Senior Information Security Auditor

Kuwait City, Al Kuwayt Boubyan Consulting Company

Posted 22 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company

Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company

  • Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
  • Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
  • Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
  • Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
  • Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
  • Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
  • Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
  • Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
  • Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
  • Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.

  • Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
  • Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
  • Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
  • Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
  • Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
  • Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
  • Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
  • Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
  • Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
  • Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.

Job Requirements

  • Relevant University Degree in Information Security or Information Technology.
  • Professional Qualifications in Information Security.
  • Minimum 5 Years of Experience in IT audit or Information Security Audit.
  • Have a Valid Transferrable Visa in Kuwait.

About Boubyan Consulting

We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- TrainingSeniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Business Consulting and Services

Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x

Sign in to set job alerts for “Security Auditor” roles. Technical Solutions Consultant, Security (Arabic) Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Auditor

Kuwait City, Al Kuwayt Boubyan Consulting Company

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the

Senior Information Security Auditor

role at

Boubyan Consulting Company Join to apply for the

Senior Information Security Auditor

role at

Boubyan Consulting Company Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices. Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks. Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly. Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings. Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce. Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements. Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards. Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process. Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors. Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.

Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices. Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks. Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly. Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings. Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce. Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements. Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards. Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process. Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors. Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.

Job Requirements

Relevant University Degree in Information Security or Information Technology. Professional Qualifications in Information Security. Minimum 5 Years of Experience in IT audit or Information Security Audit. Have a Valid Transferrable Visa in Kuwait.

About Boubyan Consulting

We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- Training Seniority level

Seniority level Mid-Senior level Employment type

Employment type Full-time Job function

Job function Information Technology Industries Business Consulting and Services Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x Sign in to set job alerts for “Security Auditor” roles.

Technical Solutions Consultant, Security (Arabic)

Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

IT Security Specialist – Information Security

Farwaniya KDD

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

IT Security Specialist – Information Security

Join to apply for the IT Security Specialist – Information Security role at KDD

Continue with Google Continue with Google

IT Security Specialist – Information Security

Join to apply for the IT Security Specialist – Information Security role at KDD

Job Duties Include But Are Not Limited To

We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team.

The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats.

  • Identify and fix vulnerabilities within existing security systems.
  • Develop organization-wide security measures.
  • Document known security breaches and vulnerabilities.
  • Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards.
  • Monitor and analyze security events and incidents to identify and respond to potential threats promptly.
  • Perform penetration tests to assess potential security problems.
  • Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks.
  • Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications.
  • Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required.
  • Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements.
  • Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR).
  • Establish relationships with external cybersecurity partners, vendors, and service providers.
  • Plan incident response activities, including investigating security breaches and recommending corrective actions.
  • Participate in the change management process.

Required Qualification

  • Education: Bachelor's degree in Computer Science, Information Systems, or a related field.
  • Experience: 3 to 4 years of experience in an IT security role.
  • Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels.
  • Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills.
  • Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines.
  • Strategic Thinking: Ability to align solution deliverables with the organization's goals.

Required Professional Skills

  • Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems.
  • Operating System Administration: Proficiency in securing Windows, Linux, and macOS.
  • Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures.
  • Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell.
  • Encryption Techniques: Knowledge of implementing and managing encryption for data protection.
  • Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware).
  • Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Dairy Product Manufacturing

Referrals increase your chances of interviewing at KDD by 2x

Get notified about new Information Technology Security Specialist jobs in Farwaniya, Kuwait .

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate

Kuwait City, Al Kuwayt Qbe Llc

Posted 15 days ago

Job Viewed

Tap Again To Close

Job Description

All Jobs > CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate Location:

Kuwait Position Type:

Full-time Description

As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will support the Army Network Enterprise Technology Command (NETCOM) on the DoDIN-A Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. You will be part of the CAC/PKI Registration Authority (LRA) operations team, responsible for token issuance, maintenance, and revocation for the Army. Requirements

Provide 24/7 On-Call and Emergency Response Respond to emergencies within two hours of notification Maintain an asset inventory of PKI equipment at all sites Support DoD Compliance Audits Address audit findings per DoD PKI policies Develop and maintain training packages Test PKI system software and token compatibility Verify subscriber identities and pre-register users Validate certificate requirements and handle revocations Support token issuance, renewal, and delivery of reports Complete requests for PIN resets, revocations, key recoveries, and token requests within specified timelines Submit activity and token reports monthly Prepare reports for NSA and HQDA Hold a Secret Security Clearance with Tier 5 background investigation Have 3+ years of experience in PKI and related fields Have never been relieved of trusted duties or had security clearance revoked Have never been convicted of a felony Complete RA/LRA training provided by DISA Preferred Qualifications

DoD Cyber Workforce Framework (DCWF 631) Security Developer Intermediate qualification or equivalent Physical Requirements

Sitting and standing for long periods Mobility within an office environment Stoop, kneel, crouch, crawl as needed Travel less than 10% QBE is an equal opportunity employer. All qualified applicants will receive consideration regardless of race, color, religion, sex, national origin, sexual orientation, gender identity/expression, age, disability, veteran status, genetic information, pregnancy, marital status, neurodivergence, ethnicity, caste, or military service.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior

Kuwait City, Al Kuwayt Qbe Llc

Posted 15 days ago

Job Viewed

Tap Again To Close

Job Description

All Jobs > CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior

CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior Kuwait Full-time Description As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will provide services in support of the Army Network Enterprise Technology Command (NETCOM) on the Army Department of Defense Information Network (DoDIN-A) Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. As a member of the CAC/PKI Registration Authority (LRA) operations team, you will provide token issuance, sustainment, maintenance, and revocation to the Army customer. Requirements Highlights of Responsibilities: Provide 24/7 On-Call and Emergency Response Respond to emergency calls and arrive at the designated work site within two (2) hours after receiving the emergency call from the COR Provide leadership, supervision, and mentorship to the RA/LRA team, ensuring all responsibilities are executed in compliance with DoD PKI CPS and RPS requirements Provide RA support to the LRA personnel in creation of NIPRNET and SIPRNET PKI tokens Provide RA interface with the Trusted Agent (TA) for token request and distribution Maintain an asset inventory list of all PKI daily operations equipment by location at all RA/LRA sites Provide support for annual and semi-annual DoD Compliance Audits Support the Army CIO/G6 Cyber Security Directorate and the NETCOM G3/5 in addressing audit findings to include mitigation and correction of findings in accordance with DoD PKI CPS and RPS Develop and maintain On-the-Job Training packages Support test events of the global management PKI system software and token versions to assess backwards compatibility and interoperability Verify Subscriber’s identity Pre-register users with PKI Validate NPE certificate requirements and forward revocation requests Support issuance and renewal of SIPRNET tokens and/or NIPRNET Alternate Smart Card Logon Support production of and delivery of an Issuance Report detailing number of tokens issued, revoked, renewed, and any issues encountered Conduct duties as assigned through NSS/PKI RPS and DoD/PKI RA/LRA CPS Complete General Officer/Senior Executive Service requests within 12 hours of receipt Complete request for PIN reset, unlock code, revocation and re-issuance of a failed token CRI within 24 hours Complete request for key recoveries within 48 hours Complete new ASCL and NSS SIPRNET token request within 72 hours Submit a monthly RA Activity Report Submit a monthly Token Report of all tokens on hand to include returned and bad tokens Provide the weekly RA Backlog Report of any activities that fall outside the response timelines identified in the sections titled Response Time Prepare a monthly NSA Failed Token Report for HQDA to submit to NSA Program Manager Office Qualifications Secret Security Clearance with a completed Tier 5 (T5) background investigation 5+ years of experience Advanced operational expertise in Smart Tokens, PKI, Certificate Revocation, CAC Pin Reset, PKE, biometrics, logical and physical access, tactical PKI, and directory services Have never been previously relieved of trusted role duties for reasons of negligence or nonperformance of duties Have never been denied or had a security clearance revoked Have never been convicted of a felony offense Must complete RA/LRA training provided by DISA prior to receiving RA or LRA credentials Preferred Qualifications: DoD Cyber Workforce Framework (DCWF 631) Information Systems Security Developer Intermediate qualified (BS degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science or CSC or GCLD or CASP+ or CCSP or Cloud+ or GSEC) or equivalent certification Physical Requirements: Sitting for long periods Standing for long periods Ambulate throughout an office Stoop, kneel, crouch, or crawl as required Travel by land or air transportation 10% or less QBE is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender, gender-identity and/or expression, age, disability, Veteran status, genetic information, pregnancy (including childbirth, lactation, or other related medical conditions), marital-status, neurodivergence, ethnicity, ancestry, caste, military/uniformed service-member status, or any other characteristic protected by applicable federal, state, local, or international law.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security/System Engineer

Kuwait City, Al Kuwayt Recooty Inc.

Posted 22 days ago

Job Viewed

Tap Again To Close

Job Description

Description

Key Talent Partners is seeking a skilled Cyber Security/System Engineer to join our client team in Kuwait City. As a mid to senior-level engineer, you will be responsible for ensuring the security and stability of their systems and networks. This is a full-time position with on-site work required. If you are passionate about cyber security and have experience in system engineering, we encourage you to apply.



Responsibilities:

  • Design, implement, and maintain security measures to protect computer systems, networks, and data
  • Perform vulnerability assessments and penetration testing to identify and address potential security threats
  • Develop and maintain disaster recovery plans and procedures
  • Monitor network activity to identify and prevent security breaches
  • Collaborate with cross-functional teams to ensure system and network stability and performance


Requirements:

  • Bachelor’s Degree in Computer Science, IT, Electronics, or Systems Engineering
  • Minimum of 10 years of experience in cyber security and system engineering
  • Strong understanding of network protocols and security technologies
  • Experience with firewalls, intrusion detection and prevention systems, and other security tools
  • Knowledge of disaster recovery planning and procedures
  • Excellent problem-solving and analytical skills
  • Strong communication and collaboration skills
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Advanced Cyber Security Architect

Kuwait City, Al Kuwayt Honeywell

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the

Advanced Cyber Security Architect

role at

Honeywell

Job Description

As an Advanced Cyber Sec Archt/Engr here at Honeywell, you will be responsible for leading the design and implementation of cutting-edge cybersecurity solutions. You will be hands-on in fortifying defenses against emerging threats and acting as the subject matter expert for technical challenges. You will collaborate with cross-functional teams, stay informed about emerging technologies, and foster a culture of continuous improvement.

In this role, you will impact our cybersecurity initiatives by protecting critical assets and information across industries, ensuring the security and resilience of businesses worldwide. You will drive technical excellence, lead incident response efforts, and conduct digital analysis. Your work will directly impact the safety and integrity of systems that power the modern world. Join us at Honeywell, where cybersecurity meets innovation, and together, we'll build a safer and more secure future.

Responsibilities

Design and implement advanced cybersecurity solutions to protect our digital infrastructure and sensitive data

Collaborate with cross-functional teams and senior leadership to develop and execute our cybersecurity strategy

Conduct risk assessments and vulnerability assessments to identify potential security threats and vulnerabilities

Develop and implement incident response plans to effectively respond to and mitigate cybersecurity incidents

Stay up-to-date with the latest cybersecurity trends, technologies, and best practices to continuously improve our security posture

Qualifications

YOU MUST HAVE

5+ years of experience in a cybersecurity leadership position

In-depth knowledge of cybersecurity technologies, frameworks, and best practices

Ability to lead direct and indirect reports by influence

WE VALUE

Bachelor’s or advanced degree in Cybersecurity, Computer Science, or related field

Relevant certifications such as CISSP, CISM, or GIAC are highly desirable

Demonstrated leadership skills and experience managing cybersecurity teams

About Us

Honeywell helps organizations solve complex challenges in automation, aviation, and energy transition. We provide innovative solutions through Aerospace Technologies, Building Automation, Energy and Sustainability, and Industrial Automation, powered by Honeywell Forge software, making the world smarter, safer, and more sustainable.

Seniority level Mid-Senior level

Employment type Full-time

Job function Engineering and Information Technology

Industries Appliances, Electrical, and Electronics Manufacturing

Referrals increase your chances of interviewing at Honeywell by 2x

Get notified about new Cyber Security Architect jobs in

Kuwait .

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest It security roles Jobs in Kuwait City !

Cyber Security/System Engineer

Kuwait City, Al Kuwayt Recooty Inc.

Posted 15 days ago

Job Viewed

Tap Again To Close

Job Description

Description

Key Talent Partners is seeking a skilled Cyber Security/System Engineer to join our client team in Kuwait City. As a mid to senior-level engineer, you will be responsible for ensuring the security and stability of their systems and networks. This is a full-time position with on-site work required. If you are passionate about cyber security and have experience in system engineering, we encourage you to apply.

Responsibilities:

Design, implement, and maintain security measures to protect computer systems, networks, and data Perform vulnerability assessments and penetration testing to identify and address potential security threats Develop and maintain disaster recovery plans and procedures Monitor network activity to identify and prevent security breaches Collaborate with cross-functional teams to ensure system and network stability and performance

Requirements:

Bachelor’s Degree in Computer Science, IT, Electronics, or Systems Engineering Minimum of 10 years of experience in cyber security and system engineering Strong understanding of network protocols and security technologies Experience with firewalls, intrusion detection and prevention systems, and other security tools Knowledge of disaster recovery planning and procedures Excellent problem-solving and analytical skills Strong communication and collaboration skills

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security - Govcio Llc

Kuwait City, Al Kuwayt Talent Pal

Posted today

Job Viewed

Tap Again To Close

Job Description

Overview:
GovCIO is currently hiring for a Cyber Security. This position will be located in ASAB, Kuwait, SAB, KSA and UDAB, UAE. Position is an onsite position.

**Responsibilities**:
Correlates threat data from various sources to establish the identity and modus operandi of hackers active in client's networks and posing a potential threat. Provides the customer with assessments and reports facilitating situational awareness and understanding of current cyber threats and adversaries. Develops cyber threat profiles based on geographic region, country, group, or individual actors. Produces cyber threat assessments based on entity threat analysis. May provide computer forensic and intrusion support to high technology investigations in the form of computer evidence seizure, computer forensic analysis, data recovery, and network assessments. Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption.

Location: ASAB, Kuwait

PSAB, KSA
UDAB, UAE
- pending contract award

ctss

Qualifications:

- High School with 6 - 9 years (or commensurate experience)
- Clearance required: Secret
- Meet certification requirement of DoD -M or the TO AND;
- Possess one or more certification from each of these groups:

- Group 1-Information Technology Certification Requirements: Microsoft Certified Solutions Expert (MCSE)-Microsoft Exchange/Windows Server or equivalent; Cisco Certified Network Associate; Cisco Certified Network Professional (CCNP);CompTIA Linux +; Linux Professional Institute Certification (LPIC); OR Red Hat Certified Engineer (RHCE);
- Group 2-IA Technology Certification Requirements: GIAC Certified Perimeter Protection Analyst (GPPA); CompTIA Cyber Security Analyst (CSA +); GIAC Certified Intrusion Analyst (GCIA); GIAC Certified Windows Security Administrator (GCWN); GIAC Certified UNIX Security Administrator (GCUX); GIAC Systems and Network Auditor (GSNA); GIAC Global Industrial Cyber Security Professional (GICSP); Global Information Assurance Certification (GIAC) Security Essentials Certification (GSEC); CompTIA Security +; Security Certified Network Professional (SCNP); Systems Security, Certified Practitioner (SSCP); GIAC Security Expert (GSE); Security Certified Network Architect (SCNA); Certification and Accreditation Professional (CAP); GIAC Information Security Fundamentals (GISF); GIAC Security Leadership Certification (GSLC); OR Certified Information Security Manager (CISM); AND Group 3-IAT Level III Requirements: Certified Information Security Auditor (CISA); GIAC Certified Incident Handler (GCIH); Certified Information System Security Professional (CISSP) or Associate; CompTIA Advanced Security Practitioner (CASP CE); Cisco Certified Network Professional (CCNP) - Security; GIAC Certified Enterprise Defender (GCED)
- Lead-level experience working with: tactical and strategic security issues of systems and networks, and associated requirements specific to deployed architecture; network security, network and systems intrusion detections, advanced devices, firewalls, and software specific to the Department of Defense; server operations including installation, configuration, optimization, and analyzing logs on Windows operating systems (including Server 2008/2012 and modern desktop versions); Cisco IOS, CAT OS, configuration of Cisco routers and switches; Server operations including installation, configuration, optimization, and analyzing logs on Unix operating systems (including Linux and Solaris)
- Expert in all functions of the IAT Level I and Level II positions as defined in DoD 8570

Company Overview:
GovCIO is a team of transformers-people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens.
But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer?
**We are an Equal Opportunity Employer.** All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets.

Posted Pay Range

The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hi
This advertiser has chosen not to accept applicants from your region.

Faculty of Computer Science & Cyber Security

Kuwait City, Al Kuwayt IUK

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

Faculty of Computer Science & Cyber Security

Join to apply for the

Faculty of Computer Science & Cyber Security

role at

IUK Faculty of Computer Science & Cyber Security

Join to apply for the

Faculty of Computer Science & Cyber Security

role at

IUK Get AI-powered advice on this job and more exclusive features. The International University of Science & Technology in Kuwait (IUK) is a newly established private university in Kuwait, with a new Campus located in the heart of Kuwait near the Avenues Mall. Fully accredited by the Private Universities Council (PUC), the University offers a wide range of academic programs in three Colleges; namely: College of Engineering, College of Business Administration, and College of Arts. In addition to the academic programs, the IUK has established the University Foundation Program (UFP) that offers English and Math foundation programs. The IUK is looking for dynamic full-time faculty members who are passionate about teaching, and contributing to the development of a vibrant and successful learning environment for students.

Position Summary

The College of Engineering invites applications for positions at the level of Assistant /Associate Professor in Cyber Security. In addition to and Computer Science & Cyber Security, the College offers several Bachelor’s programs in Engineering (Computer, Electrical, Industrial, Civil & Architectural, Architecture & Design, and Bio-Medical Engineering).

The Department of Computer Science & Cyber Security is seeking candidates for an assistant and associate professor position. The primary role of the faculty members is to promote high-quality teaching, research and creative work, university services, and to mentor junior colleagues. Besides, the candidate will collaborate with the Head of Department, Dean, and colleagues to achieve the Department's and College’s mission and vision, in line with the IUK’s vision, and support the department with academic and administrative services.

Reporting to the Department Chair, the successful candidate will be responsible for the development, delivery, and evaluation of a broad range of courses within Computer science and Cyber security such as ethical hacking and Industrial Control Systems (ICS) Security, to name a few. In addition to teaching, successful candidates are expected to maintain significant scholarly work and professional services. The successful candidate will contribute to developing an outcome-based student-focused curriculum.

In addition, faculty members are expected to maintain office hours, provide advisement for students, participate in curriculum development, and contribute to the university’s professional development activities.

Responsibilities

Teach different Computing and Cyber security courses according to his/her specialty and experience. Promote innovation in teaching by introducing new teaching methodologies and strategies. Engage with students in and out of the classroom. Promote research activities and other creative work at IUK including publishing in indexed peer-reviewed publications. Mentor new colleagues and teaching assistants Support the mission of the Department and College at the IUK by following the set curriculum and working towards achieving the program objectives and student learning outcomes. Follow the university bylaws and regulations and promote the institutional environment. Commit to teaching schedules, office hours, preparation, service, and professional development. Provide academic support to other colleagues in the department. Participate in the College's and the University's events and supporting collegiality. Support the College and the University in organizing seminars, international conferences, and faculty events. Serve in the College's and university's committees as needed.

Qualifications

A Ph.D. in a computing field with a dissertation (or intensive research/teaching) in Cyber Security. Professional certifications in Cyber Security

Experience

A minimum of three years of university teaching experience for Assistant professor and five years for associate professor at a university level. A proven research record, scholarly work, publications, and knowledge transfer. A minimum of three journal articles in peer-review indexed journals (ISI or Scopus) for Assistant professor and five years for associate professor. A proven experience in using different learning management systems and in adopting e-learning teaching strategies. An experience that proves an understanding of a multicultural academic environment, and understanding of students' needs, including those of special needs. An experience with various instructional methodologies.

Technical Skills

Excellent writing and interpersonal skills. Commitment to excellence in teaching and scholarship Computer, LMS, and e-learning skills Experience in course design based on OBE model is an asset.

Behavioral Skills

Strong interpersonal and problem-solving Skills Effective communication skills in English Team and time management skills A passion for teaching.

Seniority level

Seniority level Mid-Senior level Employment type

Employment type Other Job function

Job function Education and Training Industries Higher Education Referrals increase your chances of interviewing at IUK by 2x Sign in to set job alerts for “Professor of Computer Science” roles.

Faculty Positions- College of Engineering and Technology

Faculty Positions- College of Business Administration

Faculty Positions -Master’s holders- Engineering and Technology Department

Faculty of Architecture & Design Engineering

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All IT Security Roles Jobs View All Jobs in Kuwait City