19 Information Security jobs in Kuwait
Information Security Officer
Posted 1 day ago
Job Viewed
Job Description
The Information Technology (IT) Department at GUST invites applicants for a full-time position as an Information Security Officer. The ideal candidate should hold a Bachelor's or Master’s degree related to computer science, information technology, cybersecurity, or a related field. The State of Kuwait does not recognize degrees from online universities.
Responsibilities- Ensure the security of the university’s information systems and data.
- Develop and implement security protocols and policies.
- Conduct risk assessments and manage security incidents.
- Collaborate with IT staff to ensure security best practices are followed.
- Stay updated on the latest security threats and solutions.
- Minimum of three years of relevant experience after obtaining the latest degree.
- Experience with security certifications such as CISSP, CISM, CEH, or CIPP preferred.
- Knowledge of security standards and regulations such as HIPAA, GDPR, and PCI DSS.
- Reputable international university degree in a related field.
- Ambitious, self-motivated, and able to work independently and in teams.
Interested applicants should visit our employment portal at to fill out the online form and submit their CV and copies of their degrees. Applications will be accepted until the position is filled. Note that this position is located in Kuwait, and the selected candidate should be willing to relocate.
#J-18808-LjbffrLive Connections Hiring For Senior Associate – Information Security and Information Technology[...]
Posted 6 days ago
Job Viewed
Job Description
5 to 7 years of experience in the IT and IS Audit.
Demonstrated experience in information security, IT auditing, or similar roles.
In-depth knowledge of information security frameworks and regulations (e.g., NIST, ISO 27001, GDPR, HIPAA).
Familiarity with contemporary security tools and technologies.
Engage with stakeholders to discuss security and audit findings.
Recommended Education:- Bachelor’s degree in Information Technology, Computer Science, or a related field.
- Master’s degree in a relevant field is preferred.
- Relevant certifications such as CISSP, CISA, CISM.
Information Specialist
Posted 6 days ago
Job Viewed
Job Description
Take your career to Kuwait! Teach Away is accepting applications from Elementary Information Specialists (Librarian)for a fantastic International schoolin Kuwait city.
More about the School:
- This state of the art school caters to students from Kindergarten to Middle School andHigh School level
- The academic curriculum is based on the Core American Standards Curriculum.
- A 1:1 tablet program for students has been implemented for increased learning accessibility.
- Tablets are pre-loaded with the apps requested by teachers and the core curriculum apps are provided to students.
- The school is also experimenting with a “flipped” classroom model whereby students are allowed to take a few materials outside the classroom.
- There are also various interactive whiteboards available throughout the school: including multi-touch and 3D boards for students to interact with and visualize lessons.
Specific qualifications required for this role:
- Teaching Credential/License
Additional requirements for this role:
Degree must be relevant to your teaching subject
Technology focused school seeking innovative, tech savvy educators
International teaching experience is desirable but not required
Experience teaching in american school system
#J-18808-LjbffrCAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate 160th[...]
Posted 17 days ago
Job Viewed
Job Description
Empower AI is AI for government. It provides federal agency leaders with tools to enhance workforce potential through meaningful transformation. Headquartered in Reston, VA, Empower AI leverages three decades of experience in Health, Defense, and Civilian missions. Our Empower AI Platform offers a practical, sustainable path for clients to achieve transformation aligned with their identity, work, and resources, resulting in a more creative and productive government workforce. For more information, visit .
Empower AI is proud to be recognized as a 2024 Military Friendly Employer by Viqtory, reflecting our commitment to hiring and supporting active-duty and veteran employees.
ResponsibilitiesPosition: CAC/PKI Local Registration Authority (LRA) Information Security Specialist
You will support the Army Network Enterprise Technology Command (NETCOM) on the DoDIN-A Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. As part of the 160th Signal Brigade at Camp Arifijan, Kuwait, you will handle token issuance, sustainment, maintenance, and revocation for Army customers.
Key Responsibilities:
- Provide LRA support from 0600-2200, Monday-Friday.
- Offer 24/7 On-Call and Emergency Response services.
- Respond to emergencies within two hours of notification from the COR.
- Maintain an asset inventory of PKI equipment daily by location.
- Support DoD Compliance Audits (annual and semi-annual).
- Assist the Army CIO/G6 Cyber Security Directorate and NETCOM G3/5 with audit findings, mitigation, and corrections per DoD PKI CPS and RPS.
- Develop and update On-the-Job Training packages.
- Test global PKI system software and token versions for compatibility and interoperability.
- Verify Subscriber identities.
- Pre-register users with PKI systems.
- Validate NPE certificates and process revocations.
- Support issuance and renewal of SIPRNET tokens and NIPRNET Smart Cards.
- Produce and deliver an Issuance Report on tokens issued, revoked, renewed, and issues encountered.
- Perform duties as assigned via NSS/PKI RPS and DoD/PKI CPS.
- Respond to General Officer / SES requests within 12 hours.
- Complete PIN resets, unlocks, revocations, and re-issuances within 24 hours.
- Handle key recoveries within 48 hours.
- Process new ASCL and NSS SIPRNET token requests within 72 hours.
- Submit monthly RA Activity, Token, and NSA Failed Token Reports.
- Provide weekly RA Backlog Reports for activities outside response timelines.
Minimum Requirements:
- Secret Security Clearance with Tier 5 (T5) background investigation.
- Bachelor’s degree.
- 7-12 years of relevant experience.
- Expertise in Smart Tokens, PKI, Certificate Revocation, CAC PIN Reset, PKE, biometrics, access control, tactical PKI, and directory services.
- Never relieved of trusted duties for negligence or nonperformance.
- No security clearance denials or revocations.
- No felony convictions.
- Completion of DISA RA/LRA training prior to credential issuance.
Preferred Qualifications:
- DoD Cyber Workforce Framework (DCWF 631) Security Developer Intermediate qualification or equivalent (e.g., BS in IT, Cybersecurity, Data Science, etc., or certifications like GSEC, GCLD, CASP+).
- ITIL v4 Foundations certification.
Physical Requirements:
- Sitting and standing for extended periods.
- Mobility within and between buildings.
- Stoop, kneel, crouch, or crawl as needed.
- Travel less than 10% by land or air.
We base all hiring and promotion decisions on merit to bring the best talent to our team. We do not discriminate based on age, color, sex, disability, national origin, race, religion, or veteran status. Empower AI is a VEVRAA Federal Contractor.
#J-18808-LjbffrSenior Information Security Auditor
Posted 25 days ago
Job Viewed
Job Description
- Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
- Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
- Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
- Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
- Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
- Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
- Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
- Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
- Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
- Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
Job Requirements:
- Relevant University Degree in Information Security or Information Technology.
- Professional Qualifications in Information Security.
- Minimum 5 Years of Experience in IT audit or Information Security Audit.
- Have a Valid Transferrable Visa in Kuwait.
COMSEC/EKMS Manager

Posted 7 days ago
Job Viewed
Job Description
GovCIO is currently hiring for a COMSEC/EKMS Manager. These positions will be located inASAB, Kuwait andPSAB, KSA. Positions will beonsite.
**Responsibilities**
Correlates threat data from various sources to establish the identity and modus operandi of hackers active in client's networks and posing a potential threat. Provides the customer with assessments and reports facilitating situational awareness and understanding of current cyber threats and adversaries. Develops cyber threat profiles based on geographic region, country, group, or individual actors. Produces cyber threat assessments based on entity threat analysis. May provide computer forensic and intrusion support to high technology investigations in the form of computer evidence seizure, computer forensic analysis, data recovery, and network assessments. Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption.
Locations:
+ ASAB, Kuwait
+ PSAB, KSA
*Pending contract award
**Qualifications**
+ Clearance required: Secret Clearance
+ High School with 6 - 9 years (or commensurate experience)
+ Lead-level experience in support of COMSEC keying material and systems; managing system databases; compilation of systems reports and overall system performance; managing a DoD classified COMSEC account in accordance with National Security Agency (NSA) and specified service regulations; managing and supervising communications support personnel; COMSEC (KMI and EKMS) standards; generation and distribution of electronic keys from national and service level sources to the end-item communications security component (end cryptographic unit - ECU)
*Pending Contract Award
#ARproposal
**Company Overview**
GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens.
But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer?
**What You Can Expect**
**Interview & Hiring Process**
If you are selected to move forward through the process, here's what you canexpect:
+ During the Interview Process
+ Virtual video interview conducted via video with the hiring manager and/or team
+ Camera must be on
+ A valid photo ID must be presented during each interview
+ During the Hiring Process
+ Enhanced Biometrics ID verification screening
+ Background check, to include:
+ Criminal history (past 7 years)
+ Verification of your highest level of education
+ Verification of your employment history (past 7 years), based on information provided in your application
**Employee Perks**
At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including:
+ Employee Assistance Program (EAP)
+ Corporate Discounts
+ Learning & Development platform, to include certification preparation content
+ Training, Education and Certification Assistance*
+ Referral Bonus Program
+ Internal Mobility Program
+ Pet Insurance
+ Flexible Work Environment
*Available to full-time employees
Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience.
**We are an Equal Opportunity Employer.** All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets.
**Posted Pay Range**
The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an "at-will position" and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors.
**Posted Salary Range**
USD $0.00 - USD $0.00 /Yr.
Submit a referral to this job ( _KW-Kuwait City_
**ID** _2023-2468_
**Category** _Project/Program Management_
**Position Type** _Full-Time_
Cyber Security

Posted 7 days ago
Job Viewed
Job Description
GovCIO is currently hiring for a Cyber Security. This position will be located in ASAB, Kuwait, SAB, KSA andUDAB, UAE. Position is an onsite position.
**Responsibilities**
Correlates threat data from various sources to establish the identity and modus operandi of hackers active in client's networks and posing a potential threat. Provides the customer with assessments and reports facilitating situational awareness and understanding of current cyber threats and adversaries. Develops cyber threat profiles based on geographic region, country, group, or individual actors. Produces cyber threat assessments based on entity threat analysis. May provide computer forensic and intrusion support to high technology investigations in the form of computer evidence seizure, computer forensic analysis, data recovery, and network assessments. Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption.
Location: ASAB, Kuwait
PSAB, KSA
UDAB, UAE
*Pending contract award
**Qualifications**
+ High School with 6 - 9 years (or commensurate experience)
+ Clearance required: Secret
+ Meet certification requirement of DoD 8570.01-M or the TO AND;
+ Possess one or more certification from each of these groups:
+ Group 1-Information Technology Certification Requirements: Microsoft Certified Solutions Expert (MCSE)-Microsoft Exchange/Windows Server or equivalent; Cisco Certified Network Associate; Cisco Certified Network Professional (CCNP);CompTIA Linux +; Linux Professional Institute Certification (LPIC); OR Red Hat Certified Engineer (RHCE);
+ Group 2-IA Technology Certification Requirements: GIAC Certified Perimeter Protection Analyst (GPPA); CompTIA Cyber Security Analyst (CSA +); GIAC Certified Intrusion Analyst (GCIA); GIAC Certified Windows Security Administrator (GCWN); GIAC Certified UNIX Security Administrator (GCUX); GIAC Systems and Network Auditor (GSNA); GIAC Global Industrial Cyber Security Professional (GICSP); Global Information Assurance Certification (GIAC) Security Essentials Certification (GSEC); CompTIA Security +; Security Certified Network Professional (SCNP); Systems Security, Certified Practitioner (SSCP); GIAC Security Expert (GSE); Security Certified Network Architect (SCNA); Certification and Accreditation Professional (CAP); GIAC Information Security Fundamentals (GISF); GIAC Security Leadership Certification (GSLC); OR Certified Information Security Manager (CISM); AND Group 3-IAT Level III Requirements: Certified Information Security Auditor (CISA); GIAC Certified Incident Handler (GCIH); Certified Information System Security Professional (CISSP) or Associate; CompTIA Advanced Security Practitioner (CASP CE); Cisco Certified Network Professional (CCNP) - Security; GIAC Certified Enterprise Defender (GCED)
+ Lead-level experience in: IA technology or design, maintenance and operation of small to medium networks; administrating corporate or business' user accounts managing mail servers, printer servers, WWW servers, and/or firewalls; reviewing and recommending software applications as well as identifying hardware salient characteristics and any add on devices; systems management, monitoring and sustainment; hardware repair for servers, PCs, peripheral equipment; software installation, maintenance and sustainment
+ Lead-level experience working with: tactical and strategic security issues of systems and networks, and associated requirements specific to deployed architecture; network security, network and systems intrusion detections, advanced devices, firewalls, and software specific to the Department of Defense; server operations including installation, configuration, optimization, and analyzing logs on Windows operating systems (including Server 2008/2012 and modern desktop versions); Cisco IOS, CAT OS, configuration of Cisco routers and switches; Server operations including installation, configuration, optimization, and analyzing logs on Unix operating systems (including Linux and Solaris)
+ Expert in all functions of the IAT Level I and Level II positions as defined in DoD 8570
*Pending contract award
#ARproposal
**Company Overview**
GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens.
But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer?
**What You Can Expect**
**Interview & Hiring Process**
If you are selected to move forward through the process, here's what you canexpect:
+ During the Interview Process
+ Virtual video interview conducted via video with the hiring manager and/or team
+ Camera must be on
+ A valid photo ID must be presented during each interview
+ During the Hiring Process
+ Enhanced Biometrics ID verification screening
+ Background check, to include:
+ Criminal history (past 7 years)
+ Verification of your highest level of education
+ Verification of your employment history (past 7 years), based on information provided in your application
**Employee Perks**
At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including:
+ Employee Assistance Program (EAP)
+ Corporate Discounts
+ Learning & Development platform, to include certification preparation content
+ Training, Education and Certification Assistance*
+ Referral Bonus Program
+ Internal Mobility Program
+ Pet Insurance
+ Flexible Work Environment
*Available to full-time employees
Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience.
**We are an Equal Opportunity Employer.** All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets.
**Posted Pay Range**
The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an "at-will position" and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors.
**Posted Salary Range**
USD $106,400.00 - USD $130,950.00 /Yr.
Submit a referral to this job ( _KW-Kuwait City_
**ID** _2023-2439_
**Category** _Cyber Security Services_
**Position Type** _Full-Time_
Be The First To Know
About the latest Information security Jobs in Kuwait !
ARC Sight Management Analyst

Posted 11 days ago
Job Viewed
Job Description
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
The ArcSight Management Analyst (functional Security Information and Event Management (SIEM) Engineer) performs operation and maintenance (O&M) support of the Army SIEM (Security Information and Event Management) environment. SIEM team members provide administrative support of Red Hat Enterprise Linux and Microsoft Windows Server operating systems, assuring efficient data intake, storage, retrieval, and analysis procedures across our organization. Advises and assists customers with security configuration requirements. Engineers assists with the Risk Management Framework (RMF) requirements. Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
+ Responsible for implementation, administration, and troubleshooting of SIEM products including Elasticsearch, Kibana, Beats & Logstash (ELK).
+ Organize repositories for configuration information and develop mechanisms to record and track network configuration changes.
+ Interpret, analyze, and monitor for compliance with Cyber Security policies. Review and update Cyber Security tactics, techniques, and procedures (TTPs) and Standard Operating Procedures (SOPs).
+ Responsible for installation, administration, and operation of Red Hat Enterprise Linux, Microsoft Windows Server operating systems, Confluent Kafka, Docker, LogStash, Zookeeper and other associated SIEM products.
+ Ability to troubleshoot servers and infrastructure equipment.
+ Ability to assess networking requirements and provide solution.
+ Attends and or conducts regular meetings to keep all parties apprised of network and communications/data systems changes, improvements, and project progression as required.
+ Ability to make accurate and independent decisions under pressure.
+ Experience with a customer service-oriented environment.
+ Excellent organizational, interpersonal, written, and verbal communication skills.
+ Ability to perform comfortably in a fast-paced, deadline-oriented work environment.
+ Ability to successfully execute many complex tasks simultaneously.
+ Perform any additional duties as required/assigned.
Qualifications
+ Qualifications
+ Security Clearance:
+ Requires an active Secret Clearance
+ Education / Certifications: One-year related experience can be substituted for one year of education if the degree is required.
+ High school diploma required or equivalent.
+ This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.
+ The authorized certifications for this job title are listed as follows:
+ IAT Level: IAT III
+ BASELINE:
+ CompTIA: CASP+ ce: Advanced Security Practitioner
+ CompTIA: SecurityX ce
+ GIAC: GCED: Certified Enterprise Defender
+ GIAC: GCIH: Certified Incident Handler
+ GIAC: GICSP: Industrial Cyber Security Professional
+ GIAC: GSEC: Security Essentials
+ ISACA: CISA: Certified Information Systems Auditor
+ ISC2: CISSP (or Associate): Certified Information Systems Security Professional
+ ISC2: SSCP: Systems Security Certified Practitioner
+ COMPUTING ENVIRONMENT (CE):
+ Microsoft: 365 Certified: Enterprise Administrator Expert
+ Microsoft: 365 Certified: Messaging Administrator Associate
+ Microsoft: 365 Certified: Security Administrator Associate
+ Microsoft: Certified: Azure Administrator Associate
+ Microsoft: Certified: Azure Database Administrator Associate
+ Microsoft: Certified: Azure Security Engineer Associate
+ Microsoft: Certified: Azure Solutions Architect Expert
+ Microsoft: Certified: Identity and Access Administrator Associate
+ Microsoft: Certified: Information Protection Administrator Associate
+ Microsoft: Certified: Security Operations Analyst Associate
+ Microsoft: MCSE: Cloud Platform and Infrastructure
+ Microsoft: MCSE: Core Infrastructure
+ Microsoft: MCSE: Database Management and Analytics
+ Microsoft: MCSE: Productivity Solutions Expert
+ Microsoft: MCSE: Server Infrastructure 2016
+ Microsoft: MCSM: Certified Solutions Master (Any)
+ Red Hat: RHCA: Certified Architect (Any)
+ Red Hat: RHCE: Certified Engineer
+ Red Hat: RHCSA: Certified System Administrator
+ Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Software Engineering or Business Information Systems discipline for three years general experience.
+ Minimum of five years of experience in administrative, technical work, which demonstrated the ability and aptitudes, required to perform technical and analytical work involving information management systems.
+ Platforms including a combination of the following: Red Hat Linux, Microsoft Windows, and relational databases.
At V2X, we are deeply committed to both equal employment opportunity, including protection for Veterans and individuals with disabilities, and fostering an inclusive and diverse workplace. We ensure all individuals are treated with fairness, respect, and dignity, recognizing the strength that comes from a workforce rich in diverse experiences, perspectives, and skills. This commitment, aligned with our core Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation, and expand our success in the global marketplace, ultimately enabling us to best serve our clients.
WAN Security Engineer

Posted 12 days ago
Job Viewed
Job Description
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
WAN Security Engineers are required to be certified at the expert level in multiple disciplines of networks and security (e.g. CCNP/CCIE & CISSP). WAN Security Engineers support Enterprise-class network security technologies, which includes network firewalls, web proxy appliances, VPN appliances, Comply to Connect (C2C) and Network Access Control solutions. The WAN Security Engineers are responsible for design, troubleshooting, optimization, administration, change management and technical documentation. The core network technologies include Cisco Firepower Next-Generation Firewalls, Cisco Secure Firewall Management Center (FMC), Menlo Cloud-Based Internet Isolation Solutions (CBII), Forescout Enterprise Manager, and Cisco Identity Services Engine (ISE). Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
+ Provide enterprise-level customer support for all requests to modify network firewall access-lists; manage access control to all network devices in the theater; troubleshoot and resolve web browsing issues; support requests for services hosted in the demilitarized zones (DMZ).
+ Provides network security policy recommendations, project planning, change control, firewall management, and access control list (ACL) management.
+ Enforce enterprise security policies.
+ Assist with identifying and investigating malicious network activity.
+ Ensure that all managed technologies are compliant with current DISA Security Technical Implementation Guides (STIGs).
+ Perform regular system maintenance in support of IAVA vulnerabilities and CCRI compliance.
+ Create, update and maintain proxy web filtering policies. Analyze logs to look for irregularities and identify miscategorized sites that may need to be blocked.
+ Support authentication, authorization, accounting (AAA) & auditing for all network devices and maintain records for accounts in Cisco ISE.
+ Support the Comply to Connect (C2C) infrastructure and work with other departments that play a role in the Zero Trust architecture.
+ Monitor the status and health of the managed network devices using network monitoring tools.
+ Create, update, and maintain detailed network diagrams.
+ Create and track network issues/requests using the ServiceNow ticketing system.
+ Additional duties as assigned by leadership.
Qualifications
+ Qualification
+ Security Clearance:
+ Requires an active Secret Clearance
+ Education / Certifications: One year of related experience may be substituted for one year of education if degree is required.
+ Bachelors Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field.
+ This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.
+ The authorized certifications for this job title are listed as follows:
+ IAT Level: IAT III
+ BASELINE:
+ Cisco: CCNP Security (Cannot be used as a dual qualifier)
+ CompTIA: CASP+ ce: Advanced Security Practitioner
+ GIAC: GCED: Certified Enterprise Defender
+ GIAC: GCIH: Certified Incident Handler
+ ISACA: CISA: Certified Information Systems Auditor
+ ISC2: CISSP (or Associate): Certified Information Systems Security Professional
+ COMPUTING ENVIRONMENT (CE):
+ Cisco CCNP: Enterprise
+ Cisco CCNP: Security (Cannot be used as a dual qualifier)
+ Cisco CCIE: Enterprise Infrastructure
+ Cisco CCIE: Security
+ Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Software Engineering or Business Information Systems discipline for three years general experience.
+ Minimum of 10 years of experience working with network and firewall technologies.
+ Experience with VPN technologies.
+ A high-level ability and aptitude to perform technical, managerial, or analytical work and coordination involving enterprise network equipment & software.
+ Platforms including a combination of the following: Cisco Firepower Next Gen Firewall, Cisco Secure Firewall Management Center, Menlo Cloud-Based Internet Isolation (CBII), Forescout Enterprise Manager, and Cisco Identity Services Engine (ISE).
+ A solid background with TCP/IP and must be able to troubleshoot all supported network protocols.
+ Skills and Technology Used:
+ Ability to verify that all systems under the direct control of RCC-SWA are properly configured in accordance with the Higher Headquarters, Local, and DISA STIG configuration policies.
+ Ability to manage asset documentation for accreditation and authorization.
+ Ability to assess networking requirements and provide solutions.
+ Ability to make accurate and independent decisions under pressure.
+ Ability to successfully execute many complex tasks simultaneously.
+ Expert ability to troubleshoot infrastructure equipment.
+ Excellent organizational, interpersonal, written, and verbal communication skills
+ Ability to perform comfortably in a fast-paced, deadline-oriented work environment.
+ Ability to successfully execute many complex tasks simultaneously across departmental boundaries.
+ Experience with a customer service-oriented company
At V2X, we are deeply committed to both equal employment opportunity, including protection for Veterans and individuals with disabilities, and fostering an inclusive and diverse workplace. We ensure all individuals are treated with fairness, respect, and dignity, recognizing the strength that comes from a workforce rich in diverse experiences, perspectives, and skills. This commitment, aligned with our core Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation, and expand our success in the global marketplace, ultimately enabling us to best serve our clients.
Information Assurance III

Posted 14 days ago
Job Viewed
Job Description
This position description is subject to change at any time as needed to meet the requirements of the program or company.
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
Senior level lead Information Assurance Technician responsible for providing cyber security management support.
This position is contingent upon successful contract award to V2X.
#clearance
Responsibilities
Major Job Activities:
Provide cyber security management support in accordance with (IAW) AFI 17-130, Air Force Cyber Security Program Management, as defined in the individual Task Orders (TOs). Support coordination of all actions required by USAFCENT cyber security-related CTOs including, but not limited to, vulnerability scanning and patch compliance. USAFCENT Cyber Security oversees all vulnerability scans IAW SPIN-C. Cyber security tasks include:
+ Scanning: Annotate remediation and mitigation actions on the vulnerability scan reports and return responses to USAFCENT Cyber Security to meet CTO compliance standards.
+ Patching: Monitor and verify patch compliance using the approved technical solution (i.e., SCCM, Assured Compliance Assessment Solution Information Assurance Vulnerability Alert compliance dashboards to track patching progress IAW patch compliance CTO requirements). Subtasks include:
+ Coordinate appropriate actions to ensure site systems are receiving patches and identify any patch installation issues.
+ Coordinate with local administrators to troubleshoot and elevate patching issues to NOSC engineers in a timely manner in order to meet patch compliance timelines. If automated patches are unavailable, such as with PMO systems, coordinate with PMO offices for manual patching of these systems to meet compliance levels IAW the CTO and SPIN-C requirements.
+ Develop a POA&M when CTO compliance cannot be met by the compliance date.
+ Review System Logs: Review all system logs daily for indications of unauthorized activity. Suspicious or abnormal log information shall be noted, escalated, and safeguarded IAW the SPIN-C.
+ Report and Contain Viruses, Malicious, and Negligent Activities: report virus outbreaks or suspected malicious activity IAW SPIN-C directives and
+ Take appropriate action to contain a virus outbreak or suspected malicious activity immediately; this includes updating virus signatures and possibly isolation of the infected system(s). A Remedy trouble ticket shall be opened for all virus outbreaks or suspected malicious activity.
+ Report all negligent discharges of classified information (NDCI) or cross-domain violations (CDV) IAW SPIN-C directives and instructions. Take appropriate actions to contain and safeguard classified information from being further compromised. All NDCIs / CDVs and their respective reporting shall be classified to the same level as the information contained.
+ Attend and participate in required NOSC systems and cyber security meetings or teleconferences.
+ Security Information and Event Management (SIEM): Monitor internal and wireless (if site is equipped with wireless) SIEM systems and escalate any possible alerts to USAFCENT Cyber Security for investigation. Attempt to identify the source and severity of activity and work with USAFCENT Cyber Security to contain, eradicate, or block the malicious activity. Review all intrusion and SIEM system alerts, logs, and reports for false positives. Identify all activity detected by working with site systems and networks to document the activity that is causing the alerts. Work with site and USAFCENT Cyber Security leadership to acquire approval to filter out these alerts.
+ Air Wireless Detection: Monitor over-the-air wireless detection systems, if site is so equipped, for indications of malicious activity against wireless systems. Attempt to identify the source of activity and consult with USAFCENT Cyber Security and site leadership on courses of action.
+ Wireless Audits: Conduct wireless audits (war drives) IAW the SPIN-C to detect any unauthorized wireless devices connected to the site network. Consult with site leadership and USAFCENT Cyber Security to identify the device and assist in any investigations as directed by leadership.
+ Network Compliance: Review all site access control lists and validate that permitted activity is relevant to current systems / network architecture and approved through USAFCENT Cyber Security leadership. Audit all backup procedures IAW the SPIN-C to validate critical systems can be reconstituted after failure. Review all network account access request forms for accuracy prior to account creation. Be responsible for maintaining certifications as listed in the labor category. Certification will be included in the work center's continuity book.
Material & Equipment Directly Used:
Government computers and DoD approved software.
Working Environment:
+ Working environment is a climate-controlled facility. Outdoor temperatures may exceed temperatures of 100 degrees Fahrenheit.
+ May require support during periods of non-traditional working hours including nights or weekends.
Physical Activities:
Must be able to lift/push/pull 40 lbs. unassisted.
Qualifications
Education / Certifications:
+ High School Diploma or GED
+ U.S. Citizen
+ Active Secret Tier 3 (or higher) Security Clearance
+ IAT Level III Certification
Experience / Skills:
+ Lead-level experience in: IA technology or design, maintenance and operation of small to medium networks; administrating corporate or business' user accounts managing mail servers, printer servers, WWW servers, and/or firewalls; reviewing and recommending software applications as well as identifying hardware salient characteristics and any add on devices; systems management, monitoring and sustainment; hardware repair for servers, PCs, peripheral equipment; software installation, maintenance and sustainment; AND
+ Lead-level experience working with: tactical and strategic security issues of systems and networks, and associated requirements specific to deployed architecture; network security, network and systems intrusion detections, advanced devices, firewalls, and software specific to the Department of Defense; server operations including installation, configuration, optimization, and analyzing logs on Windows operating systems (including Server 2008/2012 and modern desktop versions); Cisco IOS, CAT OS, configuration of Cisco routers and switches; Server operations including installation, configuration, optimization, and analyzing logs on Unix operating systems (including Linux and Solaris); AND
+ Expert in all functions of the IAT Level I and Level II positions as defined in DoD 8570.
Supervisory / Budget Responsibilities:
TBD
At V2X, we are deeply committed to both equal employment opportunity, including protection for Veterans and individuals with disabilities, and fostering an inclusive and diverse workplace. We ensure all individuals are treated with fairness, respect, and dignity, recognizing the strength that comes from a workforce rich in diverse experiences, perspectives, and skills. This commitment, aligned with our core Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation, and expand our success in the global marketplace, ultimately enabling us to best serve our clients.