10 Compliance Manager jobs in Kuwait
IAVM Compliance Manager
Posted 12 days ago
Job Viewed
Job Description
Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Our $3.9B company and 16,000 employees work alongside our clients worldwide to tackle complex challenges with integrity, respect, responsibility, and professionalism.
As a Cybersecurity Information Assurance Vulnerability (IAVM) Compliance Manager , you will ensure a robust security posture and compliance adherence to DoDIN cybersecurity governance within the SWA AOR. Your role involves employing technical expertise in OS administration, CIS benchmark best practices, troubleshooting, maintenance, and scripting for automation of security tasks. You will supervise teams conducting vulnerability assessments, merging information assurance compliance strategies with industry standards to defend DoDIN Enterprise solutions and capabilities for tenants and cybersecurity customers.
The ideal candidate will have a strong background in vulnerability management and compliance, leading teams and contributing to the security resilience of the DoDIN in the SWA AOR. You will act as the operations liaison between the military, customers, and the business community, working closely with supervisors to ensure an efficient team environment.
Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus, and tuition reimbursement. You must meet all host country requirements to legally work there.
Responsibilities:
- Utilize automated compliance assessment tools for vulnerability metrics.
- Ensure compliance with DoD and federal cybersecurity policies, regulations, and standards.
- Develop and implement incident response plans, investigate security incidents, and provide reports and recommendations.
- Maintain security policies, conduct risk assessments, and collaborate on risk mitigation strategies.
- Manage access controls, identity management, and permissions according to security clearance levels.
- Automate routine vulnerability scans and remediation processes.
- Coordinate with cybersecurity teams, IT, and stakeholders, communicating effectively to articulate the cybersecurity posture.
- Implement continuous monitoring to identify and resolve security threats.
- Stay updated on emerging cybersecurity threats, technologies, and certifications per DoD standards.
- Perform additional duties as assigned.
Qualifications:
- Active Secret Security Clearance.
- Bachelor's Degree in Computer Science, MIS, IS, Engineering, or related field.
- At least one baseline and one CE certification from the approved list, maintaining compliance with DoD 8570.01M.
- Minimum of seven (7) years of experience in the telecommunications sector.
We are committed to an inclusive and diverse workplace, valuing contributions from all individuals, fostering innovation, and expanding success globally.
#J-18808-LjbffrIAVM Compliance Manager
Posted 12 days ago
Job Viewed
Job Description
Join to apply for the IAVM Compliance Manager role at V2X Inc
1 day ago Be among the first 25 applicants
Join to apply for the IAVM Compliance Manager role at V2X Inc
Get AI-powered advice on this job and more exclusive features.
Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
As a Cybersecurity Information Assurance Vulnerability (IAVM) Compliance Manager, ensure a robust security posture and compliance adherence to DoDIN cybersecurity governance within the SWA AOR. The IAVM Compliance Manager will employ technical expertise in OS administration, CIS benchmark best practices, troubleshooting, maintenance, and proficiency in scripting languages for automation of security tasks. The IAVM Compliance Manager will supervise teams of professionals in conducting thorough vulnerability assessments, merging information assurance compliance strategies with industry standards to defend DoDIN Enterprise solutions and capabilities for its tenants and other cybersecurity customers. By leveraging cybersecurity and compliance expertise, the IAVM Compliance Manager will safeguard critical assets from potential threats, sustaining the integrity of the information infrastructure.
Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
As a Cybersecurity Information Assurance Vulnerability (IAVM) Compliance Manager, ensure a robust security posture and compliance adherence to DoDIN cybersecurity governance within the SWA AOR. The IAVM Compliance Manager will employ technical expertise in OS administration, CIS benchmark best practices, troubleshooting, maintenance, and proficiency in scripting languages for automation of security tasks. The IAVM Compliance Manager will supervise teams of professionals in conducting thorough vulnerability assessments, merging information assurance compliance strategies with industry standards to defend DoDIN Enterprise solutions and capabilities for its tenants and other cybersecurity customers. By leveraging cybersecurity and compliance expertise, the IAVM Compliance Manager will safeguard critical assets from potential threats, sustaining the integrity of the information infrastructure.
Professional Cybersecurity (IAVM) Compliance Managers possess a strong background in vulnerability management and compliance, enabling them to lead teams and contribute to the ongoing security resilience of the DoDIN in the SWA AOR. The IAVM Compliance Manager is the operations liaison between the military, the customers, and the business community. IAVM Compliance Manager works closely with first-line supervisors to ensure a cohesive team that works seamlessly and efficiently together. Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
- Utilize automated compliance assessment tools to generate, store, and report using quantitative vulnerability metrics.
- Ensure compliance with DoD and federal cybersecurity policies, regulations, and standards.
- Develop and implement incident response plans to address cybersecurity incidents promptly.
- Investigate and analyze security incidents, providing detailed reports and recommendations for improvements.
- Contribute to the development and maintenance of security policies, procedures, and guidelines.
- Conduct risk assessments to evaluate the potential impact of security threats and vulnerabilities.
- Demonstrate knowledge of automated patch management tools in the Linux environment.
- Collaborate with stakeholders to develop and implement risk mitigation strategies.
- Recommend improvements to enhance the overall security posture of the network.
- Manage access controls, identity management, and permissions consistent with security clearance status and level.
- Automation of routine vulnerability scans and remediation processes.
- Collaborate with other cybersecurity professionals, IT teams, and stakeholders.
- Employ effective communication with technical and non-technical stakeholders to articulate the posture of the DODIN in the SWA AOR.
- Use a proactive approach to implementing continuous monitoring programs to identify and resolve security threats.
- Stay informed of emerging cybersecurity threats, technologies, and professional certification requirements, defined under DoD 8571.01M and DODD 8140 to enhance skills and advance working knowledge.
- Perform any additional duties as assigned.
- Qualifications
- Security Clearance:
- Requires an active Secret Clearance
- Education / Certifications: One year of related experience may be substituted for one year of education if degree is required.
- Bachelor’s Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field.
- This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.
- The authorized certifications for this job title are listed as follows:
- IAT Level: IAT III
- BASELINE:
- Cisco: CCNP Security
- CompTIA: CASP+ ce: Advanced Security Practitioner
- GIAC: GCED: Certified Enterprise Defender
- GIAC: GCIH: Certified Incident Handler
- ISACA: CISA: Certified Information Systems Auditor
- ISC2: CCSP: Certified Cloud Security Professional
- ISC2: CISSP (or Associate): Certified Information Systems Security Professional
- COMPUTING ENVIRONMENT (CE):
- CEH - Certified Ethical Hacker
- CHFI - Computer Hacking Forensic Investigator
- CIH - Certified Incident Handler
- Cisco: CCIE - Certified Internetwork Expert - ANY
- Cisco: CCNP - Certified Network Professional - ANY
- CND - Certified Network Defender
- GCIH - Certified Incident Handler
- MCSE - Certified Solutions Expert (ANY above 2012)
- Microsoft: 365 Certified: Enterprise Administrator Expert
- Microsoft: Certified: Azure Associate (ANY)
- Microsoft: Certified: Azure Expert (ANY)
- Red Hat: RHCA - Certified Architect
- Red Hat: RHCE - Certified Engineer
- RHCSA: Red Hat Certified System Administrator
- Experience:
- Requires a minimum of seven (7) years of experience in telecommunications sector.
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Legal
- Industries Defense and Space Manufacturing
Referrals increase your chances of interviewing at V2X Inc by 2x
Sign in to set job alerts for “Compliance Manager” roles. Senior Compliance & Incident Response Manager ZAIN1838 - Enterprise App & Software ManagementWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrIAVM Compliance Manager
Posted 12 days ago
Job Viewed
Job Description
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
As a Cybersecurity Information Assurance Vulnerability (IAVM) Compliance Manager, ensure a robust security posture and compliance adherence to DoDIN cybersecurity governance within the SWA AOR. The IAVM Compliance Manager will employ technical expertise in OS administration, CIS benchmark best practices, troubleshooting, maintenance, and proficiency in scripting languages for automation of security tasks. The IAVM Compliance Manager will supervise teams of professionals in conducting thorough vulnerability assessments, merging information assurance compliance strategies with industry standards to defend DoDIN Enterprise solutions and capabilities for its tenants and other cybersecurity customers. By leveraging cybersecurity and compliance expertise, the IAVM Compliance Manager will safeguard critical assets from potential threats, sustaining the integrity of the information infrastructure.
Professional Cybersecurity (IAVM) Compliance Managers possess a strong background in vulnerability management and compliance, enabling them to lead teams and contribute to the ongoing security resilience of the DoDIN in the SWA AOR. The IAVM Compliance Manager is the operations liaison between the military, the customers, and the business community. IAVM Compliance Manager works closely with first-line supervisors to ensure a cohesive team that works seamlessly and efficiently together. Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
As a Cybersecurity Information Assurance Vulnerability (IAVM) Compliance Manager, ensure a robust security posture and compliance adherence to DoDIN cybersecurity governance within the SWA AOR. The IAVM Compliance Manager will employ technical expertise in OS administration, CIS benchmark best practices, troubleshooting, maintenance, and proficiency in scripting languages for automation of security tasks. The IAVM Compliance Manager will supervise teams of professionals in conducting thorough vulnerability assessments, merging information assurance compliance strategies with industry standards to defend DoDIN Enterprise solutions and capabilities for its tenants and other cybersecurity customers. By leveraging cybersecurity and compliance expertise, the IAVM Compliance Manager will safeguard critical assets from potential threats, sustaining the integrity of the information infrastructure.
Professional Cybersecurity (IAVM) Compliance Managers possess a strong background in vulnerability management and compliance, enabling them to lead teams and contribute to the ongoing security resilience of the DoDIN in the SWA AOR. The IAVM Compliance Manager is the operations liaison between the military, the customers, and the business community. IAVM Compliance Manager works closely with first-line supervisors to ensure a cohesive team that works seamlessly and efficiently together. Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
- Utilize automated compliance assessment tools to generate, store, and report using quantitative vulnerability metrics.
- Ensure compliance with DoD and federal cybersecurity policies, regulations, and standards.
- Develop and implement incident response plans to address cybersecurity incidents promptly.
- Investigate and analyze security incidents, providing detailed reports and recommendations for improvements.
- Contribute to the development and maintenance of security policies, procedures, and guidelines.
- Conduct risk assessments to evaluate the potential impact of security threats and vulnerabilities.
- Demonstrate knowledge of automated patch management tools in the Linux environment.
- Collaborate with stakeholders to develop and implement risk mitigation strategies.
- Recommend improvements to enhance the overall security posture of the network.
- Manage access controls, identity management, and permissions consistent with security clearance status and level.
- Automation of routine vulnerability scans and remediation processes.
- Collaborate with other cybersecurity professionals, IT teams, and stakeholders.
- Employ effective communication with technical and non-technical stakeholders to articulate the posture of the DODIN in the SWA AOR.
- Use a proactive approach to implementing continuous monitoring programs to identify and resolve security threats.
- Stay informed of emerging cybersecurity threats, technologies, and professional certification requirements, defined under DoD 8571.01M and DODD 8140 to enhance skills and advance working knowledge.
- Perform any additional duties as assigned.
Qualifications
- Qualifications
- Security Clearance:
- Requires an active Secret Clearance
- Education / Certifications: One year of related experience may be substituted for one year of education if degree is required.
- Bachelor’s Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field.
- This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.
- The authorized certifications for this job title are listed as follows:
- IAT Level: IAT III
- BASELINE:
- Cisco: CCNP Security
- CompTIA: CASP+ ce: Advanced Security Practitioner
- GIAC: GCED: Certified Enterprise Defender
- GIAC: GCIH: Certified Incident Handler
- ISACA: CISA: Certified Information Systems Auditor
- ISC2: CCSP: Certified Cloud Security Professional
- ISC2: CISSP (or Associate ): Certified Information Systems Security Professional
- COMPUTING ENVIRONMENT (CE):
- CEH - Certified Ethical Hacker
- CHFI - Computer Hacking Forensic Investigator
- CIH - Certified Incident Handler
- Cisco: CCIE - Certified Internetwork Expert - ANY
- Cisco: CCNP - Certified Network Professional - ANY
- CND - Certified Network Defender
- GCIH - Certified Incident Handler
- MCSE - Certified Solutions Expert (ANY above 2012 )
- Microsoft: 365 Certified: Enterprise Administrator Expert
- Microsoft: Certified: Azure Associate (ANY )
- Microsoft: Certified: Azure Expert (ANY )
- Red Hat: RHCA - Certified Architect
- Red Hat: RHCE - Certified Engineer
- RHCSA: Red Hat Certified System Administrator
- Experience:
- Requires a minimum of seven (7) years of experience in telecommunications sector.
For more than 70 years, Vectrus has provided critical mission support for our customers’ toughest operational challenges.
NoticeTalentify is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or protected veteran status.
Talentify provides reasonable accommodations to qualified applicants with disabilities, including disabled veterans. Request assistance at or 407-000-000.
Federal law requires every new hire to complete Form I-9 and present proof of identity and U.S. work eligibility.
An Automated Employment Decision Tool (AEDT) will score your job-related skills and responses. Bias-audit & data-use details: . NYC applicants may request an alternative process or accommodation at or 407-000-000.
#J-18808-LjbffrIAVM Compliance Manager

Posted 4 days ago
Job Viewed
Job Description
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
As a Cybersecurity Information Assurance Vulnerability (IAVM) Compliance Manager, ensure a robust security posture and compliance adherence to DoDIN cybersecurity governance within the SWA AOR. The IAVM Compliance Manager will employ technical expertise in OS administration, CIS benchmark best practices, troubleshooting, maintenance, and proficiency in scripting languages for automation of security tasks. The IAVM Compliance Manager will supervise teams of professionals in conducting thorough vulnerability assessments, merging information assurance compliance strategies with industry standards to defend DoDIN Enterprise solutions and capabilities for its tenants and other cybersecurity customers. By leveraging cybersecurity and compliance expertise, the IAVM Compliance Manager will safeguard critical assets from potential threats, sustaining the integrity of the information infrastructure.
Professional Cybersecurity (IAVM) Compliance Managers possess a strong background in vulnerability management and compliance, enabling them to lead teams and contribute to the ongoing security resilience of the DoDIN in the SWA AOR. The IAVM Compliance Manager is the operations liaison between the military, the customers, and the business community. IAVM Compliance Manager works closely with first-line supervisors to ensure a cohesive team that works seamlessly and efficiently together. Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
+ Utilize automated compliance assessment tools to generate, store, and report using quantitative vulnerability metrics.
+ Ensure compliance with DoD and federal cybersecurity policies, regulations, and standards.
+ Develop and implement incident response plans to address cybersecurity incidents promptly.
+ Investigate and analyze security incidents, providing detailed reports and recommendations for improvements.
+ Contribute to the development and maintenance of security policies, procedures, and guidelines.
+ Conduct risk assessments to evaluate the potential impact of security threats and vulnerabilities.
+ Demonstrate knowledge of automated patch management tools in the Linux environment.
+ Collaborate with stakeholders to develop and implement risk mitigation strategies.
+ Recommend improvements to enhance the overall security posture of the network.
+ Manage access controls, identity management, and permissions consistent with security clearance status and level.
+ Automation of routine vulnerability scans and remediation processes.
+ Collaborate with other cybersecurity professionals, IT teams, and stakeholders.
+ Employ effective communication with technical and non-technical stakeholders to articulate the posture of the DODIN in the SWA AOR.
+ Use a proactive approach to implementing continuous monitoring programs to identify and resolve security threats.
+ Stay informed of emerging cybersecurity threats, technologies, and professional certification requirements, defined under DoD 8571.01M and DODD 8140 to enhance skills and advance working knowledge.
+ Perform any additional duties as assigned.
Qualifications
+ Qualifications
+ Security Clearance:
+ Requires an active Secret Clearance
+ Education / Certifications: One year of related experience may be substituted for one year of education if degree is required.
+ Bachelor's Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field.
+ This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.
+ The authorized certifications for this job title are listed as follows:
+ IAT Level: IAT III
+ BASELINE:
+ Cisco: CCNP Security
+ CompTIA: CASP+ ce: Advanced Security Practitioner
+ GIAC: GCED: Certified Enterprise Defender
+ GIAC: GCIH: Certified Incident Handler
+ ISACA: CISA: Certified Information Systems Auditor
+ ISC2: CCSP: Certified Cloud Security Professional
+ ISC2: CISSP (or Associate): Certified Information Systems Security Professional
+ COMPUTING ENVIRONMENT (CE):
+ CEH - Certified Ethical Hacker
+ CHFI - Computer Hacking Forensic Investigator
+ CIH - Certified Incident Handler
+ Cisco: CCIE - Certified Internetwork Expert - ANY
+ Cisco: CCNP - Certified Network Professional - ANY
+ CND - Certified Network Defender
+ GCIH - Certified Incident Handler
+ MCSE - Certified Solutions Expert (ANY above 2012)
+ Microsoft: 365 Certified: Enterprise Administrator Expert
+ Microsoft: Certified: Azure Associate (ANY)
+ Microsoft: Certified: Azure Expert (ANY)
+ Red Hat: RHCA - Certified Architect
+ Red Hat: RHCE - Certified Engineer
+ RHCSA: Red Hat Certified System Administrator
+ Experience:
+ Requires a minimum of seven (7) years of experience in telecommunications sector.
At V2X, we are deeply committed to both equal employment opportunity, including protection for Veterans and individuals with disabilities, and fostering an inclusive and diverse workplace. We ensure all individuals are treated with fairness, respect, and dignity, recognizing the strength that comes from a workforce rich in diverse experiences, perspectives, and skills. This commitment, aligned with our core Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation, and expand our success in the global marketplace, ultimately enabling us to best serve our clients.
IAVM Compliance Manager
Posted 10 days ago
Job Viewed
Job Description
IAVM Compliance Manager
role at
V2X Inc 1 day ago Be among the first 25 applicants Join to apply for the
IAVM Compliance Manager
role at
V2X Inc Get AI-powered advice on this job and more exclusive features. Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
As a Cybersecurity Information Assurance Vulnerability (IAVM) Compliance Manager, ensure a robust security posture and compliance adherence to DoDIN cybersecurity governance within the SWA AOR. The IAVM Compliance Manager will employ technical expertise in OS administration, CIS benchmark best practices, troubleshooting, maintenance, and proficiency in scripting languages for automation of security tasks. The IAVM Compliance Manager will supervise teams of professionals in conducting thorough vulnerability assessments, merging information assurance compliance strategies with industry standards to defend DoDIN Enterprise solutions and capabilities for its tenants and other cybersecurity customers. By leveraging cybersecurity and compliance expertise, the IAVM Compliance Manager will safeguard critical assets from potential threats, sustaining the integrity of the information infrastructure. Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
As a Cybersecurity Information Assurance Vulnerability (IAVM) Compliance Manager, ensure a robust security posture and compliance adherence to DoDIN cybersecurity governance within the SWA AOR. The IAVM Compliance Manager will employ technical expertise in OS administration, CIS benchmark best practices, troubleshooting, maintenance, and proficiency in scripting languages for automation of security tasks. The IAVM Compliance Manager will supervise teams of professionals in conducting thorough vulnerability assessments, merging information assurance compliance strategies with industry standards to defend DoDIN Enterprise solutions and capabilities for its tenants and other cybersecurity customers. By leveraging cybersecurity and compliance expertise, the IAVM Compliance Manager will safeguard critical assets from potential threats, sustaining the integrity of the information infrastructure.
Professional Cybersecurity (IAVM) Compliance Managers possess a strong background in vulnerability management and compliance, enabling them to lead teams and contribute to the ongoing security resilience of the DoDIN in the SWA AOR. The IAVM Compliance Manager is the operations liaison between the military, the customers, and the business community. IAVM Compliance Manager works closely with first-line supervisors to ensure a cohesive team that works seamlessly and efficiently together. Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
Utilize automated compliance assessment tools to generate, store, and report using quantitative vulnerability metrics. Ensure compliance with DoD and federal cybersecurity policies, regulations, and standards. Develop and implement incident response plans to address cybersecurity incidents promptly. Investigate and analyze security incidents, providing detailed reports and recommendations for improvements. Contribute to the development and maintenance of security policies, procedures, and guidelines. Conduct risk assessments to evaluate the potential impact of security threats and vulnerabilities. Demonstrate knowledge of automated patch management tools in the Linux environment. Collaborate with stakeholders to develop and implement risk mitigation strategies. Recommend improvements to enhance the overall security posture of the network. Manage access controls, identity management, and permissions consistent with security clearance status and level. Automation of routine vulnerability scans and remediation processes. Collaborate with other cybersecurity professionals, IT teams, and stakeholders. Employ effective communication with technical and non-technical stakeholders to articulate the posture of the DODIN in the SWA AOR. Use a proactive approach to implementing continuous monitoring programs to identify and resolve security threats. Stay informed of emerging cybersecurity threats, technologies, and professional certification requirements, defined under DoD 8571.01M and DODD 8140 to enhance skills and advance working knowledge. Perform any additional duties as assigned.
Qualifications
Qualifications Security Clearance: Requires an active Secret Clearance Education / Certifications: One year of related experience may be substituted for one year of education if degree is required. Bachelor’s Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field. This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification. The authorized certifications for this job title are listed as follows: IAT Level: IAT III BASELINE: Cisco: CCNP Security CompTIA: CASP+ ce: Advanced Security Practitioner GIAC: GCED: Certified Enterprise Defender GIAC: GCIH: Certified Incident Handler ISACA: CISA: Certified Information Systems Auditor ISC2: CCSP: Certified Cloud Security Professional ISC2: CISSP (or Associate): Certified Information Systems Security Professional COMPUTING ENVIRONMENT (CE): CEH - Certified Ethical Hacker CHFI - Computer Hacking Forensic Investigator CIH - Certified Incident Handler Cisco: CCIE - Certified Internetwork Expert - ANY Cisco: CCNP - Certified Network Professional - ANY CND - Certified Network Defender GCIH - Certified Incident Handler MCSE - Certified Solutions Expert (ANY above 2012) Microsoft: 365 Certified: Enterprise Administrator Expert Microsoft: Certified: Azure Associate (ANY) Microsoft: Certified: Azure Expert (ANY) Red Hat: RHCA - Certified Architect Red Hat: RHCE - Certified Engineer RHCSA: Red Hat Certified System Administrator Experience: Requires a minimum of seven (7) years of experience in telecommunications sector.
We are committed to an inclusive and diverse workplace that values and supports the contributions of each individual. This commitment along with our common Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation and expand our success in the global marketplace. Vectrus is an Equal Opportunity /Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, national origin, protected veteran status or status as an individual with a disability. EOE/Minority/Female/Disabled/Veteran. Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Legal Industries Defense and Space Manufacturing Referrals increase your chances of interviewing at V2X Inc by 2x Sign in to set job alerts for “Compliance Manager” roles.
Senior Compliance & Incident Response Manager
ZAIN1838 - Enterprise App & Software Management
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
IAVM Compliance Manager
Posted 16 days ago
Job Viewed
Job Description
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism. As a Cybersecurity Information Assurance Vulnerability (IAVM) Compliance Manager, ensure a robust security posture and compliance adherence to DoDIN cybersecurity governance within the SWA AOR. The IAVM Compliance Manager will employ technical expertise in OS administration, CIS benchmark best practices, troubleshooting, maintenance, and proficiency in scripting languages for automation of security tasks. The IAVM Compliance Manager will supervise teams of professionals in conducting thorough vulnerability assessments, merging information assurance compliance strategies with industry standards to defend DoDIN Enterprise solutions and capabilities for its tenants and other cybersecurity customers. By leveraging cybersecurity and compliance expertise, the IAVM Compliance Manager will safeguard critical assets from potential threats, sustaining the integrity of the information infrastructure. Professional Cybersecurity (IAVM) Compliance Managers possess a strong background in vulnerability management and compliance, enabling them to lead teams and contribute to the ongoing security resilience of the DoDIN in the SWA AOR. The IAVM Compliance Manager is the operations liaison between the military, the customers, and the business community. IAVM Compliance Manager works closely with first-line supervisors to ensure a cohesive team that works seamlessly and efficiently together. Program: OMDAC-SWACA This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program! You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
Utilize automated compliance assessment tools to generate, store, and report using quantitative vulnerability metrics. Ensure compliance with DoD and federal cybersecurity policies, regulations, and standards. Develop and implement incident response plans to address cybersecurity incidents promptly. Investigate and analyze security incidents, providing detailed reports and recommendations for improvements. Contribute to the development and maintenance of security policies, procedures, and guidelines. Conduct risk assessments to evaluate the potential impact of security threats and vulnerabilities. Demonstrate knowledge of automated patch management tools in the Linux environment. Collaborate with stakeholders to develop and implement risk mitigation strategies. Recommend improvements to enhance the overall security posture of the network. Manage access controls, identity management, and permissions consistent with security clearance status and level. Automation of routine vulnerability scans and remediation processes. Collaborate with other cybersecurity professionals, IT teams, and stakeholders. Employ effective communication with technical and non-technical stakeholders to articulate the posture of the DODIN in the SWA AOR. Use a proactive approach to implementing continuous monitoring programs to identify and resolve security threats. Stay informed of emerging cybersecurity threats, technologies, and professional certification requirements, defined under DoD 8571.01M and DODD 8140 to enhance skills and advance working knowledge. Perform any additional duties as assigned.
Qualifications
Qualifications Security Clearance:
Requires an active Secret Clearance
Education / Certifications:
One year of related experience may be substituted for one year of education if degree is required.
Bachelor’s Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field. This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification. The authorized certifications for this job title are listed as follows:
IAT Level:
IAT III BASELINE:
Cisco: CCNP Security CompTIA: CASP+ ce: Advanced Security Practitioner GIAC: GCED: Certified Enterprise Defender GIAC: GCIH: Certified Incident Handler ISACA: CISA: Certified Information Systems Auditor ISC2: CCSP: Certified Cloud Security Professional ISC2: CISSP ( or Associate ): Certified Information Systems Security Professional
COMPUTING ENVIRONMENT (CE):
CEH - Certified Ethical Hacker CHFI - Computer Hacking Forensic Investigator CIH - Certified Incident Handler Cisco: CCIE - Certified Internetwork Expert -
ANY Cisco: CCNP - Certified Network Professional -
ANY CND - Certified Network Defender GCIH - Certified Incident Handler MCSE - Certified Solutions Expert ( ANY above 2012 ) Microsoft: 365 Certified: Enterprise Administrator Expert Microsoft: Certified: Azure Associate ( ANY ) Microsoft: Certified: Azure Expert ( ANY ) Red Hat: RHCA - Certified Architect Red Hat: RHCE - Certified Engineer RHCSA: Red Hat Certified System Administrator
Experience:
Requires a minimum of seven (7) years of experience in telecommunications sector.
We are committed to an inclusive and diverse workplace that values and supports the contributions of each individual. This commitment along with our common Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation and expand our success in the global marketplace. Vectrus is an Equal Opportunity /Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, national origin, protected veteran status or status as an individual with a disability. EOE/Minority/Female/Disabled/Veteran. About the company
For more than 70 years, Vectrus has provided critical mission support for our customers’ toughest operational challenges. Notice
Talentify is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or protected veteran status. Talentify provides reasonable accommodations to qualified applicants with disabilities, including disabled veterans. Request assistance at or 407-000-000. Federal law requires every new hire to complete Form I-9 and present proof of identity and U.S. work eligibility. An Automated Employment Decision Tool (AEDT) will score your job-related skills and responses. Bias-audit & data-use details: . NYC applicants may request an alternative process or accommodation at or 407-000-000.
#J-18808-Ljbffr
IAVM Compliance Manager
Posted 24 days ago
Job Viewed
Job Description
Cybersecurity Information Assurance Vulnerability (IAVM) Compliance Manager , you will ensure a robust security posture and compliance adherence to DoDIN cybersecurity governance within the SWA AOR. Your role involves employing technical expertise in OS administration, CIS benchmark best practices, troubleshooting, maintenance, and scripting for automation of security tasks. You will supervise teams conducting vulnerability assessments, merging information assurance compliance strategies with industry standards to defend DoDIN Enterprise solutions and capabilities for tenants and cybersecurity customers. The ideal candidate will have a strong background in vulnerability management and compliance, leading teams and contributing to the security resilience of the DoDIN in the SWA AOR. You will act as the operations liaison between the military, customers, and the business community, working closely with supervisors to ensure an efficient team environment. Program:
OMDAC-SWACA This position offers company-paid housing and transportation, a completion bonus, and tuition reimbursement. You must meet all host country requirements to legally work there. Responsibilities: Utilize automated compliance assessment tools for vulnerability metrics. Ensure compliance with DoD and federal cybersecurity policies, regulations, and standards. Develop and implement incident response plans, investigate security incidents, and provide reports and recommendations. Maintain security policies, conduct risk assessments, and collaborate on risk mitigation strategies. Manage access controls, identity management, and permissions according to security clearance levels. Automate routine vulnerability scans and remediation processes. Coordinate with cybersecurity teams, IT, and stakeholders, communicating effectively to articulate the cybersecurity posture. Implement continuous monitoring to identify and resolve security threats. Stay updated on emerging cybersecurity threats, technologies, and certifications per DoD standards. Perform additional duties as assigned. Qualifications: Active Secret Security Clearance. Bachelor's Degree in Computer Science, MIS, IS, Engineering, or related field. At least one baseline and one CE certification from the approved list, maintaining compliance with DoD 8570.01M. Minimum of seven (7) years of experience in the telecommunications sector. We are committed to an inclusive and diverse workplace, valuing contributions from all individuals, fostering innovation, and expanding success globally.
#J-18808-Ljbffr
Be The First To Know
About the latest Compliance manager Jobs in Kuwait !
Compliance & Governance Manager
Posted 4 days ago
Job Viewed
Job Description
#J-18808-Ljbffr
Assistant Manager – Compliance & Governance
Posted 5 days ago
Job Viewed
Job Description
#J-18808-Ljbffr
Senior Risk Management Analyst
Posted 19 days ago
Job Viewed
Job Description
Join to apply for the Senior Risk Management Analyst role at Mezzan Foods
Join to apply for the Senior Risk Management Analyst role at Mezzan Foods
Get AI-powered advice on this job and more exclusive features.
- Identify risk data sources and coordinate with the relevant departments and subsidiaries across Mezzan to ensure timely availability of data (e.g., Finance, IT, BUs) for effective data management.
- Develop and implement plans to identify data gaps, improve data availability, quality, and timeliness to enhance existing data collection methods and support risk management processes.
- Drive the automation of risk data gathering and validation processes, overseeing the creation and maintenance of data extraction and processing queries to streamline data access, reporting, and analysis.
- Provide data support and automation assistance to the risk management functions to facilitate effective implementation of risk management procedures.
- Supervise the data reconciliation and validation with financial control, IT, business units, and subsidiaries to ensure adherence to established risk management standards.
- Design, establish, and maintain a robust Risk Management Information System (RMIS) as per the Group ERM Framework and Reporting Protocols.
- Analyze big data and provide solutions in conjunction with IT & SAP teams.
- Manage the Risk Management Information System (RMIS) & coordinate all necessary changes with system admins / service provider.
- Perform Quantitative Risk Analysis and calculating EMVs (Expected Monetary Values) to all applicable types of financial risks.
- Review process understanding working papers prepared by Risk Analysts as well as explaining the link between the Group structure, systems, processes and risk practices.
- Review and analyze relevant metrics and KRIs as per the KRI Program Plan designing KRI trend analysis and reports accordingly.
- Design and implement an overall risk management process for Mezzan, which includes an analysis of the financial impact on the company when risks occur.
- Analyze current risks, identify potential emerging risks, and evaluate Group’s historical risk management performance comparing potential risks against established criteria (e.g., cost, legal requirements).
- Prepare and maintain Risk Appetite, Risk Incidents, Country-wide, Division-wide, and Business Unit-wide Dashboards as per the risk management plan.
- Develop Business Division Risk Reports for assigned risk area / categories as per the risk management plan.
Shared services (Head Office)
Job Description
- Identify risk data sources and coordinate with the relevant departments and subsidiaries across Mezzan to ensure timely availability of data (e.g., Finance, IT, BUs) for effective data management.
- Develop and implement plans to identify data gaps, improve data availability, quality, and timeliness to enhance existing data collection methods and support risk management processes.
- Drive the automation of risk data gathering and validation processes, overseeing the creation and maintenance of data extraction and processing queries to streamline data access, reporting, and analysis.
- Provide data support and automation assistance to the risk management functions to facilitate effective implementation of risk management procedures.
- Supervise the data reconciliation and validation with financial control, IT, business units, and subsidiaries to ensure adherence to established risk management standards.
- Design, establish, and maintain a robust Risk Management Information System (RMIS) as per the Group ERM Framework and Reporting Protocols.
- Analyze big data and provide solutions in conjunction with IT & SAP teams.
- Manage the Risk Management Information System (RMIS) & coordinate all necessary changes with system admins / service provider.
- Perform Quantitative Risk Analysis and calculating EMVs (Expected Monetary Values) to all applicable types of financial risks.
- Review process understanding working papers prepared by Risk Analysts as well as explaining the link between the Group structure, systems, processes and risk practices.
- Review and analyze relevant metrics and KRIs as per the KRI Program Plan designing KRI trend analysis and reports accordingly.
- Design and implement an overall risk management process for Mezzan, which includes an analysis of the financial impact on the company when risks occur.
- Analyze current risks, identify potential emerging risks, and evaluate Group’s historical risk management performance comparing potential risks against established criteria (e.g., cost, legal requirements).
- Prepare and maintain Risk Appetite, Risk Incidents, Country-wide, Division-wide, and Business Unit-wide Dashboards as per the risk management plan.
- Develop Business Division Risk Reports for assigned risk area / categories as per the risk management plan.
- Must have expertise in data analytics.
- Detail Oriented.
- Excellent Communication and Presentation Skills.
- Highly proficient in MS Office Applications.
- Ability to work in a team, strong work ethic, flexibility and adaptability.
- Mandatory: Bachelors’ degree in Accounting, Risk Management, Business Administration, or Information Systems.
- Professional Certification(s) such as CRMA, RMP, CFE, CRA, etc. (Desirable)
- A minimum of 5-8 years in external audit, risk consulting, financial planning, analysis or relevant experience.
Mezzan Holding Co.is one of the leading food, healthcare, and consumer conglomerates in the Middle East with a celebrated heritage of over 75 years. Headquartered in Kuwait with direct operational activities in Kuwait, UAE, Qatar, Saudi Arabia, Iraq and Jordan Mezzan Holding Co: Employs 8,500 people (50+ nationalities) Distributes over 34,000 Stock Keeping Units (SKU) Serves over 100,000 meals a day in Kuwait, Qatar and the UAE through its catering business. Has a total of 130,000 square meters in food, beverage and FMCG manufacturing facilities in Kuwait, Qatar, UAE. Represents some of the biggest names in the FMCG and healthcare industries.
Apply NowSeniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Finance and Sales
- Industries Food and Beverage Manufacturing
Referrals increase your chances of interviewing at Mezzan Foods by 2x
Sign in to set job alerts for “Senior Risk Analyst” roles. Hiring Office Assistant – Fluent in English – Freshers Can Apply Required Assistant (Labour type) part time male only Administrative Officer – Engineering Environment we are looking Computer operator for part timeWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr