10 Access Control jobs in Kuwait
Installation Access Control/Defense Biometrics Identification Systems Support
Posted 1 day ago
Job Viewed
Job Description
Overview
At ITA International, we ’ re a tech-enabled professional services company. Headquartered in Newport News, Virginia, we leverage subject matter expertise, data analytics and technology to challenge boundaries and transform possibilities.
With a global presence and a passionate team of over 200 ITAers, we ’ re driven by mission success for our customers, “ In The Arena. ” Our expertise spans Operations, Training, Engineering, Nanotechnology, Statistics, Machine Learning and Software Engineering – enabling data and tech-enabled solutions that deliver real value.
Join our impactful journey at ITA International. As Theodore Roosevelt said, “ The credit belongs to the man who is actually in the arena. ” We ’ re here, standing beside our customers , ready to serve and succeed.
ITA is seeking an Installation Access Control/Defense Biometrics Identification Systems Support Professional to join the team in Kuwait
Please note this position is contingent upon position vacancy.
ResponsibilitiesThe selected candidate will play a vital role in supporting the 9th Air Force, a key component of the United States Air Force Central Command (AFCENT) overseeing operations in the Middle East. This position provides subject matter expertise to the 9th Air Force Expeditionary Security Forces Squadron, helping ensure base security and critical support services in one of the most dynamic and strategically important regions in the world. The 9 th Air Force serves at other locations such as Al Dhafra AB, UAE; Ali Al Salem AB, Kuwait; Al Mubarak Air Base, Kuwait; Prince Sultan AB (PSAB), Kingdom of Saudi Arabia (KSA); Muwaffaq-Salti AB (MSAB), Jordan; Al Udeid AB, Qatar and in CONUS.
The Contractor Shall
- Manage the Defense Biometrics Identification System. Perform a variety of duties directly related to the development and/or management of the Installation Access Control Program supporting the mission of the major command.
- Manage the Program that extends from the HQ staff level over several echelons to field units, and present very considerable complexities due to their structuring and extensive relationships (functional and financial).
- Analyze a variety of complex and extensive policies, plans, regulations, and other higher-level guidance to determine overall impacts on specific program areas and functions of the Installation Access Control Program.
- Develop guidance, objectives, policies, plans, and procedures regarding the management of the Installation Access Control Program. Review superior, lateral, and subordinate command decisions on and/or interpretation of supplied guidance to assess their impact on the Installation Access Control Program. Perform review and analysis to ensure that resources supplied to subordinate commands are used in the most efficient and cost-effective manner.
- Review and analyze a variety of other types of documents to ensure consistency between and among these and the organization’s functions.
- Perform supply justification, prioritization, and cost guidance for Installation Access Control Program resources funding.
- Serve as subject matter expert on the Installation Access Control Program. Reconcile Installation Access Control Program.
Candidates must have:
- Thorough understanding of USAFCENT Installation Access Control Programs (IACS), goals, and objectives, and understand the interrelationships of individual programs in regards to other programs and functions.
- Skill in formal and informal briefings, negotiations, and training to senior staff members, USAFCENT commanders and end-users of regulations and IACS. Prepare information papers for dissemination throughout the USAFCENT Theater of operations, as needed.
- Proficiency in the use of Microsoft Office.
- Three (3) years of experience and knowledge of USAFCENT Installation IACS.
- A current state and Government Driver’s License.
- Active Secret Clearance
All employees must successfully pass all medical screening as required per CENTCOM deployment standards.
Under The 9AF ESFS Contract, All Applicants Are Subject To An In-depth Background Check To Ensure Regulation Compliance. Eligible Applicants Will Not Have Any Of The Following
- Pending criminal or civil charges (including divorce/child custody proceedings)
- Felony arrest record
- Alcohol related arrest in the last five years
- Any type of moral turpitude arrest record/history (including, but not limited to, prostitution, pandering, voyeurism, public indecency)
- Any type of involvement in hate crimes
- History of violence
- Involvement in any group or organization that espouses extralegalviolence as a legitimate means to achieve an end
ITA International proudly complies with all federal and state benefit and pay transparency laws. Employees of ITA can expect a robust benefit package, including:
- Medical, dental and vision plans
- Life Insurance
- Short Term Disability insurance (where applicable)
- Voluntary ancillary benefit options
- 401k retirement benefits with employer matching contributions
ITA International is an Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law.
In compliance with the ADA Amendments Act (ADAAA), ITA International would like to ensure that your application process goes as smoothly as possible. If you would like to preview the physical requirements for this position, or if you have a disability and would like to request an accommodation in order to apply for a currently open position with ITA, please contact us by phone at or email us at
#J-18808-LjbffrInstallation Access Control/Defense Biometrics Identification Systems Support
Posted 22 days ago
Job Viewed
Job Description
Overview
At ITA International, we’re a tech-enabled professional services company. Headquartered in Newport News, Virginia, we leverage subject matter expertise, data analytics and technology to challenge boundaries and transform possibilities.
With a global presence and a passionate team of over 200 ITAers, we’re driven by mission success for our customers, “In The Arena.” Our expertise spans Operations, Training, Engineering, Nanotechnology, Statistics, Machine Learning and Software Engineering – enabling data and tech-enabled solutions that deliver real value.
Join our impactful journey at ITA International. As Theodore Roosevelt said, “The credit belongs to the man who is actually in the arena.” We’re here, standing beside our customers, ready to serve and succeed.
ITA is seeking an Installation Access Control/Defense Biometrics Identification Systems Support Professional to join the team in Kuwait
*Please note this position is contingent upon position vacancy.*
Responsibilities
The selected candidate will play a vital role in supporting the 9th Air Force, a key component of the United States Air Force Central Command (AFCENT) overseeing operations in the Middle East. This position provides subject matter expertise to the 9th Air Force Expeditionary Security Forces Squadron, helping ensure base security and critical support services in one of the most dynamic and strategically important regions in the world. The 9th Air Force serves at other locations such as Al Dhafra AB, UAE; Ali Al Salem AB, Kuwait; Al Mubarak Air Base, Kuwait; Prince Sultan AB (PSAB), Kingdom of Saudi Arabia (KSA); Muwaffaq-Salti AB (MSAB), Jordan; Al Udeid AB, Qatar and in CONUS.
The Contractor shall:- Manage the Defense Biometrics Identification System. Perform a variety of duties directly related to the development and/or management of the Installation Access Control Program supporting the mission of the major command.- Manage the Program that extend sfrom the HQ staff level over several echelons to field units, and present very considerable complexities due to their structuring and extensive relationships (functional and financial).- Analyze a variety of complex and extensive policies, plans, regulations, and other higher-level guidance to determine overall impacts on specific program areas and functions of the Installation Access Control Program.- Develop guidance, objectives, policies, plans, and procedures regarding the management of the Installation Access Control Program. Review superior, lateral, and subordinate command decisions on and/or interpretation of supplied guidance to assess their impact on the Installation Access Control Program. Perform review and analysis to ensure that resources supplied to subordinate commands are used in the most efficient and cost-effective manner.- Review and analyze a variety of other types of documents to ensure consistency between and among these and the organization’s functions.- Perform supply justification, prioritization, and cost guidance for Installation Access Control Program resources funding.- Serve as subject matter expert on the Installation Access Control Program. Reconcile Installation Access Control Program.
Qualifications
Candidates must have:
- Thorough understanding of USAFCENT Installation Access Control Programs (IACS), goals, and objectives, and understand the interrelationships of individual programs in regards to other programs and functions.
- Skill in formal and informal briefings, negotiations, and training to senior staff members, USAFCENT commanders and end-users of regulations and IACS. Prepare information papers for dissemination throughout the USAFCENT Theater of operations, as needed.
- Proficiency in the use of Microsoft Office.
- Three (3) years of experience and knowledge of USAFCENT Installation IACS.
- A current state and Government Driver’s License.
- Active Secret Clearance
All employees must successfully pass all medical screening as required per CENTCOMdeployment standards.
Under the 9AF ESFS contract, all applicants are subject to an in-depth background check to ensure regulation compliance. Eligible applicants will not have any of the following:
- Pending criminal or civil charges (including divorce/child custody proceedings)
- Felony arrest record
- Alcohol related arrest in the last five years
- Any type of moral turpitude arrest record/history (including, but not limited to, prostitution, pandering, voyeurism, public indecency)
- Any type of involvement in hate crimes
- History of violence
- Involvement in any group or organization that espouses extralegalviolence as a legitimate means to achieve an end
Benefit and Compensation Transparency
ITA International proudly complies with all federal and state benefit and pay transparency laws. Employees of ITA can expect a robust benefit package, including:
- Medical, dental and vision plans
- Life Insurance
- Short Term Disability insurance (where applicable)
- Voluntary ancillary benefit options
- 401k retirement benefits with employer matching contributions
Application and Employment at ITA International
ITA International is an Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law.
In compliance with the ADA Amendments Act (ADAAA), ITA International would like to ensure that your application process goes as smoothly as possible. If you would like to preview the physical requirements for this position, or if you have a disability and would like to request an accommodation in order to apply for a currently open position with ITA, please contact us by phone at or email us at
#J-18808-Ljbffr
Installation Access Control/Defense Biometrics Identification Systems Support
Posted 1 day ago
Job Viewed
Job Description
At ITA International, we ’ re a tech-enabled professional services company. Headquartered in Newport News, Virginia, we leverage subject matter expertise, data analytics and technology to challenge boundaries and transform possibilities. With a global presence and a passionate team of over 200 ITAers, we ’ re driven by mission success for our customers, “ In The Arena. ” Our expertise spans Operations, Training, Engineering, Nanotechnology, Statistics, Machine Learning and Software Engineering – enabling data and tech-enabled solutions that deliver real value. Join our impactful journey at ITA International. As Theodore Roosevelt said, “ The credit belongs to the man who is actually in the arena. ” We ’ re here, standing beside our customers , ready to serve and succeed. ITA is seeking an Installation Access Control/Defense Biometrics Identification Systems Support Professional to join the team in Kuwait Please note this position is contingent upon position vacancy.
Responsibilities
The selected candidate will play a vital role in supporting the 9th Air Force, a key component of the United States Air Force Central Command (AFCENT) overseeing operations in the Middle East. This position provides subject matter expertise to the 9th Air Force Expeditionary Security Forces Squadron, helping ensure base security and critical support services in one of the most dynamic and strategically important regions in the world. The 9 th Air Force serves at other locations such as Al Dhafra AB, UAE; Ali Al Salem AB, Kuwait; Al Mubarak Air Base, Kuwait; Prince Sultan AB (PSAB), Kingdom of Saudi Arabia (KSA); Muwaffaq-Salti AB (MSAB), Jordan; Al Udeid AB, Qatar and in CONUS. The Contractor Shall Manage the Defense Biometrics Identification System. Perform a variety of duties directly related to the development and/or management of the Installation Access Control Program supporting the mission of the major command. Manage the Program that extends from the HQ staff level over several echelons to field units, and present very considerable complexities due to their structuring and extensive relationships (functional and financial). Analyze a variety of complex and extensive policies, plans, regulations, and other higher-level guidance to determine overall impacts on specific program areas and functions of the Installation Access Control Program. Develop guidance, objectives, policies, plans, and procedures regarding the management of the Installation Access Control Program. Review superior, lateral, and subordinate command decisions on and/or interpretation of supplied guidance to assess their impact on the Installation Access Control Program. Perform review and analysis to ensure that resources supplied to subordinate commands are used in the most efficient and cost-effective manner. Review and analyze a variety of other types of documents to ensure consistency between and among these and the organization’s functions. Perform supply justification, prioritization, and cost guidance for Installation Access Control Program resources funding. Serve as subject matter expert on the Installation Access Control Program. Reconcile Installation Access Control Program.
Qualifications
Candidates must have: Thorough understanding of USAFCENT Installation Access Control Programs (IACS), goals, and objectives, and understand the interrelationships of individual programs in regards to other programs and functions. Skill in formal and informal briefings, negotiations, and training to senior staff members, USAFCENT commanders and end-users of regulations and IACS. Prepare information papers for dissemination throughout the USAFCENT Theater of operations, as needed. Proficiency in the use of Microsoft Office. Three (3) years of experience and knowledge of USAFCENT Installation IACS. A current state and Government Driver’s License. Active Secret Clearance All employees must successfully pass all medical screening as required per CENTCOM deployment standards. Under The 9AF ESFS Contract, All Applicants Are Subject To An In-depth Background Check To Ensure Regulation Compliance. Eligible Applicants Will Not Have Any Of The Following Pending criminal or civil charges (including divorce/child custody proceedings) Felony arrest record Alcohol related arrest in the last five years Any type of moral turpitude arrest record/history (including, but not limited to, prostitution, pandering, voyeurism, public indecency) Any type of involvement in hate crimes History of violence Involvement in any group or organization that espouses extralegalviolence as a legitimate means to achieve an end
Benefit And Compensation Transparency
ITA International proudly complies with all federal and state benefit and pay transparency laws. Employees of ITA can expect a robust benefit package, including: Medical, dental and vision plans Life Insurance Short Term Disability insurance (where applicable) Voluntary ancillary benefit options 401k retirement benefits with employer matching contributions
Application and Employment at ITA International
ITA International is an Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law. In compliance with the ADA Amendments Act (ADAAA), ITA International would like to ensure that your application process goes as smoothly as possible. If you would like to preview the physical requirements for this position, or if you have a disability and would like to request an accommodation in order to apply for a currently open position with ITA, please contact us by phone at or email us at
#J-18808-Ljbffr
Installation Access Control/Defense Biometrics Identification Systems Support
Posted 2 days ago
Job Viewed
Job Description
At ITA International, we’re a tech-enabled professional services company. Headquartered in Newport News, Virginia, we leverage subject matter expertise, data analytics and technology to challenge boundaries and transform possibilities.
With a global presence and a passionate team of over 200 ITAers, we’re driven by mission success for our customers, “In The Arena.” Our expertise spans Operations, Training, Engineering, Nanotechnology, Statistics, Machine Learning and Software Engineering – enabling data and tech-enabled solutions that deliver real value.
Join our impactful journey at ITA International. As Theodore Roosevelt said, “The credit belongs to the man who is actually in the arena.” We’re here, standing beside our customers, ready to serve and succeed.
ITA is seeking an Installation Access Control/Defense Biometrics Identification Systems Support Professional to join the team in Kuwait
*Please note this position is contingent upon position vacancy.*
Responsibilities The selected candidate will play a vital role in supporting the 9th Air Force, a key component of the United States Air Force Central Command (AFCENT) overseeing operations in the Middle East. This position provides subject matter expertise to the 9th Air Force Expeditionary Security Forces Squadron, helping ensure base security and critical support services in one of the most dynamic and strategically important regions in the world. The 9th Air Force serves at other locations such as Al Dhafra AB, UAE; Ali Al Salem AB, Kuwait; Al Mubarak Air Base, Kuwait; Prince Sultan AB (PSAB), Kingdom of Saudi Arabia (KSA); Muwaffaq-Salti AB (MSAB), Jordan; Al Udeid AB, Qatar and in CONUS.
The Contractor shall:- Manage the Defense Biometrics Identification System. Perform a variety of duties directly related to the development and/or management of the Installation Access Control Program supporting the mission of the major command.- Manage the Program that extend sfrom the HQ staff level over several echelons to field units, and present very considerable complexities due to their structuring and extensive relationships (functional and financial).- Analyze a variety of complex and extensive policies, plans, regulations, and other higher-level guidance to determine overall impacts on specific program areas and functions of the Installation Access Control Program.- Develop guidance, objectives, policies, plans, and procedures regarding the management of the Installation Access Control Program. Review superior, lateral, and subordinate command decisions on and/or interpretation of supplied guidance to assess their impact on the Installation Access Control Program. Perform review and analysis to ensure that resources supplied to subordinate commands are used in the most efficient and cost-effective manner.- Review and analyze a variety of other types of documents to ensure consistency between and among these and the organization’s functions.- Perform supply justification, prioritization, and cost guidance for Installation Access Control Program resources funding.- Serve as subject matter expert on the Installation Access Control Program. Reconcile Installation Access Control Program.
Qualifications Candidates must have:
- Thorough understanding of USAFCENT Installation Access Control Programs (IACS), goals, and objectives, and understand the interrelationships of individual programs in regards to other programs and functions.
- Skill in formal and informal briefings, negotiations, and training to senior staff members, USAFCENT commanders and end-users of regulations and IACS. Prepare information papers for dissemination throughout the USAFCENT Theater of operations, as needed.
- Proficiency in the use of Microsoft Office.
- Three (3) years of experience and knowledge of USAFCENT Installation IACS.
- A current state and Government Driver’s License.
- Active Secret Clearance
All employees must successfully pass all medical screening as required per
CENTCOM deployment standards.
Under the 9AF ESFS contract, all applicants are subject to an in-depth background check to ensure regulation compliance. Eligible applicants will not have any of the following:
Pending criminal or civil charges (including divorce/child custody proceedings)
Felony arrest record
Alcohol related arrest in the last five years
Any type of moral turpitude arrest record/history (including, but not limited to, prostitution, pandering, voyeurism, public indecency)
Any type of involvement in hate crimes
History of violence
Involvement in any group or organization that espouses extralegalviolence as a legitimate means to achieve an end
Benefit and Compensation Transparency ITA International proudly complies with all federal and state benefit and pay transparency laws. Employees of ITA can expect a robust benefit package, including:
Medical, dental and vision plans
Life Insurance
Short Term Disability insurance (where applicable)
Voluntary ancillary benefit options
401k retirement benefits with employer matching contributions
Application and Employment at ITA International ITA International is an Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law.
In compliance with the ADA Amendments Act (ADAAA), ITA International would like to ensure that your application process goes as smoothly as possible. If you would like to preview the physical requirements for this position, or if you have a disability and would like to request an accommodation in order to apply for a currently open position with ITA, please contact us by phone at or email us at
#J-18808-Ljbffr
Senior Information Security Auditor
Posted 2 days ago
Job Viewed
Job Description
Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company
Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company
- Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
- Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
- Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
- Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
- Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
- Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
- Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
- Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
- Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
- Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
- Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
- Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
- Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
- Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
- Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
- Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
- Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
- Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
- Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
- Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
- Relevant University Degree in Information Security or Information Technology.
- Professional Qualifications in Information Security.
- Minimum 5 Years of Experience in IT audit or Information Security Audit.
- Have a Valid Transferrable Visa in Kuwait.
We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- TrainingSeniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Business Consulting and Services
Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x
Sign in to set job alerts for “Security Auditor” roles. Technical Solutions Consultant, Security (Arabic) Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrSenior Information Security Auditor
Posted 2 days ago
Job Viewed
Job Description
Senior Information Security Auditor
role at
Boubyan Consulting Company Join to apply for the
Senior Information Security Auditor
role at
Boubyan Consulting Company Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices. Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks. Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly. Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings. Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce. Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements. Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards. Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process. Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors. Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices. Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks. Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly. Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings. Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce. Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements. Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards. Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process. Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors. Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
Job Requirements
Relevant University Degree in Information Security or Information Technology. Professional Qualifications in Information Security. Minimum 5 Years of Experience in IT audit or Information Security Audit. Have a Valid Transferrable Visa in Kuwait.
About Boubyan Consulting
We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- Training Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries Business Consulting and Services Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x Sign in to set job alerts for “Security Auditor” roles.
Technical Solutions Consultant, Security (Arabic)
Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate
Posted 1 day ago
Job Viewed
Job Description
All Jobs > CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate
Location: Kuwait
Position Type: Full-time
DescriptionAs a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will support the Army Network Enterprise Technology Command (NETCOM) on the DoDIN-A Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. You will be part of the CAC/PKI Registration Authority (LRA) operations team, responsible for token issuance, maintenance, and revocation for the Army.
Requirements- Provide 24/7 On-Call and Emergency Response
- Respond to emergencies within two hours of notification
- Maintain an asset inventory of PKI equipment at all sites
- Support DoD Compliance Audits
- Address audit findings per DoD PKI policies
- Develop and maintain training packages
- Test PKI system software and token compatibility
- Verify subscriber identities and pre-register users
- Validate certificate requirements and handle revocations
- Support token issuance, renewal, and delivery of reports
- Complete requests for PIN resets, revocations, key recoveries, and token requests within specified timelines
- Submit activity and token reports monthly
- Prepare reports for NSA and HQDA
- Hold a Secret Security Clearance with Tier 5 background investigation
- Have 3+ years of experience in PKI and related fields
- Have never been relieved of trusted duties or had security clearance revoked
- Have never been convicted of a felony
- Complete RA/LRA training provided by DISA
- DoD Cyber Workforce Framework (DCWF 631) Security Developer Intermediate qualification or equivalent
- Sitting and standing for long periods
- Mobility within an office environment
- Stoop, kneel, crouch, crawl as needed
- Travel less than 10%
QBE is an equal opportunity employer. All qualified applicants will receive consideration regardless of race, color, religion, sex, national origin, sexual orientation, gender identity/expression, age, disability, veteran status, genetic information, pregnancy, marital status, neurodivergence, ethnicity, caste, or military service.
#J-18808-LjbffrBe The First To Know
About the latest Access control Jobs in Kuwait !
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior
Posted 1 day ago
Job Viewed
Job Description
All Jobs > CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior
Kuwait
Full-time
Description
As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will provide services in support of the Army Network Enterprise Technology Command (NETCOM) on the Army Department of Defense Information Network (DoDIN-A) Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. As a member of the CAC/PKI Registration Authority (LRA) operations team, you will provide token issuance, sustainment, maintenance, and revocation to the Army customer.
Requirements
Highlights of Responsibilities:
- Provide 24/7 On-Call and Emergency Response
- Respond to emergency calls and arrive at the designated work site within two (2) hours after receiving the emergency call from the COR
- Provide leadership, supervision, and mentorship to the RA/LRA team, ensuring all responsibilities are executed in compliance with DoD PKI CPS and RPS requirements
- Provide RA support to the LRA personnel in creation of NIPRNET and SIPRNET PKI tokens
- Provide RA interface with the Trusted Agent (TA) for token request and distribution
- Maintain an asset inventory list of all PKI daily operations equipment by location at all RA/LRA sites
- Provide support for annual and semi-annual DoD Compliance Audits
- Support the Army CIO/G6 Cyber Security Directorate and the NETCOM G3/5 in addressing audit findings to include mitigation and correction of findings in accordance with DoD PKI CPS and RPS
- Develop and maintain On-the-Job Training packages
- Support test events of the global management PKI system software and token versions to assess backwards compatibility and interoperability
- Verify Subscriber’s identity
- Pre-register users with PKI
- Validate NPE certificate requirements and forward revocation requests
- Support issuance and renewal of SIPRNET tokens and/or NIPRNET Alternate Smart Card Logon
- Support production of and delivery of an Issuance Report detailing number of tokens issued, revoked, renewed, and any issues encountered
- Conduct duties as assigned through NSS/PKI RPS and DoD/PKI RA/LRA CPS
- Complete General Officer/Senior Executive Service requests within 12 hours of receipt
- Complete request for PIN reset, unlock code, revocation and re-issuance of a failed token CRI within 24 hours
- Complete request for key recoveries within 48 hours
- Complete new ASCL and NSS SIPRNET token request within 72 hours
- Submit a monthly RA Activity Report
- Submit a monthly Token Report of all tokens on hand to include returned and bad tokens
- Provide the weekly RA Backlog Report of any activities that fall outside the response timelines identified in the sections titled Response Time
- Prepare a monthly NSA Failed Token Report for HQDA to submit to NSA Program Manager Office
Qualifications
- Secret Security Clearance with a completed Tier 5 (T5) background investigation
- 5+ years of experience
- Advanced operational expertise in Smart Tokens, PKI, Certificate Revocation, CAC Pin Reset, PKE, biometrics, logical and physical access, tactical PKI, and directory services
- Have never been previously relieved of trusted role duties for reasons of negligence or nonperformance of duties
- Have never been denied or had a security clearance revoked
- Have never been convicted of a felony offense
- Must complete RA/LRA training provided by DISA prior to receiving RA or LRA credentials
Preferred Qualifications:
- DoD Cyber Workforce Framework (DCWF 631) Information Systems Security Developer Intermediate qualified (BS degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science or CSC or GCLD or CASP+ or CCSP or Cloud+ or GSEC) or equivalent certification
Physical Requirements:
- Sitting for long periods
- Standing for long periods
- Ambulate throughout an office
- Stoop, kneel, crouch, or crawl as required
- Travel by land or air transportation 10% or less
QBE is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender, gender-identity and/or expression, age, disability, Veteran status, genetic information, pregnancy (including childbirth, lactation, or other related medical conditions), marital-status, neurodivergence, ethnicity, ancestry, caste, military/uniformed service-member status, or any other characteristic protected by applicable federal, state, local, or international law.
#J-18808-LjbffrCAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate
Posted 2 days ago
Job Viewed
Job Description
Kuwait Position Type:
Full-time Description
As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will support the Army Network Enterprise Technology Command (NETCOM) on the DoDIN-A Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. You will be part of the CAC/PKI Registration Authority (LRA) operations team, responsible for token issuance, maintenance, and revocation for the Army. Requirements
Provide 24/7 On-Call and Emergency Response Respond to emergencies within two hours of notification Maintain an asset inventory of PKI equipment at all sites Support DoD Compliance Audits Address audit findings per DoD PKI policies Develop and maintain training packages Test PKI system software and token compatibility Verify subscriber identities and pre-register users Validate certificate requirements and handle revocations Support token issuance, renewal, and delivery of reports Complete requests for PIN resets, revocations, key recoveries, and token requests within specified timelines Submit activity and token reports monthly Prepare reports for NSA and HQDA Hold a Secret Security Clearance with Tier 5 background investigation Have 3+ years of experience in PKI and related fields Have never been relieved of trusted duties or had security clearance revoked Have never been convicted of a felony Complete RA/LRA training provided by DISA Preferred Qualifications
DoD Cyber Workforce Framework (DCWF 631) Security Developer Intermediate qualification or equivalent Physical Requirements
Sitting and standing for long periods Mobility within an office environment Stoop, kneel, crouch, crawl as needed Travel less than 10% QBE is an equal opportunity employer. All qualified applicants will receive consideration regardless of race, color, religion, sex, national origin, sexual orientation, gender identity/expression, age, disability, veteran status, genetic information, pregnancy, marital status, neurodivergence, ethnicity, caste, or military service.
#J-18808-Ljbffr
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior
Posted 2 days ago
Job Viewed
Job Description
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior Kuwait Full-time Description As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will provide services in support of the Army Network Enterprise Technology Command (NETCOM) on the Army Department of Defense Information Network (DoDIN-A) Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. As a member of the CAC/PKI Registration Authority (LRA) operations team, you will provide token issuance, sustainment, maintenance, and revocation to the Army customer. Requirements Highlights of Responsibilities: Provide 24/7 On-Call and Emergency Response Respond to emergency calls and arrive at the designated work site within two (2) hours after receiving the emergency call from the COR Provide leadership, supervision, and mentorship to the RA/LRA team, ensuring all responsibilities are executed in compliance with DoD PKI CPS and RPS requirements Provide RA support to the LRA personnel in creation of NIPRNET and SIPRNET PKI tokens Provide RA interface with the Trusted Agent (TA) for token request and distribution Maintain an asset inventory list of all PKI daily operations equipment by location at all RA/LRA sites Provide support for annual and semi-annual DoD Compliance Audits Support the Army CIO/G6 Cyber Security Directorate and the NETCOM G3/5 in addressing audit findings to include mitigation and correction of findings in accordance with DoD PKI CPS and RPS Develop and maintain On-the-Job Training packages Support test events of the global management PKI system software and token versions to assess backwards compatibility and interoperability Verify Subscriber’s identity Pre-register users with PKI Validate NPE certificate requirements and forward revocation requests Support issuance and renewal of SIPRNET tokens and/or NIPRNET Alternate Smart Card Logon Support production of and delivery of an Issuance Report detailing number of tokens issued, revoked, renewed, and any issues encountered Conduct duties as assigned through NSS/PKI RPS and DoD/PKI RA/LRA CPS Complete General Officer/Senior Executive Service requests within 12 hours of receipt Complete request for PIN reset, unlock code, revocation and re-issuance of a failed token CRI within 24 hours Complete request for key recoveries within 48 hours Complete new ASCL and NSS SIPRNET token request within 72 hours Submit a monthly RA Activity Report Submit a monthly Token Report of all tokens on hand to include returned and bad tokens Provide the weekly RA Backlog Report of any activities that fall outside the response timelines identified in the sections titled Response Time Prepare a monthly NSA Failed Token Report for HQDA to submit to NSA Program Manager Office Qualifications Secret Security Clearance with a completed Tier 5 (T5) background investigation 5+ years of experience Advanced operational expertise in Smart Tokens, PKI, Certificate Revocation, CAC Pin Reset, PKE, biometrics, logical and physical access, tactical PKI, and directory services Have never been previously relieved of trusted role duties for reasons of negligence or nonperformance of duties Have never been denied or had a security clearance revoked Have never been convicted of a felony offense Must complete RA/LRA training provided by DISA prior to receiving RA or LRA credentials Preferred Qualifications: DoD Cyber Workforce Framework (DCWF 631) Information Systems Security Developer Intermediate qualified (BS degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science or CSC or GCLD or CASP+ or CCSP or Cloud+ or GSEC) or equivalent certification Physical Requirements: Sitting for long periods Standing for long periods Ambulate throughout an office Stoop, kneel, crouch, or crawl as required Travel by land or air transportation 10% or less QBE is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender, gender-identity and/or expression, age, disability, Veteran status, genetic information, pregnancy (including childbirth, lactation, or other related medical conditions), marital-status, neurodivergence, ethnicity, ancestry, caste, military/uniformed service-member status, or any other characteristic protected by applicable federal, state, local, or international law.
#J-18808-Ljbffr