We use cookies to provide the essential functionality of the website and its advanced features, to analyse traffic and to improve our services to you, and to provide personalised content to you.
By clicking ‘Accept All’ you agree to these. You can change your selection at any time under the ‘Cookie Settings’ link on the page.
You can read more about our cookies in our Cookie Policy
Cookie Settings
We use cookies to provide the essential functionality of the website and its advanced features, to analyse traffic and to improve our services to you, and to provide personalised content to you.
By clicking ‘Accept’ you agree to these. You can read more about our cookies in our Cookie Policy
These cookies are essential to the functionality of thebigjobsite.com
When you log in to the Internet Site the Company will set a cookie containing a randomly generated unique reference number. This anonymous number allows the Company to identify you. The Company will never store your personal information directly as a cookie. A persistent cookie will be set, persistent cookies are not deleted when you close your browser, and will allow the Internet Site to recognise you on your next visit.
Name
Expiration
Description
ATTBCookie*
2 years
These cookies are used to remember a user’s choice about cookies on thebigjobsite.com. Where users have previously indicated a preference, that user’s preference will be stored in these cookies.
last-search
search
redirect-stage
original-keyword
1 day
Session
1 hour
1 hour
These cookies are used by thebigjobsite.com to pass search data between our own pages.
datadome
1 year
DataDome is a cybersecurity solution to detect bot activity
jjap
1 days
Used to track if you have seen the Job Alerts prompt. Job Alerts is a service you can subscribe to to receive information about new jobs.
Advanced features of the site use Cookies to provide information you requested and to reduce you having to key in repeated fields.
Name
Expiration
Description
attb-loc
3 months
Stores your location information so that we can pre-populate search fields to find jobs near you.
Analytic cookies allow the Company to see how the Internet Site is being used. This information forms the basis of future development work, and so enables the Company to continually improve its Internet Site to best suit its users.
Name
Expiration
Description
__gads
_ga
_ga_JH3TWMTYRK
_gat_gtag_UA_1462011_9
_gcl_au
_gid
_uetsid
_uetvid
13 months
2 years
2 years
1 minute
90 days
24 hours
1 day
16 days
Google Analytics: For purposes of analytics, your UserID may be tracked and sent to Google Analytics after you register for one of our services such as Job Alerts. After you register, your registered session may be stitched together with your original, unauthenticated session. This allows longer-term tracking to help us monitor the effectiveness of our marketing campaigns. No personally identifiable information, or data that permanently identifies your device, is sent along with your tracking IDs.
Regional IT services and solutions provider
Job Description
• Planning, design, installation, configuration and deployment of security solution and enforcing security best practices comply with customer requirements such as security policy and regulation.
• This is a critical post-sale role align across the Security Line of Business. The Security C
Regional IT services and solutions provider Job Description • Planning, design, installation, configuration and deployment of security solution and enforcing security best practices comply with customer requirements such as security policy and regulation.• This is a critical post-sale role align across the Security Line of Business. The Security Co
Regional IT services and solutions provider
Job Description
• Planning, design, installation, configuration and deployment of security solution and enforcing security best practices comply with customer requirements such as security policy and regulation.
• This is a critical post-sale role align across the Security Line of Business. The Security C
• Being an Application Security Evangelist who translates security concepts for developers
• Improving and maintaining secure development standards and managing application security framework improvement projects
• Integrating security tools, standards and processes into the Software Development Life Cycle (SDLC)
• Ensuring that developers are trai
• Reporting to the Information Security (IS) Manager, the Information Security Analyst (ISA) will perform - i. vulnerability scanning and automated code testing operations; ii. threat assessment and patch management advisory operations; iii. IT-related security incident containment and response; iv. management and implementation of IS initiatives;
The Cybersecurity and Data Privacy team reports directly under the office of the CISO headed by Chief Information Security Officer (CISO) Jason Lau ( https://www.linkedin.com/in/jasonciso/ ) who has over 23+ years of experience in the cybersecurity space, awarded Global Top 100 CISO, and also serves on the World Economic Forum, International Associ
Leading fintech company for online and mobile lending services Job Description • Develop and maintain the overall network, cloud and infrastructure security design and integration for the Company• Formulate a set of policies, security standards, controls, guidelines and best practices on Cybersecurity• Promote awareness in information security inte
• Take part in the entire IT service management lifecycle on building new services and continuously improve existing IT services
• Liaise effective and efficiently with internal and external stakeholders
• Provide technical support and training related to IT services
• Conduct technology and vendor evaluations on function and features from a busine
Leading retailers and wholesalers of a number of top-selling sports, lifestyle and outdoors brands of apparel, footwear and accessories products.
Job Description
• Being an Application Security Evangelist who translates security concepts for developers
• Improving and maintaining secure development standards and managing application security framew
Fast-growing software house and IT solutions provider in Hong Kong
Job Description
• Responsible for the development of the company IT Security and technology risk related policies, guidelines and standards operating procedures
• Participate in internal regular security assessment and compliance review activities
• Perform vulnerability scanning an
• Being an Application Security Evangelist who translates security concepts for developers• Improving and maintaining secure development standards and managing application security framework improvement projects• Integrating security tools, standards and processes into the Software Development Life Cycle (SDLC)• Ensuring that developers are trained
• Reporting to the Information Security (IS) Manager, the Information Security Analyst (ISA) will perform - i. vulnerability scanning and automated code testing operations; ii. threat assessment and patch management advisory operations; iii. IT-related security incident containment and response; iv. management and implementation of IS initiatives;
• Being an Application Security Evangelist who translates security concepts for developers
• Improving and maintaining secure development standards and managing application security framework improvement projects
• Integrating security tools, standards and processes into the Software Development Life Cycle (SDLC)
• Ensuring that developers are trai
Leading fintech company for online and mobile lending services
Job Description
• Develop and maintain the overall network, cloud and infrastructure security design and integration for the Company
• Formulate a set of policies, security standards, controls, guidelines and best practices on Cybersecurity
• Promote awareness in information security in
IT Manager – Operation Security (Luxury Retail, Regional) Client Description Global luxury retail corporation Job Description • The Security Manager will manage daily security operation and project activities complying industrial security standards including server, network, mobile technology, and develop baseline security standard with audit logg
• Take part in the entire IT service management lifecycle on building new services and continuously improve existing IT services• Liaise effective and efficiently with internal and external stakeholders• Provide technical support and training related to IT services• Conduct technology and vendor evaluations on function and features from a business
Our Bank client is looking for a Network Security Engineer to join the team to provide the following job duties,
Provide network security daily professional operation support
Familiar with Sangfor IAG, Hillstone, Fortinet, PA, Cisco FirePower, NetScout
Familiar with F5 product (LTM/AWAF/GTM)
Familiar with Web proxy product (LTM/AWAF/GTM)
Handle ser
• Take part in the entire IT service management lifecycle on building new services and continuously improve existing IT services
• Liaise effective and efficiently with internal and external stakeholders
• Provide technical support and training related to IT services
• Conduct technology and vendor evaluations on function and features from a busine
Leading fintech company for online and mobile lending services
Job Description
• Develop and maintain the overall network, cloud and infrastructure security design and integration for the Company
• Formulate a set of policies, security standards, controls, guidelines and best practices on Cybersecurity
• Promote awareness in information security in
Fast-growing software house and IT solutions provider in Hong Kong Job Description • Responsible for the development of the company IT Security and technology risk related policies, guidelines and standards operating procedures• Participate in internal regular security assessment and compliance review activities• Perform vulnerability scanning and
• Reporting to the Information Security (IS) Manager, the Information Security Analyst (ISA) will perform - i. vulnerability scanning and automated code testing operations; ii. threat assessment and patch management advisory operations; iii. IT-related security incident containment and response; iv. management and implementation of IS initiatives;
Fast-growing software house and IT solutions provider in Hong Kong
Job Description
• Responsible for the development of the company IT Security and technology risk related policies, guidelines and standards operating procedures
• Participate in internal regular security assessment and compliance review activities
• Perform vulnerability scanning an
IT Manager – Operation Security (Luxury Retail, Regional)
Client Description
Global luxury retail corporation
Job Description
• The Security Manager will manage daily security operation and project activities complying industrial security standards including server, network, mobile technology, and develop baseline security standard with audit loggi
Leading retailers and wholesalers of a number of top-selling sports, lifestyle and outdoors brands of apparel, footwear and accessories products. Job Description • Being an Application Security Evangelist who translates security concepts for developers• Improving and maintaining secure development standards and managing application security framewo
Job Source: Classy Wheeler Limited
There are currently no more jobs available for the search you have performed.
Looking to build a career in logistics? Birmingham, West Sussex, offers a thriving warehouse job market with diverse opportunities. Whether you're seeking a full-time, permanent position or a flexible, temporary role, there's something for everyone.
Create Email Alert
Create Email Alert
Security Jobs
ⓘ There was an unexpected error processing your request.
Please refresh the page and try again.
If the problem persists, please contact us with your issue.
Email address is already registered
You can always manage your preferences and update your interests to ensure you receive the most relevant opportunities.
Would you like to [visit your alert settings] now?
Success! You're now signed up for Job Alerts
Get ready to discover your next great opportunity.