Cyber Security Consultant
Job Details
Full Job Description
QUADRON Cybersecurity Services - SAFETY: CONFIRMED Home >>
Careers >> Cyber Security Consultant Careers
description CYBER SECURITY CONSULTANT Type of job :
Full Time
Seniority level : Senior
Line manager : Managing
Director Middle East & Africa Join our team in Kuwait as a Senior
Cyber Security Consultant! The Cyber Security Consultant is
responsible for designing, implementing, maintaining, and optimizing
server infrastructure to ensure the smooth and secure operation of
organizational systems and applications. This role involves managing
servers, overseeing their performance and availability, implementing
security measures, and troubleshooting issues as they arise. The IT
Server Administrator plays a critical role in ensuring the reliability
and efficiency of the organization's server infrastructure to support
business operations.
Task & responsibilities
- Vulnerability Management: Conducting vulnerability
assessments and managing the process of identifying and remediating
vulnerabilities in systems and applications. - Threat Intelligence:
Staying updated with the latest threats and trends in the
cybersecurity landscape, analyzing threat intelligence reports, and
applying this knowledge to proactively protect the organization's
systems. - Security Operations Center (SOC) Operations: Working in a
SOC environment, monitoring security alerts, investigating potential
incidents, and coordinating with other teams for incident response and
resolution. - Security Incident Management: Developing and
maintaining incident response plans, defining escalation procedures,
and ensuring timely and effective response to security incidents -
Incident Reporting and Documentation: Documenting security incidents,
investigations, and remediation activities, and preparing reports for
management, stakeholders, or regulatory authorities as required. -
Continuous Improvement: Staying abreast of emerging threats and
evolving technologies, evaluating and recommending security
enhancements, and participating in security audits and assessments. -
Security Monitoring: Monitoring network and system logs, security
event alerts, and intrusion detection/prevention systems to identify
potential security incidents or anomalies. - Incident Response:
Detecting, analyzing, and responding to security incidents, including
investigating security breaches, identifying the root causes,
containing the impact, and implementing remediation measures. -
Security Policies and Procedures: Developing and implementing security
policies, standards, and procedures to ensure compliance with relevant
regulations and industry best practices. - Collaboration and
Communication: Collaborating with cross-functional teams, including IT
teams, network administrators, developers, and management, to ensure
effective communication and coordination in addressing security
issues. - Security Awareness and Training: Conducting security
awareness programs and training sessions to educate employees about
security best practices, policies, and procedures. Required skills & experience - Min. 7-8 years
of relevant work experience - Networking: Understanding of network
protocols, routing,switching, and firewalls. - Operating Systems:
Proficiency in various operatingsystems, such as Windows, Linux, and
macOS, including system administration andsecurity configurations.
- Security Tools: Familiarity with security tools such asintrusion
detection systems (IDS), intrusion prevention systems (IPS),antivirus
software, vulnerability scanners, and log analysis tools. -
Incident Response: Knowledge of incident responsemethodologies,
including identification, containment, eradication, and
recoveryprocedures. - Threat Intelligence: Understanding of threat
intelligencesources, analysis, and integration into security
operations. - Forensics: Basic knowledge of digital forensics
processesand tools for investigating security incidents. - Secure
Coding: Familiarity with secure coding practicesand understanding
common vulnerabilities, such as OWASP Top 10. - Cloud Security:
Knowledge of cloud computing platforms,security controls, and best
practices for securing cloud environments. SecurityConcepts and
Knowledge: - Risk Management: Understanding of risk
assessmentmethodologies, threat modeling, and risk mitigation
strategies. - Security Frameworks: Familiarity with industry
standardsand frameworks such as ISO 27001, NIST Cybersecurity
Framework, and CISControls. - Compliance: Knowledge of regulatory
requirements andindustry-specific standards, such as GDPR, HIPAA, PCI
DSS, etc. - Security Architecture: Understanding of
securityarchitecture principles and design patterns to build secure
systems. - Encryption: Knowledge of encryption
algorithms,protocols, and their implementation to protect data at rest
and in transit. - Authentication and Authorization: Understanding
ofauthentication methods, access control mechanisms, and identity
managementsystems. - Security Awareness: Ability to promote
security awarenessand educate users about safe computing practices.
Analyticaland Problem-Solving Skills: - Threat Detection and
Analysis: Ability to identify andanalyze potential security incidents
or vulnerabilities. - Incident Handling: Capability to respond to
securityincidents promptly, including investigation, containment, and
recovery. - Log Analysis: Proficiency in analyzing system
logs,network traffic, and security event logs for detecting and
investigatingsecurity issues. - Critical Thinking: Capacity to
assess complex situations,think analytically, and make sound decisions
under pressure. - Troubleshooting: Strong problem-solving skills
todiagnose and resolve security-related issues. What we offer - Home office possibility -
Career growth and training opportunities - Challenging and rewarding
work assignments APPLY NOW
Cyber Security Consultant
QUADRON Cybersecurity Services cPLC
All Direct Job Ads are subject to WhatJobs Terms of Service. We allow users to flag postings that may be in violation of those terms. Job Ads may also be flagged by WhatJobs. However, no moderation system is perfect, and flagging a posting does not ensure that it will be removed.