18 Ciso jobs in Kuwait

Assistant/Associate Chief Information Officer

American International University

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Job Overview:

The Assistant/Associate Chief Information Officer will lead the university’s IT strategy, aligning technology with academic and operational goals. This senior role ensures robust IT infrastructure, fosters innovation, and drives efficiency while maintaining security and compliance.

Key Responsibilities:

  1. Develop and execute the university’s IT strategy aligned with its objectives.
  2. Oversee IT systems, infrastructure, and applications to enhance efficiency and user experience.
  3. Ensure cybersecurity, data protection, and compliance with regulatory standards.
  4. Lead disaster recovery and business continuity planning.
  5. Identify and implement emerging technologies to support innovation.
  6. Manage IT budgets and resource allocation effectively.
  7. Inspire and guide a collaborative, high-performing IT team.

Qualifications:

  1. Master’s degree in IT, Computer Science, Business Administration, or related fields.
  2. Preferred certifications: CISSP, PMP, CCIO.
  3. Proven success in IT leadership roles such as Director, VP, or CIO.
  4. Strong leadership, project management, and team development skills.
  5. Strategic thinking with the ability to align IT with institutional goals.
  6. Expertise in cybersecurity, IT project management, and emerging technologies.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Assistant/Associate Chief Information Officer

Kuwait City, Al Kuwayt American International University

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

Job Overview: The Assistant/Associate Chief Information Officer will lead the university’s IT strategy, aligning technology with academic and operational goals. This senior role ensures robust IT infrastructure, fosters innovation, and drives efficiency while maintaining security and compliance. Key Responsibilities: Develop and execute the university’s IT strategy aligned with its objectives. Oversee IT systems, infrastructure, and applications to enhance efficiency and user experience. Ensure cybersecurity, data protection, and compliance with regulatory standards. Lead disaster recovery and business continuity planning. Identify and implement emerging technologies to support innovation. Manage IT budgets and resource allocation effectively. Inspire and guide a collaborative, high-performing IT team. Qualifications: Master’s degree in IT, Computer Science, Business Administration, or related fields. Preferred certifications: CISSP, PMP, CCIO. Proven success in IT leadership roles such as Director, VP, or CIO. Strong leadership, project management, and team development skills. Strategic thinking with the ability to align IT with institutional goals. Expertise in cybersecurity, IT project management, and emerging technologies.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Auditor

Kuwait City, Al Kuwayt Boubyan Consulting Company

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company

Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company

  • Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
  • Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
  • Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
  • Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
  • Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
  • Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
  • Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
  • Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
  • Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
  • Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.

  • Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
  • Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
  • Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
  • Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
  • Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
  • Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
  • Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
  • Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
  • Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
  • Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.

Job Requirements

  • Relevant University Degree in Information Security or Information Technology.
  • Professional Qualifications in Information Security.
  • Minimum 5 Years of Experience in IT audit or Information Security Audit.
  • Have a Valid Transferrable Visa in Kuwait.

About Boubyan Consulting

We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- TrainingSeniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Business Consulting and Services

Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x

Sign in to set job alerts for “Security Auditor” roles. Technical Solutions Consultant, Security (Arabic) Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Analyst

Kuwait City, Al Kuwayt GIG Kuwait

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

About the Role

The Senior Manager of Talent Acquisition and Development will oversee the recruitment and development processes within GIG Kuwait. The role involves strategic planning to attract, hire, and retain top talent, as well as implementing training and development programs to enhance employee skills and organizational growth.

Responsibilities

  1. Develop and execute talent acquisition strategies to meet organizational needs.
  2. Manage the recruitment process, including sourcing, interviewing, and onboarding new employees.
  3. Design and implement employee development and training programs.
  4. Collaborate with department heads to identify staffing needs and skill gaps.
  5. Maintain talent acquisition metrics and reporting.
  6. Ensure compliance with employment laws and regulations.
  7. Foster a positive work environment and company culture.
  8. Stay updated on industry trends in talent acquisition and development.

Qualifications

  • Bachelor's degree in Human Resources, Business Administration, or related field.
  • Proven experience in talent acquisition and employee development.
  • Strong leadership and communication skills.
  • Knowledge of HR software and applicant tracking systems.

Seniority Level

  • Senior management

Employment Type

  • Full-time

Job Function

  • Human Resources / Talent Acquisition
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Auditor

Kuwait City, Al Kuwayt Boubyan Consulting Company

Posted 10 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the

Senior Information Security Auditor

role at

Boubyan Consulting Company Join to apply for the

Senior Information Security Auditor

role at

Boubyan Consulting Company Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices. Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks. Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly. Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings. Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce. Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements. Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards. Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process. Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors. Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.

Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices. Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks. Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly. Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings. Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce. Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements. Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards. Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process. Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors. Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.

Job Requirements

Relevant University Degree in Information Security or Information Technology. Professional Qualifications in Information Security. Minimum 5 Years of Experience in IT audit or Information Security Audit. Have a Valid Transferrable Visa in Kuwait.

About Boubyan Consulting

We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- Training Seniority level

Seniority level Mid-Senior level Employment type

Employment type Full-time Job function

Job function Information Technology Industries Business Consulting and Services Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x Sign in to set job alerts for “Security Auditor” roles.

Technical Solutions Consultant, Security (Arabic)

Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Analyst

Kuwait City, Al Kuwayt GIG Kuwait

Posted 25 days ago

Job Viewed

Tap Again To Close

Job Description

About the Role

The Senior Manager of Talent Acquisition and Development will oversee the recruitment and development processes within GIG Kuwait. The role involves strategic planning to attract, hire, and retain top talent, as well as implementing training and development programs to enhance employee skills and organizational growth.

Responsibilities

Develop and execute talent acquisition strategies to meet organizational needs.

Manage the recruitment process, including sourcing, interviewing, and onboarding new employees.

Design and implement employee development and training programs.

Collaborate with department heads to identify staffing needs and skill gaps.

Maintain talent acquisition metrics and reporting.

Ensure compliance with employment laws and regulations.

Foster a positive work environment and company culture.

Stay updated on industry trends in talent acquisition and development.

Qualifications

Bachelor's degree in Human Resources, Business Administration, or related field.

Proven experience in talent acquisition and employee development.

Strong leadership and communication skills.

Knowledge of HR software and applicant tracking systems.

Seniority Level

Senior management

Employment Type

Full-time

Job Function

Human Resources / Talent Acquisition

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

IT Security Specialist – Information Security

Farwaniya HealthCare Dynamics Gen. Trading Company W.L.L

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Job Duties Include But Are Not Limited To:

We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team.

The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats.

  1. Identify and fix vulnerabilities within existing security systems.
  2. Develop organization-wide security measures.
  3. Document known security breaches and vulnerabilities.
  4. Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards.
  5. Monitor and analyze security events and incidents to identify and respond to potential threats promptly.
  6. Perform penetration tests to assess potential security problems.
  7. Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks.
  8. Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications.
  9. Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required.
  10. Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements.
  11. Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR).
  12. Establish relationships with external cybersecurity partners, vendors, and service providers.
  13. Plan incident response activities, including investigating security breaches and recommending corrective actions.
  14. Participate in the change management process.

Required Qualification:

  1. Education: Bachelor's degree in Computer Science, Information Systems, or a related field.
  2. Experience: 3 to 4 years of experience in an IT security role.
  3. Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels.
  4. Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills.
  5. Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines.
  6. Strategic Thinking: Ability to align solution deliverables with the organization's goals.

Required Professional Skills:

  1. Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems.
  2. Operating System Administration: Proficiency in securing Windows, Linux, and macOS.
  3. Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures.
  4. Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell.
  5. Encryption Techniques: Knowledge of implementing and managing encryption for data protection.
  6. Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware).
  7. Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Ciso Jobs in Kuwait !

IT Security Specialist – Information Security

Farwaniya KDD

Posted 17 days ago

Job Viewed

Tap Again To Close

Job Description

IT Security Specialist – Information Security

Join to apply for the IT Security Specialist – Information Security role at KDD

Continue with Google Continue with Google

IT Security Specialist – Information Security

Join to apply for the IT Security Specialist – Information Security role at KDD

Job Duties Include But Are Not Limited To

We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team.

The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats.

  • Identify and fix vulnerabilities within existing security systems.
  • Develop organization-wide security measures.
  • Document known security breaches and vulnerabilities.
  • Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards.
  • Monitor and analyze security events and incidents to identify and respond to potential threats promptly.
  • Perform penetration tests to assess potential security problems.
  • Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks.
  • Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications.
  • Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required.
  • Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements.
  • Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR).
  • Establish relationships with external cybersecurity partners, vendors, and service providers.
  • Plan incident response activities, including investigating security breaches and recommending corrective actions.
  • Participate in the change management process.

Required Qualification

  • Education: Bachelor's degree in Computer Science, Information Systems, or a related field.
  • Experience: 3 to 4 years of experience in an IT security role.
  • Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels.
  • Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills.
  • Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines.
  • Strategic Thinking: Ability to align solution deliverables with the organization's goals.

Required Professional Skills

  • Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems.
  • Operating System Administration: Proficiency in securing Windows, Linux, and macOS.
  • Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures.
  • Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell.
  • Encryption Techniques: Knowledge of implementing and managing encryption for data protection.
  • Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware).
  • Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Dairy Product Manufacturing

Referrals increase your chances of interviewing at KDD by 2x

Get notified about new Information Technology Security Specialist jobs in Farwaniya, Kuwait .

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

IT Security Specialist – Information Security

Al Farwaniyah, Al Farwaniyah KDD

Posted 17 days ago

Job Viewed

Tap Again To Close

Job Description

IT Security Specialist – Information Security

Join to apply for the

IT Security Specialist – Information Security

role at

KDD Continue with Google Continue with Google IT Security Specialist – Information Security

Join to apply for the

IT Security Specialist – Information Security

role at

KDD Job Duties Include But Are Not Limited To

We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team.

The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats.

Identify and fix vulnerabilities within existing security systems. Develop organization-wide security measures. Document known security breaches and vulnerabilities. Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards. Monitor and analyze security events and incidents to identify and respond to potential threats promptly. Perform penetration tests to assess potential security problems. Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks. Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications. Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required. Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements. Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR). Establish relationships with external cybersecurity partners, vendors, and service providers. Plan incident response activities, including investigating security breaches and recommending corrective actions. Participate in the change management process.

Required Qualification

Education: Bachelor's degree in Computer Science, Information Systems, or a related field. Experience: 3 to 4 years of experience in an IT security role. Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels. Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills. Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines. Strategic Thinking: Ability to align solution deliverables with the organization's goals.

Required Professional Skills

Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems. Operating System Administration: Proficiency in securing Windows, Linux, and macOS. Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures. Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell. Encryption Techniques: Knowledge of implementing and managing encryption for data protection. Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware). Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.

Seniority level

Seniority level Mid-Senior level Employment type

Employment type Full-time Job function

Job function Information Technology Industries Dairy Product Manufacturing Referrals increase your chances of interviewing at KDD by 2x Get notified about new Information Technology Security Specialist jobs in

Farwaniya, Kuwait . We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

IT Security Specialist – Information Security

Al Farwaniyah, Al Farwaniyah HealthCare Dynamics Gen. Trading Company W.L.L

Posted 23 days ago

Job Viewed

Tap Again To Close

Job Description

Job Duties Include But Are Not Limited To: We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team. The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats. Identify and fix vulnerabilities within existing security systems. Develop organization-wide security measures. Document known security breaches and vulnerabilities. Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards. Monitor and analyze security events and incidents to identify and respond to potential threats promptly. Perform penetration tests to assess potential security problems. Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks. Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications. Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required. Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements. Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR). Establish relationships with external cybersecurity partners, vendors, and service providers. Plan incident response activities, including investigating security breaches and recommending corrective actions. Participate in the change management process. Required Qualification: Education: Bachelor's degree in Computer Science, Information Systems, or a related field. Experience: 3 to 4 years of experience in an IT security role. Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels. Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills. Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines. Strategic Thinking: Ability to align solution deliverables with the organization's goals. Required Professional Skills: Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems. Operating System Administration: Proficiency in securing Windows, Linux, and macOS. Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures. Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell. Encryption Techniques: Knowledge of implementing and managing encryption for data protection. Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware). Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Ciso Jobs