47 Information Security jobs in Kuwait
Vulnerability Analyst I
Posted 3 days ago
Job Viewed
Job Description
Join to apply for the Vulnerability Analyst I role at V2X Inc .
Get AI-powered advice on this job and more exclusive features.
OverviewWorking across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Our $3.9B company and 16,000 employees work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties encompass conducting comprehensive assessments of systems, networks, and applications to identify and mitigate security risks. You will analyze vulnerabilities, assess their impact, and collaborate with teams to implement remediation plans, ensuring data confidentiality, integrity, and availability.
This position involves planning, coordinating, scanning, analyzing, and reporting on compliance of the DoDIN to Cybersecurity Services customers at the regional and theater level. The role offers company-paid housing and transportation, a completion bonus, and tuition reimbursement. Candidates must meet all host country requirements to work legally.
Responsibilities- Conduct security assessments and audits of the DoD SWA network.
- Develop and implement action plans for vulnerabilities and exposures.
- Create report templates for daily use to maintain a minimum 95% vulnerability compliance rating.
- Monitor security alerts and bulletins to respond rapidly to cybersecurity incidents.
- Coordinate with cybersecurity teams to detect exploits of vulnerabilities.
- Recommend improvements to cybersecurity posture.
- Communicate effectively with management and military personnel to disseminate information timely.
- Support vulnerability management systems (Tenable, Nessus, ACAS, TYCHON).
- Prepare vulnerability scanning reports for commanders and higher headquarters.
- Perform additional duties as required.
- Active Secret Security Clearance.
- Bachelor’s Degree in Computer Science, MIS, IS, Engineering, or related field, or equivalent experience.
- Adherence to DoD 8570.01M, maintaining at least one baseline and one CE certification (e.g., CISSP, CCNP Security, CASP+).
- Minimum of 7 years of experience in telecommunications sector.
V2X is committed to equal employment opportunity, fostering an inclusive workplace that respects diversity and promotes fairness, dignity, and innovation.
Additional Details- Seniority level: Mid-Senior level
- Employment type: Full-time
- Job function: Business Development and Sales
- Industries: Defense and Space Manufacturing
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate
Posted 3 days ago
Job Viewed
Job Description
All Jobs > CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate
Location: Kuwait
Position Type: Full-time
DescriptionAs a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will support the Army Network Enterprise Technology Command (NETCOM) on the DoDIN-A Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. You will be part of the CAC/PKI Registration Authority (LRA) operations team, responsible for token issuance, maintenance, and revocation for the Army.
Requirements- Provide 24/7 On-Call and Emergency Response
- Respond to emergencies within two hours of notification
- Maintain an asset inventory of PKI equipment at all sites
- Support DoD Compliance Audits
- Address audit findings per DoD PKI policies
- Develop and maintain training packages
- Test PKI system software and token compatibility
- Verify subscriber identities and pre-register users
- Validate certificate requirements and handle revocations
- Support token issuance, renewal, and delivery of reports
- Complete requests for PIN resets, revocations, key recoveries, and token requests within specified timelines
- Submit activity and token reports monthly
- Prepare reports for NSA and HQDA
- Hold a Secret Security Clearance with Tier 5 background investigation
- Have 3+ years of experience in PKI and related fields
- Have never been relieved of trusted duties or had security clearance revoked
- Have never been convicted of a felony
- Complete RA/LRA training provided by DISA
- DoD Cyber Workforce Framework (DCWF 631) Security Developer Intermediate qualification or equivalent
- Sitting and standing for long periods
- Mobility within an office environment
- Stoop, kneel, crouch, crawl as needed
- Travel less than 10%
QBE is an equal opportunity employer. All qualified applicants will receive consideration regardless of race, color, religion, sex, national origin, sexual orientation, gender identity/expression, age, disability, veteran status, genetic information, pregnancy, marital status, neurodivergence, ethnicity, caste, or military service.
#J-18808-LjbffrIT Security Specialist – Information Security
Posted 3 days ago
Job Viewed
Job Description
Job Duties Include But Are Not Limited To:
We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team.
The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats.
- Identify and fix vulnerabilities within existing security systems.
- Develop organization-wide security measures.
- Document known security breaches and vulnerabilities.
- Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards.
- Monitor and analyze security events and incidents to identify and respond to potential threats promptly.
- Perform penetration tests to assess potential security problems.
- Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks.
- Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications.
- Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required.
- Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements.
- Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR).
- Establish relationships with external cybersecurity partners, vendors, and service providers.
- Plan incident response activities, including investigating security breaches and recommending corrective actions.
- Participate in the change management process.
Required Qualification:
- Education: Bachelor's degree in Computer Science, Information Systems, or a related field.
- Experience: 3 to 4 years of experience in an IT security role.
- Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels.
- Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills.
- Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines.
- Strategic Thinking: Ability to align solution deliverables with the organization's goals.
Required Professional Skills:
- Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems.
- Operating System Administration: Proficiency in securing Windows, Linux, and macOS.
- Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures.
- Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell.
- Encryption Techniques: Knowledge of implementing and managing encryption for data protection.
- Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware).
- Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.
Senior Information Security Analyst
Posted 3 days ago
Job Viewed
Job Description
About the Role
The Senior Manager of Talent Acquisition and Development will oversee the recruitment and development processes within GIG Kuwait. The role involves strategic planning to attract, hire, and retain top talent, as well as implementing training and development programs to enhance employee skills and organizational growth.
Responsibilities
- Develop and execute talent acquisition strategies to meet organizational needs.
- Manage the recruitment process, including sourcing, interviewing, and onboarding new employees.
- Design and implement employee development and training programs.
- Collaborate with department heads to identify staffing needs and skill gaps.
- Maintain talent acquisition metrics and reporting.
- Ensure compliance with employment laws and regulations.
- Foster a positive work environment and company culture.
- Stay updated on industry trends in talent acquisition and development.
Qualifications
- Bachelor's degree in Human Resources, Business Administration, or related field.
- Proven experience in talent acquisition and employee development.
- Strong leadership and communication skills.
- Knowledge of HR software and applicant tracking systems.
Seniority Level
- Senior management
Employment Type
- Full-time
Job Function
- Human Resources / Talent Acquisition
Network Security Engineer - Senior / Intermediate
Posted 3 days ago
Job Viewed
Job Description
Join to apply for the Network Security Engineer - Senior / Intermediate role at DTS Solution - A Beyon Cyber Company .
Get AI-powered advice on this job and more exclusive features.
- Please ONLY apply if you are based in Kuwait, Bahrain, or UAE with a valid driving license.
- Resume MUST be specific to IT network security experience and NOT Cisco routing & switching.
- Please mention “FGTPANSEC” in the subject line for resume acceptance.
- Position based in UAE and Kuwait but may require travel to GCC countries for short-term projects.
The role involves managing the complete post-sales project lifecycle for network and security solutions, including design, audit, implementation, deployment, and review. The ideal candidate will have 5+ years of experience.
Our clients include Government, Enterprise, Telecom Providers, Oil & Gas sectors. As part of DTS, you will engage, learn, and collaborate on various solutions.
Responsibilities- Design and plan solutions to meet business and project needs.
- Participate in design exercises impacting projects.
- Work directly with customers to understand requirements.
- Lead presentations to clients confidently.
- Assist SOC teams with fault diagnosis procedures.
- Prepare HLD, LLD, and migration documentation.
- Perform compliance checks and audit configurations of firewalls, routers, and switches.
- Analyze and troubleshoot security hardware and software.
- Work after hours as needed.
- Collaborate with team members.
- Maintain technical documentation.
- Develop network metrics and performance baselines.
- Expertise in Cisco ASA, ForcePoint, and WAF technology.
- Experience with IPSec, SSL VPN, Sandboxing, Proxy, NAT, syslog, DNS, NAC, and cloud platforms (AWS/Azure).
- Knowledge of Data Center topology, routing, switching, MPLS, Load-balancer, and SDN.
- Languages: Primary English; Urdu/Hindi and Arabic preferred.
- Valid certifications in Fortinet and Palo Alto Networks solutions.
Send your CV to .
Additional Details- Seniority level: Mid-Senior level
- Employment type: Full-time
- Job function: IT
- Industry: Network Security
Referrals can double your chances of interview success. Set job alerts for "Senior Network Security Engineer" roles.
#J-18808-LjbffrVulnerability Analyst I
Posted 3 days ago
Job Viewed
Job Description
Overview Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism. As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties would encompass a wide range of responsibilities aimed at ensuring the security and integrity of sensitive information and systems. Vulnerability Analysts conduct comprehensive assessments of computing systems, networks, and applications to identify and mitigate potential security risks. While leveraging cybersecurity methodologies, analysts analyze vulnerabilities, assess their impact, and collaborate with cross-functional teams to implement effective remediation plans of action with milestones. Seeks to protect and defend information and information systems by ensuring data confidentiality and integrity with non-repudiation, authentication, and availability of data and technology through assessments of control frameworks. Vulnerability Analysts strategically plan, coordinate, scan, analyze, and report compliance of the Department of Defense Information Network (DoDIN) to its Cybersecurity Services customers on the SWA regional and theater level. Program: OMDAC-SWACA This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program! You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position. Responsibilities Conduct regular security assessments and audits of information systems with the DoD SWA network. Develop and implement action plans to manage common vulnerabilities and exposures. Design report templates for daily use and distribution to customers and subordinate personnel to maintain at minimum a 95% overall vulnerability compliancy rating. Monitor Information Assurance Security Alerts & Bulletins to detect and ensure rapid initial response to any cybersecurity related incident or event that could cause harm to the SWA AOR of the DoDIN. Maintain cross-communication with other cybersecurity division (e.g. IDS/IPS & ArcSight) to discover attempts to exploit known and zero-day vulnerabilities. Recommend improvements to the overall cybersecurity posture. Possess the ability to communicate effectively with management and upper echelon military personnel to ensure information is disseminated timely and efficiently. Maintain working knowledge of vulnerability management systems (Tenable & Nessus) Provides technical and operational support to functional end users of vulnerability tools (e.g. Assured Compliance Assessment Solution) ACAS and TYCHON. Prepares vulnerability scanning reports to submit to commanders and higher headquarters. Interfaces with the IAVM Manager and ISSO regarding vulnerability and remediation issues. Additional requirements may vary depending upon location. Perform any additional duties as required/assigned. Qualifications Qualifications Security Clearance: Requires an active Secret Clearance Education / Certifications: One-year related experience can be substituted for one year of education if the degree is required. Bachelor s Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field. This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification. The authorized certifications for this job title are listed as follows: IAT Level: IT II / IAT III BASELINE: Cisco: CCNP: Certified Network Professional - Security CompTIA: CASP+ ce: Advanced Security Practitioner GIAC: GCED: Certified Enterprise Defender GIAC: GCIH: Certified Incident Handler ISACA: CISA: Certified Information Systems Auditor ISC2: CCSP: Certified Cloud Security Professional ISC2: CISSP (or Associate): Certified Information Systems Security Professional ISC2: CCSP: Certified Cloud Security Professional COMPUTING ENVIRONMENT (CE): Cisco: CCIE: Certified Internetwork Expert (Any) Cisco: CCNP: Certified Network Professional (Any) EC Council: CEH: Certified Ethical Hacker EC Council: ECIH: Certified Incident Handler EC-Council: CHFI: Certified Hacking Forensic Investigator EC-Council: CND: Certified Network Defender GIAC: GCIH: Certified Incident Handler Microsoft: 365 Certified: Enterprise Administrator Expert Microsoft: Certified: Azure Associate (Any) Microsoft: Certified: Azure Expert (Any) Microsoft: MCSE: (Any above 2012) Red Hat: RHCA: Certified Architect Red Hat: RHCE: Certified Engineer Red Hat: RHSA: Certified Systems Administrator Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Software Engineering or Business Information Systems discipline for three years general experience. Requires a minimum of seven (7) years of experience in telecommunications sector. We are committed to an inclusive and diverse workplace that values and supports the contributions of each individual. This commitment along with our common Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation and expand our success in the global marketplace. Vectrus is an Equal Opportunity /Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, national origin, protected veteran status or status as an individual with a disability. EOE/Minority/Female/Disabled/Veteran.
Company Industry
- Facilities Management
Department / Functional Area
- IT Software
Keywords
- Vulnerability Analyst I
Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at
People Looking for Vulnerability Analyst I Jobs also searched #J-18808-LjbffrBe The First To Know
About the latest Information security Jobs in Kuwait !
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior
Posted 3 days ago
Job Viewed
Job Description
All Jobs > CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior
Kuwait
Full-time
Description
As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will provide services in support of the Army Network Enterprise Technology Command (NETCOM) on the Army Department of Defense Information Network (DoDIN-A) Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. As a member of the CAC/PKI Registration Authority (LRA) operations team, you will provide token issuance, sustainment, maintenance, and revocation to the Army customer.
Requirements
Highlights of Responsibilities:
- Provide 24/7 On-Call and Emergency Response
- Respond to emergency calls and arrive at the designated work site within two (2) hours after receiving the emergency call from the COR
- Provide leadership, supervision, and mentorship to the RA/LRA team, ensuring all responsibilities are executed in compliance with DoD PKI CPS and RPS requirements
- Provide RA support to the LRA personnel in creation of NIPRNET and SIPRNET PKI tokens
- Provide RA interface with the Trusted Agent (TA) for token request and distribution
- Maintain an asset inventory list of all PKI daily operations equipment by location at all RA/LRA sites
- Provide support for annual and semi-annual DoD Compliance Audits
- Support the Army CIO/G6 Cyber Security Directorate and the NETCOM G3/5 in addressing audit findings to include mitigation and correction of findings in accordance with DoD PKI CPS and RPS
- Develop and maintain On-the-Job Training packages
- Support test events of the global management PKI system software and token versions to assess backwards compatibility and interoperability
- Verify Subscriber’s identity
- Pre-register users with PKI
- Validate NPE certificate requirements and forward revocation requests
- Support issuance and renewal of SIPRNET tokens and/or NIPRNET Alternate Smart Card Logon
- Support production of and delivery of an Issuance Report detailing number of tokens issued, revoked, renewed, and any issues encountered
- Conduct duties as assigned through NSS/PKI RPS and DoD/PKI RA/LRA CPS
- Complete General Officer/Senior Executive Service requests within 12 hours of receipt
- Complete request for PIN reset, unlock code, revocation and re-issuance of a failed token CRI within 24 hours
- Complete request for key recoveries within 48 hours
- Complete new ASCL and NSS SIPRNET token request within 72 hours
- Submit a monthly RA Activity Report
- Submit a monthly Token Report of all tokens on hand to include returned and bad tokens
- Provide the weekly RA Backlog Report of any activities that fall outside the response timelines identified in the sections titled Response Time
- Prepare a monthly NSA Failed Token Report for HQDA to submit to NSA Program Manager Office
Qualifications
- Secret Security Clearance with a completed Tier 5 (T5) background investigation
- 5+ years of experience
- Advanced operational expertise in Smart Tokens, PKI, Certificate Revocation, CAC Pin Reset, PKE, biometrics, logical and physical access, tactical PKI, and directory services
- Have never been previously relieved of trusted role duties for reasons of negligence or nonperformance of duties
- Have never been denied or had a security clearance revoked
- Have never been convicted of a felony offense
- Must complete RA/LRA training provided by DISA prior to receiving RA or LRA credentials
Preferred Qualifications:
- DoD Cyber Workforce Framework (DCWF 631) Information Systems Security Developer Intermediate qualified (BS degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science or CSC or GCLD or CASP+ or CCSP or Cloud+ or GSEC) or equivalent certification
Physical Requirements:
- Sitting for long periods
- Standing for long periods
- Ambulate throughout an office
- Stoop, kneel, crouch, or crawl as required
- Travel by land or air transportation 10% or less
QBE is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender, gender-identity and/or expression, age, disability, Veteran status, genetic information, pregnancy (including childbirth, lactation, or other related medical conditions), marital-status, neurodivergence, ethnicity, ancestry, caste, military/uniformed service-member status, or any other characteristic protected by applicable federal, state, local, or international law.
#J-18808-LjbffrSenior Associate - Cyber Security and IT Auditor
Posted 10 days ago
Job Viewed
Job Description
Senior Associate - Cyber Security and IT Auditor
Senior Associate - Cyber Security and IT AuditorLevel: Experienced
Job Description : Conducting cyber security consulting jobs, performing vulnerability assessment and Pen testing, IT audits, assessing risks, and ensuring compliance with industry standards. This role involves working with a diverse team to enhance our organization's security posture and protect sensitive information.
Location : Kuwait
Key Responsibilities :
- Conduct comprehensive IT and cyber security audits to evaluate the effectiveness of controls.
- Support compliance efforts related to regulations and standards such as ISO, NIST, GDPR, etc.
- Identify vulnerabilities and provide practical recommendations to mitigate risks.
- Collaborate with IT teams to ensure audit recommendations are implemented.
- Assist in the development of IT audit plans, programs, and reports.
- Stay updated with the latest industry trends, threats, and advancements in cyber security.
Qualifications :
- Bachelor’s degree in Information Technology, Cyber Security, or a related field.
- 2-4 years of experience in IT auditing, cyber security, or a related role.
- Professional certifications such as CISA, CISSP, or equivalent are highly desirable.
- Strong understanding of IT audit principles, practices, and tools.
- Familiarity with security frameworks and regulatory requirements.
- Excellent analytical, problem-solving, and communication skills.
- Ability to work independently and as part of a team.
Only candidates in Kuwait with relevant experience will be contacted.
Contact details:
IT Security Specialist – Information Security
Posted 17 days ago
Job Viewed
Job Description
Join to apply for the IT Security Specialist – Information Security role at KDD
Continue with Google Continue with Google
IT Security Specialist – Information SecurityJoin to apply for the IT Security Specialist – Information Security role at KDD
Job Duties Include But Are Not Limited To
We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team.
The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats.
- Identify and fix vulnerabilities within existing security systems.
- Develop organization-wide security measures.
- Document known security breaches and vulnerabilities.
- Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards.
- Monitor and analyze security events and incidents to identify and respond to potential threats promptly.
- Perform penetration tests to assess potential security problems.
- Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks.
- Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications.
- Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required.
- Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements.
- Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR).
- Establish relationships with external cybersecurity partners, vendors, and service providers.
- Plan incident response activities, including investigating security breaches and recommending corrective actions.
- Participate in the change management process.
- Education: Bachelor's degree in Computer Science, Information Systems, or a related field.
- Experience: 3 to 4 years of experience in an IT security role.
- Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels.
- Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills.
- Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines.
- Strategic Thinking: Ability to align solution deliverables with the organization's goals.
- Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems.
- Operating System Administration: Proficiency in securing Windows, Linux, and macOS.
- Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures.
- Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell.
- Encryption Techniques: Knowledge of implementing and managing encryption for data protection.
- Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware).
- Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Dairy Product Manufacturing
Referrals increase your chances of interviewing at KDD by 2x
Get notified about new Information Technology Security Specialist jobs in Farwaniya, Kuwait .
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr