11 Cybersecurity jobs in Kuwait City
Threat Intelligence Lead
Posted 4 days ago
Job Viewed
Job Description
Threat Intelligence Lead
role at
Canonical 3 months ago Be among the first 25 applicants Join to apply for the
Threat Intelligence Lead
role at
Canonical Get AI-powered advice on this job and more exclusive features. The Threat Intelligence Lead will own Canonical's threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our products and internal cybersecurity controls. You will collaborate with internal stakeholders as well as with the wider cybersecurity community, making sure that Canonical is recognised as a thought leader on open source threat intelligence.
This role will report to the CISO.
You will lead intelligence gathering and development activities on threat actors targeting software supply chains. You'll study attack trends across the wider open source software landscape, report findings to internal security teams, and advise the wider engineering community on the best course of action to detect and mitigate possible threats.
As the publisher of Ubuntu, Canonical products are directly or indirectly present in almost every organisation and household in the world, making them a prime target for threat actors. This team's mission is to help Canonical, and by extension countless community members and companies around the world, secure their software infrastructure.
What you'll do in this role
Build and own Canonical's threat intelligence strategy Build and maintain OSINT research environments Develop OSINT tradecraft, principals, and techniques Identify and track targeted intrusion cyber threats, trends, and new developments by cyber threat actors through analysis of proprietary and open source datasets Collaborate across teams to inform on activity of interest Coordinate adversary/campaign tracking Contribute to the wider threat intelligence community, establishing Canonical as a key contributor and thought leader in the space Work with product and engineering teams to explain cybersecurity threats and advise on mitigation strategies Work with the OPSEC and IS team to help implement/update security controls prioritising cyber defence Identify intelligence gaps and propose new tools and research projects to fill them Conduct briefings for executives, internal stakeholders and external customers
The successful Threat Intelligence Lead will be
An experienced threat intelligence leader (or similar) Knowledgeable about the current open source threat landscape and computer networking/infrastructure concepts Highly competent with OSINT tools (e.g., Buscador, Trace Labs OSINT VM, OSINT Framework, Maltego, Shodan, social media scraping tools, etc.) Able to identify, organise, catalogue, and track adversary tradecraft trends — often with incomplete data Experienced using threat intelligence data to influence enterprise architecture or product development decisions An excellent communicator with the ability to clearly articulate and tailor technical content to a variety of audiences Able to travel twice a year, for company events up to two weeks long
Desired Characteristics
A professional portfolio of OSINT related scripts, tools, or frameworks Demonstrated involvement in the larger OSINT community (please share relevant links) Degree qualified, with a bachelor's degree in computer science, information security, or a related field Certifications in related areas (e.g. GOSI, SANS SEC487 & SEC587, IntelTechniques OSIP, etc) Experience in a tech company or government/military signal intelligence departments
What we offer you
We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.
Distributed work environment with twice-yearly team sprints in person Personal learning and development budget of USD 2,000 per year Annual compensation review Recognition rewards Annual holiday leave Maternity and paternity leave Employee Assistance Programme Opportunity to travel to new locations to meet colleagues Priority Pass, and travel upgrades for long haul company events
About Canonical
Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.
Canonical is an equal opportunity employer
We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.
Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries Software Development Referrals increase your chances of interviewing at Canonical by 2x Sign in to set job alerts for “Threat Intelligence Lead” roles.
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Cybersecurity Sales Executive
Posted today
Job Viewed
Job Description
Role Summary:
As a Cybersecurity Sales Executive focused on the SMB market, you will be responsible for developing new business opportunities, managing client relationships, and promoting cybersecurity services and solutions tailored to small and medium-sized businesses. Your role bridges technical understanding with strong business acumen.
Responsibilities:
- Identify and engage SMB clients in need of cybersecurity services such as managed SOC, vulnerability assessments, endpoint protection, compliance support, and awareness training.
- Qualify leads, conduct discovery sessions, and propose tailored security solutions aligned with client pain points.
- Build and maintain a strong sales pipeline through outbound activities, events, referrals, and partnerships.
- Work closely with pre-sales engineers to craft compelling proposals, demos, and proof-of-concepts.
- Own the entire sales cycle from initial outreach to contract closure and account handover.
- Maintain CRM records and produce accurate sales forecasts and reports.
- Stay updated on current security trends, products, and competitor offerings in the SMB space.
- Educate clients on cybersecurity risks and help build a roadmap for their protection journey.
- Represent the company at industry events, conferences, and webinars to build brand presence.
- Collaborate with marketing on targeted campaigns for lead generation and brand awareness.
Skills
Skills:
- Strong sales and negotiation skills with proven success in B2B or tech sales (preferably cybersecurity)
- Understanding of SMB market needs, budget constraints, and buying behavior
- Familiarity with security services such as MDR, EDR, awareness training, firewalls, and compliance
- Excellent communication and presentation skills, both technical and business-oriented
- Self-motivated, driven, and customer-focused mindset
- Ability to work cross-functionally with technical and support teams
Certifications (Optional but Beneficial):
- CompTIA Security+ (for foundational security knowledge)
- Sales certifications from major vendors (e.g., Cisco, Fortinet, Microsoft)
- Cybersecurity sales training (e.g., Sandler Sales for Cybersecurity, ISACA Fundamentals)
Cybersecurity Sales Executive
Posted today
Job Viewed
Job Description
#J-18808-Ljbffr
IT Cybersecurity Specialist
Posted 1 day ago
Job Viewed
Job Description
IUK is seeking a highly motivated and skilled Cybersecurity Specialist to join our Information Technology (IT) department. In this critical role, you will play a key part in safeguarding the university's network infrastructure, sensitive data, and digital assets from cyberattacks.
Position Summary
The IT Security Specialist will play a vital role in safeguarding the IUK’s IT infrastructure, data, and user privacy. You will be responsible for a range of security tasks, including threat detection, vulnerability analysis, incident response, and maintaining a secure network environment built on firewalls and Microsoft 365 security features.
Responsibilities
Developing and maintaining security policies and procedures: This involves creating guidelines for secure usage of university IT resources, including password management, data handling, and acceptable use policies. Implementing and managing security controls: This includes setting up firewalls, intrusion detection systems, and anti-virus software to protect the university network from unauthorized access and malicious attacks. Monitoring and analyzing network activity: Monitor network traffic for suspicious activity and potential breaches. Analyze logs and identify vulnerabilities to address them proactively. Responding to security incidents: Containing the damage, investigating the incident, and implementing recovery measures in case of a security breach. Educating and training faculty, staff, and students: Raising awareness about cybersecurity best practices is crucial. Conduct training sessions, workshops, and campaigns to educate users on various security topics like phishing scams and social engineering. Staying current with evolving threats: The cybersecurity landscape is constantly changing. IT security specialists need to stay updated on the latest threats, vulnerabilities, and mitigation strategies.
Education
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field. Relevant certifications like CompTIA Security+, Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH).
Experience
Minimum of 4-5 years of experience in a cybersecurity specialist role. Prior experience in IT security in an educational setting is preferred.
Technical Skills
A solid understanding of networking, operating systems, and security technologies is essential. This includes knowledge of firewalls, intrusion detection systems, encryption, and vulnerability scanning tools. Familiarity with university-specific security regulations and compliance requirements is also beneficial.
Behavioral Skills
Analytical and problem-solving skills: Identifying, analyzing, and resolving security issues requires strong analytical and problem-solving skills. Communication skills: The ability to communicate effectively with technical and non-technical audiences is crucial. This includes explaining complex security issues in a clear and concise manner. Attention to detail: Needs to be meticulous and detail-oriented to identify and address potential security weaknesses.
#J-18808-Ljbffr
Technical Product Marketing Manager - Cybersecurity
Posted 17 days ago
Job Viewed
Job Description
Join to apply for the
Technical Product Marketing Manager - Cybersecurity
role at
Canonical Technical Product Marketing Manager - Cybersecurity
3 days ago Be among the first 25 applicants Join to apply for the
Technical Product Marketing Manager - Cybersecurity
role at
Canonical Canonical is a leading provider of open source software and operating systems to the global enterprise and technology markets. Our platform, Ubuntu, is very widely used in breakthrough enterprise initiatives such as public cloud, data science, AI, engineering innovation, and IoT. Our customers include the world's leading public cloud and silicon providers, and industry leaders in many sectors. The company is a pioneer of global distributed collaboration, with 1200+ colleagues in 75+ countries and very few office-based roles. Teams meet two to four times yearly in person, in interesting locations around the world, to align on strategy and execution.
The company is founder-led, profitable, and growing.
We're looking for a Technical Product Marketing Manager who combines deep technical understanding with strategic marketing expertise to develop go-to-market plans for our global security and compliance portfolio.
This is a hands-on, multidisciplinary, and dynamic position that requires working closely with product managers, engineering teams, and security experts to truly understand the technical capabilities of our offerings, and translate them into compelling positioning and content. You'll also collaborate with the content team, sales, and other marketing functions to drive awareness, adoption, and growth.
The ideal candidate is a technologist at heart, someone who thrives on understanding how products work under the hood and is excited to communicate their value clearly to both technical and non-technical audiences. You're motivated by ownership, driven by curiosity, and comfortable operating at the intersection of product and marketing. You love to get hands-on, solve problems, experiment, and build scalable marketing systems.
This role sits within the product marketing team and reports to the Product Marketing Lead
Location:
This role will be based remotely in the EMEA region.
What your day will look like
Lead the go-to-market strategy and execution for Canonical's range of security and compliance products, including messaging and positioning Track the competitive landscape and emerging trends to define product differentiation and value drivers Collaborate with engineering and product teams to understand product roadmaps, and customer use cases Translate technical product capabilities into clear, differentiated messaging for key personas, including Executives, DevSecOps, and platform teams Own campaign and content planning for the security portfolio Use data and insights to iterate on demand generation strategies and optimize conversion throughout the funnel Work with other teams to plan events, webinars and support messaging for paid and social media promotion
What we are looking for in you
A passion for technology and open source—you get excited about innovation, software, and community-driven development. Strong storytelling skills—you know how to craft messaging that resonates with both technical and business audiences. Growth mindset—someone who thrives on experimentation, learning, and continuous improvement. Excellent communication skills, both written and verbal.
Nice-to-have skills
Technical understanding of the Cybersecurity world Data-driven mindset, using insights to refine strategies and improve performance. Experience in product marketing for enterprise software, cloud, DevOps, or open-source solutions. Experience with demand generation, understanding how to translate GTM strategies into pipeline growth. Comfort working cross-functionally with product, sales, partners, and marketing teams.
What we offer colleagues
We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognize outstanding performance. In addition to base pay, we offer a performance-driven annual bonus or commission. We provide all team members with additional benefits which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.
Distributed work environment with twice-yearly team sprints in person Personal learning and development budget of USD 2,000 per year Annual compensation review Recognition rewards Annual holiday leave Maternity and paternity leave Team Member Assistance Program & Wellness Platform Opportunity to travel to new locations to meet colleagues Priority Pass and travel upgrades for long-haul company events
About Canonical
Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open-source projects and the platform for AI, IoT, and the cloud, we are changing the world of software. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence; in order to succeed, we need to be the best at what we do. Most colleagues at Canonical have worked from home since our inception in 2004. Working here is a step into the future and will challenge you to think differently, work smarter, learn new skills, and raise your game.
Canonical is an equal opportunity employer
We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.
Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Marketing and Sales Industries Software Development Referrals increase your chances of interviewing at Canonical by 2x Sign in to set job alerts for “Marketing Manager” roles.
Product Manager - Industrial Sector Lead
Product Manager - Hardware Certification
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Network Security Engineer - Senior / Intermediate
Posted 5 days ago
Job Viewed
Job Description
Join to apply for the
Network Security Engineer - Senior / Intermediate
role at
DTS Solution - A Beyon Cyber Company . Get AI-powered advice on this job and more exclusive features. Please ONLY apply if you are based in Kuwait, Bahrain, or UAE with a valid driving license. Resume MUST be specific to IT network security experience and NOT Cisco routing & switching. Please mention “FGTPANSEC” in the subject line for resume acceptance. Position based in UAE and Kuwait but may require travel to GCC countries for short-term projects. The role involves managing the complete post-sales project lifecycle for network and security solutions, including design, audit, implementation, deployment, and review. The ideal candidate will have 5+ years of experience. Our clients include Government, Enterprise, Telecom Providers, Oil & Gas sectors. As part of DTS, you will engage, learn, and collaborate on various solutions. Responsibilities
Design and plan solutions to meet business and project needs. Participate in design exercises impacting projects. Work directly with customers to understand requirements. Lead presentations to clients confidently. Assist SOC teams with fault diagnosis procedures. Prepare HLD, LLD, and migration documentation. Perform compliance checks and audit configurations of firewalls, routers, and switches. Analyze and troubleshoot security hardware and software. Work after hours as needed. Collaborate with team members. Maintain technical documentation. Develop network metrics and performance baselines. Qualifications
Expertise in Cisco ASA, ForcePoint, and WAF technology. Experience with IPSec, SSL VPN, Sandboxing, Proxy, NAT, syslog, DNS, NAC, and cloud platforms (AWS/Azure). Knowledge of Data Center topology, routing, switching, MPLS, Load-balancer, and SDN. Languages: Primary English; Urdu/Hindi and Arabic preferred. Certifications
Valid certifications in Fortinet and Palo Alto Networks solutions. Send your CV to
. Additional Details
Seniority level: Mid-Senior level Employment type: Full-time Job function: IT Industry: Network Security Referrals can double your chances of interview success. Set job alerts for "Senior Network Security Engineer" roles.
#J-18808-Ljbffr
Senior Information Security Auditor
Posted 22 days ago
Job Viewed
Job Description
Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company
Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company
- Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
- Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
- Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
- Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
- Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
- Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
- Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
- Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
- Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
- Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
- Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
- Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
- Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
- Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
- Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
- Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
- Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
- Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
- Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
- Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
- Relevant University Degree in Information Security or Information Technology.
- Professional Qualifications in Information Security.
- Minimum 5 Years of Experience in IT audit or Information Security Audit.
- Have a Valid Transferrable Visa in Kuwait.
We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- TrainingSeniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Business Consulting and Services
Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x
Sign in to set job alerts for “Security Auditor” roles. Technical Solutions Consultant, Security (Arabic) Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrBe The First To Know
About the latest Cybersecurity Jobs in Kuwait City !
Senior Information Security Auditor
Posted today
Job Viewed
Job Description
Senior Information Security Auditor
role at
Boubyan Consulting Company Join to apply for the
Senior Information Security Auditor
role at
Boubyan Consulting Company Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices. Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks. Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly. Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings. Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce. Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements. Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards. Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process. Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors. Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices. Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks. Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly. Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings. Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce. Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements. Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards. Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process. Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors. Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
Job Requirements
Relevant University Degree in Information Security or Information Technology. Professional Qualifications in Information Security. Minimum 5 Years of Experience in IT audit or Information Security Audit. Have a Valid Transferrable Visa in Kuwait.
About Boubyan Consulting
We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- Training Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries Business Consulting and Services Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x Sign in to set job alerts for “Security Auditor” roles.
Technical Solutions Consultant, Security (Arabic)
Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
IT Security Specialist – Information Security
Posted 8 days ago
Job Viewed
Job Description
Join to apply for the IT Security Specialist – Information Security role at KDD
Continue with Google Continue with Google
IT Security Specialist – Information SecurityJoin to apply for the IT Security Specialist – Information Security role at KDD
Job Duties Include But Are Not Limited To
We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team.
The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats.
- Identify and fix vulnerabilities within existing security systems.
- Develop organization-wide security measures.
- Document known security breaches and vulnerabilities.
- Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards.
- Monitor and analyze security events and incidents to identify and respond to potential threats promptly.
- Perform penetration tests to assess potential security problems.
- Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks.
- Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications.
- Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required.
- Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements.
- Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR).
- Establish relationships with external cybersecurity partners, vendors, and service providers.
- Plan incident response activities, including investigating security breaches and recommending corrective actions.
- Participate in the change management process.
- Education: Bachelor's degree in Computer Science, Information Systems, or a related field.
- Experience: 3 to 4 years of experience in an IT security role.
- Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels.
- Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills.
- Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines.
- Strategic Thinking: Ability to align solution deliverables with the organization's goals.
- Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems.
- Operating System Administration: Proficiency in securing Windows, Linux, and macOS.
- Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures.
- Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell.
- Encryption Techniques: Knowledge of implementing and managing encryption for data protection.
- Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware).
- Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Dairy Product Manufacturing
Referrals increase your chances of interviewing at KDD by 2x
Get notified about new Information Technology Security Specialist jobs in Farwaniya, Kuwait .
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrCAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate
Posted 14 days ago
Job Viewed
Job Description
Kuwait Position Type:
Full-time Description
As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will support the Army Network Enterprise Technology Command (NETCOM) on the DoDIN-A Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. You will be part of the CAC/PKI Registration Authority (LRA) operations team, responsible for token issuance, maintenance, and revocation for the Army. Requirements
Provide 24/7 On-Call and Emergency Response Respond to emergencies within two hours of notification Maintain an asset inventory of PKI equipment at all sites Support DoD Compliance Audits Address audit findings per DoD PKI policies Develop and maintain training packages Test PKI system software and token compatibility Verify subscriber identities and pre-register users Validate certificate requirements and handle revocations Support token issuance, renewal, and delivery of reports Complete requests for PIN resets, revocations, key recoveries, and token requests within specified timelines Submit activity and token reports monthly Prepare reports for NSA and HQDA Hold a Secret Security Clearance with Tier 5 background investigation Have 3+ years of experience in PKI and related fields Have never been relieved of trusted duties or had security clearance revoked Have never been convicted of a felony Complete RA/LRA training provided by DISA Preferred Qualifications
DoD Cyber Workforce Framework (DCWF 631) Security Developer Intermediate qualification or equivalent Physical Requirements
Sitting and standing for long periods Mobility within an office environment Stoop, kneel, crouch, crawl as needed Travel less than 10% QBE is an equal opportunity employer. All qualified applicants will receive consideration regardless of race, color, religion, sex, national origin, sexual orientation, gender identity/expression, age, disability, veteran status, genetic information, pregnancy, marital status, neurodivergence, ethnicity, caste, or military service.
#J-18808-Ljbffr