14 Cybersecurity jobs in Bahrain
Cybersecurity Trainer
Posted 4 days ago
Job Viewed
Job Description
Think Smart, Bahrain
Minimum of 5 years of experience working in a cybersecurity role with Experience in delivering cybersecurity training programs or consulting services to clients is a (MUST)
This is a full-time on-site role located in Manama as a Cybersecurity Trainer.
As a Cybersecurity Trainer, you will be responsible for designing and delivering cybersecurity training programs to individuals and organizations in the Gulf region. You will play a key role in empowering individuals to build their technical knowledge and skills and have a significant impact on their own professional success as well as their organization's security.
Job SpecificationResponsibilities:
• Develop and deliver engaging and impactful training programs, including lectures, practical exercises, and simulations, aligned with industry best practices and current cybersecurity threats.
• Assess student learning through various methods, including exams, projects, and practical tasks.
• Provide effective feedback and guidance to students to help them improve their skills and knowledge.
• Stay up to date on the latest cybersecurity trends, vulnerabilities, and attack vectors.
• Collaborate with other trainers and course developers to enhance the training curriculum and learning experience.
• Maintain a positive and professional learning environment in the classroom and online.
Qualifications:
• Bachelor's degree in Cybersecurity, Computer Science, or a related field is required.
• Industry certifications such as CISSP, CEH, CISA, CISM, or Security+ preferred
• Minimum of 5 years of experience working in a cybersecurity role with Experience in delivering cybersecurity training programs or consulting services to clients is a (MUST)
• Demonstrated expertise in advanced cybersecurity concepts and technologies, including threat intelligence, vulnerability management, incident response, and penetration testing.
• Excellent written and verbal communication skills, with the ability to explain complex concepts to non-technical audiences.
• Experience in developing or curating content for training programs.
• Strong communication and presentation skills with the ability to effectively engage and motivate diverse audiences.
• Willingness to travel within the region to conduct training sessions.
Information Technology and Services - Al Manama, Bahrain
mustakbil.com asks for your consent to use your personal data to:perm_identity
- perm_identity Personalised advertising and content, advertising and content measurement, audience research and services development
- devices Store and/or access information on a device
Data preferences
You can choose how your personal data is used. Vendors want your permission to do the following:
Store and/or access information on a deviceAdvertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are (or have been) interacting with (for example, to limit the number of times an ad is presented to you).
Create profiles for personalised advertisingInformation about your activity on this service (such as forms you submit, content you look at) can be stored and combined with other information about you (for example, information from your previous activity on this service and other websites or apps) or similar users. This is then used to build or improve a profile about you (that might include possible interests and personal aspects). Your profile can be used (also later) to present advertising that appears more relevant based on your possible interests by this and other entities.
Use profiles to select personalised advertisingAdvertising presented to you on this service can be based on your advertising profiles, which can reflect your activity on this service or other websites or apps (like the forms you submit, content you look at), possible interests and personal aspects.
Information about your activity on this service (for instance, forms you submit, non-advertising content you look at) can be stored and combined with other information about you (such as your previous activity on this service or other websites or apps) or similar users. This is then used to build or improve a profile about you (which might for example include possible interests and personal aspects). Your profile can be used (also later) to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests.
Use profiles to select personalised contentContent presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services (for instance, the forms you submit, content you look at), possible interests and personal aspects. This can for example be used to adapt the order in which content is shown to you, so that it is even easier for you to find (non-advertising) content that matches your interests.
Information regarding which advertising is presented to you and how you interact with it can be used to determine how well an advert has worked for you or other users and whether the goals of the advertising were reached. For instance, whether you saw an ad, whether you clicked on it, whether it led you to buy a product or visit a website, etc. This is very helpful to understand the relevance of advertising campaigns.
Measure content performanceInformation regarding which content is presented to you and how you interact with it can be used to determine whether the (non-advertising) content e.g. reached its intended audience and matched your interests. For instance, whether you read an article, watch a video, listen to a podcast or look at a product description, how long you spent on this service and the web pages you visit etc. This is very helpful to understand the relevance of (non-advertising) content that is shown to you.
Understand audiences through statistics or combinations of data from different sourcesReports can be generated based on the combination of data sets (like user profiles, statistics, market research, analytics data) regarding your interactions and those of other users with advertising or (non-advertising) content to identify common characteristics (for instance, to determine which target audiences are more receptive to an ad campaign or to certain contents).
Develop and improve servicesInformation about your activity on this service, such as your interaction with ads or content, can be very helpful to improve products and services and to build new products and services based on user interactions, the type of audience, etc. This specific purpose does not include the development or improvement of user profiles and identifiers.
Use limited data to select contentContent presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type, or which content you are (or have been) interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errorsYour data can be used to monitor for and prevent unusual and possibly fraudulent activity (for example, regarding advertising, ad clicks by bots), and ensure systems and processes work properly and securely. It can also be used to correct any problems you, the publisher or the advertiser may encounter in the delivery of content and ads and in your interaction with them.
Deliver and present advertising and contentCertain information (like an IP address or device capabilities) is used to ensure the technical compatibility of the content or advertising, and to facilitate the transmission of the content or ad to your device.
Match and combine data from other data sourcesInformation about your activity on this service may be matched and combined with other information relating to you and originating from various sources (for instance your activity on a separate online service, your use of a loyalty card in-store, or your answers to a survey), in support of the purposes explained in this notice.
In support of the purposes explained in this notice, your device might be considered as likely linked to other devices that belong to you or your household (for instance because you are logged in to the same service on both your phone and your computer, or because you may use the same Internet connection on both devices).
Identify devices based on information transmitted automaticallyWith your acceptance, your precise location (within a radius of less than 500 metres) may be used in support of the purposes explained in this notice.
Vendors can use your data to provide services. Declining a vendor can stop them from using the data you shared.
Exponential Interactive, Inc d/b/a VDX.tvData collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Privacy choices, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, User-provided data, Browsing and interaction data, Privacy choices, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: Non-precise location data, Browsing and interaction data, Device characteristics
Data collected and processed: IP addresses, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Browsing and interaction data, Privacy choices, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Privacy choices, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Device characteristics, Device identifiers
Data collected and processed: Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: Users’ profiles
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Privacy choices, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Privacy choices, Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Integral Ad Science (incorporating ADmantX)Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device identifiers, Precise location data
Data collected and processed: Non-precise location data
Data collected and processed: IP addresses, Non-precise location data, User-provided data, Browsing and interaction data, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Device characteristics
Data collected and processed: IP addresses, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: Device characteristics
Data collected and processed: IP addresses, Non-precise location data
Data collected and processed: IP addresses, Device characteristics
Data collected and processed: IP addresses, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device identifiers
Adobe Audience Manager, Adobe Experience PlatformData collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Privacy choices, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data
Data collected and processed: IP addresses, Users’ profiles, Browsing and interaction data, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, User-provided data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Privacy choices, Device identifiers
Data collected and processed: IP addresses, Browsing and interaction data, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Probabilistic identifiers, Device identifiers
Data collected and processed: IP addresses, Non-precise location data
Data collected and processed: IP addresses
Data collected and processed: IP addresses, Non-precise location data, Users’ profiles, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: IP addresses, Non-precise location data, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers, Authentication-derived identifiers
Data collected and processed: Device identifiers
Data collected and processed: IP addresses, Browsing and interaction data, Privacy choices, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Privacy choices, Device characteristics
Data collected and processed: IP addresses, Non-precise location data, Browsing and interaction data, Device characteristics, Probabilistic identifiers, Device identifiers, Precise location data, Authentication-derived identifiers
Marketing Science Consulting Group, Inc. #J-18808-LjbffrCybersecurity Lead
Posted 4 days ago
Job Viewed
Job Description
a. Primary role: Support the department in overseeing the development and maintenance of the project’s cybersecurity architecture; leading or assisting in the implementation and management of cybersecurity solutions; implementing, monitoring, and maintaining cybersecurity operational processes; and producing reports for the assessment and functioning of security operations.
b. Job description:
- Provide department with an independent assessment of the adequacy, effectiveness and sustainability of security operations work and follow-up with the IT Teams and other Business Units to develop action plans to mitigate identified vulnerabilities and promote security initiatives.
- Define and evaluate security technologies required to ensure safe technology operation and detection of cyber-attack.
- Provide security recommendations on actions which assist in improving security posture within the environment.
- Ensure that necessary changes to security policy documentation are incorporated as directed by the Head of department.
- Work in partnership with other Information Security and IT staff to ensure key security controls are working as intended, recommending improvements where appropriate.
- Work with the business and IT to specify cybersecurity controls and convey security control requirements to users and information custodians.
- Collaborate with security organization team members to assess and analyze security operations and suggest improvements.
c. Qualifications:
- Bachelor's or Master’s degree in Computer Science, Engineering, Information Technology, or related fields is required.
- Minimum of five (5) years of experience in IT/Security operations or Security Operations Center role.
- Display good knowledge of the recognized information security domains: Access Controls, Application Security, Cryptography, Risk Management, Compliance and Investigations, Operations Security, Physical Security, Security Architecture and Telecommunication.
- Good knowledge of the NIST CyberSecurity framework & Cyber Security requirements within Bahraini Government.
- Proficient in development of cyber security strategies, policies and procedures.
- Proficient in performing security risk assessments & maturity assessments.
- Experience in performing security awareness & security audits.
- Holds an Information/cybersecurity related certification: CISSP - The Certified Information Systems Security Professional; CISM - Certified Information Security Manager; GIAC - Global Information Assurance Certification; or CEH - Certified Ethical Hacker.
- Network+, CIHE, CCNA R&S, SSCP, Security +, CySA+, Linux security, windows security or forensics training is a plus.
Preferred candidate with valid Bahraini driving license. Candidate must be present in Bahrain at the time of application. Interested candidates can send their CVs to
#J-18808-LjbffrCybersecurity Engineer
Posted 16 days ago
Job Viewed
Job Description
• Conduct red teaming, penetration testing, and ethical hacking to identify security weaknesses.
• Use tools like Metasploit, Burp Suite, Nessus, and Kali Linux for security assessments.
• Perform code reviews, application security testing, and exploit development.
• Monitor, analyze, and respond to security events using SIEM tools (Splunk, QRadar, etc.).
• Investigate security incidents and conduct forensic analysis.
• Implement and improve intrusion detection and prevention systems (IDS/IPS).
• Work with SOC teams to enhance threat detection capabilities.
• Secure AWS environments, ensuring adherence to best security practices (IAM, VPC, Security Groups, etc.)
• Conduct cloud security assessments and compliance reviews (CIS, NIST, ISO 27001).
• Identify and mitigate network vulnerabilities, firewall misconfigurations, and security gaps.
• Ensure compliance with ISO 27001, NIST, GDPR, and other regulatory standards.
• Assist in risk assessments, audits, and security awareness training.
• Develop and enforce security policies and procedures.
• Bachelor’s or master’s degree in Cybersecurity, Computer Science, or a related field.
• 2+ years of experience in cybersecurity roles (SOC, pentesting, cloud security, etc.) or Fresh high GPA (1st or 2nd honor) (2 months internship must be passed).
• Expertise in SIEM solutions (Splunk, QRadar, or similar).
• Strong understanding of AWS security, IAM, VPC, and cloud security best practices.
• Hands-on experience with penetration testing, ethical hacking, and exploit development.
• Proficiency in scripting (Python, Bash, PowerShell) for automation and threat analysis.
• Strong knowledge of network protocols, firewalls, and security architectures.
Name *
Email *
Resume/CV *
Additional Information
#J-18808-LjbffrCybersecurity Lead
Posted today
Job Viewed
Job Description
a. Primary role: Support the department in overseeing the development and maintenance of the
project’s cybersecurity architecture; leading or assisting in the implementation and
management of cybersecurity solutions; implementing, monitoring, and maintaining
cybersecurity operational processes; and producing reports for the assessment and
functioning of security operations
b. Job description:
i. Provide department with an independent assessment of the adequacy, effectiveness and
sustainability of security operations work and follow-up with the IT Teams and
other Business Units to develop action plans to mitigate identified vulnerabilities
and promote security initiatives.
ii. Define and evaluate security technologies required to ensure safe technology
operation and detection of cyber-attack
iii. Provide the security recommendations on actions which assist in improving
security posture within environment
iv. Ensure that necessary changes to security policy documentation are
incorporated as directed by the Head of department
Work in partnership with other Information Security and IT staff to ensure key
security controls are working as intended, recommending improvements where
appropriate
vi. Work with the business and IT to specify cybersecurity controls and convey
security control requirements to users and information custodians
vii. Collaborate with security organization team members to assess and analyze
security operations and suggest improvements
c. Qualifications:
i. Bachelor's or Master’s degree in Computer Science, Engineering, Information
Technology, or related fields is required
ii. Minimum of five (5) years of experience in IT/Security operations or Security
Operations Center role
iii. Display good knowledge of the recognized information security domains: Access
Controls, Application Security, Cryptography, Risk Management, Compliance and
Investigations, Operations Security, Physical Security, Security Architecture and
Telecommunication
iv. Good knowledge of the NIST CyberSecurity framework & Cyber Security
requirements within Bahraini Government
v. Proficient in development of cyber security strategies, policies and procedures
vi. Proficient in performing security risk assessments & maturity assessments
vii. Experience in performing security awareness & security audits
viii. Holds an Information/cybersecurity related certification: CISSP - The Certified
Information Systems Security Professional; CISM - Certified Information Security
Manager; GIAC - Global Information Assurance Certification; or CEH - Certified
Ethical Hacker
ix. Network+, CIHE, CCNA R&S, SSCP, Security +, CySA+, Linux security, windows
Security or forensics training is a plus
**Salary**: From BD400.000 per month
Ability to commute/relocate:
- Manama: Reliably commute or planning to relocate before starting work (required)
Chief Cybersecurity Officer
Posted 18 days ago
Job Viewed
Job Description
Not just a job, but a career · Yokogawa, award winner for 'Best Asset Monitoring Technology' and 'Best Digital Twin Technology' at the HP Awards, is a leading provider of industrial automation, test and measurement, information systems and industrial services in several industrie .
Job Title: Chief Information Security Officer (CISO) · We are seeking a strategic and hands-on CISO to lead our Information Security, Data Governance, IT Risk Management, and Cybersecurity functions in line with Bahrain's regulatory and legal framework. · The ideal candidate brin .
Xerox - Business International Group | Recruitment & Onboarding · We are seeking a results-driven ICT Sales Executive to actively pursue and engage customer prospects. · Identify and develop new business opportunities for ICT solutions (hardware, software, cloud, networking, cybe .
Raffles Hotels & Resorts invites applications for the IT Assistant role. · This is an exciting opportunity to join our team in Bahrain. · Key Responsibilities: · Provide first-level support for all IT-related issues (hardware, software, networks, etc.) · Assist in maintaining and .
Technical Product Marketing Manager - Cybersecurity · Summary: · We are seeking a Technical Product Marketing Manager with deep technical understanding and strategic marketing skills to develop go-to-market plans for our security and compliance portfolio. · About Us · Canonical i .
About Raffles Al Areen Palace Bahrain · An ultra-luxury property offering a unique experience as The Palace of the Secret Garden. · With 78 private pool villas ranging from 1 to 3 bedrooms, we redefine luxury hospitality in Bahrain. · Our spacious villas, starting from 400 sqm, f .
Canonical is a leading provider of open source software and operating systems to the global enterprise and technology markets. Our platform, Ubuntu, is very widely used in breakthrough enterprise initiatives such as public cloud, data science, AI, engineering innovation, and IoT. .
Job Title: IT Service Desk Agent · Company: Arengy, a Digital and Cybersecurity Consulting Company operating in the Middle East from Dubai. · Arengy partners with leading industry leaders executing projects globally. We are currently seeking an IT Service Desk Agent to join our t .
The New Core Centre of Excellence Lead will oversee the strategic, governance, and technical aspects of the New Core (i.e., Temenos) and its ecosystem within Arab Banking Corporation. This role will manage the end-to-end delivery, optimization, integration, and ongoing evolution .
Job Description · At Sawdey Solution Services, we are seeking a highly skilled professional to support our technical functional task area in the areas of Hull, Mechanical, and Electrical (HM&E), Combat Systems, Aviation, and Data, Cyber, and Information Systems. This position req .
Job Description · Position Overview · We are seeking an experienced engineer to support our technical functional task area in the areas of hull, mechanical, and electrical (HM&E), combat systems, and aviation and data, cyber, and information systems. · Main Responsibilities · Ana .
Not Just a Job, But a Career · Yokogawa is a leading provider of industrial automation, test and measurement, information systems, and industrial services in various industries. · We are committed to shaping a better future for our planet by supporting the energy transition, (bio .
Cyber Security Engineer III Job Description · Apply expert knowledge of DoD cybersecurity policies, military system specifications, and computer security best practices to secure Navy systems. · Responsibilities: · Implement Risk Management Framework (RMF), including boundary def .
Chief Cybersecurity Officer - Manama - beBeeSecuritybeBeeSecurity Manama
منذ أسبوع
Job DescriptionWe are seeking an expert to lead our cybersecurity efforts. The ideal candidate will have a deep understanding of security protocols, cryptography, and network architecture.
This role requires a strong analytical mind and excellent communication skills. The successful candidate will be able to design and implement secure systems, conduct risk assessments, and develop mitigation strategies.
Key Skills and Qualifications- Proficiency in security protocols and cryptography
- Expertise in network architecture and security
- Strong analytical and problem-solving skills
- Excellent communication and interpersonal skills
- Ability to work independently and as part of a team
As a member of our team, you will enjoy a competitive salary and benefits package, including opportunities for professional development and growth.
Other InformationThe ideal candidate will have a Bachelor's degree in Computer Science or a related field, with a minimum of 7-10 years of experience in a similar role. A CISSP, CCSP, CEH, CCNP, AWS, Azure, Java, or Python certification would be an asset.
#J-18808-LjbffrCybersecurity Compliance Specialist
Posted today
Job Viewed
Job Description
- Review, update, and develop cyber security policies, procedures, and standards to align with industry best practices and regulatory requirements.
- Collaborate with cross-functional teams to implement and enforce cyber security policies and procedures effectively.
- Conduct regular assessments and testing to evaluate the effectiveness of implemented controls and identify areas for improvement.
- Prepare for and coordinate internal and external audits, ensuring compliance with applicable regulations and standards.
- Maintain documentation and evidence of compliance activities, including policies, procedures, test results, and audit reports.
- Provide guidance and support to teams on cyber security compliance matters, including training and awareness initiatives.
- Stay abreast of emerging cyber security threats, trends, and regulations to proactively address potential risks.
- Participate in incident response activities as needed, including investigations and remediation efforts.
- Collaborate with legal and regulatory compliance teams to ensure alignment between cyber security and overall compliance efforts.
**Requirements and Qualifications**:
- Bachelor's degree in Information Security, Computer Science, or related field; Master's degree preferred.
- Relevant industry certifications such as CISSP, CISM, CISA, or CRISC are highly desirable.
- Proven experience in developing, implementing, and managing cyber security policies and procedures.
- Strong understanding of regulatory requirements and standards such as GDPR, HIPAA, ISO 27001, NIST, etc.
- Experience coordinating and managing internal and external audits, including responding to audit findings and remediation activities.
- Excellent communication and interpersonal skills, with the ability to collaborate effectively with stakeholders at all levels of the organization.
- Strong analytical and problem-solving abilities, with a keen attention to detail.
- Ability to work independently and manage multiple priorities in a fast-paced environment.
- Familiarity with cyber security tools and technologies used for testing and monitoring purposes.
- Knowledge of risk management principles and methodologies.
- Prior experience in a compliance-focused role within the cyber security field is preferred.
Pay: BD900.000 per month
Application Question(s):
- Do you have a Bachelor’s degree in Information Security, Computer Science, or related field ?
**Experience**:
- related: 1 year (required)
Product & Solutions Management (Cloud, Cybersecurity) (Future Vacancy)
Posted 18 days ago
Job Viewed
Job Description
Business Unit: stc
Sector: Business
Location:
Contract Type: Full Time
Closing Date: 31-Dec-2024
General Information:This is a speculative position for candidates who would like to work in Product & Solutions Management (Cloud, Cybersecurity) roles for stc.
Please be informed that by submitting your details against this position, our Recruitment team may contact you if your application is suitable for our future roles.
The functional responsibilities related to the position will be provided or discussed with you during the shortlisting stage, by our Recruitment team.
Qualification & Experience:- Bachelor's degree in the relevant discipline
- Relevant work experience within the same field or industry
- Excellent command of the English language; Arabic will be an advantage
- Excellent interpersonal & communication skills
If you meet the criteria and you are enthusiastic about the role, we would welcome your application. To complete the application, you would need the following document(s):
#J-18808-LjbffrBe The First To Know
About the latest Cybersecurity Jobs in Bahrain !
Network Security Consultant
Posted today
Job Viewed
Job Description
- Cisco Security certified with good working experience in supporting Cisco ASA, FTD, ISE
- Good knowledge to support, maintenance and troubleshoot any incident and request with Palo alto, Fortigate firewalls
- Experience in supporting and strong knowledge on VPN technologies
- Good knowledge and troubleshooting skills with routing and switching protocols.
- Preparation of SOW, BOQ, LLD, Project plans.
- Able to work on security related projects independently.
**Job Types**: Full-time, Permanent, Contract
Application Question(s):
- Cisco Security certified with experience in supporting Cisco ASA, FTD, ISE ?
Network Security Engineer
Posted today
Job Viewed
Job Description
- Proactively monitor the Group’s global communications (GMPLS) infrastructure and ensure mínimal interruption.
- Monitor and administer the Bank’s Local Area Network (LAN)
- Administer and secure bank’s Wireless Network.
- Administer and manage the bank’s IP Telephony & video conferencing setup.
- Configure, maintain, and administer cloud network technologies in AWS and/or Azure.
- Manage and support global remote access and site-to-site Virtual Private Network (VPN)
- Manage and administer bank’s Firewall, including upgrades, reviewing rules, and deploying patches.
- Operational Management of Internet and Intranet services
- Install, configure, integrate, upgrade, and troubleshoot bank’s global network routers, local switches, and general network infrastructure.
- Troubleshoot and diagnose network issues swiftly and provide root cause analysis.
- Prepare network design/architecture for new Group offices globally and assist in procuring and implementing recommended network infrastructure.
- Provide adequate guidance to Network resources in Group offices with implementing security baselines and hardening Network devices.
- Proactively monitor network infrastructure to enhance performance and report any issues to Group Head of IT Infrastructure.
- Respond and address audit comments in a timely manner. Assist Group offices in addressing comments related to their local Network Infrastructure.
- Actively participate in the bank’s global Disaster Recovery test and provide Network topology recommendations to ensure smooth transition of bank services to DR systems.
- Prepare technical and user documentation for new network technologies once deployed.
- Provide technical assistance and support to Group IT staff & local IT teams.
- Liaise with vendors for communication / configuration, failures, and updates on Network Infrastructure.
with experience/knowledge in below technologies on Network & Security
- Firewalls
- VPN
- Routing
- Switching
- Cisco Wireless
- Proxy
- Cisco
- ISE
- AWS
- AZURE
- Network monitoring tools
- CUCM
ANALYST – AIRPORT SECURITY SYSTEMS
Posted 18 days ago
Job Viewed
Job Description
Company : Gulf Air Group
Division : Information Technology
Location : (Location)
Department : Information Technology
Closing Date : 18-Feb-2025
MAIN OBJECTIVETo architect, design, plan, implement and support all Safety and Security systems, as a technical expert in these areas, to provide the company with the necessary Safety and Security services to achieve its strategic objectives.
MAIN DUTIES- Monitor, maintain and support services, within specialism area, to ensure the security, integrity and access to these critical information assets by ICT's internal and external customers.
Monitor, manage and maintain solutions to ensure maximum uptime.
Perform daily systems monitoring, including verifying the integrity and availability of all solution resources, capacity management, reviewing system and application logs, and verifying completion of scheduled jobs.
Manage solution enhancements to improve business performance.
Perform systems maintenance and management, including solution administration, upgrades, audits and user account management.
Develop and improve efficient and reliable deployment and maintenance strategies.
Draft and maintain solution architecture, configuration and operating procedure documentation on a continuous basis.
Advise on solution security, backups, and disaster recovery needs.
Ensure that all requests for support are dealt with according to set standards and procedures. - Perform and conduct Enterprise ICT activities as per service level agreements to ensure ICT's internal and external customers are provided with the required uninterrupted services to achieve their objectives.
Develop implementation plans for complex requests for change. Lead the assessment, analysis, development, documentation and implementation of changes based on requests for change.
Ensure that incidents are handled according to agreed procedures. Analyze causes of incidents, and inform service owners in order to minimize probability of recurrence to contribute to service improvement.
Ensure that appropriate action is taken to anticipate, investigate and resolve problems in systems and services. Coordinate the implementation of agreed remedies and preventative measures.
Monitor and report on supplier performance, customer satisfaction, and market intelligence. Engage proactively and collaboratively with suppliers to resolve incidents, problems, or unsatisfactory performance.
Analyze service availability, reliability, maintainability and serviceability. Ensure that services meet and continue to meet all of their agreed performance targets and service levels.
Document and maintain IT assets, inclusive of software, hardware and licenses, within specialism area, and act to highlight and resolve potential instances of unauthorized assets such as unlicensed copies of software.
Be available for off-hours planned service windows, as well as other off-hours maintenance work as and when required.
Provide 24x7 on call day-to-day support on specialism area solutions and services. - Perform and conduct DevOps activities to deliver, evolve and improve services at a high velocity to better meet the demand of ICT's internal and external customers.
Implement, configure and maintain tools, including automation, to identify, track, log and maintain accurate, complete and current information on service configurations, within specialism area.
Design, implement and maintain system, within specialism area, integrations with internal and external systems to ensure that they meet functional requirements, interface specifications and ICT's security and governance standards and policies.
Collaborate with technical teams to develop and agree system integration plans. Assist in database support activities.
Use system management tools to collect and report on load and performance statistics and to automate the provisioning, testing and deployment of new and changed system components.
Design, code, verify, test, document, amend and refactor complex programs, scripts or integrations, within specialism area.
Create test cases using in-depth technical analysis of both functional and non-functional specifications such as reliability, efficiency, usability, maintainability and portability. Produce test scripts and materials to test new and amended software or services. - Design, implement and maintain digital transformation initiatives and associated architectures, as assigned by Manager, to meet the demand of ICT's internal and external customers to ensure they achieve their objectives and improve business value.
Technical solution architecture design, planning, implementation and the highest level of performance tuning.
Design components and modules using appropriate modelling techniques and recommend designs that take into account target environment, existing systems and performance and security requirements.
Adopt appropriate systems design methods, tools and techniques, as promulgated by section Director, in the translation of planned architecture into working solutions.
Produce specifications of cloud-based or on premises components, tiers and interfaces for translation into detailed designs of services and products.
Monitor system performance and implement performance tuning.
Determine opportunities for improvement of the current solutions and assess future enhancements.
Investigate new and emerging technologies and where possible automate manual tasks. - Plan and co-ordinate activities to manage and implement the full project management lifecycle for complex projects from initiation to final operational stage, including the transition into “business-as-usual”, to ensure delivery within scope, schedule and budget.
Plan and drive scoping, requirements definition and prioritization activities for large and complex initiatives.
Investigate operational requirements, problems, and opportunities, seeking effective business solutions.
Review business cases and determine appropriate procurement routes.
Evaluate the quality of project outputs against agreed service acceptance criteria.
Oversee and measure the fulfillment of contractual obligations using key performance indicators.
Support programme or project control boards and provide basic guidance on individual project proposals.
A Diploma degree as minimum to accept while a BSc. Degree in Computer Science or equivalent is preferred.
ExperienceA minimum of 0-2 years’ experience in related field.
About Application ProcessIf you meet the criteria and you are enthusiastic about the role, we would welcome your application. To complete the application, you would need the following document(s):
#J-18808-Ljbffr