7 Information Assurance jobs in Kuwait

Network Information Assurance

Kuwait City, Al Kuwayt V2X

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

Supports United States Army Regional Cyber Center – Southwest Asia (USARCC-SWA) networks with day-to-day operations in support of (ISO) Computer Network Defense (CND), to deny adversaries access to information and information systems (IS). Operate and maintain (O&M) active and passive defense technologies, to troubleshoot, optimize, and administer network Intrusion Detection/Prevention Systems (IDS/IPS). Adheres to Change Management (CM) policies, provides technical documentation, and follows the Risk Management Framework (RMF) by implementing, assessing, and monitoring Defense Information Systems Agency (DISA) provided Secure Technical Implementation Guides (STIGs). Program: OMDAC-SWACA

This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!

You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.

Responsibilities

Provide Network IDS/IPS O&M in support of (ISO) the Army portion of the Department of Defense Information Network (DoDIN) in the United States Central Command (US CENTCOM) Area of Responsibility (AOR).

Monitor and implement Joint Forces Headquarters (JFHQ-DoDIN), United States Army Cyber Command (ARCYBER), and US Army Network Enterprise Technology Command (NETCOM) Operation Orders (OPORD), Task Orders (TASKORD), and Communication Tasking Orders (CTOs).

Block Internet Protocol (IP) networks when directed by the customer.

Investigate network and Automated Information System (AIS) security events.

Manage customer trouble tickets using automated standardized system. Record customer requests for assistance electronically. Provides record of immediate resolution or escalates for resolution of particularly difficult and complex problems. Ensures that problem resolution is recorded electronically to assist addressing subsequent occurrences of problems.

Consults with other IT Specialists to identify defects in performance and provides administrative and technical assistance to the USARCC-SWA Team.

Generate reports for leadership detailing traffic analysis, and security events.

Create, implement, and monitor custom Snort version 2 and 3 IPS signatures.

Apply vendor provided signature and software updates while adhering to CM policies.

Perform in depth analysis utilizing the Security Incident and Event Management (SIEM).

Participate in CND exercises as requested by the customer to maintain site accreditation.

Interprets and implements Department of Defense (DoD), Army, and local Command policies, directives, manuals, instructions, regulations and guidelines for data, and system security including DISA STIGs and Security Requirements Guides (SRGs).

Maintains current DoD Cyberspace Workforce Framework (DCWF) certifications per DoD 8570.01-M, and other cybersecurity requirements.

Perform any additional duties as required/assigned.

Qualifications :

Security Clearance:

Requires an active Secret Clearance

Education / Certification: One-year related experience can be substituted for one year of education if the degree is required.

High school diploma required or equivalent

This position requires candidates to adhere to DoD 8570.01. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.

The authorized certifications for this job title are listed as follows:

IAT Level: Information Technology (IT) I / Information Assurance Technical (IAT) III

BASELINE:

Cisco: CCNP Security

CompTIA: CASP+ ce: Advanced Security Practitioner

CompTIA: CySA+ ce: Cybersecurity Analyst

ISACA: CISA: Certified Information Systems Auditor

ISC2: CCSP: Cloud Certified Security Practitioner

ISC2: CISSP (or Associate): Certified Information Systems Security Professional

COMPUTING ENVIRONMENT (CE):

Cisco: CCIE: (Any)

Cisco: CCNP: Certified Network Professional: (Any)

EC-Council: CEH: Certified Ethical Hacker

EC-Council: CHFI: Certified Hacking Forensic Investigator

EC-Council: CND: Certified Network Defender

Experience :

Requires a minimum of seven (7) years of experience in telecommunications sector.

Company Industry

  • Facilities Management

Department / Functional Area

  • Communications Engineering

Keywords

  • Network Information Assurance

Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at

People Looking for Network Information Assurance Jobs also searched

Vectrus is a leading provider of global service solutions in the areas of Infrastructure Asset Management, Information Technology and Network Communication services, and Logistics and Supply Chain Management services.
Since 1945, we've succeeded by tackling some of the world's most difficult challenges. Our management team averages 28 years of experience in the military and industry, and our globally diverse workforce, including more than 30% of our employees reporting a military background, provide us with highly resourceful and experienced problem solvers. We currently operate in 15 countries across four continents, in both stable and unstable environments, employing approximately 5,000 people and managing more than 7,250 subcontractor personnel.
Vectrus brings together the best people and performance needed to get the job done. We are "true to your mission."

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Network Information Assurance

Kuwait City, Al Kuwayt V2X Inc

Posted 27 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Network Information Assurance role at V2X Inc

1 day ago Be among the first 25 applicants

Join to apply for the Network Information Assurance role at V2X Inc

Overview

Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.

Supports United States Army Regional Cyber Center - Southwest Asia (USARCC-SWA) networks with day-to-day operations in support of (ISO) Computer Network Defense (CND), to deny adversaries access to information and information systems (IS). Operate and maintain (O&M) active and passive defense technologies, to troubleshoot, optimize, and administer network Intrusion Detection/Prevention Systems (IDS/IPS). Adheres to Change Management (CM) policies, provides technical documentation, and follows the Risk Management Framework (RMF) by implementing, assessing, and monitoring Defense Information Systems Agency (DISA) provided Secure Technical Implementation Guides (STIGs). Program: OMDAC-SWACA

Overview

Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.

Supports United States Army Regional Cyber Center - Southwest Asia (USARCC-SWA) networks with day-to-day operations in support of (ISO) Computer Network Defense (CND), to deny adversaries access to information and information systems (IS). Operate and maintain (O&M) active and passive defense technologies, to troubleshoot, optimize, and administer network Intrusion Detection/Prevention Systems (IDS/IPS). Adheres to Change Management (CM) policies, provides technical documentation, and follows the Risk Management Framework (RMF) by implementing, assessing, and monitoring Defense Information Systems Agency (DISA) provided Secure Technical Implementation Guides (STIGs). Program: OMDAC-SWACA

This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!

You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.

Responsibilities

  • Provide Network IDS/IPS O&M in support of (ISO) the Army portion of the Department of Defense Information Network (DoDIN) in the United States Central Command (US CENTCOM) Area of Responsibility (AOR).
  • Monitor and implement Joint Forces Headquarters (JFHQ-DoDIN), United States Army Cyber Command (ARCYBER), and US Army Network Enterprise Technology Command (NETCOM) Operation Orders (OPORD), Task Orders (TASKORD), and Communication Tasking Orders (CTOs).
  • Block Internet Protocol (IP) networks when directed by the customer.
  • Investigate network and Automated Information System (AIS) security events.
  • Manage customer trouble tickets using automated standardized system. Record customer requests for assistance electronically. Provides record of immediate resolution or escalates for resolution of particularly difficult and complex problems. Ensures that problem resolution is recorded electronically to assist addressing subsequent occurrences of problems.
  • Consults with other IT Specialists to identify defects in performance and provides administrative and technical assistance to the USARCC-SWA Team.
  • Generate reports for leadership detailing traffic analysis, and security events.
  • Create, implement, and monitor custom Snort version 2 and 3 IPS signatures.
  • Apply vendor provided signature and software updates while adhering to CM policies.
  • Perform in depth analysis utilizing the Security Incident and Event Management (SIEM).
  • Participate in CND exercises as requested by the customer to maintain site accreditation.
  • Interprets and implements Department of Defense (DoD), Army, and local Command policies, directives, manuals, instructions, regulations and guidelines for data, and system security including DISA STIGs and Security Requirements Guides (SRGs).
  • Maintains current DoD Cyberspace Workforce Framework (DCWF) certifications per DoD 8570.01-M, and other cybersecurity requirements.
  • Perform any additional duties as required/assigned.

Qualifications

  • Qualifications:
  • Security Clearance:
    • Requires an active Secret Clearance
  • Education / Certification: One-year related experience can be substituted for one year of education if the degree is required.
    • High school diploma required or equivalent
    • This position requires candidates to adhere to DoD 8570.01. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.
    • The authorized certifications for this job title are listed as follows:
  • IAT Level: Information Technology (IT) I / Information Assurance Technical (IAT) III
  • BASELINE:
    • Cisco: CCNP Security
    • CompTIA: CASP+ ce: Advanced Security Practitioner
    • CompTIA: CySA+ ce: Cybersecurity Analyst
    • GIAC: GCED: Certified Enterprise Defender
    • GIAC: GCIH: Certified Incident Handler
    • ISACA: CISA: Certified Information Systems Auditor
    • ISC2: CCSP: Cloud Certified Security Practitioner
    • ISC2: CISSP (or Associate): Certified Information Systems Security Professional
  • COMPUTING ENVIRONMENT (CE):
    • Cisco: CCIE: (Any)
    • Cisco: CCNP: Certified Network Professional: (Any)
    • EC-Council: CEH: Certified Ethical Hacker
    • EC-Council: CHFI: Certified Hacking Forensic Investigator
    • EC-Council: CND: Certified Network Defender
    • Microsoft: Certified: Azure Security Engineer Associate
    • Microsoft: Certified: Azure Solutions Architect Expert
    • Microsoft: MCSA: Cloud Platform
    • Microsoft: MCSA: Windows Server 2012
    • Microsoft: MCSA: Windows Server 2016
    • Microsoft: MCSE: Core Infrastructure
    • Microsoft: MCSE: Productivity Solutions Expert
  • Experience:
    • Requires a minimum of seven (7) years of experience in telecommunications sector.
At V2X, we are deeply committed to both equal employment opportunity, including protection for Veterans and individuals with disabilities, and fostering an inclusive and diverse workplace. We ensure all individuals are treated with fairness, respect, and dignity, recognizing the strength that comes from a workforce rich in diverse experiences, perspectives, and skills. This commitment, aligned with our core Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation, and expand our success in the global marketplace, ultimately enabling us to best serve our clients.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Defense and Space Manufacturing

Referrals increase your chances of interviewing at V2X Inc by 2x

Sign in to set job alerts for “Information Assurance Specialist” roles.

Kuwait City Metropolitan Area 7 hours ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Network Information Assurance

Kuwait City, Al Kuwayt V2X

Posted 16 days ago

Job Viewed

Tap Again To Close

Job Description

Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
Supports United States Army Regional Cyber Center - Southwest Asia (USARCC-SWA) networks with day-to-day operations in support of (ISO) Computer Network Defense (CND), to deny adversaries access to information and information systems (IS). Operate and maintain (O&M) active and passive defense technologies, to troubleshoot, optimize, and administer network Intrusion Detection/Prevention Systems (IDS/IPS). Adheres to Change Management (CM) policies, provides technical documentation, and follows the Risk Management Framework (RMF) by implementing, assessing, and monitoring Defense Information Systems Agency (DISA) provided Secure Technical Implementation Guides (STIGs). Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
+ Provide Network IDS/IPS O&M in support of (ISO) the Army portion of the Department of Defense Information Network (DoDIN) in the United States Central Command (US CENTCOM) Area of Responsibility (AOR).
+ Monitor and implement Joint Forces Headquarters (JFHQ-DoDIN), United States Army Cyber Command (ARCYBER), and US Army Network Enterprise Technology Command (NETCOM) Operation Orders (OPORD), Task Orders (TASKORD), and Communication Tasking Orders (CTOs).
+ Block Internet Protocol (IP) networks when directed by the customer.
+ Investigate network and Automated Information System (AIS) security events.
+ Manage customer trouble tickets using automated standardized system. Record customer requests for assistance electronically. Provides record of immediate resolution or escalates for resolution of particularly difficult and complex problems. Ensures that problem resolution is recorded electronically to assist addressing subsequent occurrences of problems.
+ Consults with other IT Specialists to identify defects in performance and provides administrative and technical assistance to the USARCC-SWA Team.
+ Generate reports for leadership detailing traffic analysis, and security events.
+ Create, implement, and monitor custom Snort version 2 and 3 IPS signatures.
+ Apply vendor provided signature and software updates while adhering to CM policies.
+ Perform in depth analysis utilizing the Security Incident and Event Management (SIEM).
+ Participate in CND exercises as requested by the customer to maintain site accreditation.
+ Interprets and implements Department of Defense (DoD), Army, and local Command policies, directives, manuals, instructions, regulations and guidelines for data, and system security including DISA STIGs and Security Requirements Guides (SRGs).
+ Maintains current DoD Cyberspace Workforce Framework (DCWF) certifications per DoD 8570.01-M, and other cybersecurity requirements.
+ Perform any additional duties as required/assigned.
Qualifications
+ Qualifications:
+ Security Clearance:
+ Requires an active Secret Clearance
+ Education / Certification: One-year related experience can be substituted for one year of education if the degree is required.
+ High school diploma required or equivalent
+ This position requires candidates to adhere to DoD 8570.01. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.
+ The authorized certifications for this job title are listed as follows:
+ IAT Level: Information Technology (IT) I / Information Assurance Technical (IAT) III
+ BASELINE:
+ Cisco: CCNP Security
+ CompTIA: CASP+ ce: Advanced Security Practitioner
+ CompTIA: CySA+ ce: Cybersecurity Analyst
+ GIAC: GCED: Certified Enterprise Defender
+ GIAC: GCIH: Certified Incident Handler
+ ISACA: CISA: Certified Information Systems Auditor
+ ISC2: CCSP: Cloud Certified Security Practitioner
+ ISC2: CISSP (or Associate): Certified Information Systems Security Professional
+ COMPUTING ENVIRONMENT (CE):
+ Cisco: CCIE: (Any)
+ Cisco: CCNP: Certified Network Professional: (Any)
+ EC-Council: CEH: Certified Ethical Hacker
+ EC-Council: CHFI: Certified Hacking Forensic Investigator
+ EC-Council: CND: Certified Network Defender
+ Microsoft: Certified: Azure Security Engineer Associate
+ Microsoft: Certified: Azure Solutions Architect Expert
+ Microsoft: MCSA: Cloud Platform
+ Microsoft: MCSA: Windows Server 2012
+ Microsoft: MCSA: Windows Server 2016
+ Microsoft: MCSE: Core Infrastructure
+ Microsoft: MCSE: Productivity Solutions Expert
+ Experience:
+ Requires a minimum of seven (7) years of experience in telecommunications sector.
At V2X, we are deeply committed to both equal employment opportunity, including protection for Veterans and individuals with disabilities, and fostering an inclusive and diverse workplace. We ensure all individuals are treated with fairness, respect, and dignity, recognizing the strength that comes from a workforce rich in diverse experiences, perspectives, and skills. This commitment, aligned with our core Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation, and expand our success in the global marketplace, ultimately enabling us to best serve our clients.
This advertiser has chosen not to accept applicants from your region.

Information Assurance III

V2X

Posted 26 days ago

Job Viewed

Tap Again To Close

Job Description

Overview
This position description is subject to change at any time as needed to meet the requirements of the program or company.
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
Senior level lead Information Assurance Technician responsible for providing cyber security management support.
This position is contingent upon successful contract award to V2X.
#clearance
Responsibilities
Major Job Activities:
Provide cyber security management support in accordance with (IAW) AFI 17-130, Air Force Cyber Security Program Management, as defined in the individual Task Orders (TOs). Support coordination of all actions required by USAFCENT cyber security-related CTOs including, but not limited to, vulnerability scanning and patch compliance. USAFCENT Cyber Security oversees all vulnerability scans IAW SPIN-C. Cyber security tasks include:
+ Scanning: Annotate remediation and mitigation actions on the vulnerability scan reports and return responses to USAFCENT Cyber Security to meet CTO compliance standards.
+ Patching: Monitor and verify patch compliance using the approved technical solution (i.e., SCCM, Assured Compliance Assessment Solution Information Assurance Vulnerability Alert compliance dashboards to track patching progress IAW patch compliance CTO requirements). Subtasks include:
+ Coordinate appropriate actions to ensure site systems are receiving patches and identify any patch installation issues.
+ Coordinate with local administrators to troubleshoot and elevate patching issues to NOSC engineers in a timely manner in order to meet patch compliance timelines. If automated patches are unavailable, such as with PMO systems, coordinate with PMO offices for manual patching of these systems to meet compliance levels IAW the CTO and SPIN-C requirements.
+ Develop a POA&M when CTO compliance cannot be met by the compliance date.
+ Review System Logs: Review all system logs daily for indications of unauthorized activity. Suspicious or abnormal log information shall be noted, escalated, and safeguarded IAW the SPIN-C.
+ Report and Contain Viruses, Malicious, and Negligent Activities: report virus outbreaks or suspected malicious activity IAW SPIN-C directives and
+ Take appropriate action to contain a virus outbreak or suspected malicious activity immediately; this includes updating virus signatures and possibly isolation of the infected system(s). A Remedy trouble ticket shall be opened for all virus outbreaks or suspected malicious activity.
+ Report all negligent discharges of classified information (NDCI) or cross-domain violations (CDV) IAW SPIN-C directives and instructions. Take appropriate actions to contain and safeguard classified information from being further compromised. All NDCIs / CDVs and their respective reporting shall be classified to the same level as the information contained.
+ Attend and participate in required NOSC systems and cyber security meetings or teleconferences.
+ Security Information and Event Management (SIEM): Monitor internal and wireless (if site is equipped with wireless) SIEM systems and escalate any possible alerts to USAFCENT Cyber Security for investigation. Attempt to identify the source and severity of activity and work with USAFCENT Cyber Security to contain, eradicate, or block the malicious activity. Review all intrusion and SIEM system alerts, logs, and reports for false positives. Identify all activity detected by working with site systems and networks to document the activity that is causing the alerts. Work with site and USAFCENT Cyber Security leadership to acquire approval to filter out these alerts.
+ Air Wireless Detection: Monitor over-the-air wireless detection systems, if site is so equipped, for indications of malicious activity against wireless systems. Attempt to identify the source of activity and consult with USAFCENT Cyber Security and site leadership on courses of action.
+ Wireless Audits: Conduct wireless audits (war drives) IAW the SPIN-C to detect any unauthorized wireless devices connected to the site network. Consult with site leadership and USAFCENT Cyber Security to identify the device and assist in any investigations as directed by leadership.
+ Network Compliance: Review all site access control lists and validate that permitted activity is relevant to current systems / network architecture and approved through USAFCENT Cyber Security leadership. Audit all backup procedures IAW the SPIN-C to validate critical systems can be reconstituted after failure. Review all network account access request forms for accuracy prior to account creation. Be responsible for maintaining certifications as listed in the labor category. Certification will be included in the work center's continuity book.
Material & Equipment Directly Used:
Government computers and DoD approved software.
Working Environment:
+ Working environment is a climate-controlled facility. Outdoor temperatures may exceed temperatures of 100 degrees Fahrenheit.
+ May require support during periods of non-traditional working hours including nights or weekends.
Physical Activities:
Must be able to lift/push/pull 40 lbs. unassisted.
Qualifications
Education / Certifications:
+ High School Diploma or GED
+ U.S. Citizen
+ Active Secret Tier 3 (or higher) Security Clearance
+ IAT Level III Certification
Experience / Skills:
+ Lead-level experience in: IA technology or design, maintenance and operation of small to medium networks; administrating corporate or business' user accounts managing mail servers, printer servers, WWW servers, and/or firewalls; reviewing and recommending software applications as well as identifying hardware salient characteristics and any add on devices; systems management, monitoring and sustainment; hardware repair for servers, PCs, peripheral equipment; software installation, maintenance and sustainment; AND
+ Lead-level experience working with: tactical and strategic security issues of systems and networks, and associated requirements specific to deployed architecture; network security, network and systems intrusion detections, advanced devices, firewalls, and software specific to the Department of Defense; server operations including installation, configuration, optimization, and analyzing logs on Windows operating systems (including Server 2008/2012 and modern desktop versions); Cisco IOS, CAT OS, configuration of Cisco routers and switches; Server operations including installation, configuration, optimization, and analyzing logs on Unix operating systems (including Linux and Solaris); AND
+ Expert in all functions of the IAT Level I and Level II positions as defined in DoD 8570.
Supervisory / Budget Responsibilities:
TBD
At V2X, we are deeply committed to both equal employment opportunity, including protection for Veterans and individuals with disabilities, and fostering an inclusive and diverse workplace. We ensure all individuals are treated with fairness, respect, and dignity, recognizing the strength that comes from a workforce rich in diverse experiences, perspectives, and skills. This commitment, aligned with our core Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation, and expand our success in the global marketplace, ultimately enabling us to best serve our clients.
This advertiser has chosen not to accept applicants from your region.

Network Information Assurance

Kuwait City, Al Kuwayt V2X

Posted 19 days ago

Job Viewed

Tap Again To Close

Job Description

Supports United States Army Regional Cyber Center – Southwest Asia (USARCC-SWA) networks with day-to-day operations in support of (ISO) Computer Network Defense (CND), to deny adversaries access to information and information systems (IS). Operate and maintain (O&M) active and passive defense technologies, to troubleshoot, optimize, and administer network Intrusion Detection/Prevention Systems (IDS/IPS). Adheres to Change Management (CM) policies, provides technical documentation, and follows the Risk Management Framework (RMF) by implementing, assessing, and monitoring Defense Information Systems Agency (DISA) provided Secure Technical Implementation Guides (STIGs). Program: OMDAC-SWACA This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program! You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position. Responsibilities Provide Network IDS/IPS O&M in support of (ISO) the Army portion of the Department of Defense Information Network (DoDIN) in the United States Central Command (US CENTCOM) Area of Responsibility (AOR). Monitor and implement Joint Forces Headquarters (JFHQ-DoDIN), United States Army Cyber Command (ARCYBER), and US Army Network Enterprise Technology Command (NETCOM) Operation Orders (OPORD), Task Orders (TASKORD), and Communication Tasking Orders (CTOs). Block Internet Protocol (IP) networks when directed by the customer. Investigate network and Automated Information System (AIS) security events. Manage customer trouble tickets using automated standardized system. Record customer requests for assistance electronically. Provides record of immediate resolution or escalates for resolution of particularly difficult and complex problems. Ensures that problem resolution is recorded electronically to assist addressing subsequent occurrences of problems. Consults with other IT Specialists to identify defects in performance and provides administrative and technical assistance to the USARCC-SWA Team. Generate reports for leadership detailing traffic analysis, and security events. Create, implement, and monitor custom Snort version 2 and 3 IPS signatures. Apply vendor provided signature and software updates while adhering to CM policies. Perform in depth analysis utilizing the Security Incident and Event Management (SIEM). Participate in CND exercises as requested by the customer to maintain site accreditation. Interprets and implements Department of Defense (DoD), Army, and local Command policies, directives, manuals, instructions, regulations and guidelines for data, and system security including DISA STIGs and Security Requirements Guides (SRGs). Maintains current DoD Cyberspace Workforce Framework (DCWF) certifications per DoD 8570.01-M, and other cybersecurity requirements. Perform any additional duties as required/assigned. Qualifications : Security Clearance: Requires an active Secret Clearance Education / Certification: One-year related experience can be substituted for one year of education if the degree is required. High school diploma required or equivalent This position requires candidates to adhere to DoD 8570.01. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification. The authorized certifications for this job title are listed as follows: IAT Level: Information Technology (IT) I / Information Assurance Technical (IAT) III BASELINE: Cisco: CCNP Security CompTIA: CASP+ ce: Advanced Security Practitioner CompTIA: CySA+ ce: Cybersecurity Analyst ISACA: CISA: Certified Information Systems Auditor ISC2: CCSP: Cloud Certified Security Practitioner ISC2: CISSP (or Associate): Certified Information Systems Security Professional COMPUTING ENVIRONMENT (CE): Cisco: CCIE: (Any) Cisco: CCNP: Certified Network Professional: (Any) EC-Council: CEH: Certified Ethical Hacker EC-Council: CHFI: Certified Hacking Forensic Investigator EC-Council: CND: Certified Network Defender Experience : Requires a minimum of seven (7) years of experience in telecommunications sector. Company Industry Facilities Management Department / Functional Area Communications Engineering Keywords Network Information Assurance Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at People Looking for Network Information Assurance Jobs also searched

Vectrus is a leading provider of global service solutions in the areas of Infrastructure Asset Management, Information Technology and Network Communication services, and Logistics and Supply Chain Management services. Since 1945, we've succeeded by tackling some of the world's most difficult challenges. Our management team averages 28 years of experience in the military and industry, and our globally diverse workforce, including more than 30% of our employees reporting a military background, provide us with highly resourceful and experienced problem solvers. We currently operate in 15 countries across four continents, in both stable and unstable environments, employing approximately 5,000 people and managing more than 7,250 subcontractor personnel. Vectrus brings together the best people and performance needed to get the job done. We are "true to your mission."

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Network Information Assurance

Kuwait City, Al Kuwayt V2X Inc

Posted 27 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the

Network Information Assurance

role at

V2X Inc 1 day ago Be among the first 25 applicants Join to apply for the

Network Information Assurance

role at

V2X Inc Overview

Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.

Supports United States Army Regional Cyber Center - Southwest Asia (USARCC-SWA) networks with day-to-day operations in support of (ISO) Computer Network Defense (CND), to deny adversaries access to information and information systems (IS). Operate and maintain (O&M) active and passive defense technologies, to troubleshoot, optimize, and administer network Intrusion Detection/Prevention Systems (IDS/IPS). Adheres to Change Management (CM) policies, provides technical documentation, and follows the Risk Management Framework (RMF) by implementing, assessing, and monitoring Defense Information Systems Agency (DISA) provided Secure Technical Implementation Guides (STIGs). Program: OMDAC-SWACA Overview

Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.

Supports United States Army Regional Cyber Center - Southwest Asia (USARCC-SWA) networks with day-to-day operations in support of (ISO) Computer Network Defense (CND), to deny adversaries access to information and information systems (IS). Operate and maintain (O&M) active and passive defense technologies, to troubleshoot, optimize, and administer network Intrusion Detection/Prevention Systems (IDS/IPS). Adheres to Change Management (CM) policies, provides technical documentation, and follows the Risk Management Framework (RMF) by implementing, assessing, and monitoring Defense Information Systems Agency (DISA) provided Secure Technical Implementation Guides (STIGs). Program: OMDAC-SWACA

This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!

You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.

Responsibilities

Provide Network IDS/IPS O&M in support of (ISO) the Army portion of the Department of Defense Information Network (DoDIN) in the United States Central Command (US CENTCOM) Area of Responsibility (AOR). Monitor and implement Joint Forces Headquarters (JFHQ-DoDIN), United States Army Cyber Command (ARCYBER), and US Army Network Enterprise Technology Command (NETCOM) Operation Orders (OPORD), Task Orders (TASKORD), and Communication Tasking Orders (CTOs). Block Internet Protocol (IP) networks when directed by the customer. Investigate network and Automated Information System (AIS) security events. Manage customer trouble tickets using automated standardized system. Record customer requests for assistance electronically. Provides record of immediate resolution or escalates for resolution of particularly difficult and complex problems. Ensures that problem resolution is recorded electronically to assist addressing subsequent occurrences of problems. Consults with other IT Specialists to identify defects in performance and provides administrative and technical assistance to the USARCC-SWA Team. Generate reports for leadership detailing traffic analysis, and security events. Create, implement, and monitor custom Snort version 2 and 3 IPS signatures. Apply vendor provided signature and software updates while adhering to CM policies. Perform in depth analysis utilizing the Security Incident and Event Management (SIEM). Participate in CND exercises as requested by the customer to maintain site accreditation. Interprets and implements Department of Defense (DoD), Army, and local Command policies, directives, manuals, instructions, regulations and guidelines for data, and system security including DISA STIGs and Security Requirements Guides (SRGs). Maintains current DoD Cyberspace Workforce Framework (DCWF) certifications per DoD 8570.01-M, and other cybersecurity requirements. Perform any additional duties as required/assigned.

Qualifications

Qualifications: Security Clearance: Requires an active Secret Clearance Education / Certification: One-year related experience can be substituted for one year of education if the degree is required. High school diploma required or equivalent This position requires candidates to adhere to DoD 8570.01. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification. The authorized certifications for this job title are listed as follows: IAT Level: Information Technology (IT) I / Information Assurance Technical (IAT) III BASELINE: Cisco: CCNP Security CompTIA: CASP+ ce: Advanced Security Practitioner CompTIA: CySA+ ce: Cybersecurity Analyst GIAC: GCED: Certified Enterprise Defender GIAC: GCIH: Certified Incident Handler ISACA: CISA: Certified Information Systems Auditor ISC2: CCSP: Cloud Certified Security Practitioner ISC2: CISSP (or Associate): Certified Information Systems Security Professional COMPUTING ENVIRONMENT (CE): Cisco: CCIE: (Any) Cisco: CCNP: Certified Network Professional: (Any) EC-Council: CEH: Certified Ethical Hacker EC-Council: CHFI: Certified Hacking Forensic Investigator EC-Council: CND: Certified Network Defender Microsoft: Certified: Azure Security Engineer Associate Microsoft: Certified: Azure Solutions Architect Expert Microsoft: MCSA: Cloud Platform Microsoft: MCSA: Windows Server 2012 Microsoft: MCSA: Windows Server 2016 Microsoft: MCSE: Core Infrastructure Microsoft: MCSE: Productivity Solutions Expert Experience: Requires a minimum of seven (7) years of experience in telecommunications sector.

At V2X, we are deeply committed to both equal employment opportunity, including protection for Veterans and individuals with disabilities, and fostering an inclusive and diverse workplace. We ensure all individuals are treated with fairness, respect, and dignity, recognizing the strength that comes from a workforce rich in diverse experiences, perspectives, and skills. This commitment, aligned with our core Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation, and expand our success in the global marketplace, ultimately enabling us to best serve our clients. Seniority level

Seniority level Mid-Senior level Employment type

Employment type Full-time Job function

Job function Information Technology Industries Defense and Space Manufacturing Referrals increase your chances of interviewing at V2X Inc by 2x Sign in to set job alerts for “Information Assurance Specialist” roles.

Kuwait City Metropolitan Area 7 hours ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Risk Management Analyst

Mezzan Foods

Posted 19 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Senior Risk Management Analyst role at Mezzan Foods

Join to apply for the Senior Risk Management Analyst role at Mezzan Foods

Get AI-powered advice on this job and more exclusive features.

  • Identify risk data sources and coordinate with the relevant departments and subsidiaries across Mezzan to ensure timely availability of data (e.g., Finance, IT, BUs) for effective data management.
  • Develop and implement plans to identify data gaps, improve data availability, quality, and timeliness to enhance existing data collection methods and support risk management processes.
  • Drive the automation of risk data gathering and validation processes, overseeing the creation and maintenance of data extraction and processing queries to streamline data access, reporting, and analysis.
  • Provide data support and automation assistance to the risk management functions to facilitate effective implementation of risk management procedures.
  • Supervise the data reconciliation and validation with financial control, IT, business units, and subsidiaries to ensure adherence to established risk management standards.
  • Design, establish, and maintain a robust Risk Management Information System (RMIS) as per the Group ERM Framework and Reporting Protocols.
  • Analyze big data and provide solutions in conjunction with IT & SAP teams.
  • Manage the Risk Management Information System (RMIS) & coordinate all necessary changes with system admins / service provider.
  • Perform Quantitative Risk Analysis and calculating EMVs (Expected Monetary Values) to all applicable types of financial risks.
  • Review process understanding working papers prepared by Risk Analysts as well as explaining the link between the Group structure, systems, processes and risk practices.
  • Review and analyze relevant metrics and KRIs as per the KRI Program Plan designing KRI trend analysis and reports accordingly.
  • Design and implement an overall risk management process for Mezzan, which includes an analysis of the financial impact on the company when risks occur.
  • Analyze current risks, identify potential emerging risks, and evaluate Group’s historical risk management performance comparing potential risks against established criteria (e.g., cost, legal requirements).
  • Prepare and maintain Risk Appetite, Risk Incidents, Country-wide, Division-wide, and Business Unit-wide Dashboards as per the risk management plan.
  • Develop Business Division Risk Reports for assigned risk area / categories as per the risk management plan.

Job Category

Shared services (Head Office)

Job Description

  • Identify risk data sources and coordinate with the relevant departments and subsidiaries across Mezzan to ensure timely availability of data (e.g., Finance, IT, BUs) for effective data management.
  • Develop and implement plans to identify data gaps, improve data availability, quality, and timeliness to enhance existing data collection methods and support risk management processes.
  • Drive the automation of risk data gathering and validation processes, overseeing the creation and maintenance of data extraction and processing queries to streamline data access, reporting, and analysis.
  • Provide data support and automation assistance to the risk management functions to facilitate effective implementation of risk management procedures.
  • Supervise the data reconciliation and validation with financial control, IT, business units, and subsidiaries to ensure adherence to established risk management standards.
  • Design, establish, and maintain a robust Risk Management Information System (RMIS) as per the Group ERM Framework and Reporting Protocols.
  • Analyze big data and provide solutions in conjunction with IT & SAP teams.
  • Manage the Risk Management Information System (RMIS) & coordinate all necessary changes with system admins / service provider.
  • Perform Quantitative Risk Analysis and calculating EMVs (Expected Monetary Values) to all applicable types of financial risks.
  • Review process understanding working papers prepared by Risk Analysts as well as explaining the link between the Group structure, systems, processes and risk practices.
  • Review and analyze relevant metrics and KRIs as per the KRI Program Plan designing KRI trend analysis and reports accordingly.
  • Design and implement an overall risk management process for Mezzan, which includes an analysis of the financial impact on the company when risks occur.
  • Analyze current risks, identify potential emerging risks, and evaluate Group’s historical risk management performance comparing potential risks against established criteria (e.g., cost, legal requirements).
  • Prepare and maintain Risk Appetite, Risk Incidents, Country-wide, Division-wide, and Business Unit-wide Dashboards as per the risk management plan.
  • Develop Business Division Risk Reports for assigned risk area / categories as per the risk management plan.

Skills

  • Must have expertise in data analytics.
  • Detail Oriented.
  • Excellent Communication and Presentation Skills.
  • Highly proficient in MS Office Applications.
  • Ability to work in a team, strong work ethic, flexibility and adaptability.

Education/Qualifications

  • Mandatory: Bachelors’ degree in Accounting, Risk Management, Business Administration, or Information Systems.
  • Professional Certification(s) such as CRMA, RMP, CFE, CRA, etc. (Desirable)
  • A minimum of 5-8 years in external audit, risk consulting, financial planning, analysis or relevant experience.

About The Business

Mezzan Holding Co.is one of the leading food, healthcare, and consumer conglomerates in the Middle East with a celebrated heritage of over 75 years. Headquartered in Kuwait with direct operational activities in Kuwait, UAE, Qatar, Saudi Arabia, Iraq and Jordan Mezzan Holding Co: Employs 8,500 people (50+ nationalities) Distributes over 34,000 Stock Keeping Units (SKU) Serves over 100,000 meals a day in Kuwait, Qatar and the UAE through its catering business. Has a total of 130,000 square meters in food, beverage and FMCG manufacturing facilities in Kuwait, Qatar, UAE. Represents some of the biggest names in the FMCG and healthcare industries.

Apply NowSeniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Finance and Sales
  • Industries Food and Beverage Manufacturing

Referrals increase your chances of interviewing at Mezzan Foods by 2x

Sign in to set job alerts for “Senior Risk Analyst” roles. Hiring Office Assistant – Fluent in English – Freshers Can Apply Required Assistant (Labour type) part time male only Administrative Officer – Engineering Environment we are looking Computer operator for part time

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Information assurance Jobs in Kuwait !

 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Information Assurance Jobs