14 Intrusion Detection jobs in Kuwait
Senior Network/Security Engineer
Job Viewed
Job Description
is seeking a highly skilled and motivated “ Senior Security/Network Engineer ” to join our dynamic team. As a key member in the team, you will be responsible for designing, implementing, and maintaining robust security measures and network infrastructure to protect our organization's as well as our valued clients’ critical assets. Responsibilities: Implement company policies and procedures and follow the set procedures to achieve the company’s objectives. Implement, troubleshoot and maintain network infrastructure, including routers, switches and firewalls. External Projects (Network/Security/IP telephony/Wireless) – Designing, Implementation, maintenance and support including hardware/software Conduct vulnerability assessments and penetration testing to identify security weaknesses and implement corrective measures. Testing different solutions for corporate customer’s Network/Hardware requirement and provide inputs. Installation, maintenance, administration and troubleshooting Access Layer Monitor network performance and troubleshoot issues. Qualifications: Bachelor's Degree in Engineering, Computer Science, Information Technology, or a related field. Over 3 years of experience in network engineering and security. Proficiency in NAC, NDR, and EDR technologies. Strong project management skills; ability to manage multiple tasks/projects. Strong knowledge of networking protocols (TCP/IP, IPv6, VLANs, routing protocols). Expertise in network security technologies (firewalls, VPNs, IDS/IPS). Experience with network monitoring tools and troubleshooting techniques. Excellent problem-solving and analytical skills. Ability to work independently and as part of a team. Strong communication and interpersonal skills. Interested candidates can apply via LinkedIn or send their resume to
Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries Telecommunications Referrals increase your chances of interviewing at B. Online KW by 2x We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Job No Longer Available
This position is no longer listed on WhatJobs. The employer may be reviewing applications, filled the role, or has removed the listing.
However, we have similar jobs available for you below.
Senior Information Security Analyst
Posted 3 days ago
Job Viewed
Job Description
About the Role
The Senior Manager of Talent Acquisition and Development will oversee the recruitment and development processes within GIG Kuwait. The role involves strategic planning to attract, hire, and retain top talent, as well as implementing training and development programs to enhance employee skills and organizational growth.
Responsibilities
- Develop and execute talent acquisition strategies to meet organizational needs.
- Manage the recruitment process, including sourcing, interviewing, and onboarding new employees.
- Design and implement employee development and training programs.
- Collaborate with department heads to identify staffing needs and skill gaps.
- Maintain talent acquisition metrics and reporting.
- Ensure compliance with employment laws and regulations.
- Foster a positive work environment and company culture.
- Stay updated on industry trends in talent acquisition and development.
Qualifications
- Bachelor's degree in Human Resources, Business Administration, or related field.
- Proven experience in talent acquisition and employee development.
- Strong leadership and communication skills.
- Knowledge of HR software and applicant tracking systems.
Seniority Level
- Senior management
Employment Type
- Full-time
Job Function
- Human Resources / Talent Acquisition
Senior Information Security Analyst
Posted 24 days ago
Job Viewed
Job Description
The Senior Manager of Talent Acquisition and Development will oversee the recruitment and development processes within GIG Kuwait. The role involves strategic planning to attract, hire, and retain top talent, as well as implementing training and development programs to enhance employee skills and organizational growth.
Responsibilities
Develop and execute talent acquisition strategies to meet organizational needs.
Manage the recruitment process, including sourcing, interviewing, and onboarding new employees.
Design and implement employee development and training programs.
Collaborate with department heads to identify staffing needs and skill gaps.
Maintain talent acquisition metrics and reporting.
Ensure compliance with employment laws and regulations.
Foster a positive work environment and company culture.
Stay updated on industry trends in talent acquisition and development.
Qualifications
Bachelor's degree in Human Resources, Business Administration, or related field.
Proven experience in talent acquisition and employee development.
Strong leadership and communication skills.
Knowledge of HR software and applicant tracking systems.
Seniority Level
Senior management
Employment Type
Full-time
Job Function
Human Resources / Talent Acquisition
#J-18808-Ljbffr
Senior Information Security Auditor
Posted 3 days ago
Job Viewed
Job Description
Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company
Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company
- Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
- Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
- Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
- Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
- Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
- Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
- Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
- Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
- Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
- Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
- Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
- Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
- Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
- Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
- Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
- Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
- Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
- Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
- Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
- Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
- Relevant University Degree in Information Security or Information Technology.
- Professional Qualifications in Information Security.
- Minimum 5 Years of Experience in IT audit or Information Security Audit.
- Have a Valid Transferrable Visa in Kuwait.
We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- TrainingSeniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Business Consulting and Services
Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x
Sign in to set job alerts for “Security Auditor” roles. Technical Solutions Consultant, Security (Arabic) Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrSenior Information Security Auditor
Posted 9 days ago
Job Viewed
Job Description
Senior Information Security Auditor
role at
Boubyan Consulting Company Join to apply for the
Senior Information Security Auditor
role at
Boubyan Consulting Company Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices. Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks. Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly. Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings. Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce. Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements. Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards. Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process. Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors. Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices. Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks. Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly. Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings. Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce. Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements. Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards. Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process. Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors. Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
Job Requirements
Relevant University Degree in Information Security or Information Technology. Professional Qualifications in Information Security. Minimum 5 Years of Experience in IT audit or Information Security Audit. Have a Valid Transferrable Visa in Kuwait.
About Boubyan Consulting
We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- Training Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries Business Consulting and Services Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x Sign in to set job alerts for “Security Auditor” roles.
Technical Solutions Consultant, Security (Arabic)
Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
IT Security Specialist – Information Security
Posted 3 days ago
Job Viewed
Job Description
Job Duties Include But Are Not Limited To:
We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team.
The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats.
- Identify and fix vulnerabilities within existing security systems.
- Develop organization-wide security measures.
- Document known security breaches and vulnerabilities.
- Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards.
- Monitor and analyze security events and incidents to identify and respond to potential threats promptly.
- Perform penetration tests to assess potential security problems.
- Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks.
- Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications.
- Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required.
- Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements.
- Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR).
- Establish relationships with external cybersecurity partners, vendors, and service providers.
- Plan incident response activities, including investigating security breaches and recommending corrective actions.
- Participate in the change management process.
Required Qualification:
- Education: Bachelor's degree in Computer Science, Information Systems, or a related field.
- Experience: 3 to 4 years of experience in an IT security role.
- Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels.
- Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills.
- Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines.
- Strategic Thinking: Ability to align solution deliverables with the organization's goals.
Required Professional Skills:
- Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems.
- Operating System Administration: Proficiency in securing Windows, Linux, and macOS.
- Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures.
- Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell.
- Encryption Techniques: Knowledge of implementing and managing encryption for data protection.
- Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware).
- Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.
IT Security Specialist – Information Security
Posted 17 days ago
Job Viewed
Job Description
Join to apply for the IT Security Specialist – Information Security role at KDD
Continue with Google Continue with Google
IT Security Specialist – Information SecurityJoin to apply for the IT Security Specialist – Information Security role at KDD
Job Duties Include But Are Not Limited To
We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team.
The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats.
- Identify and fix vulnerabilities within existing security systems.
- Develop organization-wide security measures.
- Document known security breaches and vulnerabilities.
- Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards.
- Monitor and analyze security events and incidents to identify and respond to potential threats promptly.
- Perform penetration tests to assess potential security problems.
- Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks.
- Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications.
- Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required.
- Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements.
- Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR).
- Establish relationships with external cybersecurity partners, vendors, and service providers.
- Plan incident response activities, including investigating security breaches and recommending corrective actions.
- Participate in the change management process.
- Education: Bachelor's degree in Computer Science, Information Systems, or a related field.
- Experience: 3 to 4 years of experience in an IT security role.
- Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels.
- Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills.
- Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines.
- Strategic Thinking: Ability to align solution deliverables with the organization's goals.
- Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems.
- Operating System Administration: Proficiency in securing Windows, Linux, and macOS.
- Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures.
- Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell.
- Encryption Techniques: Knowledge of implementing and managing encryption for data protection.
- Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware).
- Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Dairy Product Manufacturing
Referrals increase your chances of interviewing at KDD by 2x
Get notified about new Information Technology Security Specialist jobs in Farwaniya, Kuwait .
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrIT Security Specialist – Information Security
Posted 16 days ago
Job Viewed
Job Description
Join to apply for the
IT Security Specialist – Information Security
role at
KDD Continue with Google Continue with Google IT Security Specialist – Information Security
Join to apply for the
IT Security Specialist – Information Security
role at
KDD Job Duties Include But Are Not Limited To
We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team.
The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats.
Identify and fix vulnerabilities within existing security systems. Develop organization-wide security measures. Document known security breaches and vulnerabilities. Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards. Monitor and analyze security events and incidents to identify and respond to potential threats promptly. Perform penetration tests to assess potential security problems. Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks. Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications. Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required. Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements. Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR). Establish relationships with external cybersecurity partners, vendors, and service providers. Plan incident response activities, including investigating security breaches and recommending corrective actions. Participate in the change management process.
Required Qualification
Education: Bachelor's degree in Computer Science, Information Systems, or a related field. Experience: 3 to 4 years of experience in an IT security role. Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels. Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills. Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines. Strategic Thinking: Ability to align solution deliverables with the organization's goals.
Required Professional Skills
Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems. Operating System Administration: Proficiency in securing Windows, Linux, and macOS. Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures. Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell. Encryption Techniques: Knowledge of implementing and managing encryption for data protection. Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware). Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.
Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries Dairy Product Manufacturing Referrals increase your chances of interviewing at KDD by 2x Get notified about new Information Technology Security Specialist jobs in
Farwaniya, Kuwait . We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Be The First To Know
About the latest Intrusion detection Jobs in Kuwait !
IT Security Specialist – Information Security
Posted 22 days ago
Job Viewed
Job Description
#J-18808-Ljbffr
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate
Posted 3 days ago
Job Viewed
Job Description
All Jobs > CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate
Location: Kuwait
Position Type: Full-time
DescriptionAs a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will support the Army Network Enterprise Technology Command (NETCOM) on the DoDIN-A Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. You will be part of the CAC/PKI Registration Authority (LRA) operations team, responsible for token issuance, maintenance, and revocation for the Army.
Requirements- Provide 24/7 On-Call and Emergency Response
- Respond to emergencies within two hours of notification
- Maintain an asset inventory of PKI equipment at all sites
- Support DoD Compliance Audits
- Address audit findings per DoD PKI policies
- Develop and maintain training packages
- Test PKI system software and token compatibility
- Verify subscriber identities and pre-register users
- Validate certificate requirements and handle revocations
- Support token issuance, renewal, and delivery of reports
- Complete requests for PIN resets, revocations, key recoveries, and token requests within specified timelines
- Submit activity and token reports monthly
- Prepare reports for NSA and HQDA
- Hold a Secret Security Clearance with Tier 5 background investigation
- Have 3+ years of experience in PKI and related fields
- Have never been relieved of trusted duties or had security clearance revoked
- Have never been convicted of a felony
- Complete RA/LRA training provided by DISA
- DoD Cyber Workforce Framework (DCWF 631) Security Developer Intermediate qualification or equivalent
- Sitting and standing for long periods
- Mobility within an office environment
- Stoop, kneel, crouch, crawl as needed
- Travel less than 10%
QBE is an equal opportunity employer. All qualified applicants will receive consideration regardless of race, color, religion, sex, national origin, sexual orientation, gender identity/expression, age, disability, veteran status, genetic information, pregnancy, marital status, neurodivergence, ethnicity, caste, or military service.
#J-18808-LjbffrCAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior
Posted 3 days ago
Job Viewed
Job Description
All Jobs > CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior
Kuwait
Full-time
Description
As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will provide services in support of the Army Network Enterprise Technology Command (NETCOM) on the Army Department of Defense Information Network (DoDIN-A) Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. As a member of the CAC/PKI Registration Authority (LRA) operations team, you will provide token issuance, sustainment, maintenance, and revocation to the Army customer.
Requirements
Highlights of Responsibilities:
- Provide 24/7 On-Call and Emergency Response
- Respond to emergency calls and arrive at the designated work site within two (2) hours after receiving the emergency call from the COR
- Provide leadership, supervision, and mentorship to the RA/LRA team, ensuring all responsibilities are executed in compliance with DoD PKI CPS and RPS requirements
- Provide RA support to the LRA personnel in creation of NIPRNET and SIPRNET PKI tokens
- Provide RA interface with the Trusted Agent (TA) for token request and distribution
- Maintain an asset inventory list of all PKI daily operations equipment by location at all RA/LRA sites
- Provide support for annual and semi-annual DoD Compliance Audits
- Support the Army CIO/G6 Cyber Security Directorate and the NETCOM G3/5 in addressing audit findings to include mitigation and correction of findings in accordance with DoD PKI CPS and RPS
- Develop and maintain On-the-Job Training packages
- Support test events of the global management PKI system software and token versions to assess backwards compatibility and interoperability
- Verify Subscriber’s identity
- Pre-register users with PKI
- Validate NPE certificate requirements and forward revocation requests
- Support issuance and renewal of SIPRNET tokens and/or NIPRNET Alternate Smart Card Logon
- Support production of and delivery of an Issuance Report detailing number of tokens issued, revoked, renewed, and any issues encountered
- Conduct duties as assigned through NSS/PKI RPS and DoD/PKI RA/LRA CPS
- Complete General Officer/Senior Executive Service requests within 12 hours of receipt
- Complete request for PIN reset, unlock code, revocation and re-issuance of a failed token CRI within 24 hours
- Complete request for key recoveries within 48 hours
- Complete new ASCL and NSS SIPRNET token request within 72 hours
- Submit a monthly RA Activity Report
- Submit a monthly Token Report of all tokens on hand to include returned and bad tokens
- Provide the weekly RA Backlog Report of any activities that fall outside the response timelines identified in the sections titled Response Time
- Prepare a monthly NSA Failed Token Report for HQDA to submit to NSA Program Manager Office
Qualifications
- Secret Security Clearance with a completed Tier 5 (T5) background investigation
- 5+ years of experience
- Advanced operational expertise in Smart Tokens, PKI, Certificate Revocation, CAC Pin Reset, PKE, biometrics, logical and physical access, tactical PKI, and directory services
- Have never been previously relieved of trusted role duties for reasons of negligence or nonperformance of duties
- Have never been denied or had a security clearance revoked
- Have never been convicted of a felony offense
- Must complete RA/LRA training provided by DISA prior to receiving RA or LRA credentials
Preferred Qualifications:
- DoD Cyber Workforce Framework (DCWF 631) Information Systems Security Developer Intermediate qualified (BS degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science or CSC or GCLD or CASP+ or CCSP or Cloud+ or GSEC) or equivalent certification
Physical Requirements:
- Sitting for long periods
- Standing for long periods
- Ambulate throughout an office
- Stoop, kneel, crouch, or crawl as required
- Travel by land or air transportation 10% or less
QBE is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender, gender-identity and/or expression, age, disability, Veteran status, genetic information, pregnancy (including childbirth, lactation, or other related medical conditions), marital-status, neurodivergence, ethnicity, ancestry, caste, military/uniformed service-member status, or any other characteristic protected by applicable federal, state, local, or international law.
#J-18808-Ljbffr