Nisos Logo

Nisos

Information Systems Administrator

Sorry, this job was removed Sorry, this job was removed at 12:08 p.m. (PST) on Monday, Jul 21, 2025
Be an Early Applicant
In-Office
Belfast, County Antrim, Northern Ireland
In-Office
Belfast, County Antrim, Northern Ireland

Similar Jobs at Nisos

14 Days Ago
In-Office
Belfast, County Antrim, Northern Ireland, GBR
25K-25K
Entry level
25K-25K
Entry level
Professional Services • Security • Consulting • Cybersecurity • Generative AI • Data Privacy
The Digital Protection Specialist will monitor alerts for PII exposures, review flagged content, collaborate with teams, and enhance skills in cybersecurity.
Top Skills: AscendGoogle WorkspacemacOSmacOSMonday.Com
22 Days Ago
In-Office
Belfast, County Antrim, Northern Ireland, GBR
Senior level
Senior level
Professional Services • Security • Consulting • Cybersecurity • Generative AI • Data Privacy
As an AI Staff Engineer, you will design and implement AI features, build scalable data pipelines, and manage AI systems while mentoring team members.
Top Skills: AirflowApache KafkaAws SagemakerCloudFormationDockerElasticsearchJavaScriptKubernetesLangchainMilvusMongoDBMySQLPineconePostgresPythonPyTorchSparkTensorFlowTerraformTransformersWeaviate
25 Days Ago
In-Office
Belfast, County Antrim, Northern Ireland, GBR
Senior level
Senior level
Professional Services • Security • Consulting • Cybersecurity • Generative AI • Data Privacy
As a Full Stack Engineer, you will build platforms, develop products, and mentor junior engineers while working with various technologies and tools.
Top Skills: Amazon RdsAmazon SqsAnsibleApache ArrowAthenaAvroAWSAws EcsAzureBashCloudFormationDocker SwarmElasticsearchFlaskGCPGoogle Pub/SubGraphQLJavaScriptKubernetesMemcachedMongoDBMySQLNifiNode.jsParquetPentahoPostgresProtobufPythonRabbitMQReactRedisRest ApiTerraform

Who Is Nisos?

Nisos is the Managed Intelligence Company®. We’re a digital investigations partner who unmasks threats to protect people and organizations. We’re trusted advisors who operate as an extension of security, intelligence, legal, and trust and safety teams. Nisos helps to solve our clients’ most difficult challenges through open source intelligence. We provide actionable intelligence services including digital investigations, assessments, and monitoring. At Nisos, it’s our mission to keep organizations and what’s most important to them safe – their teams, clients, users, and key assets.

We deliver tangible impact to our clients daily by helping them protect their reputation and value, increase their revenues, reduce their losses, and avoid regulatory penalties and fines. They use our intelligence to make critical technology and policy decisions. Our work also informs their legal, M&A, and partner strategies, and reduces foreign influence threats.

Working at Nisos

We are a distributed, remote- and hybrid-working team, operating in both the U.S. and Northern Ireland. We believe in supporting and unlocking the potential of our team through training, professional development, and advancement opportunities. We cultivate a truly people-first, trusted partner culture of integrity, innovation, inclusion, responsibility, and collaboration.

What Is The Opportunity?

At Nisos, we’re committed to ensuring protection of our computer networks and our data, and maintaining security posture and protection of electronically stored information across our systems. This position is responsible for planning, implementing, upgrading and monitoring security measures for the protection of our platforms, computer networks and information.  You will assess system vulnerabilities for security risks and propose and implement risk mitigation strategies.  You will ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure.  The ideal candidate will have excellent organizational, communication, and management skills, along with an ability to lead training sessions and workshops for staff members. In this role, the person will often be asked to independently communicate with all relevant employees to promote information security and data protection compliance within the organization.

What You’ll Do 

  • Information Technology Support
    • Provide quick and effective assistance with information technology systems. 
    • Guide employees and clients  remotely and in person through IT systems configuration, troubleshooting, and maintenance.
    • Provide onboarding and offboarding training and support.
    • Listen attentively to employees’ and customers’ questions and concerns and offer optimal solutions.
    • Follow up with employees and customers to ensure satisfactory service.
    • Prioritize employee and customer satisfaction in all communications.
  • Information Security:
    • Collaborates with users to discuss computer data access needs, to identify security threats and violations, and to identify and recommend needed programming or process changes.
    • Uses data encryption, firewalls, and other appropriate security tools and applications to conceal and protect transfers of confidential digital information.
    • Monitors and restricts access to sensitive, confidential, or other high-security data.
    • Modifies security files and applications as able and necessary to provide specialized access, allow new software to be installed or integrated, or correct errors.
    • Determines when to update virus protection systems by monitoring current reports of computer viruses; facilitates or performs needed updates.
    • Work with and HR to ensure timely logical access entitlements
    • Review and analyze network and application user roles and access entitlement reports and ensure accurate access provisions and document those processes
  • Training and Continuing Education:
    • Safeguards system security, protection and processing of data, and improves overall server and network efficiency by training users and promoting security and data privacy awareness.
    • Reviews violations of security and data processing procedures; provides training to ensure violations do not recur.
    • Promote a culture of information security, data protection and compliance across all units of the organization.
    • Create incident response playbooks.

Who You Are and What You Bring

  • Comprehensive knowledge of computer systems and experience troubleshooting hardware and software.
  • Ability to work effectively under pressure and to manage sensitive and confidential information.
  • Excellent verbal and written communication skills, with strong attention to detail.
  • Bachelor’s degree (or equivalent) or a combination of equivalent education and experience in computer science or related field.
  • Proficiency with software for preparing reports and presentations.

Great to Have

  • AWS Cloud Practitioner certification
  • CompTIA A+, Security+ or similar certification
  • Experience administering macOS systems with an MDM
  • Experience with a third-party Employee Identity solution, such as OneLogin or PingID

Where You’ll Work

  • This is a hybrid position, located in Belfast, Northern Ireland. 
  • You must be authorized to work in the United Kingdom.

Things You’ll Use

To perform effectively in a remote role, you must meet the following physical and logistical requirements:

  • Sitting/Desk Work:
    • Ability to remain seated at a workstation for extended periods (up to 6–8 hours daily) to perform tasks like typing, reading, and attending virtual meetings.
  • Typing/Computer Use:
    • Frequent and consistent use of a keyboard, mouse, and monitor for data entry, document creation, and online collaboration.
    • Proficiency with standard office software and virtual communication tools (e.g., Google Workspace, Slack).
  • Visual Requirements:
    • Extended screen time, with a need for clear vision to view text and images on monitors and mobile devices. 
  • Dedicated Workspace:
    • A quiet, distraction-free home office or workspace equipped with a reliable desk, comfortable chair, and sufficient lighting.
    • Secure and private environment to maintain confidentiality of sensitive information.
  • Technology:
    • Reliable high-speed internet connection (minimum upload/download speeds as specified by the company).
    • A company-approved laptop or desktop computer, webcam, headset, and other necessary peripherals.
  • Communication & Availability:
    • Ability to participate in virtual meetings and respond to emails, calls, and messages during designated work hours.
    • Consistent adherence to company policies regarding availability and communication.
  • Systems
    • Amazon Web Services
    • Okta
    • Jamf Pro

What you need to know about the Seattle Tech Scene

Home to tech titans like Microsoft and Amazon, Seattle punches far above its weight in innovation. But its surrounding mountains, sprinkled with world-famous hiking trails and climbing routes, make the city a destination for outdoorsy types as well. Established as a logging town before shifting to shipbuilding and logistics, the Emerald City is now known for its contributions to aerospace, software, biotech and cloud computing. And its status as a thriving tech ecosystem is attracting out-of-town companies looking to establish new tech and engineering hubs.

Key Facts About Seattle Tech

  • Number of Tech Workers: 287,000; 13% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Amazon, Microsoft, Meta, Google
  • Key Industries: Artificial intelligence, cloud computing, software, biotechnology, game development
  • Funding Landscape: $3.1 billion in venture capital funding in 2024 (Pitchbook)
  • Notable Investors: Madrona, Fuse, Tola, Maveron
  • Research Centers and Universities: University of Washington, Seattle University, Seattle Pacific University, Allen Institute for Brain Science, Bill & Melinda Gates Foundation, Seattle Children’s Research Institute
By clicking Apply you agree to share your profile information with the hiring company.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account