11 Cyber Threats jobs in Kuwait

Information Security IT Analyst

Celeno Renesas Electronics Corporation

Posted today

Job Viewed

Tap Again To Close

Job Description

**Responsibilities**:
Renesas Electronics (Penang) Sdn. Bhd
- Phase 3, Bayan Lepas, Free Industrial Zone 11900 Penang Malaysia
- Job Highlights:

- Attractive Remuneration: Bonus + Profit Sharing + RSU
- Flexible working hour & hybrid work mode
- Fast growing company with positive working environment

Job Summary:

- The Information Security Analyst / Manager will be accountable for implementing large elements of the Renesas global security Strategy.
- Your New Role:

- Accountability for vulnerability assessment and remediation for Renesas
- Accountability for implementing supply chain security to critical suppliers
- Assessing, Tracking and maintaining the cyber security posture of the business
- Delivering security improvement projects
- Capturing, analyzing, reporting and actioning key security data
- Working with security suppliers - translating security strategy into actionable
- Analyzing and working with security intelligence feed and liaising with resolver groups in the business
- Acting as first and second line security leads for global security incidents on a follow the sun basis
- Deputizing for Director when necessary

Preferred Skills & Knowledge:

- Degree in Software Engineering, Information Technology or Cyber Security or comparable knowledge and skills
- 5-10 years diverse experience preferred, networking, Windows, server configuration, programming, firewall management
- Preferred experience of working with a SIEM, and security tools such as Splunk, QRadar or similar SOAR
- Experience in security testing and auditing a bonus
- Security qualification strongly preferred
- Significant proficiency in English is expected
- Excellent analytical and presentation skills
- Preferred experience of leading complex cross functional projects
- Influencing skills - goals will be achieved with and through others
- Problem solving skills coupled with a strong customer focus

This is a remote work position where we provide flexibility to work at home or anywhere you like!
- You could save on commuting and time, staying away from office politics, and finally having a great balance of work and family life!Benefits
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Auditor

Kuwait City, Al Kuwayt Boubyan Consulting Company

Posted 22 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company

Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company

  • Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
  • Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
  • Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
  • Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
  • Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
  • Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
  • Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
  • Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
  • Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
  • Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.

  • Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
  • Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
  • Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
  • Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
  • Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
  • Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
  • Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
  • Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
  • Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
  • Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.

Job Requirements

  • Relevant University Degree in Information Security or Information Technology.
  • Professional Qualifications in Information Security.
  • Minimum 5 Years of Experience in IT audit or Information Security Audit.
  • Have a Valid Transferrable Visa in Kuwait.

About Boubyan Consulting

We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- TrainingSeniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Business Consulting and Services

Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x

Sign in to set job alerts for “Security Auditor” roles. Technical Solutions Consultant, Security (Arabic) Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Auditor

Kuwait City, Al Kuwayt Boubyan Consulting Company

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the

Senior Information Security Auditor

role at

Boubyan Consulting Company Join to apply for the

Senior Information Security Auditor

role at

Boubyan Consulting Company Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices. Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks. Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly. Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings. Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce. Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements. Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards. Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process. Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors. Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.

Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices. Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks. Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly. Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings. Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce. Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements. Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards. Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process. Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors. Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.

Job Requirements

Relevant University Degree in Information Security or Information Technology. Professional Qualifications in Information Security. Minimum 5 Years of Experience in IT audit or Information Security Audit. Have a Valid Transferrable Visa in Kuwait.

About Boubyan Consulting

We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- Training Seniority level

Seniority level Mid-Senior level Employment type

Employment type Full-time Job function

Job function Information Technology Industries Business Consulting and Services Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x Sign in to set job alerts for “Security Auditor” roles.

Technical Solutions Consultant, Security (Arabic)

Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

IT Security Specialist – Information Security

Farwaniya KDD

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

IT Security Specialist – Information Security

Join to apply for the IT Security Specialist – Information Security role at KDD

Continue with Google Continue with Google

IT Security Specialist – Information Security

Join to apply for the IT Security Specialist – Information Security role at KDD

Job Duties Include But Are Not Limited To

We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team.

The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats.

  • Identify and fix vulnerabilities within existing security systems.
  • Develop organization-wide security measures.
  • Document known security breaches and vulnerabilities.
  • Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards.
  • Monitor and analyze security events and incidents to identify and respond to potential threats promptly.
  • Perform penetration tests to assess potential security problems.
  • Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks.
  • Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications.
  • Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required.
  • Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements.
  • Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR).
  • Establish relationships with external cybersecurity partners, vendors, and service providers.
  • Plan incident response activities, including investigating security breaches and recommending corrective actions.
  • Participate in the change management process.

Required Qualification

  • Education: Bachelor's degree in Computer Science, Information Systems, or a related field.
  • Experience: 3 to 4 years of experience in an IT security role.
  • Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels.
  • Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills.
  • Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines.
  • Strategic Thinking: Ability to align solution deliverables with the organization's goals.

Required Professional Skills

  • Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems.
  • Operating System Administration: Proficiency in securing Windows, Linux, and macOS.
  • Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures.
  • Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell.
  • Encryption Techniques: Knowledge of implementing and managing encryption for data protection.
  • Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware).
  • Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Dairy Product Manufacturing

Referrals increase your chances of interviewing at KDD by 2x

Get notified about new Information Technology Security Specialist jobs in Farwaniya, Kuwait .

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

IT Security Specialist – Information Security

Al Farwaniyah, Al Farwaniyah KDD

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

IT Security Specialist – Information Security

Join to apply for the

IT Security Specialist – Information Security

role at

KDD Continue with Google Continue with Google IT Security Specialist – Information Security

Join to apply for the

IT Security Specialist – Information Security

role at

KDD Job Duties Include But Are Not Limited To

We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team.

The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats.

Identify and fix vulnerabilities within existing security systems. Develop organization-wide security measures. Document known security breaches and vulnerabilities. Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards. Monitor and analyze security events and incidents to identify and respond to potential threats promptly. Perform penetration tests to assess potential security problems. Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks. Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications. Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required. Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements. Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR). Establish relationships with external cybersecurity partners, vendors, and service providers. Plan incident response activities, including investigating security breaches and recommending corrective actions. Participate in the change management process.

Required Qualification

Education: Bachelor's degree in Computer Science, Information Systems, or a related field. Experience: 3 to 4 years of experience in an IT security role. Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels. Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills. Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines. Strategic Thinking: Ability to align solution deliverables with the organization's goals.

Required Professional Skills

Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems. Operating System Administration: Proficiency in securing Windows, Linux, and macOS. Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures. Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell. Encryption Techniques: Knowledge of implementing and managing encryption for data protection. Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware). Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.

Seniority level

Seniority level Mid-Senior level Employment type

Employment type Full-time Job function

Job function Information Technology Industries Dairy Product Manufacturing Referrals increase your chances of interviewing at KDD by 2x Get notified about new Information Technology Security Specialist jobs in

Farwaniya, Kuwait . We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate

Qbe Llc

Posted 22 days ago

Job Viewed

Tap Again To Close

Job Description

All Jobs > CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate

Location: Kuwait

Position Type: Full-time

Description

As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will support the Army Network Enterprise Technology Command (NETCOM) on the DoDIN-A Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. You will be part of the CAC/PKI Registration Authority (LRA) operations team, responsible for token issuance, maintenance, and revocation for the Army.

Requirements
  • Provide 24/7 On-Call and Emergency Response
  • Respond to emergencies within two hours of notification
  • Maintain an asset inventory of PKI equipment at all sites
  • Support DoD Compliance Audits
  • Address audit findings per DoD PKI policies
  • Develop and maintain training packages
  • Test PKI system software and token compatibility
  • Verify subscriber identities and pre-register users
  • Validate certificate requirements and handle revocations
  • Support token issuance, renewal, and delivery of reports
  • Complete requests for PIN resets, revocations, key recoveries, and token requests within specified timelines
  • Submit activity and token reports monthly
  • Prepare reports for NSA and HQDA
  • Hold a Secret Security Clearance with Tier 5 background investigation
  • Have 3+ years of experience in PKI and related fields
  • Have never been relieved of trusted duties or had security clearance revoked
  • Have never been convicted of a felony
  • Complete RA/LRA training provided by DISA
Preferred Qualifications
  • DoD Cyber Workforce Framework (DCWF 631) Security Developer Intermediate qualification or equivalent
Physical Requirements
  • Sitting and standing for long periods
  • Mobility within an office environment
  • Stoop, kneel, crouch, crawl as needed
  • Travel less than 10%

QBE is an equal opportunity employer. All qualified applicants will receive consideration regardless of race, color, religion, sex, national origin, sexual orientation, gender identity/expression, age, disability, veteran status, genetic information, pregnancy, marital status, neurodivergence, ethnicity, caste, or military service.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior

Qbe Llc

Posted 22 days ago

Job Viewed

Tap Again To Close

Job Description

All Jobs > CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior

CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior
Kuwait

Full-time

Description

As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will provide services in support of the Army Network Enterprise Technology Command (NETCOM) on the Army Department of Defense Information Network (DoDIN-A) Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. As a member of the CAC/PKI Registration Authority (LRA) operations team, you will provide token issuance, sustainment, maintenance, and revocation to the Army customer.

Requirements

Highlights of Responsibilities:

  • Provide 24/7 On-Call and Emergency Response
  • Respond to emergency calls and arrive at the designated work site within two (2) hours after receiving the emergency call from the COR
  • Provide leadership, supervision, and mentorship to the RA/LRA team, ensuring all responsibilities are executed in compliance with DoD PKI CPS and RPS requirements
  • Provide RA support to the LRA personnel in creation of NIPRNET and SIPRNET PKI tokens
  • Provide RA interface with the Trusted Agent (TA) for token request and distribution
  • Maintain an asset inventory list of all PKI daily operations equipment by location at all RA/LRA sites
  • Provide support for annual and semi-annual DoD Compliance Audits
  • Support the Army CIO/G6 Cyber Security Directorate and the NETCOM G3/5 in addressing audit findings to include mitigation and correction of findings in accordance with DoD PKI CPS and RPS
  • Develop and maintain On-the-Job Training packages
  • Support test events of the global management PKI system software and token versions to assess backwards compatibility and interoperability
  • Verify Subscriber’s identity
  • Pre-register users with PKI
  • Validate NPE certificate requirements and forward revocation requests
  • Support issuance and renewal of SIPRNET tokens and/or NIPRNET Alternate Smart Card Logon
  • Support production of and delivery of an Issuance Report detailing number of tokens issued, revoked, renewed, and any issues encountered
  • Conduct duties as assigned through NSS/PKI RPS and DoD/PKI RA/LRA CPS
  • Complete General Officer/Senior Executive Service requests within 12 hours of receipt
  • Complete request for PIN reset, unlock code, revocation and re-issuance of a failed token CRI within 24 hours
  • Complete request for key recoveries within 48 hours
  • Complete new ASCL and NSS SIPRNET token request within 72 hours
  • Submit a monthly RA Activity Report
  • Submit a monthly Token Report of all tokens on hand to include returned and bad tokens
  • Provide the weekly RA Backlog Report of any activities that fall outside the response timelines identified in the sections titled Response Time
  • Prepare a monthly NSA Failed Token Report for HQDA to submit to NSA Program Manager Office

Qualifications

  • Secret Security Clearance with a completed Tier 5 (T5) background investigation
  • 5+ years of experience
  • Advanced operational expertise in Smart Tokens, PKI, Certificate Revocation, CAC Pin Reset, PKE, biometrics, logical and physical access, tactical PKI, and directory services
  • Have never been previously relieved of trusted role duties for reasons of negligence or nonperformance of duties
  • Have never been denied or had a security clearance revoked
  • Have never been convicted of a felony offense
  • Must complete RA/LRA training provided by DISA prior to receiving RA or LRA credentials

Preferred Qualifications:

  • DoD Cyber Workforce Framework (DCWF 631) Information Systems Security Developer Intermediate qualified (BS degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science or CSC or GCLD or CASP+ or CCSP or Cloud+ or GSEC) or equivalent certification

Physical Requirements:

  • Sitting for long periods
  • Standing for long periods
  • Ambulate throughout an office
  • Stoop, kneel, crouch, or crawl as required
  • Travel by land or air transportation 10% or less

QBE is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender, gender-identity and/or expression, age, disability, Veteran status, genetic information, pregnancy (including childbirth, lactation, or other related medical conditions), marital-status, neurodivergence, ethnicity, ancestry, caste, military/uniformed service-member status, or any other characteristic protected by applicable federal, state, local, or international law.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Cyber threats Jobs in Kuwait !

CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate

Kuwait City, Al Kuwayt Qbe Llc

Posted 15 days ago

Job Viewed

Tap Again To Close

Job Description

All Jobs > CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate Location:

Kuwait Position Type:

Full-time Description

As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will support the Army Network Enterprise Technology Command (NETCOM) on the DoDIN-A Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. You will be part of the CAC/PKI Registration Authority (LRA) operations team, responsible for token issuance, maintenance, and revocation for the Army. Requirements

Provide 24/7 On-Call and Emergency Response Respond to emergencies within two hours of notification Maintain an asset inventory of PKI equipment at all sites Support DoD Compliance Audits Address audit findings per DoD PKI policies Develop and maintain training packages Test PKI system software and token compatibility Verify subscriber identities and pre-register users Validate certificate requirements and handle revocations Support token issuance, renewal, and delivery of reports Complete requests for PIN resets, revocations, key recoveries, and token requests within specified timelines Submit activity and token reports monthly Prepare reports for NSA and HQDA Hold a Secret Security Clearance with Tier 5 background investigation Have 3+ years of experience in PKI and related fields Have never been relieved of trusted duties or had security clearance revoked Have never been convicted of a felony Complete RA/LRA training provided by DISA Preferred Qualifications

DoD Cyber Workforce Framework (DCWF 631) Security Developer Intermediate qualification or equivalent Physical Requirements

Sitting and standing for long periods Mobility within an office environment Stoop, kneel, crouch, crawl as needed Travel less than 10% QBE is an equal opportunity employer. All qualified applicants will receive consideration regardless of race, color, religion, sex, national origin, sexual orientation, gender identity/expression, age, disability, veteran status, genetic information, pregnancy, marital status, neurodivergence, ethnicity, caste, or military service.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior

Kuwait City, Al Kuwayt Qbe Llc

Posted 15 days ago

Job Viewed

Tap Again To Close

Job Description

All Jobs > CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior

CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior Kuwait Full-time Description As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will provide services in support of the Army Network Enterprise Technology Command (NETCOM) on the Army Department of Defense Information Network (DoDIN-A) Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. As a member of the CAC/PKI Registration Authority (LRA) operations team, you will provide token issuance, sustainment, maintenance, and revocation to the Army customer. Requirements Highlights of Responsibilities: Provide 24/7 On-Call and Emergency Response Respond to emergency calls and arrive at the designated work site within two (2) hours after receiving the emergency call from the COR Provide leadership, supervision, and mentorship to the RA/LRA team, ensuring all responsibilities are executed in compliance with DoD PKI CPS and RPS requirements Provide RA support to the LRA personnel in creation of NIPRNET and SIPRNET PKI tokens Provide RA interface with the Trusted Agent (TA) for token request and distribution Maintain an asset inventory list of all PKI daily operations equipment by location at all RA/LRA sites Provide support for annual and semi-annual DoD Compliance Audits Support the Army CIO/G6 Cyber Security Directorate and the NETCOM G3/5 in addressing audit findings to include mitigation and correction of findings in accordance with DoD PKI CPS and RPS Develop and maintain On-the-Job Training packages Support test events of the global management PKI system software and token versions to assess backwards compatibility and interoperability Verify Subscriber’s identity Pre-register users with PKI Validate NPE certificate requirements and forward revocation requests Support issuance and renewal of SIPRNET tokens and/or NIPRNET Alternate Smart Card Logon Support production of and delivery of an Issuance Report detailing number of tokens issued, revoked, renewed, and any issues encountered Conduct duties as assigned through NSS/PKI RPS and DoD/PKI RA/LRA CPS Complete General Officer/Senior Executive Service requests within 12 hours of receipt Complete request for PIN reset, unlock code, revocation and re-issuance of a failed token CRI within 24 hours Complete request for key recoveries within 48 hours Complete new ASCL and NSS SIPRNET token request within 72 hours Submit a monthly RA Activity Report Submit a monthly Token Report of all tokens on hand to include returned and bad tokens Provide the weekly RA Backlog Report of any activities that fall outside the response timelines identified in the sections titled Response Time Prepare a monthly NSA Failed Token Report for HQDA to submit to NSA Program Manager Office Qualifications Secret Security Clearance with a completed Tier 5 (T5) background investigation 5+ years of experience Advanced operational expertise in Smart Tokens, PKI, Certificate Revocation, CAC Pin Reset, PKE, biometrics, logical and physical access, tactical PKI, and directory services Have never been previously relieved of trusted role duties for reasons of negligence or nonperformance of duties Have never been denied or had a security clearance revoked Have never been convicted of a felony offense Must complete RA/LRA training provided by DISA prior to receiving RA or LRA credentials Preferred Qualifications: DoD Cyber Workforce Framework (DCWF 631) Information Systems Security Developer Intermediate qualified (BS degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science or CSC or GCLD or CASP+ or CCSP or Cloud+ or GSEC) or equivalent certification Physical Requirements: Sitting for long periods Standing for long periods Ambulate throughout an office Stoop, kneel, crouch, or crawl as required Travel by land or air transportation 10% or less QBE is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender, gender-identity and/or expression, age, disability, Veteran status, genetic information, pregnancy (including childbirth, lactation, or other related medical conditions), marital-status, neurodivergence, ethnicity, ancestry, caste, military/uniformed service-member status, or any other characteristic protected by applicable federal, state, local, or international law.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Threat Intelligence Lead

Canonical

Posted 15 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Join to apply for the Threat Intelligence Lead role at Canonical

3 months ago Be among the first 25 applicants

Join to apply for the Threat Intelligence Lead role at Canonical

Get AI-powered advice on this job and more exclusive features.

The Threat Intelligence Lead will own Canonical's threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our products and internal cybersecurity controls. You will collaborate with internal stakeholders as well as with the wider cybersecurity community, making sure that Canonical is recognised as a thought leader on open source threat intelligence.

This role will report to the CISO.

You will lead intelligence gathering and development activities on threat actors targeting software supply chains. You'll study attack trends across the wider open source software landscape, report findings to internal security teams, and advise the wider engineering community on the best course of action to detect and mitigate possible threats.

As the publisher of Ubuntu, Canonical products are directly or indirectly present in almost every organisation and household in the world, making them a prime target for threat actors. This team's mission is to help Canonical, and by extension countless community members and companies around the world, secure their software infrastructure.

What you'll do in this role

  • Build and own Canonical's threat intelligence strategy
  • Build and maintain OSINT research environments
  • Develop OSINT tradecraft, principals, and techniques
  • Identify and track targeted intrusion cyber threats, trends, and new developments by cyber threat actors through analysis of proprietary and open source datasets
  • Collaborate across teams to inform on activity of interest
  • Coordinate adversary/campaign tracking
  • Contribute to the wider threat intelligence community, establishing Canonical as a key contributor and thought leader in the space
  • Work with product and engineering teams to explain cybersecurity threats and advise on mitigation strategies
  • Work with the OPSEC and IS team to help implement/update security controls prioritising cyber defence
  • Identify intelligence gaps and propose new tools and research projects to fill them
  • Conduct briefings for executives, internal stakeholders and external customers

The successful Threat Intelligence Lead will be

  • An experienced threat intelligence leader (or similar)
  • Knowledgeable about the current open source threat landscape and computer networking/infrastructure concepts
  • Highly competent with OSINT tools (e.g., Buscador, Trace Labs OSINT VM, OSINT Framework, Maltego, Shodan, social media scraping tools, etc.)
  • Able to identify, organise, catalogue, and track adversary tradecraft trends — often with incomplete data
  • Experienced using threat intelligence data to influence enterprise architecture or product development decisions
  • An excellent communicator with the ability to clearly articulate and tailor technical content to a variety of audiences
  • Able to travel twice a year, for company events up to two weeks long

Desired Characteristics

  • A professional portfolio of OSINT related scripts, tools, or frameworks
  • Demonstrated involvement in the larger OSINT community (please share relevant links)
  • Degree qualified, with a bachelor's degree in computer science, information security, or a related field
  • Certifications in related areas (e.g. GOSI, SANS SEC487 & SEC587, IntelTechniques OSIP, etc)
  • Experience in a tech company or government/military signal intelligence departments

What we offer you

We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.

  • Distributed work environment with twice-yearly team sprints in person
  • Personal learning and development budget of USD 2,000 per year
  • Annual compensation review
  • Recognition rewards
  • Annual holiday leave
  • Maternity and paternity leave
  • Employee Assistance Programme
  • Opportunity to travel to new locations to meet colleagues
  • Priority Pass, and travel upgrades for long haul company events

About Canonical

Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.

Canonical is an equal opportunity employer

We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Software Development

Referrals increase your chances of interviewing at Canonical by 2x

Sign in to set job alerts for “Threat Intelligence Lead” roles.

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cyber Threats Jobs