13 Chief Information Security Officer jobs in Kuwait
Senior Risk Management Analyst
Posted 10 days ago
Job Viewed
Job Description
Join to apply for the Senior Risk Management Analyst role at Mezzan Foods
Join to apply for the Senior Risk Management Analyst role at Mezzan Foods
Get AI-powered advice on this job and more exclusive features.
- Identify risk data sources and coordinate with the relevant departments and subsidiaries across Mezzan to ensure timely availability of data (e.g., Finance, IT, BUs) for effective data management.
- Develop and implement plans to identify data gaps, improve data availability, quality, and timeliness to enhance existing data collection methods and support risk management processes.
- Drive the automation of risk data gathering and validation processes, overseeing the creation and maintenance of data extraction and processing queries to streamline data access, reporting, and analysis.
- Provide data support and automation assistance to the risk management functions to facilitate effective implementation of risk management procedures.
- Supervise the data reconciliation and validation with financial control, IT, business units, and subsidiaries to ensure adherence to established risk management standards.
- Design, establish, and maintain a robust Risk Management Information System (RMIS) as per the Group ERM Framework and Reporting Protocols.
- Analyze big data and provide solutions in conjunction with IT & SAP teams.
- Manage the Risk Management Information System (RMIS) & coordinate all necessary changes with system admins / service provider.
- Perform Quantitative Risk Analysis and calculating EMVs (Expected Monetary Values) to all applicable types of financial risks.
- Review process understanding working papers prepared by Risk Analysts as well as explaining the link between the Group structure, systems, processes and risk practices.
- Review and analyze relevant metrics and KRIs as per the KRI Program Plan designing KRI trend analysis and reports accordingly.
- Design and implement an overall risk management process for Mezzan, which includes an analysis of the financial impact on the company when risks occur.
- Analyze current risks, identify potential emerging risks, and evaluate Group’s historical risk management performance comparing potential risks against established criteria (e.g., cost, legal requirements).
- Prepare and maintain Risk Appetite, Risk Incidents, Country-wide, Division-wide, and Business Unit-wide Dashboards as per the risk management plan.
- Develop Business Division Risk Reports for assigned risk area / categories as per the risk management plan.
Shared services (Head Office)
Job Description
- Identify risk data sources and coordinate with the relevant departments and subsidiaries across Mezzan to ensure timely availability of data (e.g., Finance, IT, BUs) for effective data management.
- Develop and implement plans to identify data gaps, improve data availability, quality, and timeliness to enhance existing data collection methods and support risk management processes.
- Drive the automation of risk data gathering and validation processes, overseeing the creation and maintenance of data extraction and processing queries to streamline data access, reporting, and analysis.
- Provide data support and automation assistance to the risk management functions to facilitate effective implementation of risk management procedures.
- Supervise the data reconciliation and validation with financial control, IT, business units, and subsidiaries to ensure adherence to established risk management standards.
- Design, establish, and maintain a robust Risk Management Information System (RMIS) as per the Group ERM Framework and Reporting Protocols.
- Analyze big data and provide solutions in conjunction with IT & SAP teams.
- Manage the Risk Management Information System (RMIS) & coordinate all necessary changes with system admins / service provider.
- Perform Quantitative Risk Analysis and calculating EMVs (Expected Monetary Values) to all applicable types of financial risks.
- Review process understanding working papers prepared by Risk Analysts as well as explaining the link between the Group structure, systems, processes and risk practices.
- Review and analyze relevant metrics and KRIs as per the KRI Program Plan designing KRI trend analysis and reports accordingly.
- Design and implement an overall risk management process for Mezzan, which includes an analysis of the financial impact on the company when risks occur.
- Analyze current risks, identify potential emerging risks, and evaluate Group’s historical risk management performance comparing potential risks against established criteria (e.g., cost, legal requirements).
- Prepare and maintain Risk Appetite, Risk Incidents, Country-wide, Division-wide, and Business Unit-wide Dashboards as per the risk management plan.
- Develop Business Division Risk Reports for assigned risk area / categories as per the risk management plan.
- Must have expertise in data analytics.
- Detail Oriented.
- Excellent Communication and Presentation Skills.
- Highly proficient in MS Office Applications.
- Ability to work in a team, strong work ethic, flexibility and adaptability.
- Mandatory: Bachelors’ degree in Accounting, Risk Management, Business Administration, or Information Systems.
- Professional Certification(s) such as CRMA, RMP, CFE, CRA, etc. (Desirable)
- A minimum of 5-8 years in external audit, risk consulting, financial planning, analysis or relevant experience.
Mezzan Holding Co.is one of the leading food, healthcare, and consumer conglomerates in the Middle East with a celebrated heritage of over 75 years. Headquartered in Kuwait with direct operational activities in Kuwait, UAE, Qatar, Saudi Arabia, Iraq and Jordan Mezzan Holding Co: Employs 8,500 people (50+ nationalities) Distributes over 34,000 Stock Keeping Units (SKU) Serves over 100,000 meals a day in Kuwait, Qatar and the UAE through its catering business. Has a total of 130,000 square meters in food, beverage and FMCG manufacturing facilities in Kuwait, Qatar, UAE. Represents some of the biggest names in the FMCG and healthcare industries.
Apply NowSeniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Finance and Sales
- Industries Food and Beverage Manufacturing
Referrals increase your chances of interviewing at Mezzan Foods by 2x
Sign in to set job alerts for “Senior Risk Analyst” roles. Hiring Office Assistant – Fluent in English – Freshers Can Apply Required Assistant (Labour type) part time male only Administrative Officer – Engineering Environment we are looking Computer operator for part timeWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrSenior Information Security Auditor
Posted 3 days ago
Job Viewed
Job Description
Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company
Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company
- Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
- Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
- Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
- Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
- Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
- Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
- Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
- Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
- Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
- Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
- Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
- Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
- Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
- Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
- Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
- Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
- Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
- Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
- Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
- Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
- Relevant University Degree in Information Security or Information Technology.
- Professional Qualifications in Information Security.
- Minimum 5 Years of Experience in IT audit or Information Security Audit.
- Have a Valid Transferrable Visa in Kuwait.
We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- TrainingSeniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Business Consulting and Services
Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x
Sign in to set job alerts for “Security Auditor” roles. Technical Solutions Consultant, Security (Arabic) Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrSenior Information Security Analyst
Posted 3 days ago
Job Viewed
Job Description
About the Role
The Senior Manager of Talent Acquisition and Development will oversee the recruitment and development processes within GIG Kuwait. The role involves strategic planning to attract, hire, and retain top talent, as well as implementing training and development programs to enhance employee skills and organizational growth.
Responsibilities
- Develop and execute talent acquisition strategies to meet organizational needs.
- Manage the recruitment process, including sourcing, interviewing, and onboarding new employees.
- Design and implement employee development and training programs.
- Collaborate with department heads to identify staffing needs and skill gaps.
- Maintain talent acquisition metrics and reporting.
- Ensure compliance with employment laws and regulations.
- Foster a positive work environment and company culture.
- Stay updated on industry trends in talent acquisition and development.
Qualifications
- Bachelor's degree in Human Resources, Business Administration, or related field.
- Proven experience in talent acquisition and employee development.
- Strong leadership and communication skills.
- Knowledge of HR software and applicant tracking systems.
Seniority Level
- Senior management
Employment Type
- Full-time
Job Function
- Human Resources / Talent Acquisition
Senior Information Security Auditor
Posted 10 days ago
Job Viewed
Job Description
Senior Information Security Auditor
role at
Boubyan Consulting Company Join to apply for the
Senior Information Security Auditor
role at
Boubyan Consulting Company Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices. Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks. Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly. Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings. Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce. Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements. Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards. Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process. Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors. Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices. Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks. Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly. Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings. Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce. Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements. Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards. Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process. Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors. Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
Job Requirements
Relevant University Degree in Information Security or Information Technology. Professional Qualifications in Information Security. Minimum 5 Years of Experience in IT audit or Information Security Audit. Have a Valid Transferrable Visa in Kuwait.
About Boubyan Consulting
We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- Training Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries Business Consulting and Services Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x Sign in to set job alerts for “Security Auditor” roles.
Technical Solutions Consultant, Security (Arabic)
Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Senior Information Security Analyst
Posted 25 days ago
Job Viewed
Job Description
The Senior Manager of Talent Acquisition and Development will oversee the recruitment and development processes within GIG Kuwait. The role involves strategic planning to attract, hire, and retain top talent, as well as implementing training and development programs to enhance employee skills and organizational growth.
Responsibilities
Develop and execute talent acquisition strategies to meet organizational needs.
Manage the recruitment process, including sourcing, interviewing, and onboarding new employees.
Design and implement employee development and training programs.
Collaborate with department heads to identify staffing needs and skill gaps.
Maintain talent acquisition metrics and reporting.
Ensure compliance with employment laws and regulations.
Foster a positive work environment and company culture.
Stay updated on industry trends in talent acquisition and development.
Qualifications
Bachelor's degree in Human Resources, Business Administration, or related field.
Proven experience in talent acquisition and employee development.
Strong leadership and communication skills.
Knowledge of HR software and applicant tracking systems.
Seniority Level
Senior management
Employment Type
Full-time
Job Function
Human Resources / Talent Acquisition
#J-18808-Ljbffr
IT Security Specialist – Information Security
Posted 3 days ago
Job Viewed
Job Description
Job Duties Include But Are Not Limited To:
We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team.
The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats.
- Identify and fix vulnerabilities within existing security systems.
- Develop organization-wide security measures.
- Document known security breaches and vulnerabilities.
- Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards.
- Monitor and analyze security events and incidents to identify and respond to potential threats promptly.
- Perform penetration tests to assess potential security problems.
- Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks.
- Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications.
- Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required.
- Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements.
- Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR).
- Establish relationships with external cybersecurity partners, vendors, and service providers.
- Plan incident response activities, including investigating security breaches and recommending corrective actions.
- Participate in the change management process.
Required Qualification:
- Education: Bachelor's degree in Computer Science, Information Systems, or a related field.
- Experience: 3 to 4 years of experience in an IT security role.
- Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels.
- Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills.
- Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines.
- Strategic Thinking: Ability to align solution deliverables with the organization's goals.
Required Professional Skills:
- Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems.
- Operating System Administration: Proficiency in securing Windows, Linux, and macOS.
- Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures.
- Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell.
- Encryption Techniques: Knowledge of implementing and managing encryption for data protection.
- Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware).
- Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.
IT Security Specialist – Information Security
Posted 17 days ago
Job Viewed
Job Description
Join to apply for the IT Security Specialist – Information Security role at KDD
Continue with Google Continue with Google
IT Security Specialist – Information SecurityJoin to apply for the IT Security Specialist – Information Security role at KDD
Job Duties Include But Are Not Limited To
We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team.
The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats.
- Identify and fix vulnerabilities within existing security systems.
- Develop organization-wide security measures.
- Document known security breaches and vulnerabilities.
- Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards.
- Monitor and analyze security events and incidents to identify and respond to potential threats promptly.
- Perform penetration tests to assess potential security problems.
- Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks.
- Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications.
- Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required.
- Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements.
- Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR).
- Establish relationships with external cybersecurity partners, vendors, and service providers.
- Plan incident response activities, including investigating security breaches and recommending corrective actions.
- Participate in the change management process.
- Education: Bachelor's degree in Computer Science, Information Systems, or a related field.
- Experience: 3 to 4 years of experience in an IT security role.
- Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels.
- Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills.
- Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines.
- Strategic Thinking: Ability to align solution deliverables with the organization's goals.
- Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems.
- Operating System Administration: Proficiency in securing Windows, Linux, and macOS.
- Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures.
- Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell.
- Encryption Techniques: Knowledge of implementing and managing encryption for data protection.
- Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware).
- Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Dairy Product Manufacturing
Referrals increase your chances of interviewing at KDD by 2x
Get notified about new Information Technology Security Specialist jobs in Farwaniya, Kuwait .
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrBe The First To Know
About the latest Chief information security officer Jobs in Kuwait !
IT Security Specialist – Information Security
Posted 17 days ago
Job Viewed
Job Description
Join to apply for the
IT Security Specialist – Information Security
role at
KDD Continue with Google Continue with Google IT Security Specialist – Information Security
Join to apply for the
IT Security Specialist – Information Security
role at
KDD Job Duties Include But Are Not Limited To
We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team.
The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats.
Identify and fix vulnerabilities within existing security systems. Develop organization-wide security measures. Document known security breaches and vulnerabilities. Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards. Monitor and analyze security events and incidents to identify and respond to potential threats promptly. Perform penetration tests to assess potential security problems. Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks. Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications. Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required. Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements. Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR). Establish relationships with external cybersecurity partners, vendors, and service providers. Plan incident response activities, including investigating security breaches and recommending corrective actions. Participate in the change management process.
Required Qualification
Education: Bachelor's degree in Computer Science, Information Systems, or a related field. Experience: 3 to 4 years of experience in an IT security role. Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels. Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills. Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines. Strategic Thinking: Ability to align solution deliverables with the organization's goals.
Required Professional Skills
Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems. Operating System Administration: Proficiency in securing Windows, Linux, and macOS. Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures. Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell. Encryption Techniques: Knowledge of implementing and managing encryption for data protection. Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware). Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.
Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries Dairy Product Manufacturing Referrals increase your chances of interviewing at KDD by 2x Get notified about new Information Technology Security Specialist jobs in
Farwaniya, Kuwait . We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
IT Security Specialist – Information Security
Posted 23 days ago
Job Viewed
Job Description
#J-18808-Ljbffr
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate
Posted 3 days ago
Job Viewed
Job Description
All Jobs > CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate
Location: Kuwait
Position Type: Full-time
DescriptionAs a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will support the Army Network Enterprise Technology Command (NETCOM) on the DoDIN-A Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. You will be part of the CAC/PKI Registration Authority (LRA) operations team, responsible for token issuance, maintenance, and revocation for the Army.
Requirements- Provide 24/7 On-Call and Emergency Response
- Respond to emergencies within two hours of notification
- Maintain an asset inventory of PKI equipment at all sites
- Support DoD Compliance Audits
- Address audit findings per DoD PKI policies
- Develop and maintain training packages
- Test PKI system software and token compatibility
- Verify subscriber identities and pre-register users
- Validate certificate requirements and handle revocations
- Support token issuance, renewal, and delivery of reports
- Complete requests for PIN resets, revocations, key recoveries, and token requests within specified timelines
- Submit activity and token reports monthly
- Prepare reports for NSA and HQDA
- Hold a Secret Security Clearance with Tier 5 background investigation
- Have 3+ years of experience in PKI and related fields
- Have never been relieved of trusted duties or had security clearance revoked
- Have never been convicted of a felony
- Complete RA/LRA training provided by DISA
- DoD Cyber Workforce Framework (DCWF 631) Security Developer Intermediate qualification or equivalent
- Sitting and standing for long periods
- Mobility within an office environment
- Stoop, kneel, crouch, crawl as needed
- Travel less than 10%
QBE is an equal opportunity employer. All qualified applicants will receive consideration regardless of race, color, religion, sex, national origin, sexual orientation, gender identity/expression, age, disability, veteran status, genetic information, pregnancy, marital status, neurodivergence, ethnicity, caste, or military service.
#J-18808-Ljbffr