Cyber Security Consultant

Job Details

Kuwait
QUADRON Cybersecurity Services cPLC
14.05.2024
Want updates for this and similar Jobs?

Full Job Description

QUADRON Cybersecurity Services - SAFETY: CONFIRMED Home >> Careers >> Cyber Security Consultant Careers description CYBER SECURITY CONSULTANT Type of job : Full Time
Seniority level : Senior
Line manager : Managing Director Middle East & Africa Join our team in Kuwait as a Senior Cyber Security Consultant! The Cyber Security Consultant is responsible for designing, implementing, maintaining, and optimizing server infrastructure to ensure the smooth and secure operation of organizational systems and applications. This role involves managing servers, overseeing their performance and availability, implementing security measures, and troubleshooting issues as they arise. The IT Server Administrator plays a critical role in ensuring the reliability and efficiency of the organization's server infrastructure to support business operations.
Task & responsibilities - Vulnerability Management: Conducting vulnerability assessments and managing the process of identifying and remediating vulnerabilities in systems and applications. - Threat Intelligence: Staying updated with the latest threats and trends in the cybersecurity landscape, analyzing threat intelligence reports, and applying this knowledge to proactively protect the organization's systems. - Security Operations Center (SOC) Operations: Working in a SOC environment, monitoring security alerts, investigating potential incidents, and coordinating with other teams for incident response and resolution. - Security Incident Management: Developing and maintaining incident response plans, defining escalation procedures, and ensuring timely and effective response to security incidents - Incident Reporting and Documentation: Documenting security incidents, investigations, and remediation activities, and preparing reports for management, stakeholders, or regulatory authorities as required. - Continuous Improvement: Staying abreast of emerging threats and evolving technologies, evaluating and recommending security enhancements, and participating in security audits and assessments. - Security Monitoring: Monitoring network and system logs, security event alerts, and intrusion detection/prevention systems to identify potential security incidents or anomalies. - Incident Response: Detecting, analyzing, and responding to security incidents, including investigating security breaches, identifying the root causes, containing the impact, and implementing remediation measures. - Security Policies and Procedures: Developing and implementing security policies, standards, and procedures to ensure compliance with relevant regulations and industry best practices. - Collaboration and Communication: Collaborating with cross-functional teams, including IT teams, network administrators, developers, and management, to ensure effective communication and coordination in addressing security issues. - Security Awareness and Training: Conducting security awareness programs and training sessions to educate employees about security best practices, policies, and procedures. Required skills & experience - Min. 7-8 years of relevant work experience - Networking: Understanding of network protocols, routing,switching, and firewalls. - Operating Systems: Proficiency in various operatingsystems, such as Windows, Linux, and macOS, including system administration andsecurity configurations. - Security Tools: Familiarity with security tools such asintrusion detection systems (IDS), intrusion prevention systems (IPS),antivirus software, vulnerability scanners, and log analysis tools. - Incident Response: Knowledge of incident responsemethodologies, including identification, containment, eradication, and recoveryprocedures. - Threat Intelligence: Understanding of threat intelligencesources, analysis, and integration into security operations. - Forensics: Basic knowledge of digital forensics processesand tools for investigating security incidents. - Secure Coding: Familiarity with secure coding practicesand understanding common vulnerabilities, such as OWASP Top 10. - Cloud Security: Knowledge of cloud computing platforms,security controls, and best practices for securing cloud environments. SecurityConcepts and Knowledge: - Risk Management: Understanding of risk assessmentmethodologies, threat modeling, and risk mitigation strategies. - Security Frameworks: Familiarity with industry standardsand frameworks such as ISO 27001, NIST Cybersecurity Framework, and CISControls. - Compliance: Knowledge of regulatory requirements andindustry-specific standards, such as GDPR, HIPAA, PCI DSS, etc. - Security Architecture: Understanding of securityarchitecture principles and design patterns to build secure systems. - Encryption: Knowledge of encryption algorithms,protocols, and their implementation to protect data at rest and in transit. - Authentication and Authorization: Understanding ofauthentication methods, access control mechanisms, and identity managementsystems. - Security Awareness: Ability to promote security awarenessand educate users about safe computing practices. Analyticaland Problem-Solving Skills: - Threat Detection and Analysis: Ability to identify andanalyze potential security incidents or vulnerabilities. - Incident Handling: Capability to respond to securityincidents promptly, including investigation, containment, and recovery. - Log Analysis: Proficiency in analyzing system logs,network traffic, and security event logs for detecting and investigatingsecurity issues. - Critical Thinking: Capacity to assess complex situations,think analytically, and make sound decisions under pressure. - Troubleshooting: Strong problem-solving skills todiagnose and resolve security-related issues. What we offer - Home office possibility - Career growth and training opportunities - Challenging and rewarding work assignments APPLY NOW

#J-18808-Ljbffr
Report Job