0 Engineering Manager Security Standards And Hardening jobs in Kuwait
Information Security Lead
Posted today
Job Viewed
Job Description
This team is building technology solutions to simplify MENA payments regionally and globally for businesses of all sizes.
**As a Tapster You Will**:
- Monitor access to all systems and maintain access control profiles on computer networks and systems. Track documentation of access authorizations to all resources.
- Research and investigate measures that address data security risks and potential losses for reporting purposes.
- Install, modify, enhance and maintain data system security software.
- Work on determining acceptable risk levels for the enterprise and ensuring the IT environments are adequately protected from potential risks and threats.
- Participate in development and implementation of the appropriate and effective controls to mitigate identified threats and risks.
- Follow-up on detected security issues and implement solutions to reduce security risks
- Assist in the research, development, communication, maintaining and working with the operational units on the enforcement of IT security architecture, policies, procedures, solutions and standards.
- Oversee incident response planning as well as the investigation of security breaches, and assist with disciplinary and legal matters associated with such breaches as necessary
- Support improved data security awareness and education
- Review completed roles/permissions with users to ensure requirements are fully met.
- Deliver services that meet regulatory specifications. Work with internal and external auditors to document and confirm that all security administrative duties are properly performed as well as demonstrate overall compliance
- Additional responsibilities as designated by the manager
**What You Bring to the Party**:
- 10+ years of experience
- Have experience in Banking or any payment services companies
- Provides Secure network/solution designs services, Managed security services and SOC services
- Certified in one or more of the following: CompTIA Security+, CompTIA CYSA+, GSEC, CISSP, CCSP, GCIH
- Compliance experience with PCI, GDPR, NIST, ISO and GCC regional cyber security regulators.
- Fluency in spoken and written English is essential
**Tap is a rapidly growing payment services business, expanding internationally at an extraordinary pace. We are hiring exceptional talent to work with high-performing global teams with one common goal: Making payments easy, quick and secure for our clients all around the world.**
**Are you ready?
Senior Information Security Auditor
Posted today
Job Viewed
Job Description
Responsibilities
- Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
- Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
- Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
- Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
- Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
- Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
- Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
- Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
- Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
- Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
- Relevant University Degree in Information Security or Information Technology.
- Professional Qualifications in Information Security.
- Minimum 5 Years of Experience in IT audit or Information Security Audit.
- Have a Valid Transferrable Visa in Kuwait.
We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- Training
#J-18808-LjbffrIT Security Specialist – Information Security
Posted today
Job Viewed
Job Description
Join to apply for the IT Security Specialist – Information Security role at KDD
Continue with Google Continue with Google
IT Security Specialist – Information SecurityJoin to apply for the IT Security Specialist – Information Security role at KDD
Job Duties Include But Are Not Limited To
We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team.
The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats.
- Identify and fix vulnerabilities within existing security systems.
- Develop organization-wide security measures.
- Document known security breaches and vulnerabilities.
- Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards.
- Monitor and analyze security events and incidents to identify and respond to potential threats promptly.
- Perform penetration tests to assess potential security problems.
- Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks.
- Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications.
- Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required.
- Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements.
- Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR).
- Establish relationships with external cybersecurity partners, vendors, and service providers.
- Plan incident response activities, including investigating security breaches and recommending corrective actions.
- Participate in the change management process.
- Education: Bachelor's degree in Computer Science, Information Systems, or a related field.
- Experience: 3 to 4 years of experience in an IT security role.
- Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels.
- Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills.
- Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines.
- Strategic Thinking: Ability to align solution deliverables with the organization's goals.
- Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems.
- Operating System Administration: Proficiency in securing Windows, Linux, and macOS.
- Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures.
- Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell.
- Encryption Techniques: Knowledge of implementing and managing encryption for data protection.
- Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware).
- Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Dairy Product Manufacturing
Referrals increase your chances of interviewing at KDD by 2x
Get notified about new Information Technology Security Specialist jobs in Farwaniya, Kuwait .
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrIT Security Specialist – Information Security
Posted 27 days ago
Job Viewed
Job Description
Join to apply for the
IT Security Specialist – Information Security
role at
KDD Continue with Google Continue with Google IT Security Specialist – Information Security
Join to apply for the
IT Security Specialist – Information Security
role at
KDD Job Duties Include But Are Not Limited To
We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team.
The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats.
Identify and fix vulnerabilities within existing security systems. Develop organization-wide security measures. Document known security breaches and vulnerabilities. Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards. Monitor and analyze security events and incidents to identify and respond to potential threats promptly. Perform penetration tests to assess potential security problems. Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks. Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications. Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required. Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements. Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR). Establish relationships with external cybersecurity partners, vendors, and service providers. Plan incident response activities, including investigating security breaches and recommending corrective actions. Participate in the change management process.
Required Qualification
Education: Bachelor's degree in Computer Science, Information Systems, or a related field. Experience: 3 to 4 years of experience in an IT security role. Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels. Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills. Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines. Strategic Thinking: Ability to align solution deliverables with the organization's goals.
Required Professional Skills
Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems. Operating System Administration: Proficiency in securing Windows, Linux, and macOS. Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures. Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell. Encryption Techniques: Knowledge of implementing and managing encryption for data protection. Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware). Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.
Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries Dairy Product Manufacturing Referrals increase your chances of interviewing at KDD by 2x Get notified about new Information Technology Security Specialist jobs in
Farwaniya, Kuwait . We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate
Posted 14 days ago
Job Viewed
Job Description
All Jobs > CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate
Location: Kuwait
Position Type: Full-time
DescriptionAs a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will support the Army Network Enterprise Technology Command (NETCOM) on the DoDIN-A Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. You will be part of the CAC/PKI Registration Authority (LRA) operations team, responsible for token issuance, maintenance, and revocation for the Army.
Requirements- Provide 24/7 On-Call and Emergency Response
- Respond to emergencies within two hours of notification
- Maintain an asset inventory of PKI equipment at all sites
- Support DoD Compliance Audits
- Address audit findings per DoD PKI policies
- Develop and maintain training packages
- Test PKI system software and token compatibility
- Verify subscriber identities and pre-register users
- Validate certificate requirements and handle revocations
- Support token issuance, renewal, and delivery of reports
- Complete requests for PIN resets, revocations, key recoveries, and token requests within specified timelines
- Submit activity and token reports monthly
- Prepare reports for NSA and HQDA
- Hold a Secret Security Clearance with Tier 5 background investigation
- Have 3+ years of experience in PKI and related fields
- Have never been relieved of trusted duties or had security clearance revoked
- Have never been convicted of a felony
- Complete RA/LRA training provided by DISA
- DoD Cyber Workforce Framework (DCWF 631) Security Developer Intermediate qualification or equivalent
- Sitting and standing for long periods
- Mobility within an office environment
- Stoop, kneel, crouch, crawl as needed
- Travel less than 10%
QBE is an equal opportunity employer. All qualified applicants will receive consideration regardless of race, color, religion, sex, national origin, sexual orientation, gender identity/expression, age, disability, veteran status, genetic information, pregnancy, marital status, neurodivergence, ethnicity, caste, or military service.
#J-18808-LjbffrCAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior
Posted 14 days ago
Job Viewed
Job Description
All Jobs > CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior
Kuwait
Full-time
Description
As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will provide services in support of the Army Network Enterprise Technology Command (NETCOM) on the Army Department of Defense Information Network (DoDIN-A) Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. As a member of the CAC/PKI Registration Authority (LRA) operations team, you will provide token issuance, sustainment, maintenance, and revocation to the Army customer.
Requirements
Highlights of Responsibilities:
- Provide 24/7 On-Call and Emergency Response
- Respond to emergency calls and arrive at the designated work site within two (2) hours after receiving the emergency call from the COR
- Provide leadership, supervision, and mentorship to the RA/LRA team, ensuring all responsibilities are executed in compliance with DoD PKI CPS and RPS requirements
- Provide RA support to the LRA personnel in creation of NIPRNET and SIPRNET PKI tokens
- Provide RA interface with the Trusted Agent (TA) for token request and distribution
- Maintain an asset inventory list of all PKI daily operations equipment by location at all RA/LRA sites
- Provide support for annual and semi-annual DoD Compliance Audits
- Support the Army CIO/G6 Cyber Security Directorate and the NETCOM G3/5 in addressing audit findings to include mitigation and correction of findings in accordance with DoD PKI CPS and RPS
- Develop and maintain On-the-Job Training packages
- Support test events of the global management PKI system software and token versions to assess backwards compatibility and interoperability
- Verify Subscriber’s identity
- Pre-register users with PKI
- Validate NPE certificate requirements and forward revocation requests
- Support issuance and renewal of SIPRNET tokens and/or NIPRNET Alternate Smart Card Logon
- Support production of and delivery of an Issuance Report detailing number of tokens issued, revoked, renewed, and any issues encountered
- Conduct duties as assigned through NSS/PKI RPS and DoD/PKI RA/LRA CPS
- Complete General Officer/Senior Executive Service requests within 12 hours of receipt
- Complete request for PIN reset, unlock code, revocation and re-issuance of a failed token CRI within 24 hours
- Complete request for key recoveries within 48 hours
- Complete new ASCL and NSS SIPRNET token request within 72 hours
- Submit a monthly RA Activity Report
- Submit a monthly Token Report of all tokens on hand to include returned and bad tokens
- Provide the weekly RA Backlog Report of any activities that fall outside the response timelines identified in the sections titled Response Time
- Prepare a monthly NSA Failed Token Report for HQDA to submit to NSA Program Manager Office
Qualifications
- Secret Security Clearance with a completed Tier 5 (T5) background investigation
- 5+ years of experience
- Advanced operational expertise in Smart Tokens, PKI, Certificate Revocation, CAC Pin Reset, PKE, biometrics, logical and physical access, tactical PKI, and directory services
- Have never been previously relieved of trusted role duties for reasons of negligence or nonperformance of duties
- Have never been denied or had a security clearance revoked
- Have never been convicted of a felony offense
- Must complete RA/LRA training provided by DISA prior to receiving RA or LRA credentials
Preferred Qualifications:
- DoD Cyber Workforce Framework (DCWF 631) Information Systems Security Developer Intermediate qualified (BS degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science or CSC or GCLD or CASP+ or CCSP or Cloud+ or GSEC) or equivalent certification
Physical Requirements:
- Sitting for long periods
- Standing for long periods
- Ambulate throughout an office
- Stoop, kneel, crouch, or crawl as required
- Travel by land or air transportation 10% or less
QBE is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender, gender-identity and/or expression, age, disability, Veteran status, genetic information, pregnancy (including childbirth, lactation, or other related medical conditions), marital-status, neurodivergence, ethnicity, ancestry, caste, military/uniformed service-member status, or any other characteristic protected by applicable federal, state, local, or international law.
#J-18808-LjbffrCAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate
Posted 6 days ago
Job Viewed
Job Description
Kuwait Position Type:
Full-time Description
As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will support the Army Network Enterprise Technology Command (NETCOM) on the DoDIN-A Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. You will be part of the CAC/PKI Registration Authority (LRA) operations team, responsible for token issuance, maintenance, and revocation for the Army. Requirements
Provide 24/7 On-Call and Emergency Response Respond to emergencies within two hours of notification Maintain an asset inventory of PKI equipment at all sites Support DoD Compliance Audits Address audit findings per DoD PKI policies Develop and maintain training packages Test PKI system software and token compatibility Verify subscriber identities and pre-register users Validate certificate requirements and handle revocations Support token issuance, renewal, and delivery of reports Complete requests for PIN resets, revocations, key recoveries, and token requests within specified timelines Submit activity and token reports monthly Prepare reports for NSA and HQDA Hold a Secret Security Clearance with Tier 5 background investigation Have 3+ years of experience in PKI and related fields Have never been relieved of trusted duties or had security clearance revoked Have never been convicted of a felony Complete RA/LRA training provided by DISA Preferred Qualifications
DoD Cyber Workforce Framework (DCWF 631) Security Developer Intermediate qualification or equivalent Physical Requirements
Sitting and standing for long periods Mobility within an office environment Stoop, kneel, crouch, crawl as needed Travel less than 10% QBE is an equal opportunity employer. All qualified applicants will receive consideration regardless of race, color, religion, sex, national origin, sexual orientation, gender identity/expression, age, disability, veteran status, genetic information, pregnancy, marital status, neurodivergence, ethnicity, caste, or military service.
#J-18808-Ljbffr
Be The First To Know
About the latest Engineering manager security standards and hardening Jobs in Kuwait !
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior
Posted 6 days ago
Job Viewed
Job Description
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior Kuwait Full-time Description As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will provide services in support of the Army Network Enterprise Technology Command (NETCOM) on the Army Department of Defense Information Network (DoDIN-A) Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. As a member of the CAC/PKI Registration Authority (LRA) operations team, you will provide token issuance, sustainment, maintenance, and revocation to the Army customer. Requirements Highlights of Responsibilities: Provide 24/7 On-Call and Emergency Response Respond to emergency calls and arrive at the designated work site within two (2) hours after receiving the emergency call from the COR Provide leadership, supervision, and mentorship to the RA/LRA team, ensuring all responsibilities are executed in compliance with DoD PKI CPS and RPS requirements Provide RA support to the LRA personnel in creation of NIPRNET and SIPRNET PKI tokens Provide RA interface with the Trusted Agent (TA) for token request and distribution Maintain an asset inventory list of all PKI daily operations equipment by location at all RA/LRA sites Provide support for annual and semi-annual DoD Compliance Audits Support the Army CIO/G6 Cyber Security Directorate and the NETCOM G3/5 in addressing audit findings to include mitigation and correction of findings in accordance with DoD PKI CPS and RPS Develop and maintain On-the-Job Training packages Support test events of the global management PKI system software and token versions to assess backwards compatibility and interoperability Verify Subscriber’s identity Pre-register users with PKI Validate NPE certificate requirements and forward revocation requests Support issuance and renewal of SIPRNET tokens and/or NIPRNET Alternate Smart Card Logon Support production of and delivery of an Issuance Report detailing number of tokens issued, revoked, renewed, and any issues encountered Conduct duties as assigned through NSS/PKI RPS and DoD/PKI RA/LRA CPS Complete General Officer/Senior Executive Service requests within 12 hours of receipt Complete request for PIN reset, unlock code, revocation and re-issuance of a failed token CRI within 24 hours Complete request for key recoveries within 48 hours Complete new ASCL and NSS SIPRNET token request within 72 hours Submit a monthly RA Activity Report Submit a monthly Token Report of all tokens on hand to include returned and bad tokens Provide the weekly RA Backlog Report of any activities that fall outside the response timelines identified in the sections titled Response Time Prepare a monthly NSA Failed Token Report for HQDA to submit to NSA Program Manager Office Qualifications Secret Security Clearance with a completed Tier 5 (T5) background investigation 5+ years of experience Advanced operational expertise in Smart Tokens, PKI, Certificate Revocation, CAC Pin Reset, PKE, biometrics, logical and physical access, tactical PKI, and directory services Have never been previously relieved of trusted role duties for reasons of negligence or nonperformance of duties Have never been denied or had a security clearance revoked Have never been convicted of a felony offense Must complete RA/LRA training provided by DISA prior to receiving RA or LRA credentials Preferred Qualifications: DoD Cyber Workforce Framework (DCWF 631) Information Systems Security Developer Intermediate qualified (BS degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science or CSC or GCLD or CASP+ or CCSP or Cloud+ or GSEC) or equivalent certification Physical Requirements: Sitting for long periods Standing for long periods Ambulate throughout an office Stoop, kneel, crouch, or crawl as required Travel by land or air transportation 10% or less QBE is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender, gender-identity and/or expression, age, disability, Veteran status, genetic information, pregnancy (including childbirth, lactation, or other related medical conditions), marital-status, neurodivergence, ethnicity, ancestry, caste, military/uniformed service-member status, or any other characteristic protected by applicable federal, state, local, or international law.
#J-18808-Ljbffr
Information & Cyber Security and Data Privacy
Posted today
Job Viewed
Job Description
At IKEA we have a vibrant culture where ideas are heard, where there is opportunity to learn new skills and where the goal always is to create a better everyday life for the many people. We give down-to-earth, straightforward people the possibility to grow, both as individuals and in their professional roles. We offer this position in a fast paced, truly global environment with many challenges and development opportunities.
**Job description**
More specifically, in this role you will:
- Support digital product teams in their delivery of innovative digital products by assessing business impact and risks related to information security and privacy; agree and monitor remediation plans.
- Engage with relevant stakeholders in IKEA Al Homaizi as well as franchisees to drive topics related to Information and Cyber Security and Data Privacy by providing expertise, best practices, trainings and hands-on support.
- Be able to lead the topic of Information and Cyber Security and Data Privacy, with deep knowledge in one or more areas, such as those related to business continuity management, and/or IT Risk management and compliance
- Be an active member of the IKEA Al Homaizi Information and Cyber Security and Data Privacy team and IKEA digital community.
- Contribute to further develop the IKEA Al Homaizi frameworks, standards and best practices related to one or more areas, such as Information and Cyber Security and Data Privacy, business continuity and/or IT risk management.
- At any time, act as an ambassador of IKEA values and role model for fact-based business leadership.
In this role you will report to our Risk & Compliance Manager in IKEA Al Homaizi and work closely with Information Security and Data Privacy leaders, Cyber security leaders and specialists across IKEA to lead towards uniformity and commonality, contributing to the IKEA Al Homaizi security and privacy approach to secure IKEA in a connected value chain.
**Qualification**
We are on the journey to transform our digital capabilities, bringing processes, people, data & technology together - an enabler for IKEA to become an even better home furnishing company in the future. A journey that needs passionate people who embrace change, dare to question and want to make a difference. If that sounds like you, come and join us. Together we can do great things.
We believe that you are passionate to drive, explore and understand how digital services and products are built and how they break. Where theoretical knowledge helps you, it is backed up by practical skills learned and honed beyond what can be taught. You excel when confronted by an open-ended situation. You have powerful analytic capabilities as well as an ordered and structured approach to problem solving. You are pragmatic and ensure that we enable business to flourish, today and tomorrow.
You are required to have a good understanding in agile ways-of-working and enjoy working in a value-driven organization.
We're doing some amazing things at IKEA Al Homaizi and therefore, we need some amazing people - this position is not an exception.
To be successful in the role, we expect that you have working experience in at least 5 of the listed domains:
- IT security audits
- Incident response
- Business continuity management/resiliency
- Cloud security
- DevSecOps and CI/CD security (SDLC)
- Information Security and Data Privacy frameworks
- IT risk and compliance frameworks & controls
- Vendor security risk management
- Vulnerability management
We believe you are a strong Information and Cyber Security and Data Privacy leader with the ability to inspire and mobilize people towards clearly set objectives. We are looking for a pragmatic and adaptable person with strong willpower, that can make things happen.
You are curious, have a strong capability to communicate and inspire, and are a real partner in leading the business in creating a risk-aware culture. You have a desire to safeguard the IKEA Brand and the integrity of our co-workers. It is within your ability to demonstrate a risk-based approach in line with the IKEA culture & values that you create real business impact and buy-in for decisions and investments.
**More Information** About the **Cybersecurity** Leader role**
**We are looking for an **Information & Cyber Security and Data Privacy Leader** with experience and knowledge across multiple security domains, that can help us build the future of IKEA.
As Information and Cyber Security and Data Privacy, you will work closely together with the business, architects, and engineers, focusing on enabling IKEA to perform secure and high-quality services and products, to create a better everyday life for the many people. In this role you will be the spokesperson for Information and Cyber Security and Data Privacy and incorporate yourself in ongoing projects and initiatives.
Please send your CV and tell us in which direction you would like to take career, If you are exp
Engineering Manager
Posted today
Job Viewed
Job Description
Overview
Canonical is a leading provider of open source software and operating systems to the global enterprise and technology markets. Our platform, Ubuntu, is widely used in breakthrough enterprise initiatives such as public cloud, data science, AI, engineering innovation, and IoT. Our customers include the world's leading public cloud and silicon providers, and industry leaders in many sectors. The company is a pioneer of global distributed collaboration, with 1200+ colleagues in 75+ countries and very few office-based roles. Teams meet two to four times yearly in person, in interesting locations around the world, to align on strategy and execution. The company is founder-led, profitable, and growing. This is a general track for first-level engineering management positions at Canonical.
We believe that open source is just starting to transform the tech sector and enterprise compute. Our goal is to make open source easier, more reliable, and more secure for deployment and development. We strive to be the provider of "most software to most companies". To deliver on that ambition, our engineers are carefully selected from the applicants across the globe. We select for brilliance and motivation to take open source to the next level. Our engineering managers help teams achieve more than they realised they could, and feel proud of the result.
What you'll do- Lead and develop a team of engineers, ranging from graduate to senior
- Work remotely in a single major time zone, sometimes two
- Coach, mentor, and offer career development feedback
- Identify and measure team health indicators
- Implement disciplined engineering processes
- Represent your team and product to stakeholders, partners, and customers
- Develop and evangelise great engineering and organisational practices
- Plan and manage progress on agreed goals and projects
- Be an active part of the leadership team, collaborating with other leaders
- An exceptional academic track record from both high school and university
- Undergraduate degree in Computer Science or STEM, or a compelling narrative about your alternative path
- Drive and a track record of going above and beyond expectations
- Excellent verbal and written communication skills in English
- A love of developing and growing people and a track record of it
- Experience in leading, coaching, and mentoring software developers
- Organised and able to ensure your team delivers timely, high-quality results
- Well-organised, self-starting, and able to deliver to schedule
- Professional manner of interacting with colleagues, partners, and the community
- You have advanced expertise in your domain
- You are knowledgeable and passionate about software development
- You have solid experience working in an agile development environment
- You have a demonstrated drive for continual learning
- Builds trust, relationships, and confidence
- Result-oriented, with a personal drive to meet commitments
- Ability to travel twice a year, for company events up to two weeks each
- Experience in a developer advocacy or community role
- Ops and system administration experience
- Performance engineering and security experience
We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.
- Distributed work environment with twice-yearly team sprints in person
- Personal learning and development budget of USD 2,000 per year
- Annual compensation review
- Recognition rewards
- Annual holiday leave
- Maternity and paternity leave
- Employee Assistance Programme
- Opportunity to travel to new locations to meet colleagues
- Priority Pass and travel upgrades for long haul company events
Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open-source projects and the platform for AI, IoT, and the cloud, we are changing the world of software. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence; in order to succeed, we need to be the best at what we do. Most colleagues at Canonical have worked from home since our inception in 2004. Working here is a step into the future and will challenge you to think differently, work smarter, learn new skills, and raise your game.
Canonical is an equal opportunity employer. We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.
#J-18808-Ljbffr