Monitoring and controlling access to buildings, facilities, and events.Overseeing and managing access to buildings, facilities, and events to ensure security and control.Documenting detailed logs
Collaborating with cross-functional teams, you will develop and enforce security policies, standards, and procedures, while conducting regular security assessments and audits to identify
in remediation of critical information security incidents.• Support Incident Response Plan ... in enforcing and auditing information security policies and procedures such as ...
Monitoring security cameras and other surveillance equipment to detect and prevent unauthorized activities.Performing regular patrols and inspections to safeguard individuals and protect property
Maintaining detailed logs and reports of security activities, including incidents, observations, and actions taken.Performing regular patrols and inspections to safeguard individuals and protect
Job Description:Implement, manage, and monitor security measures for the protection of computer systems, networks, and informationConduct regular security assessments to identify vulnerabilities
patterns and vulnerabilitiesCompleting all tactical security operations tasks associated with this ... stakeholders in relation to cyber security issues and provide future recommendationsMaintain...
Urgent need for well-known company in KSA/ Al Khobar for the following position:Chief information security officerSaudi Nationality Job Purpose:To integrate security policies and protection
measures that help in the security posture of the organization ... safeguarding the log sources and security accessPlanning for disaster recovery ... in the event of any security...
safeguarding the log sources and security accessPlanning for disaster recovery in ... access to data or systemsConduct security assessments, risk analysis and root ...
part of MATAR-IT Cyber Security and Risk Management team, with ... primary role to manage information security management system (ISMS) across MATAR ...
Develop and implement information security strategies, policies, and procedures to protect the organization's digital assets.Collaborate with IT and business stakeholders to align security
We are seeking a skilled Cyber Security Specialist to join our team. The ideal candidate will be responsible for protecting our organization's computer systems and networks from cyber threats.
Maintaining detailed logs and reports of security activities, including incidents, observations, and actions taken.Surveilling security cameras and other monitoring equipment to identify
duties of the security guards providing safety and security for the property ... , Implement security programs and processes ... to reduce and control security risks, Delegate...