70 Information Security jobs in Kuwait
Cyber Recovery Solutions Senior Consultant
Posted 15 days ago
Job Viewed
Job Description
3 weeks ago Be among the first 25 applicants
As a Senior Cyber Recovery Consultant, you will provide end-to-end custom consulting, design and implementation support for customers, specifically related to Dell Technologies products. This may include pre-sales kick-offs, consulting, initial design workshops, implementation, customization, integration and outline orientation for the customer. You will work closely with internal and customer resources to ensure a smooth transition from the initial consultation through to integration/production mode. You will be considered a subject matter expert around Cyber Recovery solutions and knowledgeable of industry best practices in the design and implementation of complex Cyber Recovery and Data Protection solutions.
Requirements
- Lead Cyber Recovery solution and proposal development once project goals and objectives have been defined
- Operate as a subject matter expert on Cyber Recovery solutions within the Consulting practice, including managing large customer engagements, delivering technical Cyber Recovery workshops to customers, and interpreting/managing complex Statements of Work (SOW's)
- Have full oversight of Cyber Recovery solutions at all stages of the lifecycle - from initial requirement gathering/validation, through to solution design and delivery
- Plan implementations and advance strategies for new initiatives
- Excellent technical knowledge of Cyber Recovery and Data Protection solutions
- Experience with Data Protection/Backup Recovery Tools & Architecture (Networker, NetBackup, Veeam, TSM, Commvault, etc.) as well as Data Domain and Avamar Technologies
- Advanced writing skills and demonstrated ability to document processes for the customer
- Advanced communication skills in working with the customer including awareness of stakeholders and ability to influence outcomes
- Advanced knowledge, understanding and application of project management principles and methodologies
- 10-15+ years' experience with the above
- Strong Understanding of the wider IT landscape including Network, Storage, Compute , Replication, Backup/Recovery Architectures
- Good understanding of TOGAF framework
- Seniority level Mid-Senior level
- Employment type Contract
- Job function Consulting
- Industries IT Services and IT Consulting
Referrals increase your chances of interviewing at SWATX by 2x
ZAIN1471 - Technical Opportunities for Recent Graduates IT Specialist. Condtruction and ecommerce company CRM & Billing Technical Lead - Microsoft Dynamics Missile Defense and Joint Interface Control Officer Installation Access Control/Defense Biometrics Identification Systems SupportWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrHead of Security Operations
Posted 17 days ago
Job Viewed
Job Description
Join to apply for the Head of Security Operations role at Canonical
Continue with Google Continue with Google
Join to apply for the Head of Security Operations role at Canonical
Get AI-powered advice on this job and more exclusive features.
Sign in to access AI-powered advicesContinue with Google Continue with Google
Continue with Google Continue with Google
Continue with Google Continue with Google
Continue with Google Continue with Google
Continue with Google Continue with Google
Continue with Google Continue with Google
This global leadership role in cyber security is to manage the Security Operations (SecOps) team responsible for design, implementation and evolution of Canonical security practices, techniques, tools, systems and policies. The team is the primary owner of strategy and practices that determine how Canonical secures its data, internal infrastructure and build processes. They are responsible for assuring the security and integrity of our own infrastructure and product deployments. They design and implement technical security controls that ensure security threats are automatically identified, contained and remediated. The team will also contribute ideas and requirements for Canonical product security, improving the resilience and robustness of all Ubuntu customers and users subject to cyber attack.
As a leader on cyber security in the company, the SecOps team manager will collaborate with our Organisational Learning and Development team to develop playbooks and facilitate SecOps training across Canonical. They will operate in a wider security organisation, run a high performing security team and improve Canonical's security posture. They will lead initiatives to integrate the team's insights into Canonical's broader software development process.
While this is a management position, we expect managers to be expert practitioners, able to lead by example, contribute at the highest level, and assess work based on their own professional experience and skill. Candidates should have deep, hands-on expertise with a range of open source and proprietary security tooling and practices, which they can integrate into a holistic next generation security solution across the breadth of Canonical's interests.
The SecOps team's mission is not only to secure Canonical, but also to contribute to the security of the wider open source ecosystem. They might share knowledge through public presentations and industry events, and share threat intelligence with the wider community or represent Canonical in sector-specific governance bodies.
This role reports to the CISO.
What you will do in this role:
- Hire and mentor a team of outstanding technical security professionals
- Define Canonical's SecOps security standards and playbooks
- Own and drive the architecture and design of the SOC
- Analyse and improve Canonical's security architecture
- Evaluate, select and implement new security tools and practices
- Identify, contain and guide the remediation of security threats and cyber attacks
- Grow the presence and thought leadership of Canonical SecOps practice
- Contribute to open source threat intelligence initiatives
- Drive threat modelling, table top exercises and other SecOps practices across Engineering, IS and Canonical
- Develop Canonical SecOps learning and development materials
- Publish blog posts, whitepapers and conference presentations
- Identify, implement and track SecOps KPIs
- Plan and deliver SecOps work in the framework of Canonical's agile engineering practice
- Work with Security leadership to present information and influence change
- Proven track record of mitigating with advanced threat actors and nation state threats
- Expert technical understanding of SOCs from the ground up
- In depth knowledge of SOC architecture and design including strategies for logging, firewalls, network segmentation, honeypots etc
- Someone who understands how the SOC works not just how to use it
- Expert in Linux security
- Ability to define, implement, automate and measure effective incident response playbooks
- Knowledge of security architecture and market-leading security tools
- Experience contributing to, and consuming, threat intelligence feeds
- Experience in security risk management frameworks such as NIST CSF
- An exceptional academic track record from both high school and university
- Undergraduate degree in Computer Science or STEM, or a compelling narrative about your alternative path
- Drive and a track record of going above-and-beyond expectations
- Deep personal motivation to be at the forefront of technology security
- Leadership and management ability
- Excellent business English writing and presentation skills
- Confidence to report security performance metrics with accountability for accuracy and completeness
- Experience in offensive or defensive security teams with hands-on ability
- Experience with open source security tools
- Experience with security standards such as ISO 27001
- Experience with security posture management of corporate endpoitns
- Seniority level Director
- Employment type Full-time
- Job function Other, Information Technology, and Management
- Industries Software Development
Referrals increase your chances of interviewing at Canonical by 2x
Sign in to set job alerts for “Head of Security” roles.Continue with Google Continue with Google
Continue with Google Continue with Google
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrSenior Security Operations Engineer
Posted 17 days ago
Job Viewed
Job Description
Join to apply for the Senior Security Operations Engineer role at Canonical
Continue with Google Continue with Google
Join to apply for the Senior Security Operations Engineer role at Canonical
We have opened several senior/staff Security Operations Engineer (SOC) positions, creating a new team reporting to the CISO. We are looking for a range of experience in these positions - at the high end we are looking for deep experience defending highly contested critical assets and high-value cyber targets against advanced persistent threats and state-level actors. We have more junior roles for exceptional individuals with a proven personal interest an engagement in cyber attack and defence, and outstanding academic and career performance even if experience is limited.
Our goal is to build an entirely new level of assurance and observable rigour into the open source supply chain. We have our own estate to monitor, but more broadly our goal is to raise the robustness of the entire global Ubuntu estate through the work of this team.
The Security Operations (SecOps) team is responsible for design, implementation and evolution of Canonical security practices, techniques, tools, systems and policies. The team is the primary owner of strategy and practices that determine how Canonical secures its data, internal infrastructure and build processes. They are responsible for assuring the security and integrity of our own infrastructure and product deployments. They design and implement technical security controls that ensure security threats are automatically identified, contained and remediated. The team will also contribute ideas and requirements for Canonical product security, improving the resilience and robustness of all Ubuntu customers and users subject to cyber attack.
The SecOps team's mission is not only to secure Canonical, but also to contribute to the security of the wider open source ecosystem. They might share knowledge through public presentations and industry events, and share threat intelligence with the wider community or represent Canonical in sector-specific governance bodies.
What you will do in this role:
- Implement and evolve Canonical's Security Operation Center
- Analyse and improve Canonical's security architecture
- Evaluate, select and implement new security tools and practices
- Identify, contain and guide the remediation of security threats and cyber attacks
- Grow the presence and thought leadership of Canonical SecOps practice
- Contribute to open source threat intelligence initiatives
- Drive threat modelling, table top exercises and other SecOps practices across Engineering, IS and Canonical
- Develop Canonical SecOps learning and development materials
- Publish blog posts, whitepapers and conference presentations
- Identify, implement and track SecOps KPIs
- Plan and deliver SecOps work in the framework of Canonical's agile engineering practice
- Work with Security leadership to present information and influence change
- An exceptional academic track record
- Undergraduate degree in Computer Science or STEM, or a compelling narrative about your alternative path
- Previous professional experience working or leading a Security Operation Center
- Deep personal motivation to be at the forefront of technology security
- Expertise in threat modelling and risk management frameworks
- Knowledge of security architecture and market-leading security tools
- Experience contributing to, and consuming, threat intelligence feeds
- Experience in security risk management frameworks such as NIST CSF and ISO27001
- Experience in a security operations team or a security operations centre (SOC)
- Experience in offensive or defensive security teams with hands-on ability
- Experience with state-actor and other advanced persistent threats
We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.
- Distributed work environment with twice-yearly team sprints in person
- Personal learning and development budget of USD 2,000 per year
- Annual compensation review
- Recognition rewards
- Annual holiday leave
- Maternity and paternity leave
- Employee Assistance Programme
- Opportunity to travel to new locations to meet colleagues
- Priority Pass, and travel upgrades for long haul company events
Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.
Canonical is an equal opportunity employer
We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.
Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Software Development
Referrals increase your chances of interviewing at Canonical by 2x
Linux Cryptography and Security EngineerWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrAdvanced Cyber Security Architect
Posted today
Job Viewed
Job Description
Join to apply for the Advanced Cyber Security Architect role at Honeywell
Job Description
As an Advanced Cyber Sec Archt/Engr here at Honeywell, you will be responsible for leading the design and implementation of cutting-edge cybersecurity solutions. You will be hands-on in fortifying defenses against emerging threats and acting as the subject matter expert for technical challenges. You will collaborate with cross-functional teams, stay informed about emerging technologies, and foster a culture of continuous improvement.
In this role, you will impact our cybersecurity initiatives by protecting critical assets and information across industries, ensuring the security and resilience of businesses worldwide. You will drive technical excellence, lead incident response efforts, and conduct digital analysis. Your work will directly impact the safety and integrity of systems that power the modern world. Join us at Honeywell, where cybersecurity meets innovation, and together, we'll build a safer and more secure future.
Responsibilities
- Design and implement advanced cybersecurity solutions to protect our digital infrastructure and sensitive data
- Collaborate with cross-functional teams and senior leadership to develop and execute our cybersecurity strategy
- Conduct risk assessments and vulnerability assessments to identify potential security threats and vulnerabilities
- Develop and implement incident response plans to effectively respond to and mitigate cybersecurity incidents
- Stay up-to-date with the latest cybersecurity trends, technologies, and best practices to continuously improve our security posture
Qualifications
YOU MUST HAVE
- 5+ years of experience in a cybersecurity leadership position
- In-depth knowledge of cybersecurity technologies, frameworks, and best practices
- Ability to lead direct and indirect reports by influence
WE VALUE
- Bachelor’s or advanced degree in Cybersecurity, Computer Science, or related field
- Relevant certifications such as CISSP, CISM, or GIAC are highly desirable
- Demonstrated leadership skills and experience managing cybersecurity teams
About Us
Honeywell helps organizations solve complex challenges in automation, aviation, and energy transition. We provide innovative solutions through Aerospace Technologies, Building Automation, Energy and Sustainability, and Industrial Automation, powered by Honeywell Forge software, making the world smarter, safer, and more sustainable.
Seniority level- Mid-Senior level
- Full-time
- Engineering and Information Technology
- Appliances, Electrical, and Electronics Manufacturing
Referrals increase your chances of interviewing at Honeywell by 2x
Get notified about new Cyber Security Architect jobs in Kuwait .
#J-18808-LjbffrEngineering Manager - Security Standards and Hardening
Posted 3 days ago
Job Viewed
Job Description
Join to apply for the Engineering Manager - Security Standards and Hardening role at Canonical
Engineering Manager - Security Standards and Hardening1 week ago Be among the first 25 applicants
Join to apply for the Engineering Manager - Security Standards and Hardening role at Canonical
As the most widely used Linux distribution, Ubuntu underpins the security of the entire internet. The role of Security Engineering Manager directly impacts the safety and security of millions of users worldwide. Join a team of security experts dedicated to protecting the open-source ecosystem and driving innovation. Your leadership will be instrumental in addressing emerging threats, developing robust security measures, and ensuring the continued integrity of Ubuntu. This is an opportunity to make a tangible difference and leave a lasting legacy on the digital landscape.
As we place ever more trust in software and data security in our increasingly connected world, Canonical's mission to deliver the world's best open source platform comes with a responsibility: to set the highest possible standard for software security, not only for the OS, but also for the wide range of open source infrastructure and software that developers enjoy within the Ubuntu ecosystem. With Canonical's Ubuntu being the leading open source platform for large-scale cloud and edge deployments, we are increasingly called upon to help customers meet strict security requirements such as FIPS, CIS, STIG, FedRAMP and the new CRA.
This role is about leading the charge to set the security standards for open source software across the Ubuntu platform, from desktops, servers and edge devices to cloud infrastructure, Kubernetes and OpenStack, by certifying core components to meet industry standards and guiding development teams across the company in security best practices. We work primarily within the areas of cryptographic modules (FIPS 140) and system hardening, where we collaborate with industry partners including CIS and DISA to define and build secure operating system deployments.
An Engineering Manager is responsible for line management and career guidance. The ability to develop engineering talent, to represent your team and product from a technical perspective, and to drive collaboration with other teams and customers are all critical to success in this role.
What you will do in this role
- Lead and develop a team of engineers, ranging from graduate to senior
- Coach, mentor, and offer career development feedback
- Identify and measure team health indicators
- Implement disciplined engineering processes
- Represent your team and product to stakeholders, partners, and customers
- Develop and evangelise great engineering and organisational practices
- Plan and manage progress on agreed goals and projects
- Support our products and customers to meet strict product security requirements such as FIPS, CIS, STIG, FedRAMP and the new CRA
- Support the work addressing specific cryptography modules (FIPS 140) and system hardening efforts with indrustry partners, including CIS and DISA
- An exceptional academic track record from both high school and university
- Undergraduate degree in Computer Science or STEM, or a compelling narrative about your alternative path
- Drive, and a track record of going above-and-beyond expectations
- Excellent verbal and written communication skills in English
- A love of developing and growing people and a track record of it
- Organised and able to ensure your team delivers timely, high quality results
- Professional manner interacting with colleagues, partners, and community
- Prior experience working on FIPS/Common Criteria certified products and in-depth knowledge of the underlying standards
- Prior experience working directly with DISA-STIG or CIS benchmarks, including related audit + remediation tooling (e.g. Compliance as Code)
- Knowledgeable and passionate about software and application security
- Solid experience working in an agile development environment
- A demonstrated drive for continual learning
- Builds trust, relationships and confidence
- Result-oriented, with a personal drive to meet commitments
- Ability to travel twice a year, for company events up to two weeks each
- Hands-on domain knowledge of Linux cryptography libraries (OpenSSL, GnuTLS)
We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.
- Distributed work environment with twice-yearly team sprints in person
- Personal learning and development budget of USD 2,000 per year
- Annual compensation review
- Recognition rewards
- Annual holiday leave
- Maternity and paternity leave
- Employee Assistance Programme
- Opportunity to travel to new locations to meet colleagues
- Priority Pass, and travel upgrades for long haul company events
Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.
Canonical is an equal opportunity employer
We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.
Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Engineering and Information Technology
- Industries Software Development
Referrals increase your chances of interviewing at Canonical by 2x
Sign in to set job alerts for “Engineering Manager” roles. Engineering Manager - Solutions Engineering Software Engineering Manager - Sustaining Engineering Technical Manager - Automotive and Industrial Engineering Manager - Build and Release Infrastructure Engineering Manager - Build and Release Infrastructure Software Engineering Manager - Container and Virtualisation Infrastructure Software Engineering Manager, Ubuntu Gaming Systems Integrations Engineering Manager Linux Engineering Manager - Optimisation for Latest Hardware Salesforce Engineering Manager, Commercial Systems Software Platform Engineering Manager - Ubuntu for Next-Gen Silicon Engineering Manager for IAM (Identity and Access Management) Software Engineering Manager - Ubuntu Linux Kernel Embedded Linux Field Engineering Manager Linux Enablement - Software Engineering ManagerWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrSenior Compliance & Incident Response Manager
Posted 3 days ago
Job Viewed
Job Description
Get AI-powered advice on this job and more exclusive features.
Direct message the job poster from Keeta
Global Talent Acquisition Partner| Diversity Hiring Expert | Digital Talent Attraction | Leadership Hiring| Headhunting Specialist & Emiratization…We’re Hiring: Senior Compliance & Incident Response Manager
Keeta is an independent brand of Meituan, the world's largest tech-driven retail company. Keeta is revolutionizing the food delivery space. As a dynamic and innovative global platform, Keeta leverages cutting-edge technology to provide fast, reliable, and seamless food delivery experiences. With the mission "We help people eat better, live better", Keeta launched in 2023 and has rapidly expanded across key regions, including Hong Kong, Saudi Arabia and now in Brazil.
Are you passionate about public safety, regulatory coordination, and emergency response? Do you thrive in fast-paced, high-growth environments where safety and compliance are mission-critical? Join us in building a safer ecosystem for our platform and users.
What You’ll Do
- Emergency Response: Lead swift and effective responses to traffic accidents, public safety events, fire hazards, and more.
- Daily Safety Ops: Analyze safety data, implement risk prevention strategies, and manage safety documentation.
- Regulatory Liaison: Act as the bridge between our team and local regulatory authorities—ensuring compliance and alignment with jurisdictional protocols.
- Cross-functional Support: Collaborate with HQ and cross-regional teams on initiatives and directives.
Why Keeta?
Innovation-Driven: Keeta uses the advanced technology solutions to disrupt the traditional food delivery landscape, making every order smarter and faster.
Fast-Growing & Dynamic: Keeta is expanding quickly, offering endless opportunities for personal and professional growth.
Global Impact: Join a company that’s transforming the way people enjoy food, impacting communities around the world.
What We’re Looking For
Education & Experience: Bachelor’s degree or above with 5+ years in corporate safety, compliance, or emergency management.
Professional Skills:
- Solid grasp of safety workflows and local regulatory processes.
- Background in internet/tech platforms is a plus.
- Prior corporate safety-related experience required.
Soft Skills:
- Strong business writing and verbal expression.
- Team player with a hands-on, problem-solving attitude.
Mindset & Flexibility:
- Detail-oriented and responsible.
- Comfortable working under pressure.
- Open to short-term business travel.
Bonus Points If You Have
- Managing public security events, fire safety, or traffic emergencies.
- Experience dealing directly with safety regulatory authorities and compliance agencies.
Apply now or reach out to our talent team to learn more.
#ComplianceJobs #IncidentResponse #SafetyManagement #InternetSafety #EmergencyResponse #RegulatoryAffairs #HiringNow
Seniority level- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Management and Analyst
- Industries Information Services and Technology, Information and Media
Referrals increase your chances of interviewing at Keeta by 2x
Sign in to set job alerts for “Incident Manager” roles.We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrAdmin Support – Security / Consulting
Posted 3 days ago
Job Viewed
Job Description
Admin Support
Job Id :
×
Please enter details to report job
Name*
Email*
Reason to report
Description
Admin Support – Security / Consulting
RIMSCO is hiring an experienced Admin Support professional to join our Security and Consulting team.
Requirements
- Bachelor’s degree or equivalent in Security Risk Management
- Minimum 5 years of experience in the security industry, including consulting
- Strong organizational and administrative skills
- Excellent written and verbal communication
- Proficiency in English is essential
- Advanced skills in Microsoft Office and other relevant computer applications
A detail-oriented individual who can manage administrative tasks efficiently, support consulting operations, and contribute to a secure and well-organized work environment.
Apply now:
Basic Details
Qualification
Posted : 18 days ago
Job Type : Full-Time
Company : Kuwait Jobs
Posted By: Saikumar
Contact Info
Mobile : Not-Mentioned
Alternate Mobile : Not-Mentioned
Email : Vacancy for Receptionist for Immigration Consultancy Hiring from Philippines for Ladies Beauty Salon Junior Operations & Admin Executive (Freshers Can Apply) #J-18808-Ljbffr
Be The First To Know
About the latest Information security Jobs in Kuwait !
IT Security Specialist – Information Security
Posted 3 days ago
Job Viewed
Job Description
Join to apply for the IT Security Specialist – Information Security role at KDD
Continue with Google Continue with Google
IT Security Specialist – Information SecurityJoin to apply for the IT Security Specialist – Information Security role at KDD
Job Duties Include But Are Not Limited To
We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team.
The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats.
- Identify and fix vulnerabilities within existing security systems.
- Develop organization-wide security measures.
- Document known security breaches and vulnerabilities.
- Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards.
- Monitor and analyze security events and incidents to identify and respond to potential threats promptly.
- Perform penetration tests to assess potential security problems.
- Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks.
- Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications.
- Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required.
- Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements.
- Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR).
- Establish relationships with external cybersecurity partners, vendors, and service providers.
- Plan incident response activities, including investigating security breaches and recommending corrective actions.
- Participate in the change management process.
- Education: Bachelor's degree in Computer Science, Information Systems, or a related field.
- Experience: 3 to 4 years of experience in an IT security role.
- Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels.
- Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills.
- Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines.
- Strategic Thinking: Ability to align solution deliverables with the organization's goals.
- Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems.
- Operating System Administration: Proficiency in securing Windows, Linux, and macOS.
- Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures.
- Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell.
- Encryption Techniques: Knowledge of implementing and managing encryption for data protection.
- Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware).
- Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Dairy Product Manufacturing
Referrals increase your chances of interviewing at KDD by 2x
Get notified about new Information Technology Security Specialist jobs in Farwaniya, Kuwait .
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrNetwork Information Assurance
Posted 5 days ago
Job Viewed
Job Description
Join to apply for the Network Information Assurance role at V2X Inc
1 day ago Be among the first 25 applicants
Join to apply for the Network Information Assurance role at V2X Inc
Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
Supports United States Army Regional Cyber Center - Southwest Asia (USARCC-SWA) networks with day-to-day operations in support of (ISO) Computer Network Defense (CND), to deny adversaries access to information and information systems (IS). Operate and maintain (O&M) active and passive defense technologies, to troubleshoot, optimize, and administer network Intrusion Detection/Prevention Systems (IDS/IPS). Adheres to Change Management (CM) policies, provides technical documentation, and follows the Risk Management Framework (RMF) by implementing, assessing, and monitoring Defense Information Systems Agency (DISA) provided Secure Technical Implementation Guides (STIGs). Program: OMDAC-SWACA
Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
Supports United States Army Regional Cyber Center - Southwest Asia (USARCC-SWA) networks with day-to-day operations in support of (ISO) Computer Network Defense (CND), to deny adversaries access to information and information systems (IS). Operate and maintain (O&M) active and passive defense technologies, to troubleshoot, optimize, and administer network Intrusion Detection/Prevention Systems (IDS/IPS). Adheres to Change Management (CM) policies, provides technical documentation, and follows the Risk Management Framework (RMF) by implementing, assessing, and monitoring Defense Information Systems Agency (DISA) provided Secure Technical Implementation Guides (STIGs). Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
- Provide Network IDS/IPS O&M in support of (ISO) the Army portion of the Department of Defense Information Network (DoDIN) in the United States Central Command (US CENTCOM) Area of Responsibility (AOR).
- Monitor and implement Joint Forces Headquarters (JFHQ-DoDIN), United States Army Cyber Command (ARCYBER), and US Army Network Enterprise Technology Command (NETCOM) Operation Orders (OPORD), Task Orders (TASKORD), and Communication Tasking Orders (CTOs).
- Block Internet Protocol (IP) networks when directed by the customer.
- Investigate network and Automated Information System (AIS) security events.
- Manage customer trouble tickets using automated standardized system. Record customer requests for assistance electronically. Provides record of immediate resolution or escalates for resolution of particularly difficult and complex problems. Ensures that problem resolution is recorded electronically to assist addressing subsequent occurrences of problems.
- Consults with other IT Specialists to identify defects in performance and provides administrative and technical assistance to the USARCC-SWA Team.
- Generate reports for leadership detailing traffic analysis, and security events.
- Create, implement, and monitor custom Snort version 2 and 3 IPS signatures.
- Apply vendor provided signature and software updates while adhering to CM policies.
- Perform in depth analysis utilizing the Security Incident and Event Management (SIEM).
- Participate in CND exercises as requested by the customer to maintain site accreditation.
- Interprets and implements Department of Defense (DoD), Army, and local Command policies, directives, manuals, instructions, regulations and guidelines for data, and system security including DISA STIGs and Security Requirements Guides (SRGs).
- Maintains current DoD Cyberspace Workforce Framework (DCWF) certifications per DoD -M, and other cybersecurity requirements.
- Perform any additional duties as required/assigned.
- Qualifications:
- Security Clearance:
- Requires an active Secret Clearance
- Education / Certification: One-year related experience can be substituted for one year of education if the degree is required.
- High school diploma required or equivalent
- This position requires candidates to adhere to DoD . All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.
- The authorized certifications for this job title are listed as follows:
- IAT Level: Information Technology (IT) I / Information Assurance Technical (IAT) III
- BASELINE:
- Cisco: CCNP Security
- CompTIA: CASP+ ce: Advanced Security Practitioner
- CompTIA: CySA+ ce: Cybersecurity Analyst
- GIAC: GCED: Certified Enterprise Defender
- GIAC: GCIH: Certified Incident Handler
- ISACA: CISA: Certified Information Systems Auditor
- ISC2: CCSP: Cloud Certified Security Practitioner
- ISC2: CISSP (or Associate): Certified Information Systems Security Professional
- COMPUTING ENVIRONMENT (CE):
- Cisco: CCIE: (Any)
- Cisco: CCNP: Certified Network Professional: (Any)
- EC-Council: CEH: Certified Ethical Hacker
- EC-Council: CHFI: Certified Hacking Forensic Investigator
- EC-Council: CND: Certified Network Defender
- Microsoft: Certified: Azure Security Engineer Associate
- Microsoft: Certified: Azure Solutions Architect Expert
- Microsoft: MCSA: Cloud Platform
- Microsoft: MCSA: Windows Server 2012
- Microsoft: MCSA: Windows Server 2016
- Microsoft: MCSE: Core Infrastructure
- Microsoft: MCSE: Productivity Solutions Expert
- Experience:
- Requires a minimum of seven (7) years of experience in telecommunications sector.
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Defense and Space Manufacturing
Referrals increase your chances of interviewing at V2X Inc by 2x
Sign in to set job alerts for “Information Assurance Specialist” roles.Kuwait City Metropolitan Area 7 hours ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrCOMSEC/EKMS Manager
Posted 5 days ago
Job Viewed
Job Description
Join to apply for the COMSEC/EKMS Manager role at GovCIO
1 week ago Be among the first 25 applicants
Join to apply for the COMSEC/EKMS Manager role at GovCIO
Overview
GovCIO is currently hiring for a COMSEC/EKMS Manager. These positions will be located in ASAB, Kuwait and PSAB, KSA. Positions will be onsite.
Responsibilities
- Correlate threat data from various sources to establish the identity and modus operandi of hackers active in client's networks and posing a potential threat.
- Provide assessments and reports to facilitate situational awareness and understanding of current cyber threats and adversaries.
- Develop cyber threat profiles based on geographic region, country, group, or individual actors.
- Produce cyber threat assessments based on entity threat analysis.
- Provide computer forensic and intrusion support for high technology investigations, including evidence seizure, forensic analysis, data recovery, and network assessments.
- Research and maintain proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding, network security, and encryption.
Locations:
- ASAB, Kuwait
- PSAB, KSA
- Pending contract award
Qualifications
- Clearance required: Secret Clearance
- High School diploma with 6 - 9 years (or equivalent experience)
- Lead-level experience in support of COMSEC keying material and systems, managing system databases, compiling system reports, and managing a DoD classified COMSEC