Prepare and present security risk assessments and reports to senior management, regulators, and the Board Risk Committee.
  • Design, implement, and enforce security policies and procedures to safeguard the bank's infrastructure and data.

Security Operations

  • Oversee Security Operations Center (SOC) activities, incident response, and threat intelligence monitoring.
  • Develop and maintain business continuity, disaster recovery, and incident response plans.
  • Implement and monitor Data Loss Prevention (DLP), intrusion detection/prevention (IDS/IPS), endpoint protection, and other security tools.
  • Lead investigations of security breaches, develop strategies for handling incidents, and ensure lessons learned are integrated into policies and processes.
  • Stay current with the latest security systems, standards, and products to ensure optimal protection.
  • Regularly evaluate the effectiveness of security measures and update them against emerging threats and industry best practices.
  • Conduct regular staff training on security awareness, best practices, and incident procedures.
  • Collaborate with IT and business management to continuously improve security controls and culture.

Risk Management

  • Conduct enterprise-wide risk assessments on systems, applications, vendors, and third-party service providers.
  • Identify vulnerabilities and ensure timely remediation through patch management and secure configurations.
  • Work with IT and business units to integrate security into new product initiatives.

Vendor & Technology Oversight

  • Evaluate and approve technology vendors, outsourcing partners, and cloud solutions for compliance with security standards.
  • Manage penetration tests, vulnerability assessments, and external audits.

Requirements

  • Bachelor's degree in information security, Computer Science, or related field. Master's degree preferred.
  • Professional certifications: CISSP or CISM required; CISA and ISO 27001 Lead Implementer preferred.
  • Cloud security certifications (e.g., CCSP, AWS Security) are a plus.
  • 8-12 years in information security, with at least 5 years in the financial-services sector.
  • Strong background in banking systems, digital channels, payment systems, and regulatory environments.
  • Proven experience engaging with regulators (QCB, QFCRA, CMA, or equivalent).
  • Proven experience in implementing SEIM Solutions, managing SOC Team.
  • Expertise in cybersecurity frameworks, network security, cryptography, and identity & access management.
  • Strong risk management and analytical skills.
  • Excellent communication and stakeholder-management skills, capable of engaging effectively with regulators, auditors, and the Board.
  • Ability to influence across departments, build a culture of security, and lead change initiatives without direct authority
This advertiser has chosen not to accept applicants from your region.

Associate Security Consultant

Doha, Doha Tech Mahindra

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Job Summary

Role: Associate Security Consultant
Exp: 8 to 16 years
Notice period: Immediate to 30 days
Project Duration: Long term
Job Location: Doha, Qatar
Lateral Budget: 18-20 K QAR
Lateral Sub con Budget: 20-24K QAR

Responsibilities
  • Responsible for GRC (Governance, Risk & Compliance) operation management as per organization requirements.
  • Focus on providing strategic alignment to IT and the organization's vision, mission & values and set up committees and monitoring frameworks to govern Security.
  • Support the Security Governance Forums at KM for multiple security committees.
  • Management and development of information security and coordinate the management of security through sharing ideas among key security players, monitoring threats, identifying opportunities for improvement, and ongoing monitoring of security activity to meet targets.
  • Drive and manage the development of information security to ensure approaches, techniques and tools continue to meet needs.
  • Ensure reporting to higher management for all existing and newly developed KPIs and ensure the team achieves the desired KPIs per defined timelines.
  • Organize and manage internal and external information security audits and management reviews, and reporting to management.
  • Provide project information security oversight; ensure teams become an active part of projects, take information security into account, carry out or oversee information security risk assessments and ensure results are acted upon.
  • Promote information security awareness throughout the business and provide security-related information as required both internally and externally to the company.
  • Maintain knowledge necessary to advise on all aspects of information risk management and information security by adding to and maintaining certifications; engage in continuous learning; stay up to date with threats and security information.
  • Provide leadership attributes with Independent Contributor, Team Management & Mentoring, Client Communication, Presentation skills, Service/project Delivery and People Management.
  • Oversee the performance and issues of the Consultants deployed.
Required Professional Experience
  • Professional experience as per the grade requirements mentioned under Article 4.1.2.
  • Relevant experience in Information Security GRC Management.
  • Sound written and verbal communication skills to communicate at all levels of the organization.
  • Proficiency in project management and experience in people leadership.
  • Demonstrated experience with Information Security Risk Management Programs, including defining an IS risk register with identified threats and risks.
  • Experience in IT Audits, IT Governance Risk Compliance and IT Process.
  • Good understanding of IT General controls for development and Technology Infra.
Skills / Tools
  • Knowledge of Security frameworks like ISO 27001, NIST CSF, PCI DSS are desirable.
  • Strong understanding and experience with business process controls.
  • Must have knowledge of Qatar National Security Frameworks implementation and support requirements.
  • Should have at least 7-8 years of implementation experience in ISO27001/PCI/Data Governance areas.
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Information security Jobs in Qatar !

Senior Offensive Security Consultant - Banking

Doha, Doha VAM Systems

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

We are currently looking Senior Offensive Security Consultant for our Qatar operations with the following terms & conditions.

Required Qualifications and Experience
  • University graduate in Computer Science subject
  • Strong understanding of offensive security concepts and frameworks, including MITRE ATT&CK, vulnerability exploitation, DevSecOps and OWASP top ten projects.
  • Experience managing or integrating SAST, DAST, attack simulation, and container security tools into CI / CD platforms (e.g., Jenkins, GitLab CI, Azure DevOps)
  • Awareness of current breach and attack simulation platforms and AI-driven CI / CD pen testing solutions and their use cases (e.g., Cytix, SafeBreach, AttackIQ, Cymulate).
  • Strong knowledge of container and kubernetes security
  • Ability to work independently and manage multiple priorities in a fast-paced environment.
  • Excellent verbal and written communication skills.
  • Proven work experience in the UK, US, or Europe
Responsibilities
  • Security Tool Management & Integration
    • Own the deployment, configuration, and maintenance of :
    • Static Application Security Testing (SAST) tools
    • Dynamic Application Security Testing (DAST) tools
    • Breach and Attack Simulation (BAS) tools
    • Container Security Solutions (e.g., image scanning, runtime protection)
    • Integrate security tools into CI / CD pipelines to enable automated and continuous security validation.
    • Monitor tool performance, ensure scalability, and optimize configurations for accuracy and efficiency.
  • Security Strategy & Enablement
Preferred Qualifications and Experience
  • Certifications such as OSCP, CRTO, OSCE, or equivalent.
  • Experience of streamlining SDLC processes and workflows using AI techniques and approaches
  • Experience with cloud platforms (AWS, Azure, GCP) and their native security services.
Framework & Boundaries
  • Group's overall strategic plan.
  • Applicable policies and procedures.
  • Delegated authorities as per the delegation of authority structure.
  • Instructions of the Head of Cyber Risk Assessments and Group Chief Information Security Officer

Joining time frame : 2 weeks (maximum 1 month)

This advertiser has chosen not to accept applicants from your region.

Security Specialist - SOC Analyst

ECCO Gulf WLL

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

The Security Specialist is responsible for the administration of the organization's information and data security policies and practices. The primary goal of this role is to ensure that authorized users can access information with ease while protecting its confidentiality, integrity, and availability in accordance with security best practices. The Security Specialist will manage, monitor, and respond to security incidents, ensuring the organization's information systems remain secure. This individual will play an integral part in maintaining compliance with internal security standards and external regulatory frameworks.

Responsibilities
  • Service Management and Service Operation
  • Draft and maintain security policies, standards, procedures, and documentation.
  • Monitor compliance with security operations procedures and assess systems for potential or actual breaches.
  • Investigate security breaches and ensure thorough investigation and remediation actions.
  • Implement system changes required to maintain security.
  • Ensure the accuracy and completeness of security records.
  • Strategy & Architecture and Information Strategy
  • Assess vulnerabilities and perform security risk assessments on business applications and computer systems.
  • Provide expert advice on security strategies to mitigate identified risks.
  • Investigate major security breaches and recommend appropriate control improvements.
  • Contribute to the development of security standards and guidelines.
  • Conduct risk assessments, business impact analysis, and accreditation for all major information systems.
  • Apply appropriate forensics to investigate vulnerabilities and breaches.
  • Plan, Prioritize, and Solve Problems
  • Develop team/unit goals, strategies, and plans aligned with organizational objectives.
  • Anticipate the impact of changes (e.g., government policy, economic conditions) and adjust strategies accordingly.
  • Ensure activities align with the organization's change initiatives.
  • Evaluate achievements and adapt future strategies.
  • Technology
  • Apply a solid understanding of relevant technology and select the best tools for assigned tasks.
  • Leverage a broad range of communications technologies to deliver effective security messages.
  • Ensure compliance with information and communication security policies.
  • Identify opportunities to use existing technologies to achieve team outcomes.
  • Support compliance with the organization's records and knowledge management requirements.
  • Key Accountabilities
  • Monitor security alerts using Security Information and Event Management (SIEM) tools.
  • Investigate and analyze security incidents, determining root causes and impacts.
  • Respond to security incidents, implementing containment, eradication, and recovery measures.
  • Conduct proactive threat hunting activities to identify potential vulnerabilities.
  • Maintain and configure security tools such as firewalls, intrusion detection/prevention systems, and endpoint protection solutions.
  • Collaborate with IT teams to ensure adherence to security best practices.
  • Develop, maintain, and update incident response playbooks and procedures.
  • Perform regular security assessments and vulnerability scans.
  • Stay updated with the latest trends and technologies in cybersecurity.
  • Coordinate incident response efforts in the event of a breach, ensuring compliance with national security agencies when necessary.
  • Conduct internal investigations, identify root causes of incidents, and recommend corrective actions.
  • Develop custom security signatures/rules for detection and prevention systems.
  • Create custom scripts for analysis and automation in security tasks.
  • Develop, tune, and implement threat detection analytics and security sensors.
  • Additional Responsibilities
  • Participate in internal cyber drills and disaster recovery exercises.
  • Conduct vulnerability assessments and penetration tests to identify and address security risks.
  • Collaborate with the National Cyber Security Agency during major incidents.
Qualifications and Requirements

Essential Qualifications :

  • Education: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • Certifications:
    • Certified SOC Analyst (CSA), Certified Ethical Hacker (CEH), Microsoft Security Operations Analyst-SE 200 professional certification is mandatory.
    • Relevant certifications (e.g., CompTIA Security+, CISSP, GIAC Security Essentials (GSEC), GCIH) are preferred.
  • Experience :
  • Minimum 5-6 years of experience in cybersecurity, ideally in a SOC (Security Operations Center) environment.
  • Hands-on experience with SIEM tools such as Azure Sentinel is a must.
  • Experience in incident response, threat hunting, and vulnerability management.
  • Familiarity with Microsoft Defender, Microsoft Cloud Defender, Microsoft Purview, Microsoft Insider Risk Management, and vulnerability scanning tools (e.g., Tenable, Burp Suite).
  • Experience with regulatory and compliance frameworks like GDPR, HIPAA, ISO 27001, Qatar 2022 CSF is a plus.
Seniority level
  • Mid-Senior level
Employment type
  • Full-time
Job function
  • Information Technology
Industries
  • Outsourcing and Offshoring Consulting
This advertiser has chosen not to accept applicants from your region.

Cyber Security Operation Analyst

Commercial Bank

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Job Summary
  • Creation of USE cases using MITRE framework, Dashboard and Reports on Splunk SIEM
  • Strong technical background on Network Security, Threat hunting and Risk based analysis
  • Analyzing Network traffic for IPS, WAF, Firewall, DDOS and other perimeter device.
Key Accountabilities
  • Continuous monitoring and review of security events, reports, alerts and CSOC dashboards to identify anomalous patterns indicative of potential security incidents
  • Responsible for timely and effective response to, and management of, incidents, events, notifications, calls and other activities related to CSOC including Root Cause Analysis
  • Gather relevant information and provide actionable intelligence on potential cyber security threats and incidents
Other Accountabilities
  • Take direction and guidance from InfoSec Management to build, support and update the CSOC playbooks / processes
  • Render support for the administration and configuration of security controls such as SIEM, Anti-virus software, network security devices, PAM, DLP, Vulnerability Management, etc.
  • Prepare security awareness messages, presentations and announcements for management, IT staff, and regular users
  • Participate in regular cyber drills and CSOC exercises
Competencies
  • Adaptability / Flexibility
  • Computer Skills
  • Creativity / Innovation
  • Decision Making / Judgment
  • Dependability
  • Initiative
  • Integrity / Ethics
  • Internet Savvy
  • Managing Technology
  • Personal Organization
  • Planning
  • Problem Solving / Analysis
  • Process PRIME postings manually
  • Process transaction vouchers received from various Departments (internal)
  • Productivity
  • Quality
  • Receipt and verify the posting and payroll documents received
  • Results Focus
  • Self Development
  • Sense of Urgency
  • Strategic Thinking / Management
  • Summary
  • Technical Skills
  • Vision and Values
Skills
  • Anomaly Detection
  • Authentication
  • Cryptography
  • Cyber Crime Trend Analysis
  • Cyber Security Administration
  • Cyber Security Analysis
  • Cyber Security Architecture
  • Cyber Security Audits
  • Cyber Security Best Practices
  • Cyber Security Compliance
  • Cyber Security Design
  • Cyber Security Governance
  • Cyber Security Monitoring
  • Cyber Security Planning
  • Cyber Security Policy Management
  • Cyber Security Regulations
  • Cyber Security Risk Management
  • Cyber Security Standards and Procedures
  • Cyber Security Testing
  • Cyber Security Threat Monitoring
  • Cyber Security Tools / Products
  • Cyber Threats and Attacks
  • Data Analysis
  • Disaster Recovery
  • Encryption and Authentication
  • Encryption / Decryption
  • Event Monitoring / Log Analysis
  • Fault Diagnosis / Isolation / Detection
  • Firewall Management
  • Hacking Countermeasures
  • Incident Response
  • Incidents Reporting
  • Intrusion Detection
  • Intrusion Detection Systems
  • Malware Analysis
  • Network Forensics
  • Network Protocols
  • Network Topologies
  • Penetration Testing
  • Threat Containment
  • Vulnerability Assessments
Education
  • Bachelor's degree in Computer Science or equivalent
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Information Security Jobs