Responsible for coordinating all phases of IT Infrastructure audits in accordance with department, regulatory, and professional standards. Collaborate with IT Infrastructure and Information Security team members in other geographical locations.
- Minimum 5 years’ experience in penetration/ethical hacking - At least one must have of the following certifications: OSCP, OSCE, CREST etc - Experience with IT and cybersecurity strategy, policies, standards, procedures and controls
Maintains and manages the Verint Systems within the organization and to ensure its optimum performance on a daily basis. Provides Global technical assistance by attending to call recording related issues and concerns.
DWS Group (DWS) is one of the world's leading asset managers with EUR 859bn of assets under management (as of 30 June 2021). Building on more than 60 years of experience, it has a reputation for excellence in Germany, Europe, the A
Performing hands-on automation tasks. Dealing with software development, operations, and services. Improving communication, collaboration, and integration between software developers and IT operations personnel.
• Phishing investigation • Threat hunting • Responding to/investigating to security alerts • Collect specific log or set of logs • Development skills for either tools making (50-liner scripts) or chaining (API, integration)
Requirements for this role include: · 3 years of S/4 HANA end to end implementation and support experience · Hands on experience on version upgrades, SPS updates and patch application for Add-Ons on S/4 HANA · Experience on cloud and hybrid env.
•Bachelor’s degree in Computer Science, Information Technology, Engineering (Computer/Telecommunication),or other relevant courses •At least 2 years’ experience in Front-end or Back-end development/ web development •Willing to work onsite in Makati
We are expanding and looking for a Cyber Security Analyst to join our IT security team. This position is the Level 2 blue team within the Security Operations Centre (SOC) operations for cyber security investigations and incident handling.
Prioritizes, scopes, and manages team(s) responsible for the implementation, execution and monitoring of Information Security processes and procedures. Provides leadership and guidance in securing information owned or used by the firm.