CrawlJobs Logo

Information Security Operations Consultant

n-ix.com Logo

N-iX

Location Icon

Location:

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

We are looking for an IS Operations Consultant to support the setup and operational strengthening of a centralized Information Security Operations capability. You will provide expert guidance and hands-on support across security operations domains, including SOC oversight, vulnerability management, penetration testing coordination, and security awareness activities. The role focuses on operational execution, process optimization, vendor coordination, and audit readiness, working closely with the CISO, Infrastructure, Cloud, IT Operations, Workplace, and Application teams. This is not a line management position and does not include direct team leadership or budget ownership.

Job Responsibility:

  • Support oversight of external MSSP delivering 24x7 monitoring and incident response
  • Contribute to incident response coordination and post-incident reviews
  • Assist in strengthening cyber resilience through process improvement and operational enhancements
  • Support vulnerability management processes (validation, prioritization, remediation follow-up)
  • Coordinate penetration testing activities and tracking of remediation
  • Support the execution of security awareness campaigns and training monitoring
  • Contribute to alignment with regulatory and audit frameworks (ISO 27001, NIST, DORA, NIS2)
  • Support preparation of audit evidence and documentation
  • Assist in KPI reporting (vulnerabilities, risks, remediation status)
  • Contribute to maintaining consolidated security risk tracking
  • Act as operational interface between central security function and local IT teams
  • Support vendor performance monitoring (MSSP, pentest providers, tooling vendors)
  • Assist in SLA tracking and operational service reviews
  • Collaborate with Infrastructure and Cloud teams to ensure secure configurations and remediation follow-up

Requirements:

  • 5+ years of experience in Information Security operations (SOC, VM, IR, or similar)
  • Strong hands-on knowledge of security technologies (SIEM, EDR/XDR, vulnerability scanners)
  • Experience working in enterprise or multi-entity environments
  • Familiarity with cloud security concepts (AWS, Azure, IAM, logging, encryption)
  • Working knowledge of regulatory frameworks such as ISO 27001, DORA, or NIS2
  • Experience supporting external security vendors (MSSP coordination is a plus)
  • Strong communication skills and ability to work across distributed teams
  • Fluent in English and Spanish
  • German is a plus
  • Certifications (CISSP, CISM, or similar) are advantageous but not mandatory
What we offer:
  • Flexible working format - remote, office-based or flexible
  • A competitive salary and good compensation package
  • Personalized career growth
  • Professional development tools (mentorship program, tech talks and trainings, centers of excellence, and more)
  • Active tech communities with regular knowledge sharing
  • Education reimbursement
  • Memorable anniversary presents
  • Corporate events and team buildings
  • Other location-specific benefits

Additional Information:

Job Posted:
April 03, 2026

Work Type:
Remote work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Information Security Operations Consultant

Information Security Risk Lead

The Information Security Risk Lead is responsible for driving efforts to support...
Location
Location
Thailand , Bangkok
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Master’s/Bachelor’s/University degree or equivalent experience in Computer Science, Cyber Security, Computer/Information Engineering, Information Technology or a related discipline is preferred
  • One or more industry-recognized cybersecurity-related certifications such as CISSP, CISA, CISM, CRISC, ISO 27001
  • 6 - 10 years or above of relevant experience in Cyber Security Management / Cyber Security Operations / Technology Risk Management / Third-party Risk Management or IT Audit, preferably with experience gained from banking / finance services industry / consultancy / control compliance or legal disciplines
  • Experience in assessing cyber regulatory compliance from BOT, SEC etc.
  • Strong understanding of International Standards/Frameworks such as: NIST, ISO 27001series, COBIT, CIS, GDPR, DORA, etc.
  • Proficient in interpreting and applying policies, standards and procedures
  • Excellent project management and organizational skills (PMP, PRINCE2, etc. is a plus)
  • Strong consultation, reporting writing and communication skills with highly proficiency in both spoken and written English and Thai
  • Thai language fluency is a must.
Job Responsibility
Job Responsibility
  • Manage and validate deliverables of all Information Security (IS) programs, ensuring closure per agreed timelines and goals
  • Engagement with local regulators BOT, SEC, TB-CERT, Thai-CERT, MDES, NCSA, etc. on IS related matters
  • Manage regulatory exams and internal & external audits
  • Work closely with Global & Regional Information Security teams to improve processes and reduce risk, and support the IS regulatory related activities for Thailand
  • Manage internal/external resources to organize cyber-attack simulations exercise, coordinating and overseeing vulnerability, mitigation/remediation/correction action plans, and issues management process
  • Accountable for delivery of the associated remediation from regulatory assessments
  • Proficiency in preparing periodic updates / reports / presentation deck for both internal stakeholders and regulators
  • Provide timely and appropriate updates to regional and global stakeholders
  • escalate issues in a timely manner to senior management
  • Build and develop partnerships with business, IT, risk, compliance, IS, senior management staff and stakeholders
  • Fulltime
Read More
Arrow Right

Senior Information Security Officer

In a world of technology, people make the difference. We believe if we invest in...
Location
Location
United States , Reston
Salary
Salary:
Not provided
anavationllc.com Logo
AnaVation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Demonstrates strong experience with IC/DoD customer's Assessment and Authorization (A&A) process (e.g., RMF, NIST800-53, ICD503)
  • Experience in developing and implementing DoD/DIA approved information security controls, procedures and documentation for the operation of standalone classified systems
  • A Bachelor’s Degree from an accredited institute in an area applicable to this position and eight (8) years of relevant experience
  • An additional four (4) years of relevant experience may be substituted for the bachelor’s degree
  • Must presently be 8570 compliant (IAT Level 2 preferred)
  • Experience with one or more commercial government cloud service provider’s system accreditation processes
  • Experience with the Xacta
  • Experience as a Cybersecurity Control Assessor
  • Experience with Ongoing Authorizations and Assessments
  • Experience with C2S Cloud, or DevOpsSec
Job Responsibility
Job Responsibility
  • Provide subject matter expertise and consulting on security related matters for enterprise information system and network architectures, access problems, and implementation of security policies and procedures
  • Assist in overseeing and managing day-to-day operation of Information Systems
  • Optimize system operation and resource utilization and performs system capacity planning/analysis while maintaining the security posture
  • Assist team in DIA’s Authorization and Accreditation (A&A) process using RMF across the design lifecycle for classified systems obtaining and maintaining Interim Authority to Operate (ATO), ATO and Authority to Connect (ATC)
  • Create and process RMF authorization packages from submission to approval/disapproval
  • Develop and maintain IT security documents, including system security plans, risk assessments, Plan of Action and Milestones (POA&M), contingency plans, incident response plans, IT security policies and procedures
  • Provide recommendations regarding remediation and mitigation of identified vulnerabilities by developing plan of action and milestones (POA&Ms)
  • Advise developers on integrating security requirements
  • Demonstrate a strong understanding of Networks, Cloud, and IT system security authorization procedures
What we offer
What we offer
  • Generous cost sharing for medical insurance for the employee and dependents
  • 100% company paid dental insurance for employees and dependents
  • 100% company paid long-term and short term disability insurance
  • 100% company paid vision insurance for employees and dependents
  • 401k plan with generous match and 100% immediate vesting
  • Competitive Pay
  • Generous paid leave and holiday package
  • Tuition and training reimbursement
  • Life and AD&D Insurance
  • Fulltime
Read More
Arrow Right

Security Consultant

BluBiz Solutions is currently seeking an experienced Security Consultant to prov...
Location
Location
Australia , Melbourne
Salary
Salary:
Not provided
blubiz.com.au Logo
BluBiz Solutions
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum 5 years of relevant IT, Assurance, Risk Management, or Cybersecurity support experience
  • Experience in Implementation of information security industry standards (ISO27001, PCIDSS) and other best practice frameworks for Enterprise clients
  • Proven experience in conducting security assessments such as VAPT evaluation, and documentation of client environment, infrastructure, processes, and operations
  • Ability to influence technical and management leaders to achieve the best Cyber Security outcomes
  • Extensive knowledge of security frameworks such as TOGAF, ISO-27001, NIST, HIPPA and PCI
  • Demonstrate the ability to translate business needs into architecture requirements
  • Strong business and risk analysis skills to drive security outcomes
  • Experience in architecting enterprise network and security solutions
  • Experience in working with one or multiple vendor solutions such as Cisco, Fortinet, Palo Alto
  • Strong client-facing skills with the ability to build relationships
Job Responsibility
Job Responsibility
  • Provide consultancy to clients on information security and architectural decisions
  • Be a trusted advisor and lead for delivery of cybersecurity and risk consulting client engagements that will include governance, risk and compliance reviews
  • Assist in driving growth of Cybersecurity and Risk practice through building solutions, and leading proposal development
  • Develop and deliver security strategy, architecture, and design for BluBiz clients
  • Deliver technical presentations tailored for technical and non-technical audiences from IT manager, executive and C-Level
  • Develop high-level and detailed security requirements relating to new opportunities
  • Prepare overall solution design, architecture, and implementation plan
  • Provide technical leadership to enterprise customers through a range of presales support functions including, supporting product evaluations, pre-sales technical consultation, post-sales support advocacy, and proactive needs analysis
  • Assist with networking and security solutions, product plans and roadmaps
Read More
Arrow Right

Digital Web & Mobile Security Senior Analyst

The Digital Web & Mobile Security Senior Analyst is an intermediate level positi...
Location
Location
India , Chennai; Pune
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience as application security consultant / security expert
  • SME level knowledge of web application vulnerabilities and web application business logic flaws and threats
  • In depth and hands-on understanding and application architectures and technology (including web applications, mobile technology, web 2.0 technology, identity and access management)
  • Demonstrable experience with mobile application security, HTML5, Web Services/API assessment, identity management will be highly regarded
  • Thorough understanding of industry and corporate technology standards for Information Security
  • Expert in latest Internet and Mobile technology with strong architectural and design knowledge
  • Detailed familiarity with security hacking tools and techniques
  • Excellent written and oral English communication skills
Job Responsibility
Job Responsibility
  • Prevent and drive to clear the outstanding safety and soundness items by assessing and predicting the potential risk items before it becomes an issue / escalation
  • Assess priorities across multiple safety and soundness items and drive those critical ones similar like driving high priority production items and never settle until it is closed
  • Drive our outstanding safety and soundness items across all teams to closure and turn it around to become prevention instead of reacting to issues
  • Operate independently including the ability to provide executive summary for safety and soundness issues for executive consumption without a need for a continuous review
  • Review existing security architectures, identify design gaps, and recommend security enhancements
  • Act as an advocate for the application security architecture. Communicates and educates on the IS Architecture and roadmap
  • Develop security design pattern by identifying broader and emerging IS issues
  • Provides architecture consulting across the bank to project teams and other architects
  • Prioritize architecture deliverables, and establish short-term, mid-term and long-range architecture plans. Facilitates the migration to the reference architecture in a way that enables and supports the strategic plan
  • Maintains understanding of business issues, operating procedures and priorities
  • Fulltime
Read More
Arrow Right

Senior Manager IAM Enterprise Security

The IT Sr. Manager, Identity & Access Management is responsible for providing le...
Location
Location
Poland , Krakow
Salary
Salary:
Not provided
genpt.com Logo
Genuine Parts Company
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • BS/BA degree and specialized information security technical training required
  • A reputable security certification (CISSP, CISSP w/specialization HCISPP, GIAC, CISA, etc.) is required
  • A minimum of 6 years of progressive Information Security experience
  • A minimum of 3+ years of management experience leading information security
  • Identity & Access Management to include governance experience is required
  • In-depth knowledge of the information security industry and regulatory obligations (Sarbanes-Oxley (SOX), HIPAA, GLBA, PCI DSS, HITRUST, NIST Framework, etc.)
  • Working knowledge of Microsoft Active Directory
  • Ability to analyze all layers of the OSI model from the security stance
  • In-depth knowledge of networking technologies and architecture
  • ITIL familiarization - managing incidents, requests, and changes
Job Responsibility
Job Responsibility
  • Serves as an internal information security consultant to the enterprise
  • Include focus and expertise in Privileged Access Management (PAM), Customer Identity Access Management (CIAM), Identity Governance and Administration (IGA) and Employee Identity Access Management (EIAM) to include Single Sign on and Multi-factor authentication
  • Research and recommend solutions that meet security standards while ensuring functionality for business continuity
  • Develop security test scenarios for unit, process, function, integration, and acceptance testing
  • Design integration schema and linkage for multi-platform business and technological solutions
  • Evaluates the security of new technologies and assists with the plan to integrate them into the company environment
  • Help develop the policies and procedures in conjunction with the established IT governance channels to manage the use and operation of these systems
  • Recommend best practices for security controls without hindering functionality
  • Define the minimum access and identity configuration standards for all IT systems
  • Evaluates new and proposed security systems and technologies
What we offer
What we offer
  • We offer comprehensive benefit plans and programs designed to support your health and wellness, provide income protection and build financial security for your retirement
Read More
Arrow Right

Operational Technology (OT) Cyber Security Engineer

The OT Cyber Security Engineer will contribute to the delivery of high-quality t...
Location
Location
United Kingdom , Stockton-on-Tees
Salary
Salary:
Not provided
risktec.tuv.com Logo
Risktec Solutions
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • A relevant technical degree or equivalent industry experience in OT cybersecurity is desirable
  • Good working understanding of industrial control systems (DCS, SCADA, PLCs, etc.)
  • Prior experience in technical delivery roles, including hands-on involvement in a project delivery or client-facing setting, is desirable but not essential
  • Evidence of delivering high-quality technical work under supervision
  • Foundational knowledge of OT cybersecurity practices, frameworks, and regulations, such as IEC 62443, CAF, OG86, and NIS
  • Awareness of OT cybersecurity techniques and tools for compliance with national/international standards, contributing to effective technical solutions
  • Developing competency in performing assignments in areas such as: Supporting risk assessments and vulnerability analysis of OT environments
  • Assisting in asset inventory preparation and management for industrial control systems (ICS)
  • Conducting physical and standards-based site audits, aligned with international standards
  • Contributing to network diagram creation to improve system visibility and security
Job Responsibility
Job Responsibility
  • Support risk assessments and create asset inventories for OT systems across client sites under supervision
  • Perform physical and standards-compliant site audits as directed by senior consultants or team leads
  • Assist in the creation, documentation, review, and validation of network diagrams and OT systems architecture
  • Support the review, development, and implementation of OT Cyber Security Management Systems (CSMS) in alignment with established frameworks and international standards
  • Collaborate with the OT Cyber Security team and other departments to deliver projects successfully, ensuring high-quality outputs
  • Prepare and deliver accurate and professional technical reports and documentation that meet client expectations and regulatory compliance
  • Stay informed of industry trends and emerging OT cybersecurity challenges, applying foundational knowledge to support team-directed initiatives
  • Interaction with customers to ensure TUV deliver a solution on time and to high quality
What we offer
What we offer
  • comprehensive training
  • flexible working
  • a great pay and benefits package
  • Fulltime
Read More
Arrow Right

Information Security Consultant

We are seeking a Information Security Consultant to join our client's team. We n...
Location
Location
Canada , Regina
Salary
Salary:
Not provided
https://www.randstad.com Logo
Randstad
Expiration Date
April 04, 2026
Flip Icon
Requirements
Requirements
  • Have minimum of 10 years hands-on Information Security experience in roles involving security engineering, security architecture or security operations
  • Bachelor’s degree in Information Security, Information Technology, Computer Science, Engineering, or related discipline
  • Industry certifications such as CISSP, CISM, CCSP, CCIE
  • Proven experience leading or contributing to enterprise security projects involving technology integration, process enhancement, or control implementation
  • Experience in configuring, deploying, managing, Endpoint Detection & Response (EDR) platforms (e.g. Microsoft Defender, SentinelOne)
  • Experience with Vulnerability Management tooling, lifecycle processes, remediation validation, and reporting (e.g., Qualys, Veracode)
  • Experience in Next-Generation Firewall (NGFW) capabilities, including Secure Sockets Layer (SSL) inspection, threat prevention, content filtering, micro-segmentation, application control, and network policy tuning
  • Experience in Security Information and Event Management (SIEM) use cases, tuning, threathunting integration, and log onboarding (e.g. Splunk, Sentinel, Sumo Logic)
  • Experience in Cloud and Hybrid Security technologies, with hands-on understanding of native controls (e.g. Azure Defender)
  • Extensive experience in Intrusion Prevention and Detection (IPS/IDS) including deployment, tuning, ruleset management, and vendor-agnostic architectures
Job Responsibility
Job Responsibility
  • Review enterprise architectures, network designs, and cloud deployments to derive required security controls and identify design risks, compliance gaps, and remediation recommendations
  • Develop secure architecture patterns, configuration standards, design documents, and operational runbooks aligned with regulatory requirements and industry frameworks
  • Lead or support security incident response activities, including investigation, containment, root-cause analysis, recovery coordination, and post-incident reporting
  • Develop and maintain incident playbooks, escalation procedures, evidence collection guidelines, and integration
  • Provide guidance during critical incidents, communicate business impacts to leadership, ensure lessons learned are documented, and drive the implementation of corrective actions to reduce recurrence and improve organizational readiness
  • Work with cross-functional IT, business, and vendor teams to ensure secure solution implementation and adherence to enterprise security policies
What we offer
What we offer
  • Opportunity to lead and shape the modernization of platforms
  • Collaborative environment working closely with stakeholders from various business areas and Information Management & Technology team
  • Chance to develop and implement cutting-edge solutions
  • Platform to showcase excellent presentation skills by regularly updating and engaging with project stakeholders and IT leadership
  • Contribution to meaningful work
Read More
Arrow Right

Senior Detection Engineer

This is a detection engineering role that leverages knowledge of monitoring, ana...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.marriott.com Logo
Marriott Bonvoy
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Sciences or related field or equivalent experience/certification
  • 3+ years of collective experience in Splunk SIEM (Splunk Enterprise Security) threat detection use case development or UEBA (Exabeam) use case development for insider threat use case development
  • 5+ years of experience in security functions such as SOC, CIRT, security engineering, risk management, vulnerability management or technical infrastructure operations, administration, or systems engineering
  • scripting or programming language, including Python
  • Current information security certification such as Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP) preferred
  • offensive and defensive security certifications such as CEH, IGAC Cyber Defense, OSCP or other related certifications preferred
  • Splunk Certification, including Splunk Enterprise Security Certified Admin preferred
  • use case development experience on the Exabeam platform preferred
  • working knowledge of the NIST Cyber Security Framework and ISO/IEC 27001:2022 preferred
  • working knowledge of the MITRE ATT&CK Framework preferred
Job Responsibility
Job Responsibility
  • Lead collaboration sessions within the cyber security tower and other business units to devise security monitoring use cases
  • engage and collaborate with other security engineers and architects as needed to keep pace with the evolution of corporate infrastructure and applications and share that knowledge with peers as appropriate
  • document prospective security monitoring use cases with MITRE ATT&ACK mappings using standard templates and methodologies
  • inform and consult other cyber ops teams of required data onboarding and integrations for use case development
  • develop analytics, correlation searches, dashboards, reports and alerts within the SIEM and UEBA platforms
  • solicit feedback for pre-production security monitoring content through peer review process and user acceptance testing for tuning
  • document developed security monitoring content in a documentation registry using department standard templates and methodologies
  • manage field mapping and transmission of security monitoring alerts to the security incident response platform for SOC analyst consumption as outlined in process documentation
  • provide governance support for the content development function entailing content development standards compliance, change management approvals for SIEM or UEBA content, and lifecycle management of developed security monitoring content
  • service operational requests in queue such as analytics content performance tuning, filtering, search refinement, parsing issues
  • Fulltime
Read More
Arrow Right