Get new jobs by email
- ...Job Summary We are Currently Looking for Information Security Systems Engineer For Our Bahrain Operations. Should be Cisco Certified Network Security Assistant (CCNA Security) holder. Should have information security architecture on one of the following professional...
- ...Job purpose Overseeing information security, cybersecurity and IT risk management programs based on industry-accepted information security and risk management frameworks. Responsible for the organization's data privacy and protection function to ensure compliance...
- ...the system is available 24/7. Maintain best practices and security standards. Design and implement security solutions that protect... ..., intrusion detection and prevention systems, and security information and event management (SIEM) systems to ensure optimal protection...
- A leading recruitment firm in Bahrain is looking for a candidate with 10+ years of technical experience, specializing in AWS Solution Architecture. The role requires extensive knowledge of various AWS services and previous large-scale migration projects. An AWS certification...
- ...Job Summary Position for Architect Landscape is requested with 10 years of Experience in Design and Construction Supervision Particularly in Sports Facilities. English Fluency is a must. Skills English Fluency is a must. Experience in Design and Construction...
- An established industry player is seeking a skilled cybersecurity professional to enhance its security operations. In this pivotal role, you will oversee the development and maintenance of cybersecurity architecture, ensuring the effectiveness of security operations and...
BHD 160 per month
...Description We are looking for a qualified Lifeguard/ Security Guard to join our team in Bahrain. This position is open to expatriates currently residing in Bahrain. Requirements: Must be currently located in Bahrain. Must be a proficient swimmer for lifeguard...- An established industry player is seeking a seasoned security expert to safeguard their on-prem and cloud environments. This role involves designing robust security solutions, conducting regular assessments, and responding to security incidents. You will be responsible...
- ...Job Summary Work with technical teams and developers to remediate vulnerabilities and security findings. Conduct application security hardening, security assessment and vulnerability scanning to ensure applications are securely developed and hosted. Primary emphasis...
- ...governance, data lifecycle management, data security, and data quality frameworks, aligned... ...Master's degree in Computer Science, Information Technology, Engineering, or a related... ...field, with at least 4 years in a senior architect or leadership role within the financial...
- ...The Information Technology (IT) Specialist is responsible for the maintenance, support, and security of an organization's computer systems, networks, and technical infrastructure. This role involves a mix of hands-on technical support and strategic system management....
- ...development, cloud computing, systems engineering, infrastructure, security, networking, data & analytics) experience Experience in... ...depth and strong interpersonal skills. As a Solutions Architect at Amazon Web Services, you will have the exciting opportunity...
- ...system. Knowledge of using best practice for implementing IT Security, Integration, and Testing. Knowledge of scripts to automate... ...and maintenance) Mandatory - AWS Certified Solution Architect / Developer / SysOps Associate and/or Professional. Working...
- A leading technology organization in Manama is looking for an experienced Information Technology Specialist. The role focuses on maintaining and securing the company's IT systems, providing technical support, and managing user accounts. Ideal candidates should have a Bachelor...
- ...The Cyber Security Manager is responsible to safeguard the groups critical information assets, systems, and infrastructure against cyber threats and attacks. This involves developing and maintaining a comprehensive cyber security program that aligns with the group's strategic...
- ...application specializing in microfinance, cards, and digital payment solutions. This role includes overseeing development, infrastructure, security, and support functions while ensuring high platform availability, scalability, and regulatory compliance. The head will work...
- ...Managing the development of the enterprise information and business architecture; Aligning IT Strategy planning with company business... ...application instrumentation, integration architecture; Has to have the TOGAF 9 Certified Enterprise Architect. #J-18808-Ljbffr...
- ...growing technology firm in Bahrain is seeking an experienced IT Manager to lead the Information Technology department. This senior role involves overseeing IT infrastructure, ensuring security, and aligning IT strategy with business objectives. The ideal candidate will...
- An established industry player is seeking a skilled Enterprise Architect to lead the development of enterprise information and business architecture. This role involves aligning IT strategies with business goals, optimizing information management, and managing risks associated...
- ...Architect (Master’s Degree in Architecture) Job Category: Architect Job Type: Full Time We are seeking a qualified and visionary Architect with a Master’s degree in Architecture to join our design team. The ideal candidate will contribute to the design and...
- A leading financial institution in Bahrain seeks an experienced professional to optimize the Fircosoft Sanction Screening system. Key responsibilities include improving detection accuracy, ensuring compliance with regulations, and enhancing operational efficiency. Candidates...
- ...startup environment. You’ll work closely with the CTO, CPO, and Infrastructure Architect to shape the platform’s architecture, guide the team, and move fast without compromising quality, security, or scalability.. What You’ll Do Own the architecture: Design and evolve...
- ...business and IT executives, IT leaders, architects, developers, and various lines of businesses... ...and deepest functionality, the most secure computing environment, and the most proven... ..., please visit confidential for more information. If the country/region you’re applying in...
- ...formulate estimates and resolve issues. • Confer with engineers, architects, owners, contractors and subcontractors on changes and... ...equipment, and labor expenses • Travel to job sites to gather information on materials needed, labor requirements, and other factors...
- ...Reconciliations Documents financial transactions by entering account information. Substantiates financial transactions by auditing documents... ...by collecting and analyzing account information. Secures financial information by completing data base backups. Maintains...
- ...records of items laundered. Follow all company and safety and security policies and procedures; report any maintenance problems, safety... ...and professional. Maintain confidentiality of proprietary information; protect company assets. Support all co-workers and treat them...
- ...and coaching employees. Follow all company and safety and security policies and procedures Report accidents, injuries, and unsafe... ...and professional Maintain confidentiality of proprietary information Protect company assets Welcome and acknowledge all guests...
- ...applications. This is not a ticket-driven role. You’ll be trusted to architect, build, deploy, and evolve React applications from the ground... ...devices • Instrumenting user telemetry and analytics to inform product decisions • Contributing to and evolving a shared design...
- ..., and well being of guests. Follow all company and safety and security policies and procedures; report accidents, injuries, and unsafe... ...and professional, maintain confidentiality of proprietary information, and protect company assets. Welcome and acknowledge all guests...
- ...and data recovery processes. Support the implementation of IT security policies and procedures. Maintain documentation related to... ...efficiency and stability. Requirements Bachelor’s degree in Information Technology, Computer Science, or related field. 1–3 years of...
