Information Security Officer
2 weeks ago
Universal Digital Health Care (UDHC) , Pakistan
• Cloud Security Architecture: Design, develop, and implement robust security architecture for cloud-based systems, ensuring compliance with industry standards and regulations. Had working for SIME deployments i.e. WAZUH or any similar tool.
• Security Implementation: Deploy and configure security tools, controls, and technologies in cloud environments, such as firewalls, intrusion detection/prevention systems, encryption mechanisms, and access controls.
• Risk Assessment and Management: Conduct regular risk assessments and vulnerability scans to identify and mitigate security risks and threats in cloud infrastructure and applications.
• Incident Response: Develop and maintain incident response plans and procedures to effectively respond to security incidents, including investigation, containment, and remediation.
• Security Monitoring and Logging: Implement monitoring and logging solutions to continuously track and analyze security events and activities within cloud environments and respond promptly to any suspicious behavior or anomalies.
• Identity and Access Management (IAM): Manage user access and permissions in cloud platforms, ensuring least privilege principles are enforced and access controls are properly configured.
• Security Compliance: Ensure compliance with relevant security standards, regulations, and frameworks (e.g., GDPR, HIPAA, ISO 27001) in cloud environments, and assist with audits and assessments as needed.
• Security Awareness and Training: Develop and deliver security awareness programs and training sessions to educate employees and stakeholders on cloud security best practices and policies.
• Collaboration and Communication: Collaborate with cross-functional teams, including IT operations, development, and business units, to integrate security into all aspects of the cloud lifecycle and communicate security requirements effectively.
• Continuous Improvement: Stay abreast of emerging threats, vulnerabilities, and security technologies in the cloud space, and recommend and implement improvements to enhance the overall security posture.
Qualifications:
• Bachelor's degree in computer science, Information Security, or a related field; master's degree preferred.
• Proven experience (2-3 years) working as a security engineer or architect, with a focus on cloud security.
• Strong understanding of cloud computing platforms (e.g., AWS, Azure, Google Cloud) and their security features and services.
• Hands-on experience with cloud security tools and technologies, such as cloud access security brokers (CASBs), cloud workload protection platforms (CWPPs), and cloud security posture management (CSPM) tools.
• Certifications such as Certified Cloud Security Professional (CCSP), or AWS Certified Security Specialty are highly desirable.
• Excellent analytical, problem-solving, and communication skills.
• Ability to work independently and collaboratively in a fast-paced environment.
• Strong commitment to maintaining the highest standards of security and compliance.
• Experience with scripting and automation (e.g., Python, PowerShell) for security tasks is a plus
Hospital & Health Care - Lahore, Pakistan
mustakbil.com asks for your consent to use your personal data to:perm_identity
- perm_identity Personalised advertising and content, advertising and content measurement, audience research and services development
- devices Store and/or access information on a device
Data preferences
You can choose how your personal data is used. Vendors want your permission to do the following:
Store and/or access information on a deviceAdvertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are (or have been) interacting with (for example, to limit the number of times an ad is presented to you).
Create profiles for personalised advertisingInformation about your activity on this service (such as forms you submit, content you look at) can be stored and combined with other information about you (for example, information from your previous activity on this service and other websites or apps) or similar users. This is then used to build or improve a profile about you (that might include possible interests and personal aspects). Your profile can be used (also later) to present advertising that appears more relevant based on your possible interests by this and other entities.
Use profiles to select personalised advertisingAdvertising presented to you on this service can be based on your advertising profiles, which can reflect your activity on this service or other websites or apps (like the forms you submit, content you look at), possible interests and personal aspects.
Information about your activity on this service (for instance, forms you submit, non-advertising content you look at) can be stored and combined with other information about you (such as your previous activity on this service or other websites or apps) or similar users. This is then used to build or improve a profile about you (which might for example include possible interests and personal aspects). Your profile can be used (also later) to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests.
Use profiles to select personalised contentContent presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services (for instance, the forms you submit, content you look at), possible interests and personal aspects. This can for example be used to adapt the order in which content is shown to you, so that it is even easier for you to find (non-advertising) content that matches your interests.
Information regarding which advertising is presented to you and how you interact with it can be used to determine how well an advert has worked for you or other users and whether the goals of the advertising were reached. For instance, whether you saw an ad, whether you clicked on it, whether it led you to buy a product or visit a website, etc. This is very helpful to understand the relevance of advertising campaigns.
Measure content performanceInformation regarding which content is presented to you and how you interact with it can be used to determine whether the (non-advertising) content e.g. reached its intended audience and matched your interests. For instance, whether you read an article, watch a video, listen to a podcast or look at a product description, how long you spent on this service and the web pages you visit etc. This is very helpful to understand the relevance of (non-advertising) content that is shown to you.
Understand audiences through statistics or combinations of data from different sourcesReports can be generated based on the combination of data sets (like user profiles, statistics, market research, analytics data) regarding your interactions and those of other users with advertising or (non-advertising) content to identify common characteristics (for instance, to determine which target audiences are more receptive to an ad campaign or to certain contents).
Develop and improve servicesInformation about your activity on this service, such as your interaction with ads or content, can be very helpful to improve products and services and to build new products and services based on user interactions, the type of audience, etc. This specific purpose does not include the development or improvement of user profiles and identifiers.
Use limited data to select contentContent presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type, or which content you are (or have been) interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errorsYour data can be used to monitor for and prevent unusual and possibly fraudulent activity (for example, regarding advertising, ad clicks by bots), and ensure systems and processes work properly and securely. It can also be used to correct any problems you, the publisher or the advertiser may encounter in the delivery of content and ads and in your interaction with them.
Deliver and present advertising and contentCertain information (like an IP address or device capabilities) is used to ensure the technical compatibility of the content or advertising, and to facilitate the transmission of the content or ad to your device.
Match and combine data from other data sourcesInformation about your activity on this service may be matched and combined with other information relating to you and originating from various sources (for instance your activity on a separate online service, your use of a loyalty card in-store, or your answers to a survey), in support of the purposes explained in this notice.
In support of the purposes explained in this notice, your device might be considered as likely linked to other devices that belong to you or your household (for instance because you are logged in to the same service on both your phone and your computer, or because you may use the same Internet connection on both devices).
Identify devices based on information transmitted automaticallyWith your acceptance, your precise location (within a radius of less than 500 metres) may be used in support of the purposes explained in this notice.
Vendors can use your data to provide services. Declining a vendor can stop them from using the data you shared.
Exponential Interactive, Inc d/b/a VDX.tvData collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Privacy choices, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, User-provided data, Browsing and interaction data, Privacy choices, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: Non-precise location data, Browsing and interaction data, Device characteristics
Data collected and processed: IP addresses, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Browsing and interaction data, Privacy choices, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Privacy choices, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Device characteristics, Device identifiers
Data collected and processed: Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: Users' profiles
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Privacy choices, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Privacy choices, Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Integral Ad Science (incorporating ADmantX)Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device identifiers, Precise location data
Data collected and processed: Non-precise location data
Data collected and processed: IP addresses, Non-precise location data, User-provided data, Browsing and interaction data, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Device characteristics
Data collected and processed: IP addresses, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: Device characteristics
Data collected and processed: IP addresses, Non-precise location data
Data collected and processed: IP addresses, Device characteristics
Data collected and processed: IP addresses, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device identifiers
Adobe Audience Manager, Adobe Experience PlatformData collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Privacy choices, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Users' profiles, Browsing and interaction data, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Privacy choices, Device identifiers
Data collected and processed: IP addresses, Browsing and interaction data, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data
Data collected and processed: IP addresses
Data collected and processed: IP addresses, Non-precise location data, Users' profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: Device identifiers
Data collected and processed: IP addresses, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Privacy choices, Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Marketing Science Consulting Group, Inc.#J-18808-Ljbffr
-
Information Security Officer
2 days ago
Lahore, Punjab, Pakistan UOH Full timeAbout the Role:The University of Buner is seeking an experienced Information Security Officer to join our IT department and play a key role in ensuring the security and integrity of our systems and data.The successful candidate will be responsible for designing and implementing effective security strategies, conducting risk assessments, and developing...
-
Certified Information Security Officer
2 days ago
Lahore, Punjab, Pakistan UNAVAILABLE Full timeDuties and ResponsibilitiesKey Responsibilities:Develop and Implement Information Security Policies: The successful candidate will develop and implement information security policies and procedures that align with industry best practices.Lead SOC 2 Type II Project Implementation: This role will lead the implementation of SOC 2 Type II project, including...
-
Chief Information Security Officer
7 days ago
Lahore, Punjab, Pakistan FINCA Impact Finance Full timeJob DescriptionThe Chief Information Security Officer - Global Cybersecurity will oversee the development and implementation of FINCA's global cybersecurity strategy, ensuring the protection of corporate assets and infrastructure from cyber threats.This senior-level professional will lead cross-functional teams to design, test, and implement effective...
-
Manager Operation Accurate Security
1 week ago
Lahore, Punjab, Pakistan Accurate Security Systems (Pvt) Ltd Full timeManager Operation Accurate Security (PVT) Ltd.Accurate Security Systems (Pvt) Ltd, PakistanTo work as Manager Operation of the company to make and maintain contacts with the clients and the security guards.Be responsible for issuing and receiving all arms and ammunitions to the security guards.To manage recovery and payments and maintain records for the...
-
Security Compliance Officer
13 hours ago
Lahore, Punjab, Pakistan Universal Digital Health Care (UDHC) Full timeJob Title: Information Security OfficerLocation: Lahore, PakistanWe are seeking an experienced Information Security Officer to join our team at Universal Digital Health Care (UDHC). As a member of our security team, you will be responsible for ensuring the confidentiality, integrity, and availability of sensitive patient data.**Responsibilities:Design,...
-
Information Security Architect
5 days ago
Lahore, Punjab, Pakistan Descon Full timeWe are seeking a skilled Information Security Specialist to join our team at Descon. The successful candidate will be responsible for developing, implementing, and maintaining an Information Security Management System (ISMS) aligned with ISO 27001 standards.Key Responsibilities:Develop and implement ISMS policies, procedures, and standards to ensure the...
-
Information Security Auditor
3 days ago
Lahore, Punjab, Pakistan TUV Austria Full timeWe are seeking a highly skilled Information Security Auditor to join our team at TUV Austria. The ideal candidate will have a Bachelor's degree in IT or a relevant field and a minimum of 3-4 years of experience in data security and network security.A strong background in ISO 27001 is required, with a Lead Auditor Course certification being a plus.Experience...
-
Information Security Analyst
2 days ago
Lahore, Punjab, Pakistan Atheneum Partners (Private) Limited Full timeAbout Us: Atheneum Partners (Private) Limited is a fast-paced, entrepreneurial environment striving for excellence with a diverse and driven team. We are committed to providing faster insights to empower our clients' decision making through AI capabilities that connect them to the world's top professionals and industry leaders.We are growing rapidly, with...
-
Security Officer
2 days ago
Lahore, Punjab, Pakistan UOH Full timeUniversity Of Makran Panjgur is seeking candidates for the position of Security Officer.Responsibilities:To be determined based on the specific needs of the University.Skills Required:A polite and approachable manner at all times.A reasonable level of physical fitness and strength.A trustworthy character.A flexible and responsible approach to the job.The...
-
Chief Information Officer
6 days ago
Lahore, Punjab, Pakistan PRG Pakistan Full timeWe are seeking an experienced leader to join our team as Chief Information Officer. As a key member of our leadership team, you will be responsible for driving strategic IT initiatives, developing and executing technical strategies, and ensuring alignment with business goals.About the TeamOur Vision:To be a world-class IT organization that supports business...
-
Information Technology Security Specialist
3 weeks ago
Lahore, Punjab, Pakistan ibex Full timeInformation Technology Security SpecialistObjectives:ISO 27001 and ITGC auditsDescription:As a member of the Information Security team, this position will maintain ISO 27001 certification and practice to ensure that the IBEX complies with industry and regulatory requirements like ISO 27001/2, SOC2 Type 2, and SOX audit. This position will liaise closely with...
-
Information Security Risk Manager
4 days ago
Lahore, Punjab, Pakistan ibex Full timeJob Overview:As a member of the Information Security team at ibex, this position plays a crucial role in maintaining ISO 27001 certification and ensuring compliance with industry and regulatory requirements. This includes collaborating closely with internal business units, HR, and other relevant departments to identify and implement necessary controls.Key...
-
Information Security Compliance Specialist
2 days ago
Lahore, Punjab, Pakistan UNAVAILABLE Full timeCompany OverviewAbout UNAVAILABLEUNAVAILABLE is a leading organization in the field of information security, committed to providing cutting-edge solutions to our clients. Our team of experts works tirelessly to ensure that our systems and processes are secure and compliant with industry standards.
-
Information Security Risk Manager
13 hours ago
Lahore, Punjab, Pakistan FINCA Impact Finance Full timeKey ResponsibilitiesThe Global DLP Analyst will be accountable for protecting FINCA's data by ensuring the DLP solution is properly configured and monitored.Main Responsibilities:Configure and maintain DLP policies, alerts, and reporting to ensure data security.Respond to generated alerts, incidents, and manually reported data security events.Collaborate...
-
Information Security Analyst
6 days ago
Lahore, Punjab, Pakistan ibex Full timeAbout the RoleThis is a critical position at ibex, requiring a skilled IT Security Specialist to lead our security efforts.Key Responsibilities:Develop and execute comprehensive security strategies.Conduct thorough risk assessments to identify, assess, and mitigate potential vulnerabilities in alignment with industry standards and frameworks.Review client...
-
Information Security Manager
2 days ago
Lahore, Punjab, Pakistan UNAVAILABLE Full timeJob DetailsUNAVAILABLE is looking for a Senior IT Security Specialist to join our team.This position will be responsible for developing and implementing an effective cybersecurity strategy to protect our organization's data and infrastructure.ResponsibilitiesThe successful candidate will have a strong background in Network and Cyber Security functions and...
-
Information Security Analyst
19 hours ago
Lahore, Punjab, Pakistan BusinessBook Full timeAbout Our CompanyBusinessBook is a company of esteemed management consultants providing top-notch training and consulting services to our clients.ResponsibilitiesSupport Our Team: You will work closely with our experienced team to provide comprehensive IT security solutions to our clients.Assist with Projects: Assist with various projects, including...
-
Security Manager
1 week ago
Lahore, Punjab, Pakistan Trafco Tracking (Pvt) Ltd Full timeA TRACKING Company is looking for a SECURITY MANAGER.Responsibilities:Recovery Operations.Field visits and investigations of theft/snatch cases.Maintaining a liaison with POLICE, ACLC, MP & other Law Enforcement Agencies.Reporting and documentation of all theft/snatch/misplaced cases.Job SpecificationMust be well spoken, courageous & confident.Able to handle...
-
Information Protection Analyst
6 days ago
Lahore, Punjab, Pakistan Dukan Full timeWe are looking for an experienced Information Protection Analyst to join our team at Dukan.In this role, you will be responsible for monitoring network security, assessing risks, and identifying potential threats while conducting thorough incident response.Responsibilities:A strong understanding of cyber-security tools, compliance regulations, and risk...
-
Sales Executive Required
2 weeks ago
Lahore, Punjab, Pakistan Homeland Security Full timeSales Executive Required Homeland Security, Pakistan HLS is searching for new clients who could benefit from company products and maximizing customer potential. Responsibilities include:Carrying out market research to find new customers using the internet, business directory, and local chambers.Traveling to visit potential clients on a daily basis.Preparing...