Information And Technology Jobs overseas

About 81169 results in (14) seconds Clear Filters

Jobs Search

About 81169 results in (14) seconds
Information Security SOC Manager - Sugar Land or Lubbock at PROSPERITY BANK
Lubbock, Texas, United States - Full Time
Skills Needed
Cybersecurity, Incident Response, Threat Detection, Siem, Risk Management, Team Leadership, Vulnerability Assessment, Network Security, Threat Intelligence, Mitre Att&Ck, Cyber Kill Chain, Edr, Xdr, Ngfw, Malware Analysis, Compliance Monitoring
Specialization
Candidates must have at least 3 years of experience in security operations or incident management and a bachelor's degree in a related field. Proficiency in enterprise security technologies like SIEM, EDR, and XDR, along with knowledge of cybersecurity frameworks such as NIST and MITRE ATT&CK, is required.
Experience Required
Minimum 2 year(s)
Information Security Architect at Unit4-Australia
Krakow, Lesser Poland Voivodeship, Poland - Full Time
Skills Needed
Security Architecture, Cloud Security, Azure, Identity And Access Management, Zero Trust, Devsecops, Ci/Cd, Kubernetes, Network Security, Endpoint Protection, Risk Management, Security Governance, Threat Detection, Microsoft 365, Entra Id, Iac
Specialization
Candidates must possess 7-10+ years of experience in IT or cybersecurity, including at least 3 years in a dedicated security architecture role, with deep expertise in Azure cloud security and modern enterprise platforms. Essential qualifications include relevant certifications like CISSP or Microsoft Certified: Cyber security Architect Expert, and demonstrated ability to deliver Zero Trust concepts in production environments.
Experience Required
Minimum 10 year(s)
Information Security Architect at Unit4-Australia
Wrocław, Lower Silesian Voivodeship, Poland - Full Time
Skills Needed
Information Security, Cloud Security, Identity Management, Endpoint Protection, Devsecops, Zero Trust, Microsoft Security Technologies, Security Architecture, Risk Management, Compliance, Saas, Infrastructure Security, Threat Detection, Governance, Automation, Consulting
Specialization
Candidates should have 7-10+ years of experience in IT or cybersecurity, with at least 3 years in a dedicated security architecture role. Relevant industry certifications and deep technical expertise across cloud and security technologies are essential.
Experience Required
Minimum 10 year(s)
Technical Information Engineer at BAE Systems
London, England, United Kingdom - Full Time
Skills Needed
Xml, Sgml, Technical Documentation, Ils Disciplines, Communication, Data Modules Authoring, Engineering Data Interpretation, Design Drawings Interpretation, Quality Review, Technical Authoring, Rtx Eagle, Ptc Arbortext, Adobe Framemaker
Specialization
Candidates must possess a STEM degree or equivalent experience, along with prior experience in an Engineering environment and knowledge of technical documentation or ILS disciplines. Desirable skills include exposure to XML/SGML and experience with specific authoring tools like PTC Arbortext.
Experience Required
Minimum 2 year(s)
Health Information Technician I at State of Oklahoma
Taft, Oklahoma, United States - Full Time
Skills Needed
Medical Records Maintenance, Medical Terminology, Data Entry, Report Writing, Record Auditing, Compliance Monitoring, Statistical Reporting, Computer Literacy, Communication, Scheduling, Documentation Management, Patient Data Abstraction, Confidentiality, Medical Coding
Specialization
Candidates must be eligible for accreditation as a Registered Health Information Technician or possess two years of experience working with patient records in a medical setting. Proficiency in medical terminology and record maintenance methods is required.
Information Security Consultant at Inetum
Lisbon, , Portugal - Full Time
Skills Needed
Information Security, Cybersecurity, Iso 20000 1, Iso 27001, Pci Dss, Soc Type 1, Soc Type 2, Nis2, Dora, Risk Assessments, Audits, Business Continuity Plans, Analytical Capability, Methodological Rigor, Communication
Specialization
Candidates must have a minimum of 2 years of experience implementing standards like ISO 20000, ISO 27001, PCI DSS, and SOC Type 2, alongside strong analytical and structuring abilities. The role requires autonomy, organizational rigor, and comfort communicating with both technical and non-technical teams.
Information Systems Specialist at Eitan Medical
Netanya, Center District, Israel - Full Time
Skills Needed
Sap Bydesign, Salesforce, Sql, Azure Data Factory, Python, Power Bi, Requirements Gathering, System Implementation, Business Process Improvement, User Training, Functional Specifications, System Support, Configuration
Specialization
Candidates must have 3+ years of experience with SAP ERP systems, preferably SAP ByDesign, and proven experience leading full-cycle module or business process implementations. A Bachelor's degree in a relevant field is required, along with a hands-on, proactive approach and excellent communication skills for global collaboration.
Experience Required
Minimum 2 year(s)
Information Security Consultant at Vanquis
London, England, United Kingdom - Full Time
Skills Needed
Information Security Advice, Security Assessments, Control Gaps Identification, Risk Management, Security Controls Implementation, Policy Compliance, Stakeholder Engagement, Supplier Evaluation, Iso 27001, Nist, Cis, Owasp, Soc 2, Aws, Azure, Communication
Specialization
Candidates must have proven experience in an Information Security function, ideally in an enterprise environment, with a strong understanding of cybersecurity standards like ISO 27001, NIST, and cloud technologies such as AWS and Azure. Excellent communication skills and a pragmatic, analytical mindset are required to assess complex issues and recommend practical solutions.
Experience Required
Minimum 5 year(s)
Information Systems Technician at Hillsboro Area Hospital Inc
Hillsboro, Illinois, United States - Full Time
Skills Needed
Hardware Setup, Troubleshooting, Server Support, Peripheral Equipment Support, Cpsi System Support, User Training, Network Setup, Backup Management, Software Installation, User Support, Data Processing Equipment Operation, Vendor Communication, Network Configuration, Security Monitoring, Network Administration, Virtual Desktop Support
Specialization
Candidates need a minimum of 2 years of computer experience with proficiency in multiple applications, including Microsoft Office, preferably within a healthcare environment. A preferred educational background is a graduate degree (BA or BS) with an emphasis in Computer Science or a related field, alongside detailed knowledge of PC/mainframe hardware and software.
Information Security Specialist at Sherpa 6
Springfield, Virginia, United States - Full Time
Skills Needed
Vulnerability Management, Incident Response, Microsoft Defender, Microsoft Intune, Microsoft Purview, Siem, Log Aggregation, Endpoint Security, Change Management, Stigs, Cis Benchmarks, Nist 800 171, Nist 800 53, Rmf, Cmmc, Cybersecurity
Specialization
Candidates must have a bachelor's degree in a related field and 3–5 years of experience in cybersecurity operations. Proficiency with Microsoft security technologies and experience in enterprise environments are required.
Experience Required
Minimum 2 year(s)
Information Security Specialist at Sherpa 6
Spring Lake, North Carolina, United States - Full Time
Skills Needed
Vulnerability Management, Incident Response, Microsoft Defender, Microsoft Intune, Microsoft Purview, Siem, Log Aggregation, Endpoint Security, Compliance, Audit Readiness, Stigs, Cis Benchmarks, Nist 800 171, Change Management, Threat Detection, Identity Systems
Specialization
Candidates must hold a bachelor's degree in a relevant field and possess 3–5 years of experience in cybersecurity operations. Proficiency with Microsoft security technologies and experience in enterprise environment security management are required.
Experience Required
Minimum 2 year(s)
Information Security Specialist at Sherpa 6
, Florida, United States - Full Time
Skills Needed
Vulnerability Management, Incident Response, Microsoft Defender, Microsoft Intune, Microsoft Purview, Siem, Log Aggregation, Endpoint Security, Change Management, Audit Readiness, Stigs, Cis Benchmarks, Nist 800 171, Cmmc, Threat Detection, System Administration
Specialization
Candidates must hold a bachelor's degree in a relevant field and possess 3–5 years of experience in cybersecurity operations. Proficiency with Microsoft security technologies, vulnerability management, and enterprise system security is required, along with the ability to obtain a Secret clearance.
Experience Required
Minimum 2 year(s)
Information Security Specialist at Sherpa 6
Littleton, Colorado, United States - Full Time
Skills Needed
Vulnerability Management, Incident Response, Microsoft Defender, Microsoft Intune, Microsoft Purview, Siem, Log Aggregation, Endpoint Security, Compliance, Stigs, Cis Benchmarks, Nist 800 171, Change Management, Audit Readiness, Threat Detection, System Administration
Specialization
Candidates must hold a bachelor's degree in a relevant field and possess 3–5 years of experience in cybersecurity operations. Proficiency with Microsoft security technologies and experience managing Windows and Linux systems in an enterprise environment are required.
Experience Required
Minimum 2 year(s)
Information Systems Technician at Daigle Oil Company
Fort Kent, Maine, United States - Full Time
Skills Needed
Information Systems Management, Data Accuracy, System Back Ups, Preventative Maintenance, Security Compliance, Web Presence Management, Email Administration, Peripheral Equipment Support, Vmware, Microsoft Office 365, Microsoft Active Directory
Specialization
Candidates should possess an Associate degree or at least three years of relevant experience. Proficiency in VMware, Microsoft Office 365, and Microsoft Active Directory is considered a plus.
Experience Required
Minimum 2 year(s)
Information Operations Planner at Obsidian Solutions Group LLC
Twentynine Palms, California, United States - Full Time
Skills Needed
Information Operations, Military Planning, Intelligence Analysis, Electronic Warfare, Cyber Operations, Military Decision Making Process, Doctrine Development, Training Program Management, Public Affairs, Operations Security, Military Information Support Operations, Civil Military Operations, Instructional Design, Staff Coordination, All Source Intelligence, Joint Operation Planning
Specialization
Candidates must have extensive experience in intelligence or information operations, including a background in military planning and doctrine. A formal military Information Operations school graduation and professional military education are required, along with the ability to obtain and maintain a Top Secret security clearance.
Experience Required
Minimum 5 year(s)
Information Security Consultant at Vanquis
London, England, United Kingdom - Full Time
Skills Needed
Information Security Advice, Security Control Implementation, Security Assessments, Risk Management, Compliance Assurance, Stakeholder Engagement, Iso 27001, Nist, Cis, Owasp, Soc 2, Aws Security, Azure Security, Communication, Analytical Mindset, Pragmatic Mindset
Specialization
Candidates must have proven experience in an Information Security function, ideally in an enterprise environment, with a strong understanding of major cybersecurity standards like ISO 27001, NIST, and CIS. Essential skills include knowledge of cloud technologies (AWS/Azure) and excellent communication abilities to engage effectively with technical and business stakeholders.
Experience Required
Minimum 2 year(s)
Extrajobb som informationsvärd at Submit Bemanning
Nacka kommun, Stockholm, Sweden - Full Time
Skills Needed
Swedish Language, Customer Service, Communication, Mobile App Proficiency, Interpersonal Skills
Specialization
Candidates must speak Swedish and be social, friendly, and service-oriented. Ability to use a smartphone without difficulty is required.
Information Security Architect at AJ Bell
London, England, United Kingdom - Full Time
Skills Needed
Security Best Practice, Enterprise Security Controls, Security Standards, Security Reviews, Audit Support, Due Diligence, Endpoint Security, Cloud Security, Network Security, Devops Security, Security Monitoring, Ssdlc Practices, Risk Management, Grc, Iso27001, Nist
Specialization
Candidates should have experience implementing enterprise security platforms, strong knowledge across various security domains like endpoint, cloud, and network security, and an understanding of secure software development lifecycle practices. A minimum of 5+ years in information security, preferably in financial services or e-commerce, along with strong communication skills, is required.
Experience Required
Minimum 5 year(s)
Management Information Analyst at Adler & Allan
Leeds, England, United Kingdom - Full Time
Skills Needed
Analytical Skills, Numerical Skills, Data Analysis, Reporting, Dashboard Development, Data Quality, Stakeholder Engagement, Communication, Excel, Power Bi, Tableau, Sql, Data Modelling, Performance Measurement, Forecasting, Scenario Analysis
Specialization
Candidates should possess strong analytical and numerical skills, experience in producing MI reports, and proficiency in Excel and BI tools. A degree in a related field is required, with additional qualifications in analytics or BI being beneficial.
Experience Required
Minimum 2 year(s)
Information Governance Officer at GlobeMed Group
Sinn El Fil, Mount Lebanon Governorate, Lebanon - Full Time
Skills Needed
Information Security Risk Management, Iso 27001, Information Security Awareness Training, Business Continuity Planning, Disaster Recovery Planning, Risk Assessments, Risk Register Management, Control Verification, Internal Audits, External Audits, Security Incident Handling, Security Standards Knowledge, Security Vulnerability Tools, Information Security Management System (Isms)
Specialization
Candidates must hold a Bachelor's Degree in communication engineering, computer science, or information systems, coupled with over 3 years of experience in a security-related field. A CISSP or CISM security certification is required, along with hands-on experience using security vulnerability tools.
Experience Required
Minimum 2 year(s)
Information Security SOC Manager - Sugar Land or Lubbock at PROSPERITY BANK
Lubbock, Texas, United States -
Full Time


Start Date

Immediate

Expiry Date

18 Jul, 26

Salary

0.0

Posted On

19 Apr, 26

Experience

2 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Cybersecurity, Incident Response, Threat Detection, SIEM, Risk Management, Team Leadership, Vulnerability Assessment, Network Security, Threat Intelligence, MITRE ATT&CK, Cyber Kill Chain, EDR, XDR, NGFW, Malware Analysis, Compliance Monitoring

Industry

Banking

Description
POSITION PURPOSE The Information Security Operations Center Manager (SOC Manager) is tasked with developing, maintaining, and continuously enhancing the Bank’s threat detection and incident response capabilities. This critical role strengthens the Bank’s cybersecurity defenses by spearheading the creation of advanced threat detection systems and robust response strategies to address adversarial actions and non-compliant activities that threaten critical technology infrastructure and sensitive data. The SOC Manager ensures these capabilities align with regulatory requirements and the Bank’s enterprise risk management goals, safeguarding essential operations and assets. They lead and mentor a high-performing team of security analysts, fostering a culture of operational excellence and readiness. The role involves directing coordinated incident response efforts, working collaboratively with cross-functional teams to deliver a unified, risk-based approach to incident management. Additionally, the SOC Manager advises leadership on security initiatives, drives strategic projects, and serves as a trusted expert on emerging threats and cyber risks. They play a key role in enhancing enterprise-wide incident response preparedness, advancing risk mitigation strategies, and promoting cybersecurity awareness throughout the organization.  ESSENTIAL FUNCTIONS AND BASIC DUTIES 1. Lead the SOC team in effectively identifying, classifying, and escalating cybersecurity incidents. Oversee the full lifecycle management of low-impact incidents, ensuring timely containment and resolution. Serve as the Incident Response Team (IRT) Lead, providing operational direction, coordination, and oversight during incident response efforts, under the strategic guidance of the CISO. 2. Provide leadership and direction to the SOC team to ensure adherence to established security policies, procedures, and operational standards. Monitor and enforce quality assurance practices to support the timely detection, analysis, and mitigation of security threats. 3. Integrate leadership priorities into security operations by managing and developing SOC staff and resources to support cybersecurity objectives in alignment with organizational goals and regulatory requirements.  4. Maintain clear and effective communication with internal stakeholders across the organization, while actively engaging with industry partners and other external entities as needed to support collaboration, threat intelligence sharing, and coordinated incident response efforts. 5. Provide leadership and direction to the SOC team to ensure adherence to established security policies, procedures, and operational standards. Monitor and enforce quality assurance practices to support the timely detection, analysis, and mitigation of security threats. 6. Establish key performance indicators to measure program and response readiness, and lead the development, implementation, and continuous improvement of incident response strategies, policies, and procedures to advance and sustain operational excellence.  7. Identify skill requirements for SOC personnel based on evolving threat landscapes and organizational goals. Conduct regular skill gap assessments to evaluate current capabilities and future needs, design and implement targeted training and skill development programs to strengthen technical competencies, enhance incident response readiness, and support overall security objectives. 8. Advise senior leadership on security initiatives, lead strategic projects, and serve as a key resource on emerging threats and cyber risk. Contribute to incident response readiness, enterprise risk mitigation, and cybersecurity awareness across the organization. 9. Perform cyber defense and threat activity trend analysis and reporting to inform IT operations and senior management; prepare and deliver threat and target briefings; and maintain a continuously updated situational overview of incidents throughout their lifecycle to support timely, actionable risk-based decision-making. 10. Plan and facilitate scenario-based tabletop exercises to evaluate the effectiveness of the Incident Response Plan and IR team performance. Coordinate cross-functional participation, assess response actions, identify gaps, and document lessons learned. Deliver post-exercise reports with actionable recommendations and present findings to leadership to drive continuous improvement. 11. Drive the development of advanced threat detection capabilities using SIEM, UEBA, and related security tools to generate high-confidence, actionable alerts for potential malicious or non-compliant activity; develop and optimize detection logic, threat hunting queries, and compliance monitoring use cases to support continuous visibility and proactive risk identification across the environment. 12. Lead the creation of actionable post-mortem reports following security incidents, detailing attacker tactics and techniques, root cause analysis, impact assessments, and other key findings, providing insights to support continuous improvement and reduce future risk. 13. Design and implement enhancements to improve the identification of adversarial tactics, techniques, and procedures (TTPs) and techniques, integrate external and internal observations to develop actionable threat models, and identify potential exposures, and provide strategic remediation recommendations to leadership and collaborate with cross-functional teams to drive effective risk-based defense prioritization. 14. Work outside of regular business hours when necessary. 15. Other duties as assigned.  The above statements describe the general nature and level of work only. They are not an exhaustive list of all required responsibilities, duties, and skills.  Other duties may be added, or this job description amended at any time.  SUPERVISORY RESPONSIBILITIES * Lead and manage team through training, developing, and coaching associates on a consistent basis. * Encourage others to set challenging goals and high standards of performance. * Inspire associates to define new opportunities and continuously improve the organization. * Celebrate and reward significant achievements of associates. * Present logical and persuasive case for proposals and positions. * Assist team in addressing their individual strengths and development needs.  QUALIFICATIONS Education/Certification: Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related discipline; or the equivalent of combined education and relevant work experience. Advanced degrees in cybersecurity can substitute work experience on a year-for-year basis. Professional certifications through ISC(2), ISACA, GIAC, OffSec are preferred. Required Knowledge:         Management, operational planning processes, decision-making policies and procedures, skill development principles and practices. Adversarial tactics, cyber-attack and exploitation tools and techniques (including network exploitation), data exfiltration methods, and insider attack patterns to effectively anticipate, detect, and counter malicious activities. Analytical, data analysis, and information searching tools and techniques, along with working proficiency in security information and event management (SIEM) and event correlation methods to accurately detect, analyze, and respond to security incidents.  Threat modeling tools and techniques, including MITRE ATT&K and the Cyber Kill Chain, to identify gaps in safeguards. Cybersecurity principles and practices—including data integrity, operations security (OPSEC), network security, access control, data encryption, adversarial tactics, threat remediation, and the principle of defense-in-depth. Threat intelligence requirement analysis, collections planning, and maintenance principles and practices used to derive actionable security insights.  Cybersecurity threats, vulnerabilities, and threat characteristics—including system and network attack vectors, malware, filename extension abuse, and web application security risks. Strong understanding of:  Research methods, including OSINT, penetration testing, and vulnerability assessment used to identify and analyze potential security exposures. Cloud service models, web security principles and practices, and network communications and computer networking principles, including network addressing, configurations, digital communication systems, and associated protocols and endpoints, to ensure secure network environments. Client/server architecture, operating systems and software, encryption algorithms (including their capabilities and applications), and authentication/authorization tools and techniques. Familiarity with:   Malware analysis principles, to identify, investigate, and mitigate malicious software threats Experience Required:         Minimum of 3 years of experience in security operations, cyber defense, offensive security, or incident management roles, with a proven focus on designing and implementing detection and mitigation processes to counter cybersecurity threats effectively. Experience with managing or supervising small, focused teams. Proven working knowledge of enterprise-level security technologies—including SIEM, UAM (User Activity Monitoring) platforms, IPS/IDS, EDR/XDR, NGFW, and related tools—with the ability to evaluate, enhance, and expand their use to support effective incident detection, investigation, and response. Practical experience with common cybersecurity frameworks such as NIST CSF, MITRE ATT&CK, Cyber Kill Chain, SANS Incident Response, NIST SP800-61, etc. Demonstrated ability to successfully execute initiatives in complex and highly regulated environments. Banking or financial services industry experience is a plus. Skills/Abilities:                              Navigating a fast-paced, highly regulated environments by applying critical thinking, establishing priorities, and tailoring complex information for diverse audiences. Effectively communicating, collaborating, and building strong relationships with internal and external stakeholders to achieve organizational objectives. Anticipating threats, leading incident response processes, and recognizing behavioral patterns to detect and mitigate potential security risks.   Competencies in mitigating cognitive biases, extrapolating from incomplete data sets, and performing comprehensive data analyses to derive actionable insights.  Managing a workforce and coordinating cybersecurity operations across an organization, and assessing effects generated during and after cyber operations. Forecasting requirements and assessing partner and internal operations capabilities. Integrating organization objectives, and creating, implementing, and monitoring processes and procedures. Determining information requirements, developing intelligence collection strategies, evaluating the feasibility and utility of intelligence collection sources, and developing, creating, and maintaining intelligence collection plans. Conducting requirements, capability, data structure, and trend analysis; developing analytics; and performing risk, security, cyber readiness, and impact assessments. Experienced in evaluating data source quality and preparing briefings and readiness reports. Collecting and performing network traffic and packet-level analysis to identify network threats, protect against malware, and conduct intrusion data analysis.   Gathering and querying data from diverse sources—including open-source and metadata extraction—correlating information across multiple tools and conducting thorough research.  Developing and analyzing large data sets to develop unique threat detections and security insights.  Recognizing and categorizing vulnerabilities, identifying malware threats, and effectively containing malware to protect systems and data.   Detecting host- and network-based intrusions, identifying insider threats, recognizing recurring threat incidents, uncovering filename extension abuse, spotting anomalous activity, and interpreting digital forensics data to maintain a robust security posture. Management, operational planning processes, decision-making policies and procedures, skill development principles and practices. PHYSICAL ACTIVITIES AND REQUIREMENTS OF THIS POSITION TALKING: Especially where one must frequently convey detailed or important instructions or ideas accurately, loudly, or quickly. AVERAGE HEARING: Able to hear average or normal conversations and receive ordinary information. REPETITIVE MOTION: Movements frequently and regularly required using the wrists, hands, and/or fingers. AVERAGE VISUAL ABILITIES: Average, ordinary, visual acuity necessary to prepare or inspect documents or products, or operate machinery. PHYSICAL STRENGTH: Sedentary work; sitting most of the time. Exerts up to 10 lbs. of force occasionally. (Almost all office jobs.) WORKING CONDITIONS NONE: No hazardous or significantly unpleasant conditions (such as in a typical office). MENTAL ACTIVITIES AND REQUIREMENTS OF THIS POSITION REASONING ABILITY: Ability to apply logical or scientific thinking to define problems, collect data establish facts and draw conclusions. Able to interpret a variety of technical instructions and deal with multiple variables. MATHEMATICS ABILITY: Understanding of concepts such as probability, statistics, and basic algebra. LANGUAGE ABILITY: Ability to read periodicals, journals, manuals, dictionaries, thesauruses, and encyclopedias. Ability to prepare business letters, proposals, summaries, and reports using prescribed format and conforming to all rules of punctuation, grammar, diction, and style. Ability to conduct training, communicates Hours: Monday - Friday 8:00AM - 5:00PM. 40 hours per week
Responsibilities
The SOC Manager is responsible for leading the security operations team to identify, classify, and respond to cybersecurity incidents while enhancing threat detection capabilities. They also advise senior leadership on security initiatives and drive strategic projects to improve the organization's overall risk mitigation and incident response readiness.
Information Security SOC Manager - Sugar Land or Lubbock at PROSPERITY BANK
Lubbock, Texas, United States - Full Time
Skills Needed
Cybersecurity, Incident Response, Threat Detection, Siem, Risk Management, Team Leadership, Vulnerability Assessment, Network Security, Threat Intelligence, Mitre Att&Ck, Cyber Kill Chain, Edr, Xdr, Ngfw, Malware Analysis, Compliance Monitoring
Specialization
Candidates must have at least 3 years of experience in security operations or incident management and a bachelor's degree in a related field. Proficiency in enterprise security technologies like SIEM, EDR, and XDR, along with knowledge of cybersecurity frameworks such as NIST and MITRE ATT&CK, is required.
Experience Required
Minimum 2 year(s)
Information Security Architect at Unit4-Australia
Krakow, Lesser Poland Voivodeship, Poland - Full Time
Skills Needed
Security Architecture, Cloud Security, Azure, Identity And Access Management, Zero Trust, Devsecops, Ci/Cd, Kubernetes, Network Security, Endpoint Protection, Risk Management, Security Governance, Threat Detection, Microsoft 365, Entra Id, Iac
Specialization
Candidates must possess 7-10+ years of experience in IT or cybersecurity, including at least 3 years in a dedicated security architecture role, with deep expertise in Azure cloud security and modern enterprise platforms. Essential qualifications include relevant certifications like CISSP or Microsoft Certified: Cyber security Architect Expert, and demonstrated ability to deliver Zero Trust concepts in production environments.
Experience Required
Minimum 10 year(s)
Information Security Architect at Unit4-Australia
Wrocław, Lower Silesian Voivodeship, Poland - Full Time
Skills Needed
Information Security, Cloud Security, Identity Management, Endpoint Protection, Devsecops, Zero Trust, Microsoft Security Technologies, Security Architecture, Risk Management, Compliance, Saas, Infrastructure Security, Threat Detection, Governance, Automation, Consulting
Specialization
Candidates should have 7-10+ years of experience in IT or cybersecurity, with at least 3 years in a dedicated security architecture role. Relevant industry certifications and deep technical expertise across cloud and security technologies are essential.
Experience Required
Minimum 10 year(s)
Technical Information Engineer at BAE Systems
London, England, United Kingdom - Full Time
Skills Needed
Xml, Sgml, Technical Documentation, Ils Disciplines, Communication, Data Modules Authoring, Engineering Data Interpretation, Design Drawings Interpretation, Quality Review, Technical Authoring, Rtx Eagle, Ptc Arbortext, Adobe Framemaker
Specialization
Candidates must possess a STEM degree or equivalent experience, along with prior experience in an Engineering environment and knowledge of technical documentation or ILS disciplines. Desirable skills include exposure to XML/SGML and experience with specific authoring tools like PTC Arbortext.
Experience Required
Minimum 2 year(s)
Health Information Technician I at State of Oklahoma
Taft, Oklahoma, United States - Full Time
Skills Needed
Medical Records Maintenance, Medical Terminology, Data Entry, Report Writing, Record Auditing, Compliance Monitoring, Statistical Reporting, Computer Literacy, Communication, Scheduling, Documentation Management, Patient Data Abstraction, Confidentiality, Medical Coding
Specialization
Candidates must be eligible for accreditation as a Registered Health Information Technician or possess two years of experience working with patient records in a medical setting. Proficiency in medical terminology and record maintenance methods is required.
Information Security Consultant at Inetum
Lisbon, , Portugal - Full Time
Skills Needed
Information Security, Cybersecurity, Iso 20000 1, Iso 27001, Pci Dss, Soc Type 1, Soc Type 2, Nis2, Dora, Risk Assessments, Audits, Business Continuity Plans, Analytical Capability, Methodological Rigor, Communication
Specialization
Candidates must have a minimum of 2 years of experience implementing standards like ISO 20000, ISO 27001, PCI DSS, and SOC Type 2, alongside strong analytical and structuring abilities. The role requires autonomy, organizational rigor, and comfort communicating with both technical and non-technical teams.
Information Systems Specialist at Eitan Medical
Netanya, Center District, Israel - Full Time
Skills Needed
Sap Bydesign, Salesforce, Sql, Azure Data Factory, Python, Power Bi, Requirements Gathering, System Implementation, Business Process Improvement, User Training, Functional Specifications, System Support, Configuration
Specialization
Candidates must have 3+ years of experience with SAP ERP systems, preferably SAP ByDesign, and proven experience leading full-cycle module or business process implementations. A Bachelor's degree in a relevant field is required, along with a hands-on, proactive approach and excellent communication skills for global collaboration.
Experience Required
Minimum 2 year(s)
Information Security Consultant at Vanquis
London, England, United Kingdom - Full Time
Skills Needed
Information Security Advice, Security Assessments, Control Gaps Identification, Risk Management, Security Controls Implementation, Policy Compliance, Stakeholder Engagement, Supplier Evaluation, Iso 27001, Nist, Cis, Owasp, Soc 2, Aws, Azure, Communication
Specialization
Candidates must have proven experience in an Information Security function, ideally in an enterprise environment, with a strong understanding of cybersecurity standards like ISO 27001, NIST, and cloud technologies such as AWS and Azure. Excellent communication skills and a pragmatic, analytical mindset are required to assess complex issues and recommend practical solutions.
Experience Required
Minimum 5 year(s)
Information Systems Technician at Hillsboro Area Hospital Inc
Hillsboro, Illinois, United States - Full Time
Skills Needed
Hardware Setup, Troubleshooting, Server Support, Peripheral Equipment Support, Cpsi System Support, User Training, Network Setup, Backup Management, Software Installation, User Support, Data Processing Equipment Operation, Vendor Communication, Network Configuration, Security Monitoring, Network Administration, Virtual Desktop Support
Specialization
Candidates need a minimum of 2 years of computer experience with proficiency in multiple applications, including Microsoft Office, preferably within a healthcare environment. A preferred educational background is a graduate degree (BA or BS) with an emphasis in Computer Science or a related field, alongside detailed knowledge of PC/mainframe hardware and software.
Information Security Specialist at Sherpa 6
Springfield, Virginia, United States - Full Time
Skills Needed
Vulnerability Management, Incident Response, Microsoft Defender, Microsoft Intune, Microsoft Purview, Siem, Log Aggregation, Endpoint Security, Change Management, Stigs, Cis Benchmarks, Nist 800 171, Nist 800 53, Rmf, Cmmc, Cybersecurity
Specialization
Candidates must have a bachelor's degree in a related field and 3–5 years of experience in cybersecurity operations. Proficiency with Microsoft security technologies and experience in enterprise environments are required.
Experience Required
Minimum 2 year(s)
Information Security Specialist at Sherpa 6
Spring Lake, North Carolina, United States - Full Time
Skills Needed
Vulnerability Management, Incident Response, Microsoft Defender, Microsoft Intune, Microsoft Purview, Siem, Log Aggregation, Endpoint Security, Compliance, Audit Readiness, Stigs, Cis Benchmarks, Nist 800 171, Change Management, Threat Detection, Identity Systems
Specialization
Candidates must hold a bachelor's degree in a relevant field and possess 3–5 years of experience in cybersecurity operations. Proficiency with Microsoft security technologies and experience in enterprise environment security management are required.
Experience Required
Minimum 2 year(s)
Information Security Specialist at Sherpa 6
, Florida, United States - Full Time
Skills Needed
Vulnerability Management, Incident Response, Microsoft Defender, Microsoft Intune, Microsoft Purview, Siem, Log Aggregation, Endpoint Security, Change Management, Audit Readiness, Stigs, Cis Benchmarks, Nist 800 171, Cmmc, Threat Detection, System Administration
Specialization
Candidates must hold a bachelor's degree in a relevant field and possess 3–5 years of experience in cybersecurity operations. Proficiency with Microsoft security technologies, vulnerability management, and enterprise system security is required, along with the ability to obtain a Secret clearance.
Experience Required
Minimum 2 year(s)
Information Security Specialist at Sherpa 6
Littleton, Colorado, United States - Full Time
Skills Needed
Vulnerability Management, Incident Response, Microsoft Defender, Microsoft Intune, Microsoft Purview, Siem, Log Aggregation, Endpoint Security, Compliance, Stigs, Cis Benchmarks, Nist 800 171, Change Management, Audit Readiness, Threat Detection, System Administration
Specialization
Candidates must hold a bachelor's degree in a relevant field and possess 3–5 years of experience in cybersecurity operations. Proficiency with Microsoft security technologies and experience managing Windows and Linux systems in an enterprise environment are required.
Experience Required
Minimum 2 year(s)
Information Systems Technician at Daigle Oil Company
Fort Kent, Maine, United States - Full Time
Skills Needed
Information Systems Management, Data Accuracy, System Back Ups, Preventative Maintenance, Security Compliance, Web Presence Management, Email Administration, Peripheral Equipment Support, Vmware, Microsoft Office 365, Microsoft Active Directory
Specialization
Candidates should possess an Associate degree or at least three years of relevant experience. Proficiency in VMware, Microsoft Office 365, and Microsoft Active Directory is considered a plus.
Experience Required
Minimum 2 year(s)
Information Operations Planner at Obsidian Solutions Group LLC
Twentynine Palms, California, United States - Full Time
Skills Needed
Information Operations, Military Planning, Intelligence Analysis, Electronic Warfare, Cyber Operations, Military Decision Making Process, Doctrine Development, Training Program Management, Public Affairs, Operations Security, Military Information Support Operations, Civil Military Operations, Instructional Design, Staff Coordination, All Source Intelligence, Joint Operation Planning
Specialization
Candidates must have extensive experience in intelligence or information operations, including a background in military planning and doctrine. A formal military Information Operations school graduation and professional military education are required, along with the ability to obtain and maintain a Top Secret security clearance.
Experience Required
Minimum 5 year(s)
Information Security Consultant at Vanquis
London, England, United Kingdom - Full Time
Skills Needed
Information Security Advice, Security Control Implementation, Security Assessments, Risk Management, Compliance Assurance, Stakeholder Engagement, Iso 27001, Nist, Cis, Owasp, Soc 2, Aws Security, Azure Security, Communication, Analytical Mindset, Pragmatic Mindset
Specialization
Candidates must have proven experience in an Information Security function, ideally in an enterprise environment, with a strong understanding of major cybersecurity standards like ISO 27001, NIST, and CIS. Essential skills include knowledge of cloud technologies (AWS/Azure) and excellent communication abilities to engage effectively with technical and business stakeholders.
Experience Required
Minimum 2 year(s)
Extrajobb som informationsvärd at Submit Bemanning
Nacka kommun, Stockholm, Sweden - Full Time
Skills Needed
Swedish Language, Customer Service, Communication, Mobile App Proficiency, Interpersonal Skills
Specialization
Candidates must speak Swedish and be social, friendly, and service-oriented. Ability to use a smartphone without difficulty is required.
Information Security Architect at AJ Bell
London, England, United Kingdom - Full Time
Skills Needed
Security Best Practice, Enterprise Security Controls, Security Standards, Security Reviews, Audit Support, Due Diligence, Endpoint Security, Cloud Security, Network Security, Devops Security, Security Monitoring, Ssdlc Practices, Risk Management, Grc, Iso27001, Nist
Specialization
Candidates should have experience implementing enterprise security platforms, strong knowledge across various security domains like endpoint, cloud, and network security, and an understanding of secure software development lifecycle practices. A minimum of 5+ years in information security, preferably in financial services or e-commerce, along with strong communication skills, is required.
Experience Required
Minimum 5 year(s)
Management Information Analyst at Adler & Allan
Leeds, England, United Kingdom - Full Time
Skills Needed
Analytical Skills, Numerical Skills, Data Analysis, Reporting, Dashboard Development, Data Quality, Stakeholder Engagement, Communication, Excel, Power Bi, Tableau, Sql, Data Modelling, Performance Measurement, Forecasting, Scenario Analysis
Specialization
Candidates should possess strong analytical and numerical skills, experience in producing MI reports, and proficiency in Excel and BI tools. A degree in a related field is required, with additional qualifications in analytics or BI being beneficial.
Experience Required
Minimum 2 year(s)
Information Governance Officer at GlobeMed Group
Sinn El Fil, Mount Lebanon Governorate, Lebanon - Full Time
Skills Needed
Information Security Risk Management, Iso 27001, Information Security Awareness Training, Business Continuity Planning, Disaster Recovery Planning, Risk Assessments, Risk Register Management, Control Verification, Internal Audits, External Audits, Security Incident Handling, Security Standards Knowledge, Security Vulnerability Tools, Information Security Management System (Isms)
Specialization
Candidates must hold a Bachelor's Degree in communication engineering, computer science, or information systems, coupled with over 3 years of experience in a security-related field. A CISSP or CISM security certification is required, along with hands-on experience using security vulnerability tools.
Experience Required
Minimum 2 year(s)
Loading...