...Job Description - Internal Auditor (Cyber & Information Systems) (2300001B)
Job Description
Internal Auditor (Cyber & Information Systems) - ( 2300001B )
Description
Job Purpose:
Conduct Information System/ Information Technology audits as per the annual...
...Junior Cyber Security Specialist
Assist in conducting vulnerability assessments and penetration testing
Review and analyze security policies and procedures to identify areas for improvement
Participate in incident response efforts and help develop mitigation strategies...
Brief overview of the role
Due to continued success and growth, Newton Fallowell Grantham now require an Apprentice Estate Agent to work in their busy high street sales office. To study Junior Estate Agency Level 2 with Learning Curve.
Apprenticeship summary...
VAM Systems is a Business Consulting, IT Solutions and Services company.
VAM Systems is currently looking for Cybersecurity Specialist for our Bahrain operations with the following skillsets & terms and conditions:
Skills/Experience:
3 to 5 years...
...Aspiring cybersecurity enthusiasts committed to protecting digital infrastructures and combating cyber threats
Analytical thinkers adept at identifying vulnerabilities and implementing robust security measures
Effective communicators who thrive in collaborative team...
...KPMG in Bahrain’s Cyber Security practice has a focus on the financial, government, telecom, and industrial sectors. We continuously seek to understand our clients’ cyber security challenges and provide services to improve their cyber security posture, reduce their organizational...
...Job Summary::
The Director of Cyber Security & Governance at our organization plays a crucial role in steering our cybersecurity strategy and operations. This leadership position involves overseeing the comprehensive management of digital identity and access, ensuring...
...the highest quality standards. This role involves close collaboration with cross-functional teams, including Security Architecture, Cyber Defense and supporting functions such as Business Administration to ensure seamless service delivery and client satisfaction.
Responsibilities...
...for inclusion in the corporate / department risk register.
Take part in major IT initiatives, transformation projects review of cyber-security systems and internal controls pertaining to Information system under development.
Plan, coordinate and manage each IT individual...
...SLAs.
Directly participate in IT operations and support as required (i.e., be hands-on).
Proactively manage and support IT and cyber incident response efforts, actively collaborating with relevant teams to identify, assess, and manage technology incidents in a...
...Additionally, you will conduct vulnerability scans, analyze malware, interpret network tool information, and contribute to the development of cyber defense tools.
Main Tasks & Responsibilities
Characterize and analyze network traffic to identify anomalous activity and...
...position is eligible for part time, substantial or adhoc telework at the discretion of management.
This position is designated as a Cyber IT/Cybersecurity Workforce position. You must obtain and maintain the credentials as described in SECNAV M for specialty area 65...
...Founder of Mint Specialist Recruitment | IT | Software Development | Data | Enterprise IT | Cloud | Infrastructure | Cyber Security | Gaming
We are urgently seeking a highly talented and driven Sales Manager with a history of successful B2B IT sales and sales team leadership...
...Committee on the adequacy and effectiveness of internal controls primarily related to all aspects of Information Technology, Information & Cyber Security, Business Continuity Management, Digital, Operational and IT Risk Management
It includes:
Delivery of audit...
...walkthroughs - this requires an understanding of our Digital Risk Protection (DRP) stack and at the minimum ability to demo Hackerview, Cyber Blindspot and ThreatCover.
Other Responsibilities
The candidate will also be assigned a part of the sales process as his/her...
...basis we work closely together with other members of the firm and also within the broader Deloitte organization, specifically with cyber security, data and cloud computing experts and the IP valuation team.
Let's talk about you As a lawyer : • you obtained your...
...and contract terms with vendors to ensure value for money is achieved, and quality standards, data protection, business continuity, Cyber and information security and outsourcing requirements are fulfilled with alignment of relevant stakeholders.
Support Head of procurement...
...security initiatives.
ii. Define and evaluate security technologies required to ensure safe technology
operation and detection of cyber-attack
iii. Provide the security recommendations on actions which assist in improving
security posture within environment...
...and the management of related risks
Carry out “ad hoc” tasks related to data protection and data retention as directed by the GH – Cyber & IT Risk or Senior Management
Job Context
Data protection and privacy landscape are evolving and changing rapidly due to the...
...Bahrain
The Threat Intelligence Lead will own Canonical’s threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our...
...Business Sales
Country:
Bahrain
Location:
Bahrain - Manama
Contract Type:
Full Time
Job Objective:
Responsible for cyber security solutions development and positioning. Understand how to implement and monitor security measures for the protection of...
...the yield of more valued products, enhanced unit capacities, save energy, improve efficiency and protect OT systems and networks from cyber-attacks.
Key Areas:
Direct and guide a team of engineers and system analysts who create and maintain regulatory control,...
...and requirements for Canonical product security, improving the resilience and robustness of all Ubuntu customers and users subject to cyber attacks. Additionally, the team collaborates with our Organisational Learning and Development team to develop playbooks and...
...to industry standards.
Provide on-call support as needed, being available 24X7 to promptly address and resolve IT and, as needed, cyber incidents, ensuring minimal disruption to business operations and maintaining the integrity and security of the Microsoft platforms....
...Directly participate in IT System Administration and support as required (i.e., be hands-on).
Proactively manage and support IT and cyber incident response efforts, actively collaborating with relevant teams to identify, assess, and manage technology incidents in a...
...years(IT Solutions and Services) for AWS, Azure Cloud Services, Remote IT Infra Management, Microsoft Power and Dynamics Services, Cyber Security Services.
Secondary Role
Lead generation – Generating qualified leads across mid and large enterprise segments by...
...address security weaknesses.
You'll actively monitor and analyze network traffic, system vulnerabilities, and security incidents as a Cyber Security Engineer, identifying and mitigating potential threats to maintain data confidentiality, integrity, and availability.
As...
...:
Join our SecOps Team and play an impactful role in development (by choosing tools and methods) and maintenance of corporate cyber-security
Be directly involved in multiple projects related with corporate’s cybersecurity, for example implementation of new tool...
...Full Stack Engineer (Remote)
TryHackMe is the fastest-growing online cyber security training platform. Our mission is to make learning and teaching cyber security easier by providing gamified security exercises and challenges. Having only been around for handful...
...Demand/ Lead Generation Manager
About us:
TryHackMe, the fastest-growing cyber security training platform, serves over three million global users and more than 200 businesses. We provide guided, gamified, hands-on training that caters to all skill levels and...