| Company Name |
| Du Telecom Dubai UAE About Du Telecom du is a vibrant and multiple award-winning telecommunications service provider serving around 9 million individual customers with its mobile, fixedline, broadband internet, and Home services over its 4G LTE network. du also caters to over 100,000 UAE businesses with its vast range of ICT and managed services. Since its launch in 2007, du has many UAE firsts to its credit, including introduction of Pay by the Second® billing system, IPTV and self-service portal. du is ideally placed to support the realisation of UAE Vision 2021 and transformation of Dubai into a Smart City. indeeddubai.com |
| Job Title |
| 1) Lead Architect – Robotics 2) CDC L1 SOC Analyst 3) Engineer – Cloud Infra |
| Eligibility |
| Education: Equivalent Degree Diploma Holders Nationality: Any Gender: Male / Female |
| Experience |
| Freshers and Experienced Both Can Apply |
| Job Type: Full Time |
| Job Location |
| Dubai UAE |
| Salary |
| Not Disclosed |
| Benefits |
| As Per UAE Labor Law |
| Interested candidates can share your resume to Apply now |
| Posted Date: Aug 2022 |
Company Confidential Position Information Security Compliance Specialist Industry: other WWW.JOBSVACANCYDUBAI.COM Eligibility Employment type: Full Time Qualification: Bachelor’s Degree Holder Experience minimum 7 year Designation We are hiring for the position of Information Security Compliance Specialist for a government entity here in Abu Dhabi, UAE Requirements: Contribute to the evolution of company’s Compliance program. Responsible for the day-to-day activities as the company relate to the security compliance program and follow-up activities. Aligned functionally within the organization and therefore is responsible for advising others on the compliance process and increasing awareness of security within their area of responsibility. Conducts security compliance program activities as specified in the information security policy to assess compliance with company’s policies, standards and procedures Keeps track of security deficiencies through the documentation of finding...
