19 Cybersecurity jobs in Kuwait
Threat Intelligence Lead
Posted 25 days ago
Job Viewed
Job Description
Join to apply for the Threat Intelligence Lead role at Canonical
3 months ago Be among the first 25 applicants
Join to apply for the Threat Intelligence Lead role at Canonical
Get AI-powered advice on this job and more exclusive features.
The Threat Intelligence Lead will own Canonical's threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our products and internal cybersecurity controls. You will collaborate with internal stakeholders as well as with the wider cybersecurity community, making sure that Canonical is recognised as a thought leader on open source threat intelligence.
This role will report to the CISO.
You will lead intelligence gathering and development activities on threat actors targeting software supply chains. You'll study attack trends across the wider open source software landscape, report findings to internal security teams, and advise the wider engineering community on the best course of action to detect and mitigate possible threats.
As the publisher of Ubuntu, Canonical products are directly or indirectly present in almost every organisation and household in the world, making them a prime target for threat actors. This team's mission is to help Canonical, and by extension countless community members and companies around the world, secure their software infrastructure.
What you'll do in this role
- Build and own Canonical's threat intelligence strategy
- Build and maintain OSINT research environments
- Develop OSINT tradecraft, principals, and techniques
- Identify and track targeted intrusion cyber threats, trends, and new developments by cyber threat actors through analysis of proprietary and open source datasets
- Collaborate across teams to inform on activity of interest
- Coordinate adversary/campaign tracking
- Contribute to the wider threat intelligence community, establishing Canonical as a key contributor and thought leader in the space
- Work with product and engineering teams to explain cybersecurity threats and advise on mitigation strategies
- Work with the OPSEC and IS team to help implement/update security controls prioritising cyber defence
- Identify intelligence gaps and propose new tools and research projects to fill them
- Conduct briefings for executives, internal stakeholders and external customers
- An experienced threat intelligence leader (or similar)
- Knowledgeable about the current open source threat landscape and computer networking/infrastructure concepts
- Highly competent with OSINT tools (e.g., Buscador, Trace Labs OSINT VM, OSINT Framework, Maltego, Shodan, social media scraping tools, etc.)
- Able to identify, organise, catalogue, and track adversary tradecraft trends — often with incomplete data
- Experienced using threat intelligence data to influence enterprise architecture or product development decisions
- An excellent communicator with the ability to clearly articulate and tailor technical content to a variety of audiences
- Able to travel twice a year, for company events up to two weeks long
- A professional portfolio of OSINT related scripts, tools, or frameworks
- Demonstrated involvement in the larger OSINT community (please share relevant links)
- Degree qualified, with a bachelor's degree in computer science, information security, or a related field
- Certifications in related areas (e.g. GOSI, SANS SEC487 & SEC587, IntelTechniques OSIP, etc)
- Experience in a tech company or government/military signal intelligence departments
We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.
- Distributed work environment with twice-yearly team sprints in person
- Personal learning and development budget of USD 2,000 per year
- Annual compensation review
- Recognition rewards
- Annual holiday leave
- Maternity and paternity leave
- Employee Assistance Programme
- Opportunity to travel to new locations to meet colleagues
- Priority Pass, and travel upgrades for long haul company events
Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.
Canonical is an equal opportunity employer
We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.
Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Software Development
Referrals increase your chances of interviewing at Canonical by 2x
Sign in to set job alerts for “Threat Intelligence Lead” roles.We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrThreat Intelligence Lead
Posted 14 days ago
Job Viewed
Job Description
Threat Intelligence Lead
role at
Canonical 3 months ago Be among the first 25 applicants Join to apply for the
Threat Intelligence Lead
role at
Canonical Get AI-powered advice on this job and more exclusive features. The Threat Intelligence Lead will own Canonical's threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our products and internal cybersecurity controls. You will collaborate with internal stakeholders as well as with the wider cybersecurity community, making sure that Canonical is recognised as a thought leader on open source threat intelligence.
This role will report to the CISO.
You will lead intelligence gathering and development activities on threat actors targeting software supply chains. You'll study attack trends across the wider open source software landscape, report findings to internal security teams, and advise the wider engineering community on the best course of action to detect and mitigate possible threats.
As the publisher of Ubuntu, Canonical products are directly or indirectly present in almost every organisation and household in the world, making them a prime target for threat actors. This team's mission is to help Canonical, and by extension countless community members and companies around the world, secure their software infrastructure.
What you'll do in this role
Build and own Canonical's threat intelligence strategy Build and maintain OSINT research environments Develop OSINT tradecraft, principals, and techniques Identify and track targeted intrusion cyber threats, trends, and new developments by cyber threat actors through analysis of proprietary and open source datasets Collaborate across teams to inform on activity of interest Coordinate adversary/campaign tracking Contribute to the wider threat intelligence community, establishing Canonical as a key contributor and thought leader in the space Work with product and engineering teams to explain cybersecurity threats and advise on mitigation strategies Work with the OPSEC and IS team to help implement/update security controls prioritising cyber defence Identify intelligence gaps and propose new tools and research projects to fill them Conduct briefings for executives, internal stakeholders and external customers
The successful Threat Intelligence Lead will be
An experienced threat intelligence leader (or similar) Knowledgeable about the current open source threat landscape and computer networking/infrastructure concepts Highly competent with OSINT tools (e.g., Buscador, Trace Labs OSINT VM, OSINT Framework, Maltego, Shodan, social media scraping tools, etc.) Able to identify, organise, catalogue, and track adversary tradecraft trends — often with incomplete data Experienced using threat intelligence data to influence enterprise architecture or product development decisions An excellent communicator with the ability to clearly articulate and tailor technical content to a variety of audiences Able to travel twice a year, for company events up to two weeks long
Desired Characteristics
A professional portfolio of OSINT related scripts, tools, or frameworks Demonstrated involvement in the larger OSINT community (please share relevant links) Degree qualified, with a bachelor's degree in computer science, information security, or a related field Certifications in related areas (e.g. GOSI, SANS SEC487 & SEC587, IntelTechniques OSIP, etc) Experience in a tech company or government/military signal intelligence departments
What we offer you
We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.
Distributed work environment with twice-yearly team sprints in person Personal learning and development budget of USD 2,000 per year Annual compensation review Recognition rewards Annual holiday leave Maternity and paternity leave Employee Assistance Programme Opportunity to travel to new locations to meet colleagues Priority Pass, and travel upgrades for long haul company events
About Canonical
Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.
Canonical is an equal opportunity employer
We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.
Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries Software Development Referrals increase your chances of interviewing at Canonical by 2x Sign in to set job alerts for “Threat Intelligence Lead” roles.
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
IT Cybersecurity Specialist
Posted 4 days ago
Job Viewed
Job Description
The International University of Science & Technology in Kuwait (IUK) is a newly established private university in Kuwait, with a new Campus located in the heart of Kuwait near the Avenues Mall. Fully accredited by the Private Universities Council (PUC), the University offers a wide range of academic programs in Engineering, Business, and Arts and Social Sciences. In addition to the academic programs, the IUK has established the University Foundation Program (UFP) that offers English and Math foundation programs.
IUK is seeking a highly motivated and skilled Cybersecurity Specialist to join our Information Technology (IT) department. In this critical role, you will play a key part in safeguarding the university's network infrastructure, sensitive data, and digital assets from cyberattacks.
Position Summary
The IT Security Specialist will play a vital role in safeguarding the IUK’s IT infrastructure, data, and user privacy. You will be responsible for a range of security tasks, including threat detection, vulnerability analysis, incident response, and maintaining a secure network environment built on firewalls and Microsoft 365 security features.
Responsibilities
- Developing and maintaining security policies and procedures: This involves creating guidelines for secure usage of university IT resources, including password management, data handling, and acceptable use policies.
- Implementing and managing security controls: This includes setting up firewalls, intrusion detection systems, and anti-virus software to protect the university network from unauthorized access and malicious attacks.
- Monitoring and analyzing network activity: Monitor network traffic for suspicious activity and potential breaches. Analyze logs and identify vulnerabilities to address them proactively.
- Responding to security incidents: Containing the damage, investigating the incident, and implementing recovery measures in case of a security breach.
- Educating and training faculty, staff, and students: Raising awareness about cybersecurity best practices is crucial. Conduct training sessions, workshops, and campaigns to educate users on various security topics like phishing scams and social engineering.
- Staying current with evolving threats: The cybersecurity landscape is constantly changing. IT security specialists need to stay updated on the latest threats, vulnerabilities, and mitigation strategies.
- Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field.
- Relevant certifications like CompTIA Security+, Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH).
- Minimum of 4-5 years of experience in a cybersecurity specialist role.
- Prior experience in IT security in an educational setting is preferred.
- A solid understanding of networking, operating systems, and security technologies is essential. This includes knowledge of firewalls, intrusion detection systems, encryption, and vulnerability scanning tools.
- Familiarity with university-specific security regulations and compliance requirements is also beneficial.
- Analytical and problem-solving skills: Identifying, analyzing, and resolving security issues requires strong analytical and problem-solving skills.
- Communication skills: The ability to communicate effectively with technical and non-technical audiences is crucial. This includes explaining complex security issues in a clear and concise manner.
- Attention to detail: Needs to be meticulous and detail-oriented to identify and address potential security weaknesses.
IT Cybersecurity Specialist
Posted 11 days ago
Job Viewed
Job Description
IUK is seeking a highly motivated and skilled Cybersecurity Specialist to join our Information Technology (IT) department. In this critical role, you will play a key part in safeguarding the university's network infrastructure, sensitive data, and digital assets from cyberattacks.
Position Summary
The IT Security Specialist will play a vital role in safeguarding the IUK’s IT infrastructure, data, and user privacy. You will be responsible for a range of security tasks, including threat detection, vulnerability analysis, incident response, and maintaining a secure network environment built on firewalls and Microsoft 365 security features.
Responsibilities
Developing and maintaining security policies and procedures: This involves creating guidelines for secure usage of university IT resources, including password management, data handling, and acceptable use policies. Implementing and managing security controls: This includes setting up firewalls, intrusion detection systems, and anti-virus software to protect the university network from unauthorized access and malicious attacks. Monitoring and analyzing network activity: Monitor network traffic for suspicious activity and potential breaches. Analyze logs and identify vulnerabilities to address them proactively. Responding to security incidents: Containing the damage, investigating the incident, and implementing recovery measures in case of a security breach. Educating and training faculty, staff, and students: Raising awareness about cybersecurity best practices is crucial. Conduct training sessions, workshops, and campaigns to educate users on various security topics like phishing scams and social engineering. Staying current with evolving threats: The cybersecurity landscape is constantly changing. IT security specialists need to stay updated on the latest threats, vulnerabilities, and mitigation strategies.
Education
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field. Relevant certifications like CompTIA Security+, Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH).
Experience
Minimum of 4-5 years of experience in a cybersecurity specialist role. Prior experience in IT security in an educational setting is preferred.
Technical Skills
A solid understanding of networking, operating systems, and security technologies is essential. This includes knowledge of firewalls, intrusion detection systems, encryption, and vulnerability scanning tools. Familiarity with university-specific security regulations and compliance requirements is also beneficial.
Behavioral Skills
Analytical and problem-solving skills: Identifying, analyzing, and resolving security issues requires strong analytical and problem-solving skills. Communication skills: The ability to communicate effectively with technical and non-technical audiences is crucial. This includes explaining complex security issues in a clear and concise manner. Attention to detail: Needs to be meticulous and detail-oriented to identify and address potential security weaknesses.
#J-18808-Ljbffr
Technical Product Marketing Manager - Cybersecurity
Posted today
Job Viewed
Job Description
Join to apply for the Technical Product Marketing Manager - Cybersecurity role at Canonical
Technical Product Marketing Manager - Cybersecurity3 days ago Be among the first 25 applicants
Join to apply for the Technical Product Marketing Manager - Cybersecurity role at Canonical
Canonical is a leading provider of open source software and operating systems to the global enterprise and technology markets. Our platform, Ubuntu, is very widely used in breakthrough enterprise initiatives such as public cloud, data science, AI, engineering innovation, and IoT. Our customers include the world's leading public cloud and silicon providers, and industry leaders in many sectors. The company is a pioneer of global distributed collaboration, with 1200+ colleagues in 75+ countries and very few office-based roles. Teams meet two to four times yearly in person, in interesting locations around the world, to align on strategy and execution.
The company is founder-led, profitable, and growing.
We're looking for a Technical Product Marketing Manager who combines deep technical understanding with strategic marketing expertise to develop go-to-market plans for our global security and compliance portfolio.
This is a hands-on, multidisciplinary, and dynamic position that requires working closely with product managers, engineering teams, and security experts to truly understand the technical capabilities of our offerings, and translate them into compelling positioning and content. You'll also collaborate with the content team, sales, and other marketing functions to drive awareness, adoption, and growth.
The ideal candidate is a technologist at heart, someone who thrives on understanding how products work under the hood and is excited to communicate their value clearly to both technical and non-technical audiences. You're motivated by ownership, driven by curiosity, and comfortable operating at the intersection of product and marketing. You love to get hands-on, solve problems, experiment, and build scalable marketing systems.
This role sits within the product marketing team and reports to the Product Marketing Lead
Location: This role will be based remotely in the EMEA region.
What your day will look like
- Lead the go-to-market strategy and execution for Canonical's range of security and compliance products, including messaging and positioning
- Track the competitive landscape and emerging trends to define product differentiation and value drivers
- Collaborate with engineering and product teams to understand product roadmaps, and customer use cases
- Translate technical product capabilities into clear, differentiated messaging for key personas, including Executives, DevSecOps, and platform teams
- Own campaign and content planning for the security portfolio
- Use data and insights to iterate on demand generation strategies and optimize conversion throughout the funnel
- Work with other teams to plan events, webinars and support messaging for paid and social media promotion
- A passion for technology and open source—you get excited about innovation, software, and community-driven development.
- Strong storytelling skills—you know how to craft messaging that resonates with both technical and business audiences.
- Growth mindset—someone who thrives on experimentation, learning, and continuous improvement.
- Excellent communication skills, both written and verbal.
- Technical understanding of the Cybersecurity world
- Data-driven mindset, using insights to refine strategies and improve performance.
- Experience in product marketing for enterprise software, cloud, DevOps, or open-source solutions.
- Experience with demand generation, understanding how to translate GTM strategies into pipeline growth.
- Comfort working cross-functionally with product, sales, partners, and marketing teams.
We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognize outstanding performance. In addition to base pay, we offer a performance-driven annual bonus or commission. We provide all team members with additional benefits which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.
- Distributed work environment with twice-yearly team sprints in person
- Personal learning and development budget of USD 2,000 per year
- Annual compensation review
- Recognition rewards
- Annual holiday leave
- Maternity and paternity leave
- Team Member Assistance Program & Wellness Platform
- Opportunity to travel to new locations to meet colleagues
- Priority Pass and travel upgrades for long-haul company events
Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open-source projects and the platform for AI, IoT, and the cloud, we are changing the world of software. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence; in order to succeed, we need to be the best at what we do. Most colleagues at Canonical have worked from home since our inception in 2004. Working here is a step into the future and will challenge you to think differently, work smarter, learn new skills, and raise your game.
Canonical is an equal opportunity employer
We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.
Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Marketing and Sales
- Industries Software Development
Referrals increase your chances of interviewing at Canonical by 2x
Sign in to set job alerts for “Marketing Manager” roles. Product Manager - Industrial Sector Lead Product Manager - Hardware CertificationWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrNetwork Security Engineer - Senior / Intermediate
Posted 4 days ago
Job Viewed
Job Description
Join to apply for the Network Security Engineer - Senior / Intermediate role at DTS Solution - A Beyon Cyber Company .
Get AI-powered advice on this job and more exclusive features.
- Please ONLY apply if you are based in Kuwait, Bahrain, or UAE with a valid driving license.
- Resume MUST be specific to IT network security experience and NOT Cisco routing & switching.
- Please mention “FGTPANSEC” in the subject line for resume acceptance.
- Position based in UAE and Kuwait but may require travel to GCC countries for short-term projects.
The role involves managing the complete post-sales project lifecycle for network and security solutions, including design, audit, implementation, deployment, and review. The ideal candidate will have 5+ years of experience.
Our clients include Government, Enterprise, Telecom Providers, Oil & Gas sectors. As part of DTS, you will engage, learn, and collaborate on various solutions.
Responsibilities- Design and plan solutions to meet business and project needs.
- Participate in design exercises impacting projects.
- Work directly with customers to understand requirements.
- Lead presentations to clients confidently.
- Assist SOC teams with fault diagnosis procedures.
- Prepare HLD, LLD, and migration documentation.
- Perform compliance checks and audit configurations of firewalls, routers, and switches.
- Analyze and troubleshoot security hardware and software.
- Work after hours as needed.
- Collaborate with team members.
- Maintain technical documentation.
- Develop network metrics and performance baselines.
- Expertise in Cisco ASA, ForcePoint, and WAF technology.
- Experience with IPSec, SSL VPN, Sandboxing, Proxy, NAT, syslog, DNS, NAC, and cloud platforms (AWS/Azure).
- Knowledge of Data Center topology, routing, switching, MPLS, Load-balancer, and SDN.
- Languages: Primary English; Urdu/Hindi and Arabic preferred.
- Valid certifications in Fortinet and Palo Alto Networks solutions.
Send your CV to .
Additional Details- Seniority level: Mid-Senior level
- Employment type: Full-time
- Job function: IT
- Industry: Network Security
Referrals can double your chances of interview success. Set job alerts for "Senior Network Security Engineer" roles.
#J-18808-LjbffrNetwork Security Engineer - Senior / Intermediate
Posted 15 days ago
Job Viewed
Job Description
Join to apply for the
Network Security Engineer - Senior / Intermediate
role at
DTS Solution - A Beyon Cyber Company . Get AI-powered advice on this job and more exclusive features. Please ONLY apply if you are based in Kuwait, Bahrain, or UAE with a valid driving license. Resume MUST be specific to IT network security experience and NOT Cisco routing & switching. Please mention “FGTPANSEC” in the subject line for resume acceptance. Position based in UAE and Kuwait but may require travel to GCC countries for short-term projects. The role involves managing the complete post-sales project lifecycle for network and security solutions, including design, audit, implementation, deployment, and review. The ideal candidate will have 5+ years of experience. Our clients include Government, Enterprise, Telecom Providers, Oil & Gas sectors. As part of DTS, you will engage, learn, and collaborate on various solutions. Responsibilities
Design and plan solutions to meet business and project needs. Participate in design exercises impacting projects. Work directly with customers to understand requirements. Lead presentations to clients confidently. Assist SOC teams with fault diagnosis procedures. Prepare HLD, LLD, and migration documentation. Perform compliance checks and audit configurations of firewalls, routers, and switches. Analyze and troubleshoot security hardware and software. Work after hours as needed. Collaborate with team members. Maintain technical documentation. Develop network metrics and performance baselines. Qualifications
Expertise in Cisco ASA, ForcePoint, and WAF technology. Experience with IPSec, SSL VPN, Sandboxing, Proxy, NAT, syslog, DNS, NAC, and cloud platforms (AWS/Azure). Knowledge of Data Center topology, routing, switching, MPLS, Load-balancer, and SDN. Languages: Primary English; Urdu/Hindi and Arabic preferred. Certifications
Valid certifications in Fortinet and Palo Alto Networks solutions. Send your CV to
. Additional Details
Seniority level: Mid-Senior level Employment type: Full-time Job function: IT Industry: Network Security Referrals can double your chances of interview success. Set job alerts for "Senior Network Security Engineer" roles.
#J-18808-Ljbffr
Be The First To Know
About the latest Cybersecurity Jobs in Kuwait !
Senior Information Security Analyst
Posted 4 days ago
Job Viewed
Job Description
About the Role
The Senior Manager of Talent Acquisition and Development will oversee the recruitment and development processes within GIG Kuwait. The role involves strategic planning to attract, hire, and retain top talent, as well as implementing training and development programs to enhance employee skills and organizational growth.
Responsibilities
- Develop and execute talent acquisition strategies to meet organizational needs.
- Manage the recruitment process, including sourcing, interviewing, and onboarding new employees.
- Design and implement employee development and training programs.
- Collaborate with department heads to identify staffing needs and skill gaps.
- Maintain talent acquisition metrics and reporting.
- Ensure compliance with employment laws and regulations.
- Foster a positive work environment and company culture.
- Stay updated on industry trends in talent acquisition and development.
Qualifications
- Bachelor's degree in Human Resources, Business Administration, or related field.
- Proven experience in talent acquisition and employee development.
- Strong leadership and communication skills.
- Knowledge of HR software and applicant tracking systems.
Seniority Level
- Senior management
Employment Type
- Full-time
Job Function
- Human Resources / Talent Acquisition
Senior Information Security Analyst
Posted 25 days ago
Job Viewed
Job Description
The Senior Manager of Talent Acquisition and Development will oversee the recruitment and development processes within GIG Kuwait. The role involves strategic planning to attract, hire, and retain top talent, as well as implementing training and development programs to enhance employee skills and organizational growth.
Responsibilities
Develop and execute talent acquisition strategies to meet organizational needs.
Manage the recruitment process, including sourcing, interviewing, and onboarding new employees.
Design and implement employee development and training programs.
Collaborate with department heads to identify staffing needs and skill gaps.
Maintain talent acquisition metrics and reporting.
Ensure compliance with employment laws and regulations.
Foster a positive work environment and company culture.
Stay updated on industry trends in talent acquisition and development.
Qualifications
Bachelor's degree in Human Resources, Business Administration, or related field.
Proven experience in talent acquisition and employee development.
Strong leadership and communication skills.
Knowledge of HR software and applicant tracking systems.
Seniority Level
Senior management
Employment Type
Full-time
Job Function
Human Resources / Talent Acquisition
#J-18808-Ljbffr
Senior Information Security Auditor
Posted 4 days ago
Job Viewed
Job Description
Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company
Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company
- Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
- Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
- Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
- Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
- Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
- Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
- Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
- Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
- Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
- Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
- Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
- Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
- Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
- Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
- Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
- Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
- Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
- Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
- Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
- Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
- Relevant University Degree in Information Security or Information Technology.
- Professional Qualifications in Information Security.
- Minimum 5 Years of Experience in IT audit or Information Security Audit.
- Have a Valid Transferrable Visa in Kuwait.
We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- TrainingSeniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Business Consulting and Services
Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x
Sign in to set job alerts for “Security Auditor” roles. Technical Solutions Consultant, Security (Arabic) Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr