11 IT Security Roles jobs in Kuwait City
Senior Information Security Auditor
Posted 22 days ago
Job Viewed
Job Description
Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company
Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company
- Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
- Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
- Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
- Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
- Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
- Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
- Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
- Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
- Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
- Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
- Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
- Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
- Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
- Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
- Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
- Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
- Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
- Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
- Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
- Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
- Relevant University Degree in Information Security or Information Technology.
- Professional Qualifications in Information Security.
- Minimum 5 Years of Experience in IT audit or Information Security Audit.
- Have a Valid Transferrable Visa in Kuwait.
We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- TrainingSeniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Business Consulting and Services
Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x
Sign in to set job alerts for “Security Auditor” roles. Technical Solutions Consultant, Security (Arabic) Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrSenior Information Security Auditor
Posted 1 day ago
Job Viewed
Job Description
Senior Information Security Auditor
role at
Boubyan Consulting Company Join to apply for the
Senior Information Security Auditor
role at
Boubyan Consulting Company Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices. Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks. Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly. Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings. Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce. Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements. Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards. Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process. Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors. Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices. Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks. Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly. Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings. Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce. Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements. Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards. Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process. Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors. Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
Job Requirements
Relevant University Degree in Information Security or Information Technology. Professional Qualifications in Information Security. Minimum 5 Years of Experience in IT audit or Information Security Audit. Have a Valid Transferrable Visa in Kuwait.
About Boubyan Consulting
We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- Training Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries Business Consulting and Services Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x Sign in to set job alerts for “Security Auditor” roles.
Technical Solutions Consultant, Security (Arabic)
Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
IT Security Specialist – Information Security
Posted 8 days ago
Job Viewed
Job Description
Join to apply for the IT Security Specialist – Information Security role at KDD
Continue with Google Continue with Google
IT Security Specialist – Information SecurityJoin to apply for the IT Security Specialist – Information Security role at KDD
Job Duties Include But Are Not Limited To
We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team.
The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats.
- Identify and fix vulnerabilities within existing security systems.
- Develop organization-wide security measures.
- Document known security breaches and vulnerabilities.
- Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards.
- Monitor and analyze security events and incidents to identify and respond to potential threats promptly.
- Perform penetration tests to assess potential security problems.
- Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks.
- Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications.
- Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required.
- Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements.
- Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR).
- Establish relationships with external cybersecurity partners, vendors, and service providers.
- Plan incident response activities, including investigating security breaches and recommending corrective actions.
- Participate in the change management process.
- Education: Bachelor's degree in Computer Science, Information Systems, or a related field.
- Experience: 3 to 4 years of experience in an IT security role.
- Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels.
- Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills.
- Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines.
- Strategic Thinking: Ability to align solution deliverables with the organization's goals.
- Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems.
- Operating System Administration: Proficiency in securing Windows, Linux, and macOS.
- Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures.
- Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell.
- Encryption Techniques: Knowledge of implementing and managing encryption for data protection.
- Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware).
- Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Dairy Product Manufacturing
Referrals increase your chances of interviewing at KDD by 2x
Get notified about new Information Technology Security Specialist jobs in Farwaniya, Kuwait .
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrCAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate
Posted 15 days ago
Job Viewed
Job Description
Kuwait Position Type:
Full-time Description
As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will support the Army Network Enterprise Technology Command (NETCOM) on the DoDIN-A Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. You will be part of the CAC/PKI Registration Authority (LRA) operations team, responsible for token issuance, maintenance, and revocation for the Army. Requirements
Provide 24/7 On-Call and Emergency Response Respond to emergencies within two hours of notification Maintain an asset inventory of PKI equipment at all sites Support DoD Compliance Audits Address audit findings per DoD PKI policies Develop and maintain training packages Test PKI system software and token compatibility Verify subscriber identities and pre-register users Validate certificate requirements and handle revocations Support token issuance, renewal, and delivery of reports Complete requests for PIN resets, revocations, key recoveries, and token requests within specified timelines Submit activity and token reports monthly Prepare reports for NSA and HQDA Hold a Secret Security Clearance with Tier 5 background investigation Have 3+ years of experience in PKI and related fields Have never been relieved of trusted duties or had security clearance revoked Have never been convicted of a felony Complete RA/LRA training provided by DISA Preferred Qualifications
DoD Cyber Workforce Framework (DCWF 631) Security Developer Intermediate qualification or equivalent Physical Requirements
Sitting and standing for long periods Mobility within an office environment Stoop, kneel, crouch, crawl as needed Travel less than 10% QBE is an equal opportunity employer. All qualified applicants will receive consideration regardless of race, color, religion, sex, national origin, sexual orientation, gender identity/expression, age, disability, veteran status, genetic information, pregnancy, marital status, neurodivergence, ethnicity, caste, or military service.
#J-18808-Ljbffr
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior
Posted 15 days ago
Job Viewed
Job Description
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior Kuwait Full-time Description As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will provide services in support of the Army Network Enterprise Technology Command (NETCOM) on the Army Department of Defense Information Network (DoDIN-A) Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. As a member of the CAC/PKI Registration Authority (LRA) operations team, you will provide token issuance, sustainment, maintenance, and revocation to the Army customer. Requirements Highlights of Responsibilities: Provide 24/7 On-Call and Emergency Response Respond to emergency calls and arrive at the designated work site within two (2) hours after receiving the emergency call from the COR Provide leadership, supervision, and mentorship to the RA/LRA team, ensuring all responsibilities are executed in compliance with DoD PKI CPS and RPS requirements Provide RA support to the LRA personnel in creation of NIPRNET and SIPRNET PKI tokens Provide RA interface with the Trusted Agent (TA) for token request and distribution Maintain an asset inventory list of all PKI daily operations equipment by location at all RA/LRA sites Provide support for annual and semi-annual DoD Compliance Audits Support the Army CIO/G6 Cyber Security Directorate and the NETCOM G3/5 in addressing audit findings to include mitigation and correction of findings in accordance with DoD PKI CPS and RPS Develop and maintain On-the-Job Training packages Support test events of the global management PKI system software and token versions to assess backwards compatibility and interoperability Verify Subscriber’s identity Pre-register users with PKI Validate NPE certificate requirements and forward revocation requests Support issuance and renewal of SIPRNET tokens and/or NIPRNET Alternate Smart Card Logon Support production of and delivery of an Issuance Report detailing number of tokens issued, revoked, renewed, and any issues encountered Conduct duties as assigned through NSS/PKI RPS and DoD/PKI RA/LRA CPS Complete General Officer/Senior Executive Service requests within 12 hours of receipt Complete request for PIN reset, unlock code, revocation and re-issuance of a failed token CRI within 24 hours Complete request for key recoveries within 48 hours Complete new ASCL and NSS SIPRNET token request within 72 hours Submit a monthly RA Activity Report Submit a monthly Token Report of all tokens on hand to include returned and bad tokens Provide the weekly RA Backlog Report of any activities that fall outside the response timelines identified in the sections titled Response Time Prepare a monthly NSA Failed Token Report for HQDA to submit to NSA Program Manager Office Qualifications Secret Security Clearance with a completed Tier 5 (T5) background investigation 5+ years of experience Advanced operational expertise in Smart Tokens, PKI, Certificate Revocation, CAC Pin Reset, PKE, biometrics, logical and physical access, tactical PKI, and directory services Have never been previously relieved of trusted role duties for reasons of negligence or nonperformance of duties Have never been denied or had a security clearance revoked Have never been convicted of a felony offense Must complete RA/LRA training provided by DISA prior to receiving RA or LRA credentials Preferred Qualifications: DoD Cyber Workforce Framework (DCWF 631) Information Systems Security Developer Intermediate qualified (BS degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science or CSC or GCLD or CASP+ or CCSP or Cloud+ or GSEC) or equivalent certification Physical Requirements: Sitting for long periods Standing for long periods Ambulate throughout an office Stoop, kneel, crouch, or crawl as required Travel by land or air transportation 10% or less QBE is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender, gender-identity and/or expression, age, disability, Veteran status, genetic information, pregnancy (including childbirth, lactation, or other related medical conditions), marital-status, neurodivergence, ethnicity, ancestry, caste, military/uniformed service-member status, or any other characteristic protected by applicable federal, state, local, or international law.
#J-18808-Ljbffr
Cyber Security/System Engineer
Posted 22 days ago
Job Viewed
Job Description
Key Talent Partners is seeking a skilled Cyber Security/System Engineer to join our client team in Kuwait City. As a mid to senior-level engineer, you will be responsible for ensuring the security and stability of their systems and networks. This is a full-time position with on-site work required. If you are passionate about cyber security and have experience in system engineering, we encourage you to apply.
Responsibilities:
- Design, implement, and maintain security measures to protect computer systems, networks, and data
- Perform vulnerability assessments and penetration testing to identify and address potential security threats
- Develop and maintain disaster recovery plans and procedures
- Monitor network activity to identify and prevent security breaches
- Collaborate with cross-functional teams to ensure system and network stability and performance
Requirements:
- Bachelor’s Degree in Computer Science, IT, Electronics, or Systems Engineering
- Minimum of 10 years of experience in cyber security and system engineering
- Strong understanding of network protocols and security technologies
- Experience with firewalls, intrusion detection and prevention systems, and other security tools
- Knowledge of disaster recovery planning and procedures
- Excellent problem-solving and analytical skills
- Strong communication and collaboration skills
Advanced Cyber Security Architect
Posted 5 days ago
Job Viewed
Job Description
Advanced Cyber Security Architect
role at
Honeywell
Job Description
As an Advanced Cyber Sec Archt/Engr here at Honeywell, you will be responsible for leading the design and implementation of cutting-edge cybersecurity solutions. You will be hands-on in fortifying defenses against emerging threats and acting as the subject matter expert for technical challenges. You will collaborate with cross-functional teams, stay informed about emerging technologies, and foster a culture of continuous improvement.
In this role, you will impact our cybersecurity initiatives by protecting critical assets and information across industries, ensuring the security and resilience of businesses worldwide. You will drive technical excellence, lead incident response efforts, and conduct digital analysis. Your work will directly impact the safety and integrity of systems that power the modern world. Join us at Honeywell, where cybersecurity meets innovation, and together, we'll build a safer and more secure future.
Responsibilities
Design and implement advanced cybersecurity solutions to protect our digital infrastructure and sensitive data
Collaborate with cross-functional teams and senior leadership to develop and execute our cybersecurity strategy
Conduct risk assessments and vulnerability assessments to identify potential security threats and vulnerabilities
Develop and implement incident response plans to effectively respond to and mitigate cybersecurity incidents
Stay up-to-date with the latest cybersecurity trends, technologies, and best practices to continuously improve our security posture
Qualifications
YOU MUST HAVE
5+ years of experience in a cybersecurity leadership position
In-depth knowledge of cybersecurity technologies, frameworks, and best practices
Ability to lead direct and indirect reports by influence
WE VALUE
Bachelor’s or advanced degree in Cybersecurity, Computer Science, or related field
Relevant certifications such as CISSP, CISM, or GIAC are highly desirable
Demonstrated leadership skills and experience managing cybersecurity teams
About Us
Honeywell helps organizations solve complex challenges in automation, aviation, and energy transition. We provide innovative solutions through Aerospace Technologies, Building Automation, Energy and Sustainability, and Industrial Automation, powered by Honeywell Forge software, making the world smarter, safer, and more sustainable.
Seniority level Mid-Senior level
Employment type Full-time
Job function Engineering and Information Technology
Industries Appliances, Electrical, and Electronics Manufacturing
Referrals increase your chances of interviewing at Honeywell by 2x
Get notified about new Cyber Security Architect jobs in
Kuwait .
#J-18808-Ljbffr
Be The First To Know
About the latest It security roles Jobs in Kuwait City !
Cyber Security/System Engineer
Posted 15 days ago
Job Viewed
Job Description
Key Talent Partners is seeking a skilled Cyber Security/System Engineer to join our client team in Kuwait City. As a mid to senior-level engineer, you will be responsible for ensuring the security and stability of their systems and networks. This is a full-time position with on-site work required. If you are passionate about cyber security and have experience in system engineering, we encourage you to apply.
Responsibilities:
Design, implement, and maintain security measures to protect computer systems, networks, and data Perform vulnerability assessments and penetration testing to identify and address potential security threats Develop and maintain disaster recovery plans and procedures Monitor network activity to identify and prevent security breaches Collaborate with cross-functional teams to ensure system and network stability and performance
Requirements:
Bachelor’s Degree in Computer Science, IT, Electronics, or Systems Engineering Minimum of 10 years of experience in cyber security and system engineering Strong understanding of network protocols and security technologies Experience with firewalls, intrusion detection and prevention systems, and other security tools Knowledge of disaster recovery planning and procedures Excellent problem-solving and analytical skills Strong communication and collaboration skills
#J-18808-Ljbffr
Cyber Security - Govcio Llc
Posted today
Job Viewed
Job Description
GovCIO is currently hiring for a Cyber Security. This position will be located in ASAB, Kuwait, SAB, KSA and UDAB, UAE. Position is an onsite position.
**Responsibilities**:
Correlates threat data from various sources to establish the identity and modus operandi of hackers active in client's networks and posing a potential threat. Provides the customer with assessments and reports facilitating situational awareness and understanding of current cyber threats and adversaries. Develops cyber threat profiles based on geographic region, country, group, or individual actors. Produces cyber threat assessments based on entity threat analysis. May provide computer forensic and intrusion support to high technology investigations in the form of computer evidence seizure, computer forensic analysis, data recovery, and network assessments. Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption.
Location: ASAB, Kuwait
PSAB, KSA
UDAB, UAE
- pending contract award
ctss
Qualifications:
- High School with 6 - 9 years (or commensurate experience)
- Clearance required: Secret
- Meet certification requirement of DoD -M or the TO AND;
- Possess one or more certification from each of these groups:
- Group 1-Information Technology Certification Requirements: Microsoft Certified Solutions Expert (MCSE)-Microsoft Exchange/Windows Server or equivalent; Cisco Certified Network Associate; Cisco Certified Network Professional (CCNP);CompTIA Linux +; Linux Professional Institute Certification (LPIC); OR Red Hat Certified Engineer (RHCE);
- Group 2-IA Technology Certification Requirements: GIAC Certified Perimeter Protection Analyst (GPPA); CompTIA Cyber Security Analyst (CSA +); GIAC Certified Intrusion Analyst (GCIA); GIAC Certified Windows Security Administrator (GCWN); GIAC Certified UNIX Security Administrator (GCUX); GIAC Systems and Network Auditor (GSNA); GIAC Global Industrial Cyber Security Professional (GICSP); Global Information Assurance Certification (GIAC) Security Essentials Certification (GSEC); CompTIA Security +; Security Certified Network Professional (SCNP); Systems Security, Certified Practitioner (SSCP); GIAC Security Expert (GSE); Security Certified Network Architect (SCNA); Certification and Accreditation Professional (CAP); GIAC Information Security Fundamentals (GISF); GIAC Security Leadership Certification (GSLC); OR Certified Information Security Manager (CISM); AND Group 3-IAT Level III Requirements: Certified Information Security Auditor (CISA); GIAC Certified Incident Handler (GCIH); Certified Information System Security Professional (CISSP) or Associate; CompTIA Advanced Security Practitioner (CASP CE); Cisco Certified Network Professional (CCNP) - Security; GIAC Certified Enterprise Defender (GCED)
- Lead-level experience working with: tactical and strategic security issues of systems and networks, and associated requirements specific to deployed architecture; network security, network and systems intrusion detections, advanced devices, firewalls, and software specific to the Department of Defense; server operations including installation, configuration, optimization, and analyzing logs on Windows operating systems (including Server 2008/2012 and modern desktop versions); Cisco IOS, CAT OS, configuration of Cisco routers and switches; Server operations including installation, configuration, optimization, and analyzing logs on Unix operating systems (including Linux and Solaris)
- Expert in all functions of the IAT Level I and Level II positions as defined in DoD 8570
Company Overview:
GovCIO is a team of transformers-people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens.
But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer?
**We are an Equal Opportunity Employer.** All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets.
Posted Pay Range
The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hi
Faculty of Computer Science & Cyber Security
Posted 5 days ago
Job Viewed
Job Description
Join to apply for the
Faculty of Computer Science & Cyber Security
role at
IUK Faculty of Computer Science & Cyber Security
Join to apply for the
Faculty of Computer Science & Cyber Security
role at
IUK Get AI-powered advice on this job and more exclusive features. The International University of Science & Technology in Kuwait (IUK) is a newly established private university in Kuwait, with a new Campus located in the heart of Kuwait near the Avenues Mall. Fully accredited by the Private Universities Council (PUC), the University offers a wide range of academic programs in three Colleges; namely: College of Engineering, College of Business Administration, and College of Arts. In addition to the academic programs, the IUK has established the University Foundation Program (UFP) that offers English and Math foundation programs. The IUK is looking for dynamic full-time faculty members who are passionate about teaching, and contributing to the development of a vibrant and successful learning environment for students.
Position Summary
The College of Engineering invites applications for positions at the level of Assistant /Associate Professor in Cyber Security. In addition to and Computer Science & Cyber Security, the College offers several Bachelor’s programs in Engineering (Computer, Electrical, Industrial, Civil & Architectural, Architecture & Design, and Bio-Medical Engineering).
The Department of Computer Science & Cyber Security is seeking candidates for an assistant and associate professor position. The primary role of the faculty members is to promote high-quality teaching, research and creative work, university services, and to mentor junior colleagues. Besides, the candidate will collaborate with the Head of Department, Dean, and colleagues to achieve the Department's and College’s mission and vision, in line with the IUK’s vision, and support the department with academic and administrative services.
Reporting to the Department Chair, the successful candidate will be responsible for the development, delivery, and evaluation of a broad range of courses within Computer science and Cyber security such as ethical hacking and Industrial Control Systems (ICS) Security, to name a few. In addition to teaching, successful candidates are expected to maintain significant scholarly work and professional services. The successful candidate will contribute to developing an outcome-based student-focused curriculum.
In addition, faculty members are expected to maintain office hours, provide advisement for students, participate in curriculum development, and contribute to the university’s professional development activities.
Responsibilities
Teach different Computing and Cyber security courses according to his/her specialty and experience. Promote innovation in teaching by introducing new teaching methodologies and strategies. Engage with students in and out of the classroom. Promote research activities and other creative work at IUK including publishing in indexed peer-reviewed publications. Mentor new colleagues and teaching assistants Support the mission of the Department and College at the IUK by following the set curriculum and working towards achieving the program objectives and student learning outcomes. Follow the university bylaws and regulations and promote the institutional environment. Commit to teaching schedules, office hours, preparation, service, and professional development. Provide academic support to other colleagues in the department. Participate in the College's and the University's events and supporting collegiality. Support the College and the University in organizing seminars, international conferences, and faculty events. Serve in the College's and university's committees as needed.
Qualifications
A Ph.D. in a computing field with a dissertation (or intensive research/teaching) in Cyber Security. Professional certifications in Cyber Security
Experience
A minimum of three years of university teaching experience for Assistant professor and five years for associate professor at a university level. A proven research record, scholarly work, publications, and knowledge transfer. A minimum of three journal articles in peer-review indexed journals (ISI or Scopus) for Assistant professor and five years for associate professor. A proven experience in using different learning management systems and in adopting e-learning teaching strategies. An experience that proves an understanding of a multicultural academic environment, and understanding of students' needs, including those of special needs. An experience with various instructional methodologies.
Technical Skills
Excellent writing and interpersonal skills. Commitment to excellence in teaching and scholarship Computer, LMS, and e-learning skills Experience in course design based on OBE model is an asset.
Behavioral Skills
Strong interpersonal and problem-solving Skills Effective communication skills in English Team and time management skills A passion for teaching.
Seniority level
Seniority level Mid-Senior level Employment type
Employment type Other Job function
Job function Education and Training Industries Higher Education Referrals increase your chances of interviewing at IUK by 2x Sign in to set job alerts for “Professor of Computer Science” roles.
Faculty Positions- College of Engineering and Technology
Faculty Positions- College of Business Administration
Faculty Positions -Master’s holders- Engineering and Technology Department
Faculty of Architecture & Design Engineering
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr