7 Information Assurance jobs in Kuwait
Network Information Assurance
Posted 5 days ago
Job Viewed
Job Description
Supports United States Army Regional Cyber Center – Southwest Asia (USARCC-SWA) networks with day-to-day operations in support of (ISO) Computer Network Defense (CND), to deny adversaries access to information and information systems (IS). Operate and maintain (O&M) active and passive defense technologies, to troubleshoot, optimize, and administer network Intrusion Detection/Prevention Systems (IDS/IPS). Adheres to Change Management (CM) policies, provides technical documentation, and follows the Risk Management Framework (RMF) by implementing, assessing, and monitoring Defense Information Systems Agency (DISA) provided Secure Technical Implementation Guides (STIGs). Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
Provide Network IDS/IPS O&M in support of (ISO) the Army portion of the Department of Defense Information Network (DoDIN) in the United States Central Command (US CENTCOM) Area of Responsibility (AOR).
Monitor and implement Joint Forces Headquarters (JFHQ-DoDIN), United States Army Cyber Command (ARCYBER), and US Army Network Enterprise Technology Command (NETCOM) Operation Orders (OPORD), Task Orders (TASKORD), and Communication Tasking Orders (CTOs).
Block Internet Protocol (IP) networks when directed by the customer.
Investigate network and Automated Information System (AIS) security events.
Manage customer trouble tickets using automated standardized system. Record customer requests for assistance electronically. Provides record of immediate resolution or escalates for resolution of particularly difficult and complex problems. Ensures that problem resolution is recorded electronically to assist addressing subsequent occurrences of problems.
Consults with other IT Specialists to identify defects in performance and provides administrative and technical assistance to the USARCC-SWA Team.
Generate reports for leadership detailing traffic analysis, and security events.
Create, implement, and monitor custom Snort version 2 and 3 IPS signatures.
Apply vendor provided signature and software updates while adhering to CM policies.
Perform in depth analysis utilizing the Security Incident and Event Management (SIEM).
Participate in CND exercises as requested by the customer to maintain site accreditation.
Interprets and implements Department of Defense (DoD), Army, and local Command policies, directives, manuals, instructions, regulations and guidelines for data, and system security including DISA STIGs and Security Requirements Guides (SRGs).
Maintains current DoD Cyberspace Workforce Framework (DCWF) certifications per DoD 8570.01-M, and other cybersecurity requirements.
Perform any additional duties as required/assigned.
Qualifications :
Security Clearance:
Requires an active Secret Clearance
Education / Certification: One-year related experience can be substituted for one year of education if the degree is required.
High school diploma required or equivalent
This position requires candidates to adhere to DoD 8570.01. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.
The authorized certifications for this job title are listed as follows:
IAT Level: Information Technology (IT) I / Information Assurance Technical (IAT) III
BASELINE:
Cisco: CCNP Security
CompTIA: CASP+ ce: Advanced Security Practitioner
CompTIA: CySA+ ce: Cybersecurity Analyst
ISACA: CISA: Certified Information Systems Auditor
ISC2: CCSP: Cloud Certified Security Practitioner
ISC2: CISSP (or Associate): Certified Information Systems Security Professional
COMPUTING ENVIRONMENT (CE):
Cisco: CCIE: (Any)
Cisco: CCNP: Certified Network Professional: (Any)
EC-Council: CEH: Certified Ethical Hacker
EC-Council: CHFI: Certified Hacking Forensic Investigator
EC-Council: CND: Certified Network Defender
Experience :
Requires a minimum of seven (7) years of experience in telecommunications sector.
Company Industry
- Facilities Management
Department / Functional Area
- Communications Engineering
Keywords
- Network Information Assurance
Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at
People Looking for Network Information Assurance Jobs also searchedVectrus is a leading provider of global service solutions in the areas of Infrastructure Asset Management, Information Technology and Network Communication services, and Logistics and Supply Chain Management services.
Since 1945, we've succeeded by tackling some of the world's most difficult challenges. Our management team averages 28 years of experience in the military and industry, and our globally diverse workforce, including more than 30% of our employees reporting a military background, provide us with highly resourceful and experienced problem solvers. We currently operate in 15 countries across four continents, in both stable and unstable environments, employing approximately 5,000 people and managing more than 7,250 subcontractor personnel.
Vectrus brings together the best people and performance needed to get the job done. We are "true to your mission."
Network Information Assurance
Posted 27 days ago
Job Viewed
Job Description
Join to apply for the Network Information Assurance role at V2X Inc
1 day ago Be among the first 25 applicants
Join to apply for the Network Information Assurance role at V2X Inc
Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
Supports United States Army Regional Cyber Center - Southwest Asia (USARCC-SWA) networks with day-to-day operations in support of (ISO) Computer Network Defense (CND), to deny adversaries access to information and information systems (IS). Operate and maintain (O&M) active and passive defense technologies, to troubleshoot, optimize, and administer network Intrusion Detection/Prevention Systems (IDS/IPS). Adheres to Change Management (CM) policies, provides technical documentation, and follows the Risk Management Framework (RMF) by implementing, assessing, and monitoring Defense Information Systems Agency (DISA) provided Secure Technical Implementation Guides (STIGs). Program: OMDAC-SWACA
Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
Supports United States Army Regional Cyber Center - Southwest Asia (USARCC-SWA) networks with day-to-day operations in support of (ISO) Computer Network Defense (CND), to deny adversaries access to information and information systems (IS). Operate and maintain (O&M) active and passive defense technologies, to troubleshoot, optimize, and administer network Intrusion Detection/Prevention Systems (IDS/IPS). Adheres to Change Management (CM) policies, provides technical documentation, and follows the Risk Management Framework (RMF) by implementing, assessing, and monitoring Defense Information Systems Agency (DISA) provided Secure Technical Implementation Guides (STIGs). Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
- Provide Network IDS/IPS O&M in support of (ISO) the Army portion of the Department of Defense Information Network (DoDIN) in the United States Central Command (US CENTCOM) Area of Responsibility (AOR).
- Monitor and implement Joint Forces Headquarters (JFHQ-DoDIN), United States Army Cyber Command (ARCYBER), and US Army Network Enterprise Technology Command (NETCOM) Operation Orders (OPORD), Task Orders (TASKORD), and Communication Tasking Orders (CTOs).
- Block Internet Protocol (IP) networks when directed by the customer.
- Investigate network and Automated Information System (AIS) security events.
- Manage customer trouble tickets using automated standardized system. Record customer requests for assistance electronically. Provides record of immediate resolution or escalates for resolution of particularly difficult and complex problems. Ensures that problem resolution is recorded electronically to assist addressing subsequent occurrences of problems.
- Consults with other IT Specialists to identify defects in performance and provides administrative and technical assistance to the USARCC-SWA Team.
- Generate reports for leadership detailing traffic analysis, and security events.
- Create, implement, and monitor custom Snort version 2 and 3 IPS signatures.
- Apply vendor provided signature and software updates while adhering to CM policies.
- Perform in depth analysis utilizing the Security Incident and Event Management (SIEM).
- Participate in CND exercises as requested by the customer to maintain site accreditation.
- Interprets and implements Department of Defense (DoD), Army, and local Command policies, directives, manuals, instructions, regulations and guidelines for data, and system security including DISA STIGs and Security Requirements Guides (SRGs).
- Maintains current DoD Cyberspace Workforce Framework (DCWF) certifications per DoD 8570.01-M, and other cybersecurity requirements.
- Perform any additional duties as required/assigned.
- Qualifications:
- Security Clearance:
- Requires an active Secret Clearance
- Education / Certification: One-year related experience can be substituted for one year of education if the degree is required.
- High school diploma required or equivalent
- This position requires candidates to adhere to DoD 8570.01. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.
- The authorized certifications for this job title are listed as follows:
- IAT Level: Information Technology (IT) I / Information Assurance Technical (IAT) III
- BASELINE:
- Cisco: CCNP Security
- CompTIA: CASP+ ce: Advanced Security Practitioner
- CompTIA: CySA+ ce: Cybersecurity Analyst
- GIAC: GCED: Certified Enterprise Defender
- GIAC: GCIH: Certified Incident Handler
- ISACA: CISA: Certified Information Systems Auditor
- ISC2: CCSP: Cloud Certified Security Practitioner
- ISC2: CISSP (or Associate): Certified Information Systems Security Professional
- COMPUTING ENVIRONMENT (CE):
- Cisco: CCIE: (Any)
- Cisco: CCNP: Certified Network Professional: (Any)
- EC-Council: CEH: Certified Ethical Hacker
- EC-Council: CHFI: Certified Hacking Forensic Investigator
- EC-Council: CND: Certified Network Defender
- Microsoft: Certified: Azure Security Engineer Associate
- Microsoft: Certified: Azure Solutions Architect Expert
- Microsoft: MCSA: Cloud Platform
- Microsoft: MCSA: Windows Server 2012
- Microsoft: MCSA: Windows Server 2016
- Microsoft: MCSE: Core Infrastructure
- Microsoft: MCSE: Productivity Solutions Expert
- Experience:
- Requires a minimum of seven (7) years of experience in telecommunications sector.
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Defense and Space Manufacturing
Referrals increase your chances of interviewing at V2X Inc by 2x
Sign in to set job alerts for “Information Assurance Specialist” roles.Kuwait City Metropolitan Area 7 hours ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrNetwork Information Assurance

Posted 16 days ago
Job Viewed
Job Description
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
Supports United States Army Regional Cyber Center - Southwest Asia (USARCC-SWA) networks with day-to-day operations in support of (ISO) Computer Network Defense (CND), to deny adversaries access to information and information systems (IS). Operate and maintain (O&M) active and passive defense technologies, to troubleshoot, optimize, and administer network Intrusion Detection/Prevention Systems (IDS/IPS). Adheres to Change Management (CM) policies, provides technical documentation, and follows the Risk Management Framework (RMF) by implementing, assessing, and monitoring Defense Information Systems Agency (DISA) provided Secure Technical Implementation Guides (STIGs). Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
+ Provide Network IDS/IPS O&M in support of (ISO) the Army portion of the Department of Defense Information Network (DoDIN) in the United States Central Command (US CENTCOM) Area of Responsibility (AOR).
+ Monitor and implement Joint Forces Headquarters (JFHQ-DoDIN), United States Army Cyber Command (ARCYBER), and US Army Network Enterprise Technology Command (NETCOM) Operation Orders (OPORD), Task Orders (TASKORD), and Communication Tasking Orders (CTOs).
+ Block Internet Protocol (IP) networks when directed by the customer.
+ Investigate network and Automated Information System (AIS) security events.
+ Manage customer trouble tickets using automated standardized system. Record customer requests for assistance electronically. Provides record of immediate resolution or escalates for resolution of particularly difficult and complex problems. Ensures that problem resolution is recorded electronically to assist addressing subsequent occurrences of problems.
+ Consults with other IT Specialists to identify defects in performance and provides administrative and technical assistance to the USARCC-SWA Team.
+ Generate reports for leadership detailing traffic analysis, and security events.
+ Create, implement, and monitor custom Snort version 2 and 3 IPS signatures.
+ Apply vendor provided signature and software updates while adhering to CM policies.
+ Perform in depth analysis utilizing the Security Incident and Event Management (SIEM).
+ Participate in CND exercises as requested by the customer to maintain site accreditation.
+ Interprets and implements Department of Defense (DoD), Army, and local Command policies, directives, manuals, instructions, regulations and guidelines for data, and system security including DISA STIGs and Security Requirements Guides (SRGs).
+ Maintains current DoD Cyberspace Workforce Framework (DCWF) certifications per DoD 8570.01-M, and other cybersecurity requirements.
+ Perform any additional duties as required/assigned.
Qualifications
+ Qualifications:
+ Security Clearance:
+ Requires an active Secret Clearance
+ Education / Certification: One-year related experience can be substituted for one year of education if the degree is required.
+ High school diploma required or equivalent
+ This position requires candidates to adhere to DoD 8570.01. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.
+ The authorized certifications for this job title are listed as follows:
+ IAT Level: Information Technology (IT) I / Information Assurance Technical (IAT) III
+ BASELINE:
+ Cisco: CCNP Security
+ CompTIA: CASP+ ce: Advanced Security Practitioner
+ CompTIA: CySA+ ce: Cybersecurity Analyst
+ GIAC: GCED: Certified Enterprise Defender
+ GIAC: GCIH: Certified Incident Handler
+ ISACA: CISA: Certified Information Systems Auditor
+ ISC2: CCSP: Cloud Certified Security Practitioner
+ ISC2: CISSP (or Associate): Certified Information Systems Security Professional
+ COMPUTING ENVIRONMENT (CE):
+ Cisco: CCIE: (Any)
+ Cisco: CCNP: Certified Network Professional: (Any)
+ EC-Council: CEH: Certified Ethical Hacker
+ EC-Council: CHFI: Certified Hacking Forensic Investigator
+ EC-Council: CND: Certified Network Defender
+ Microsoft: Certified: Azure Security Engineer Associate
+ Microsoft: Certified: Azure Solutions Architect Expert
+ Microsoft: MCSA: Cloud Platform
+ Microsoft: MCSA: Windows Server 2012
+ Microsoft: MCSA: Windows Server 2016
+ Microsoft: MCSE: Core Infrastructure
+ Microsoft: MCSE: Productivity Solutions Expert
+ Experience:
+ Requires a minimum of seven (7) years of experience in telecommunications sector.
At V2X, we are deeply committed to both equal employment opportunity, including protection for Veterans and individuals with disabilities, and fostering an inclusive and diverse workplace. We ensure all individuals are treated with fairness, respect, and dignity, recognizing the strength that comes from a workforce rich in diverse experiences, perspectives, and skills. This commitment, aligned with our core Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation, and expand our success in the global marketplace, ultimately enabling us to best serve our clients.
Information Assurance III

Posted 26 days ago
Job Viewed
Job Description
This position description is subject to change at any time as needed to meet the requirements of the program or company.
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
Senior level lead Information Assurance Technician responsible for providing cyber security management support.
This position is contingent upon successful contract award to V2X.
#clearance
Responsibilities
Major Job Activities:
Provide cyber security management support in accordance with (IAW) AFI 17-130, Air Force Cyber Security Program Management, as defined in the individual Task Orders (TOs). Support coordination of all actions required by USAFCENT cyber security-related CTOs including, but not limited to, vulnerability scanning and patch compliance. USAFCENT Cyber Security oversees all vulnerability scans IAW SPIN-C. Cyber security tasks include:
+ Scanning: Annotate remediation and mitigation actions on the vulnerability scan reports and return responses to USAFCENT Cyber Security to meet CTO compliance standards.
+ Patching: Monitor and verify patch compliance using the approved technical solution (i.e., SCCM, Assured Compliance Assessment Solution Information Assurance Vulnerability Alert compliance dashboards to track patching progress IAW patch compliance CTO requirements). Subtasks include:
+ Coordinate appropriate actions to ensure site systems are receiving patches and identify any patch installation issues.
+ Coordinate with local administrators to troubleshoot and elevate patching issues to NOSC engineers in a timely manner in order to meet patch compliance timelines. If automated patches are unavailable, such as with PMO systems, coordinate with PMO offices for manual patching of these systems to meet compliance levels IAW the CTO and SPIN-C requirements.
+ Develop a POA&M when CTO compliance cannot be met by the compliance date.
+ Review System Logs: Review all system logs daily for indications of unauthorized activity. Suspicious or abnormal log information shall be noted, escalated, and safeguarded IAW the SPIN-C.
+ Report and Contain Viruses, Malicious, and Negligent Activities: report virus outbreaks or suspected malicious activity IAW SPIN-C directives and
+ Take appropriate action to contain a virus outbreak or suspected malicious activity immediately; this includes updating virus signatures and possibly isolation of the infected system(s). A Remedy trouble ticket shall be opened for all virus outbreaks or suspected malicious activity.
+ Report all negligent discharges of classified information (NDCI) or cross-domain violations (CDV) IAW SPIN-C directives and instructions. Take appropriate actions to contain and safeguard classified information from being further compromised. All NDCIs / CDVs and their respective reporting shall be classified to the same level as the information contained.
+ Attend and participate in required NOSC systems and cyber security meetings or teleconferences.
+ Security Information and Event Management (SIEM): Monitor internal and wireless (if site is equipped with wireless) SIEM systems and escalate any possible alerts to USAFCENT Cyber Security for investigation. Attempt to identify the source and severity of activity and work with USAFCENT Cyber Security to contain, eradicate, or block the malicious activity. Review all intrusion and SIEM system alerts, logs, and reports for false positives. Identify all activity detected by working with site systems and networks to document the activity that is causing the alerts. Work with site and USAFCENT Cyber Security leadership to acquire approval to filter out these alerts.
+ Air Wireless Detection: Monitor over-the-air wireless detection systems, if site is so equipped, for indications of malicious activity against wireless systems. Attempt to identify the source of activity and consult with USAFCENT Cyber Security and site leadership on courses of action.
+ Wireless Audits: Conduct wireless audits (war drives) IAW the SPIN-C to detect any unauthorized wireless devices connected to the site network. Consult with site leadership and USAFCENT Cyber Security to identify the device and assist in any investigations as directed by leadership.
+ Network Compliance: Review all site access control lists and validate that permitted activity is relevant to current systems / network architecture and approved through USAFCENT Cyber Security leadership. Audit all backup procedures IAW the SPIN-C to validate critical systems can be reconstituted after failure. Review all network account access request forms for accuracy prior to account creation. Be responsible for maintaining certifications as listed in the labor category. Certification will be included in the work center's continuity book.
Material & Equipment Directly Used:
Government computers and DoD approved software.
Working Environment:
+ Working environment is a climate-controlled facility. Outdoor temperatures may exceed temperatures of 100 degrees Fahrenheit.
+ May require support during periods of non-traditional working hours including nights or weekends.
Physical Activities:
Must be able to lift/push/pull 40 lbs. unassisted.
Qualifications
Education / Certifications:
+ High School Diploma or GED
+ U.S. Citizen
+ Active Secret Tier 3 (or higher) Security Clearance
+ IAT Level III Certification
Experience / Skills:
+ Lead-level experience in: IA technology or design, maintenance and operation of small to medium networks; administrating corporate or business' user accounts managing mail servers, printer servers, WWW servers, and/or firewalls; reviewing and recommending software applications as well as identifying hardware salient characteristics and any add on devices; systems management, monitoring and sustainment; hardware repair for servers, PCs, peripheral equipment; software installation, maintenance and sustainment; AND
+ Lead-level experience working with: tactical and strategic security issues of systems and networks, and associated requirements specific to deployed architecture; network security, network and systems intrusion detections, advanced devices, firewalls, and software specific to the Department of Defense; server operations including installation, configuration, optimization, and analyzing logs on Windows operating systems (including Server 2008/2012 and modern desktop versions); Cisco IOS, CAT OS, configuration of Cisco routers and switches; Server operations including installation, configuration, optimization, and analyzing logs on Unix operating systems (including Linux and Solaris); AND
+ Expert in all functions of the IAT Level I and Level II positions as defined in DoD 8570.
Supervisory / Budget Responsibilities:
TBD
At V2X, we are deeply committed to both equal employment opportunity, including protection for Veterans and individuals with disabilities, and fostering an inclusive and diverse workplace. We ensure all individuals are treated with fairness, respect, and dignity, recognizing the strength that comes from a workforce rich in diverse experiences, perspectives, and skills. This commitment, aligned with our core Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation, and expand our success in the global marketplace, ultimately enabling us to best serve our clients.
Network Information Assurance
Posted 19 days ago
Job Viewed
Job Description
Vectrus is a leading provider of global service solutions in the areas of Infrastructure Asset Management, Information Technology and Network Communication services, and Logistics and Supply Chain Management services. Since 1945, we've succeeded by tackling some of the world's most difficult challenges. Our management team averages 28 years of experience in the military and industry, and our globally diverse workforce, including more than 30% of our employees reporting a military background, provide us with highly resourceful and experienced problem solvers. We currently operate in 15 countries across four continents, in both stable and unstable environments, employing approximately 5,000 people and managing more than 7,250 subcontractor personnel. Vectrus brings together the best people and performance needed to get the job done. We are "true to your mission."
#J-18808-Ljbffr
Network Information Assurance
Posted 27 days ago
Job Viewed
Job Description
Network Information Assurance
role at
V2X Inc 1 day ago Be among the first 25 applicants Join to apply for the
Network Information Assurance
role at
V2X Inc Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
Supports United States Army Regional Cyber Center - Southwest Asia (USARCC-SWA) networks with day-to-day operations in support of (ISO) Computer Network Defense (CND), to deny adversaries access to information and information systems (IS). Operate and maintain (O&M) active and passive defense technologies, to troubleshoot, optimize, and administer network Intrusion Detection/Prevention Systems (IDS/IPS). Adheres to Change Management (CM) policies, provides technical documentation, and follows the Risk Management Framework (RMF) by implementing, assessing, and monitoring Defense Information Systems Agency (DISA) provided Secure Technical Implementation Guides (STIGs). Program: OMDAC-SWACA Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
Supports United States Army Regional Cyber Center - Southwest Asia (USARCC-SWA) networks with day-to-day operations in support of (ISO) Computer Network Defense (CND), to deny adversaries access to information and information systems (IS). Operate and maintain (O&M) active and passive defense technologies, to troubleshoot, optimize, and administer network Intrusion Detection/Prevention Systems (IDS/IPS). Adheres to Change Management (CM) policies, provides technical documentation, and follows the Risk Management Framework (RMF) by implementing, assessing, and monitoring Defense Information Systems Agency (DISA) provided Secure Technical Implementation Guides (STIGs). Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
Provide Network IDS/IPS O&M in support of (ISO) the Army portion of the Department of Defense Information Network (DoDIN) in the United States Central Command (US CENTCOM) Area of Responsibility (AOR). Monitor and implement Joint Forces Headquarters (JFHQ-DoDIN), United States Army Cyber Command (ARCYBER), and US Army Network Enterprise Technology Command (NETCOM) Operation Orders (OPORD), Task Orders (TASKORD), and Communication Tasking Orders (CTOs). Block Internet Protocol (IP) networks when directed by the customer. Investigate network and Automated Information System (AIS) security events. Manage customer trouble tickets using automated standardized system. Record customer requests for assistance electronically. Provides record of immediate resolution or escalates for resolution of particularly difficult and complex problems. Ensures that problem resolution is recorded electronically to assist addressing subsequent occurrences of problems. Consults with other IT Specialists to identify defects in performance and provides administrative and technical assistance to the USARCC-SWA Team. Generate reports for leadership detailing traffic analysis, and security events. Create, implement, and monitor custom Snort version 2 and 3 IPS signatures. Apply vendor provided signature and software updates while adhering to CM policies. Perform in depth analysis utilizing the Security Incident and Event Management (SIEM). Participate in CND exercises as requested by the customer to maintain site accreditation. Interprets and implements Department of Defense (DoD), Army, and local Command policies, directives, manuals, instructions, regulations and guidelines for data, and system security including DISA STIGs and Security Requirements Guides (SRGs). Maintains current DoD Cyberspace Workforce Framework (DCWF) certifications per DoD 8570.01-M, and other cybersecurity requirements. Perform any additional duties as required/assigned.
Qualifications
Qualifications: Security Clearance: Requires an active Secret Clearance Education / Certification: One-year related experience can be substituted for one year of education if the degree is required. High school diploma required or equivalent This position requires candidates to adhere to DoD 8570.01. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification. The authorized certifications for this job title are listed as follows: IAT Level: Information Technology (IT) I / Information Assurance Technical (IAT) III BASELINE: Cisco: CCNP Security CompTIA: CASP+ ce: Advanced Security Practitioner CompTIA: CySA+ ce: Cybersecurity Analyst GIAC: GCED: Certified Enterprise Defender GIAC: GCIH: Certified Incident Handler ISACA: CISA: Certified Information Systems Auditor ISC2: CCSP: Cloud Certified Security Practitioner ISC2: CISSP (or Associate): Certified Information Systems Security Professional COMPUTING ENVIRONMENT (CE): Cisco: CCIE: (Any) Cisco: CCNP: Certified Network Professional: (Any) EC-Council: CEH: Certified Ethical Hacker EC-Council: CHFI: Certified Hacking Forensic Investigator EC-Council: CND: Certified Network Defender Microsoft: Certified: Azure Security Engineer Associate Microsoft: Certified: Azure Solutions Architect Expert Microsoft: MCSA: Cloud Platform Microsoft: MCSA: Windows Server 2012 Microsoft: MCSA: Windows Server 2016 Microsoft: MCSE: Core Infrastructure Microsoft: MCSE: Productivity Solutions Expert Experience: Requires a minimum of seven (7) years of experience in telecommunications sector.
At V2X, we are deeply committed to both equal employment opportunity, including protection for Veterans and individuals with disabilities, and fostering an inclusive and diverse workplace. We ensure all individuals are treated with fairness, respect, and dignity, recognizing the strength that comes from a workforce rich in diverse experiences, perspectives, and skills. This commitment, aligned with our core Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation, and expand our success in the global marketplace, ultimately enabling us to best serve our clients. Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries Defense and Space Manufacturing Referrals increase your chances of interviewing at V2X Inc by 2x Sign in to set job alerts for “Information Assurance Specialist” roles.
Kuwait City Metropolitan Area 7 hours ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Senior Risk Management Analyst
Posted 19 days ago
Job Viewed
Job Description
Join to apply for the Senior Risk Management Analyst role at Mezzan Foods
Join to apply for the Senior Risk Management Analyst role at Mezzan Foods
Get AI-powered advice on this job and more exclusive features.
- Identify risk data sources and coordinate with the relevant departments and subsidiaries across Mezzan to ensure timely availability of data (e.g., Finance, IT, BUs) for effective data management.
- Develop and implement plans to identify data gaps, improve data availability, quality, and timeliness to enhance existing data collection methods and support risk management processes.
- Drive the automation of risk data gathering and validation processes, overseeing the creation and maintenance of data extraction and processing queries to streamline data access, reporting, and analysis.
- Provide data support and automation assistance to the risk management functions to facilitate effective implementation of risk management procedures.
- Supervise the data reconciliation and validation with financial control, IT, business units, and subsidiaries to ensure adherence to established risk management standards.
- Design, establish, and maintain a robust Risk Management Information System (RMIS) as per the Group ERM Framework and Reporting Protocols.
- Analyze big data and provide solutions in conjunction with IT & SAP teams.
- Manage the Risk Management Information System (RMIS) & coordinate all necessary changes with system admins / service provider.
- Perform Quantitative Risk Analysis and calculating EMVs (Expected Monetary Values) to all applicable types of financial risks.
- Review process understanding working papers prepared by Risk Analysts as well as explaining the link between the Group structure, systems, processes and risk practices.
- Review and analyze relevant metrics and KRIs as per the KRI Program Plan designing KRI trend analysis and reports accordingly.
- Design and implement an overall risk management process for Mezzan, which includes an analysis of the financial impact on the company when risks occur.
- Analyze current risks, identify potential emerging risks, and evaluate Group’s historical risk management performance comparing potential risks against established criteria (e.g., cost, legal requirements).
- Prepare and maintain Risk Appetite, Risk Incidents, Country-wide, Division-wide, and Business Unit-wide Dashboards as per the risk management plan.
- Develop Business Division Risk Reports for assigned risk area / categories as per the risk management plan.
Shared services (Head Office)
Job Description
- Identify risk data sources and coordinate with the relevant departments and subsidiaries across Mezzan to ensure timely availability of data (e.g., Finance, IT, BUs) for effective data management.
- Develop and implement plans to identify data gaps, improve data availability, quality, and timeliness to enhance existing data collection methods and support risk management processes.
- Drive the automation of risk data gathering and validation processes, overseeing the creation and maintenance of data extraction and processing queries to streamline data access, reporting, and analysis.
- Provide data support and automation assistance to the risk management functions to facilitate effective implementation of risk management procedures.
- Supervise the data reconciliation and validation with financial control, IT, business units, and subsidiaries to ensure adherence to established risk management standards.
- Design, establish, and maintain a robust Risk Management Information System (RMIS) as per the Group ERM Framework and Reporting Protocols.
- Analyze big data and provide solutions in conjunction with IT & SAP teams.
- Manage the Risk Management Information System (RMIS) & coordinate all necessary changes with system admins / service provider.
- Perform Quantitative Risk Analysis and calculating EMVs (Expected Monetary Values) to all applicable types of financial risks.
- Review process understanding working papers prepared by Risk Analysts as well as explaining the link between the Group structure, systems, processes and risk practices.
- Review and analyze relevant metrics and KRIs as per the KRI Program Plan designing KRI trend analysis and reports accordingly.
- Design and implement an overall risk management process for Mezzan, which includes an analysis of the financial impact on the company when risks occur.
- Analyze current risks, identify potential emerging risks, and evaluate Group’s historical risk management performance comparing potential risks against established criteria (e.g., cost, legal requirements).
- Prepare and maintain Risk Appetite, Risk Incidents, Country-wide, Division-wide, and Business Unit-wide Dashboards as per the risk management plan.
- Develop Business Division Risk Reports for assigned risk area / categories as per the risk management plan.
- Must have expertise in data analytics.
- Detail Oriented.
- Excellent Communication and Presentation Skills.
- Highly proficient in MS Office Applications.
- Ability to work in a team, strong work ethic, flexibility and adaptability.
- Mandatory: Bachelors’ degree in Accounting, Risk Management, Business Administration, or Information Systems.
- Professional Certification(s) such as CRMA, RMP, CFE, CRA, etc. (Desirable)
- A minimum of 5-8 years in external audit, risk consulting, financial planning, analysis or relevant experience.
Mezzan Holding Co.is one of the leading food, healthcare, and consumer conglomerates in the Middle East with a celebrated heritage of over 75 years. Headquartered in Kuwait with direct operational activities in Kuwait, UAE, Qatar, Saudi Arabia, Iraq and Jordan Mezzan Holding Co: Employs 8,500 people (50+ nationalities) Distributes over 34,000 Stock Keeping Units (SKU) Serves over 100,000 meals a day in Kuwait, Qatar and the UAE through its catering business. Has a total of 130,000 square meters in food, beverage and FMCG manufacturing facilities in Kuwait, Qatar, UAE. Represents some of the biggest names in the FMCG and healthcare industries.
Apply NowSeniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Finance and Sales
- Industries Food and Beverage Manufacturing
Referrals increase your chances of interviewing at Mezzan Foods by 2x
Sign in to set job alerts for “Senior Risk Analyst” roles. Hiring Office Assistant – Fluent in English – Freshers Can Apply Required Assistant (Labour type) part time male only Administrative Officer – Engineering Environment we are looking Computer operator for part timeWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrBe The First To Know
About the latest Information assurance Jobs in Kuwait !