25 Security Expert jobs in Kuwait
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate
Posted 2 days ago
Job Viewed
Job Description
All Jobs > CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate
Location: Kuwait
Position Type: Full-time
DescriptionAs a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will support the Army Network Enterprise Technology Command (NETCOM) on the DoDIN-A Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. You will be part of the CAC/PKI Registration Authority (LRA) operations team, responsible for token issuance, maintenance, and revocation for the Army.
Requirements- Provide 24/7 On-Call and Emergency Response
- Respond to emergencies within two hours of notification
- Maintain an asset inventory of PKI equipment at all sites
- Support DoD Compliance Audits
- Address audit findings per DoD PKI policies
- Develop and maintain training packages
- Test PKI system software and token compatibility
- Verify subscriber identities and pre-register users
- Validate certificate requirements and handle revocations
- Support token issuance, renewal, and delivery of reports
- Complete requests for PIN resets, revocations, key recoveries, and token requests within specified timelines
- Submit activity and token reports monthly
- Prepare reports for NSA and HQDA
- Hold a Secret Security Clearance with Tier 5 background investigation
- Have 3+ years of experience in PKI and related fields
- Have never been relieved of trusted duties or had security clearance revoked
- Have never been convicted of a felony
- Complete RA/LRA training provided by DISA
- DoD Cyber Workforce Framework (DCWF 631) Security Developer Intermediate qualification or equivalent
- Sitting and standing for long periods
- Mobility within an office environment
- Stoop, kneel, crouch, crawl as needed
- Travel less than 10%
QBE is an equal opportunity employer. All qualified applicants will receive consideration regardless of race, color, religion, sex, national origin, sexual orientation, gender identity/expression, age, disability, veteran status, genetic information, pregnancy, marital status, neurodivergence, ethnicity, caste, or military service.
#J-18808-LjbffrCAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior
Posted 2 days ago
Job Viewed
Job Description
All Jobs > CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior
Kuwait
Full-time
Description
As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will provide services in support of the Army Network Enterprise Technology Command (NETCOM) on the Army Department of Defense Information Network (DoDIN-A) Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. As a member of the CAC/PKI Registration Authority (LRA) operations team, you will provide token issuance, sustainment, maintenance, and revocation to the Army customer.
Requirements
Highlights of Responsibilities:
- Provide 24/7 On-Call and Emergency Response
- Respond to emergency calls and arrive at the designated work site within two (2) hours after receiving the emergency call from the COR
- Provide leadership, supervision, and mentorship to the RA/LRA team, ensuring all responsibilities are executed in compliance with DoD PKI CPS and RPS requirements
- Provide RA support to the LRA personnel in creation of NIPRNET and SIPRNET PKI tokens
- Provide RA interface with the Trusted Agent (TA) for token request and distribution
- Maintain an asset inventory list of all PKI daily operations equipment by location at all RA/LRA sites
- Provide support for annual and semi-annual DoD Compliance Audits
- Support the Army CIO/G6 Cyber Security Directorate and the NETCOM G3/5 in addressing audit findings to include mitigation and correction of findings in accordance with DoD PKI CPS and RPS
- Develop and maintain On-the-Job Training packages
- Support test events of the global management PKI system software and token versions to assess backwards compatibility and interoperability
- Verify Subscriber’s identity
- Pre-register users with PKI
- Validate NPE certificate requirements and forward revocation requests
- Support issuance and renewal of SIPRNET tokens and/or NIPRNET Alternate Smart Card Logon
- Support production of and delivery of an Issuance Report detailing number of tokens issued, revoked, renewed, and any issues encountered
- Conduct duties as assigned through NSS/PKI RPS and DoD/PKI RA/LRA CPS
- Complete General Officer/Senior Executive Service requests within 12 hours of receipt
- Complete request for PIN reset, unlock code, revocation and re-issuance of a failed token CRI within 24 hours
- Complete request for key recoveries within 48 hours
- Complete new ASCL and NSS SIPRNET token request within 72 hours
- Submit a monthly RA Activity Report
- Submit a monthly Token Report of all tokens on hand to include returned and bad tokens
- Provide the weekly RA Backlog Report of any activities that fall outside the response timelines identified in the sections titled Response Time
- Prepare a monthly NSA Failed Token Report for HQDA to submit to NSA Program Manager Office
Qualifications
- Secret Security Clearance with a completed Tier 5 (T5) background investigation
- 5+ years of experience
- Advanced operational expertise in Smart Tokens, PKI, Certificate Revocation, CAC Pin Reset, PKE, biometrics, logical and physical access, tactical PKI, and directory services
- Have never been previously relieved of trusted role duties for reasons of negligence or nonperformance of duties
- Have never been denied or had a security clearance revoked
- Have never been convicted of a felony offense
- Must complete RA/LRA training provided by DISA prior to receiving RA or LRA credentials
Preferred Qualifications:
- DoD Cyber Workforce Framework (DCWF 631) Information Systems Security Developer Intermediate qualified (BS degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science or CSC or GCLD or CASP+ or CCSP or Cloud+ or GSEC) or equivalent certification
Physical Requirements:
- Sitting for long periods
- Standing for long periods
- Ambulate throughout an office
- Stoop, kneel, crouch, or crawl as required
- Travel by land or air transportation 10% or less
QBE is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender, gender-identity and/or expression, age, disability, Veteran status, genetic information, pregnancy (including childbirth, lactation, or other related medical conditions), marital-status, neurodivergence, ethnicity, ancestry, caste, military/uniformed service-member status, or any other characteristic protected by applicable federal, state, local, or international law.
#J-18808-LjbffrCAC/PKI Local Registration Authority (LRA) Information Security Specialist – Intermediate
Posted 2 days ago
Job Viewed
Job Description
Kuwait Position Type:
Full-time Description
As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will support the Army Network Enterprise Technology Command (NETCOM) on the DoDIN-A Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. You will be part of the CAC/PKI Registration Authority (LRA) operations team, responsible for token issuance, maintenance, and revocation for the Army. Requirements
Provide 24/7 On-Call and Emergency Response Respond to emergencies within two hours of notification Maintain an asset inventory of PKI equipment at all sites Support DoD Compliance Audits Address audit findings per DoD PKI policies Develop and maintain training packages Test PKI system software and token compatibility Verify subscriber identities and pre-register users Validate certificate requirements and handle revocations Support token issuance, renewal, and delivery of reports Complete requests for PIN resets, revocations, key recoveries, and token requests within specified timelines Submit activity and token reports monthly Prepare reports for NSA and HQDA Hold a Secret Security Clearance with Tier 5 background investigation Have 3+ years of experience in PKI and related fields Have never been relieved of trusted duties or had security clearance revoked Have never been convicted of a felony Complete RA/LRA training provided by DISA Preferred Qualifications
DoD Cyber Workforce Framework (DCWF 631) Security Developer Intermediate qualification or equivalent Physical Requirements
Sitting and standing for long periods Mobility within an office environment Stoop, kneel, crouch, crawl as needed Travel less than 10% QBE is an equal opportunity employer. All qualified applicants will receive consideration regardless of race, color, religion, sex, national origin, sexual orientation, gender identity/expression, age, disability, veteran status, genetic information, pregnancy, marital status, neurodivergence, ethnicity, caste, or military service.
#J-18808-Ljbffr
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior
Posted 2 days ago
Job Viewed
Job Description
CAC/PKI Local Registration Authority (LRA) Information Security Specialist – Senior Kuwait Full-time Description As a CAC/PKI Local Registration Authority (LRA) Information Security Specialist, you will provide services in support of the Army Network Enterprise Technology Command (NETCOM) on the Army Department of Defense Information Network (DoDIN-A) Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. As a member of the CAC/PKI Registration Authority (LRA) operations team, you will provide token issuance, sustainment, maintenance, and revocation to the Army customer. Requirements Highlights of Responsibilities: Provide 24/7 On-Call and Emergency Response Respond to emergency calls and arrive at the designated work site within two (2) hours after receiving the emergency call from the COR Provide leadership, supervision, and mentorship to the RA/LRA team, ensuring all responsibilities are executed in compliance with DoD PKI CPS and RPS requirements Provide RA support to the LRA personnel in creation of NIPRNET and SIPRNET PKI tokens Provide RA interface with the Trusted Agent (TA) for token request and distribution Maintain an asset inventory list of all PKI daily operations equipment by location at all RA/LRA sites Provide support for annual and semi-annual DoD Compliance Audits Support the Army CIO/G6 Cyber Security Directorate and the NETCOM G3/5 in addressing audit findings to include mitigation and correction of findings in accordance with DoD PKI CPS and RPS Develop and maintain On-the-Job Training packages Support test events of the global management PKI system software and token versions to assess backwards compatibility and interoperability Verify Subscriber’s identity Pre-register users with PKI Validate NPE certificate requirements and forward revocation requests Support issuance and renewal of SIPRNET tokens and/or NIPRNET Alternate Smart Card Logon Support production of and delivery of an Issuance Report detailing number of tokens issued, revoked, renewed, and any issues encountered Conduct duties as assigned through NSS/PKI RPS and DoD/PKI RA/LRA CPS Complete General Officer/Senior Executive Service requests within 12 hours of receipt Complete request for PIN reset, unlock code, revocation and re-issuance of a failed token CRI within 24 hours Complete request for key recoveries within 48 hours Complete new ASCL and NSS SIPRNET token request within 72 hours Submit a monthly RA Activity Report Submit a monthly Token Report of all tokens on hand to include returned and bad tokens Provide the weekly RA Backlog Report of any activities that fall outside the response timelines identified in the sections titled Response Time Prepare a monthly NSA Failed Token Report for HQDA to submit to NSA Program Manager Office Qualifications Secret Security Clearance with a completed Tier 5 (T5) background investigation 5+ years of experience Advanced operational expertise in Smart Tokens, PKI, Certificate Revocation, CAC Pin Reset, PKE, biometrics, logical and physical access, tactical PKI, and directory services Have never been previously relieved of trusted role duties for reasons of negligence or nonperformance of duties Have never been denied or had a security clearance revoked Have never been convicted of a felony offense Must complete RA/LRA training provided by DISA prior to receiving RA or LRA credentials Preferred Qualifications: DoD Cyber Workforce Framework (DCWF 631) Information Systems Security Developer Intermediate qualified (BS degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science or CSC or GCLD or CASP+ or CCSP or Cloud+ or GSEC) or equivalent certification Physical Requirements: Sitting for long periods Standing for long periods Ambulate throughout an office Stoop, kneel, crouch, or crawl as required Travel by land or air transportation 10% or less QBE is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender, gender-identity and/or expression, age, disability, Veteran status, genetic information, pregnancy (including childbirth, lactation, or other related medical conditions), marital-status, neurodivergence, ethnicity, ancestry, caste, military/uniformed service-member status, or any other characteristic protected by applicable federal, state, local, or international law.
#J-18808-Ljbffr
Senior Information Security Auditor
Posted 3 days ago
Job Viewed
Job Description
Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company
Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company
- Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
- Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
- Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
- Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
- Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
- Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
- Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
- Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
- Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
- Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
- Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
- Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
- Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
- Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
- Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
- Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
- Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
- Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
- Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
- Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
- Relevant University Degree in Information Security or Information Technology.
- Professional Qualifications in Information Security.
- Minimum 5 Years of Experience in IT audit or Information Security Audit.
- Have a Valid Transferrable Visa in Kuwait.
We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- TrainingSeniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Business Consulting and Services
Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x
Sign in to set job alerts for “Security Auditor” roles. Technical Solutions Consultant, Security (Arabic) Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrSenior Information Security Auditor
Posted 2 days ago
Job Viewed
Job Description
Senior Information Security Auditor
role at
Boubyan Consulting Company Join to apply for the
Senior Information Security Auditor
role at
Boubyan Consulting Company Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices. Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks. Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly. Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings. Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce. Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements. Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards. Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process. Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors. Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices. Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks. Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly. Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings. Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce. Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements. Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards. Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process. Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors. Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.
Job Requirements
Relevant University Degree in Information Security or Information Technology. Professional Qualifications in Information Security. Minimum 5 Years of Experience in IT audit or Information Security Audit. Have a Valid Transferrable Visa in Kuwait.
About Boubyan Consulting
We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- Training Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries Business Consulting and Services Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x Sign in to set job alerts for “Security Auditor” roles.
Technical Solutions Consultant, Security (Arabic)
Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Security Risk Management Specialist
Posted 6 days ago
Job Viewed
Job Description
Overview
In security risk management we're looking to harness the power of industry best practice combined with driving new innovation on how we do security risk assessments and modelling. Our security risk management team is the primary owner of the strategy and practices of how we identify, track and reduce our security risk across everything we do. To support this we need to use industry best practices paired with emerging threat information to promote risk identification, quantification, impact analysis, and modelling to ultimately drive decision making. In this role, you will help establish and execute a broad strategic vision for the security risk program at Canonical. You will not only work within the team but also cross-functionally with various teams across the organisation. The team contributes ideas and requirements for Canonical product security, improving the resilience and robustness of all Ubuntu customers and users subject to cyber attacks. Additionally, the team collaborates with our Organisational Learning and Development team to develop playbooks and facilitate security training across Canonical.
The security risk management team's mission is not only to secure Canonical, but also to contribute to the security of the wider open source ecosystem. They might share knowledge through public presentations and industry events, and share threat intelligence with the wider community or represent Canonical in sector-specific governance bodies.
What you will do in this role- Define Canonical's security risk management standards and playbooks
- Analyse and improve Canonical's security risk practices
- Evaluate, select and implement new security requirements, tools and practices
- Grow the presence and thought leadership of Canonical security risk management practice
- Develop Canonical security risk learning and development materials
- Work with Security leadership to present information and influence change
- Participate in developing key risk indicators, provide inputs to the development of key control indicators, and key performance indicators for various programs
- Apply statistical models to risk frameworks (such as FAIR, sensitivity analysis, and others)
- Participate in risk management, decision-making, and collaborative discussions
- Lead quantified risk assessments and understand the value of qualitative data for improvements to quality and engineering processes
- Interpret internal or external cyber security risk analyses in business terms and recommend a responsible course of action
- Develop templates and materials to help with self-service risk management actions
- Monitor and identify opportunities to improve the effectiveness of risk management processes
- Launch campaigns to perform security assessments and help mitigate security risks across the company
- Build evaluation methods and performance indicators to measure efficiency of security functions and capabilities.
- An exceptional academic track record
- Undergraduate degree in Computer Science or STEM, or a compelling narrative about your alternative path
- Drive and a track record of going above-and-beyond expectations
- Deep personal motivation to be at the forefront of technology security
- Leadership and management ability
- Excellent business English writing and presentation skills
- Problem-solver with excellent communication skills, a deep technical understanding of security assessments and risk management
- Expertise in threat modelling and risk management frameworks
- Broad knowledge of how to operationalize the management of security risk
- Experience in Secure Development Lifecycle and Security by Design methodology
We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.
- Distributed work environment with twice-yearly team sprints in person
- Personal learning and development budget of USD 2,000 per year
- Annual compensation review
- Recognition rewards
- Annual holiday leave
- Maternity and paternity leave
- Employee Assistance Programme
- Opportunity to travel to new locations to meet colleagues
- Priority Pass, and travel upgrades for long haul company events
Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.
Canonical is an equal opportunity employer
We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.
#J-18808-LjbffrBe The First To Know
About the latest Security expert Jobs in Kuwait !
Security Risk Management Specialist
Posted 6 days ago
Job Viewed
Job Description
Overview
In security risk management we're looking to harness the power of industry best practice combined with driving new innovation on how we do security risk assessments and modelling. Our security risk management team is the primary owner of the strategy and practices of how we identify, track and reduce our security risk across everything we do. To support this we need to use industry best practices paired with emerging threat information to promote risk identification, quantification, impact analysis, and modelling to ultimately drive decision making. In this role, you will help establish and execute a broad strategic vision for the security risk program at Canonical. You will not only work within the team but also cross-functionally with various teams across the organisation. The team contributes ideas and requirements for Canonical product security, improving the resilience and robustness of all Ubuntu customers and users subject to cyber attacks. Additionally, the team collaborates with our Organisational Learning and Development team to develop playbooks and facilitate security training across Canonical.
The security risk management team's mission is not only to secure Canonical, but also to contribute to the security of the wider open source ecosystem. They might share knowledge through public presentations and industry events, and share threat intelligence with the wider community or represent Canonical in sector-specific governance bodies.
What you will do in this role- Define Canonical's security risk management standards and playbooks
- Analyse and improve Canonical's security risk practices
- Evaluate, select and implement new security requirements, tools and practices
- Grow the presence and thought leadership of Canonical security risk management practice
- Develop Canonical security risk learning and development materials
- Work with Security leadership to present information and influence change
- Participate in developing key risk indicators, provide inputs to the development of key control indicators, and key performance indicators for various programs
- Apply statistical models to risk frameworks (such as FAIR, sensitivity analysis, and others)
- Participate in risk management, decision-making, and collaborative discussions
- Lead quantified risk assessments and understand the value of qualitative data for improvements to quality and engineering processes
- Interpret internal or external cyber security risk analyses in business terms and recommend a responsible course of action
- Develop templates and materials to help with self-service risk management actions
- Monitor and identify opportunities to improve the effectiveness of risk management processes
- Launch campaigns to perform security assessments and help mitigate security risks across the company
- Build evaluation methods and performance indicators to measure efficiency of security functions and capabilities.
- An exceptional academic track record
- Undergraduate degree in Computer Science or STEM, or a compelling narrative about your alternative path
- Drive and a track record of going above-and-beyond expectations
- Deep personal motivation to be at the forefront of technology security
- Leadership and management ability
- Excellent business English writing and presentation skills
- Problem-solver with excellent communication skills, a deep technical understanding of security assessments and risk management
- Expertise in threat modelling and risk management frameworks
- Broad knowledge of how to operationalize the management of security risk
- Experience in Secure Development Lifecycle and Security by Design methodology
We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.
- Distributed work environment with twice-yearly team sprints in person
- Personal learning and development budget of USD 2,000 per year
- Annual compensation review
- Recognition rewards
- Annual holiday leave
- Maternity and paternity leave
- Employee Assistance Programme
- Opportunity to travel to new locations to meet colleagues
- Priority Pass, and travel upgrades for long haul company events
Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.
Canonical is an equal opportunity employer
We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.
#J-18808-LjbffrSecurity Risk Management Specialist
Posted 6 days ago
Job Viewed
Job Description
Overview
In security risk management we're looking to harness the power of industry best practice combined with driving new innovation on how we do security risk assessments and modelling. Our security risk management team is the primary owner of the strategy and practices of how we identify, track and reduce our security risk across everything we do. To support this we need to use industry best practices paired with emerging threat information to promote risk identification, quantification, impact analysis, and modelling to ultimately drive decision making. In this role, you will help establish and execute a broad strategic vision for the security risk program at Canonical. You will not only work within the team but also cross-functionally with various teams across the organisation. The team contributes ideas and requirements for Canonical product security, improving the resilience and robustness of all Ubuntu customers and users subject to cyber attacks. Additionally, the team collaborates with our Organisational Learning and Development team to develop playbooks and facilitate security training across Canonical.
The security risk management team's mission is not only to secure Canonical, but also to contribute to the security of the wider open source ecosystem. They might share knowledge through public presentations and industry events, and share threat intelligence with the wider community or represent Canonical in sector-specific governance bodies.
What you will do in this role- Define Canonical's security risk management standards and playbooks
- Analyse and improve Canonical's security risk practices
- Evaluate, select and implement new security requirements, tools and practices
- Grow the presence and thought leadership of Canonical security risk management practice
- Develop Canonical security risk learning and development materials
- Work with Security leadership to present information and influence change
- Participate in developing key risk indicators, provide inputs to the development of key control indicators, and key performance indicators for various programs
- Apply statistical models to risk frameworks (such as FAIR, sensitivity analysis, and others)
- Participate in risk management, decision-making, and collaborative discussions
- Lead quantified risk assessments and understand the value of qualitative data for improvements to quality and engineering processes
- Interpret internal or external cyber security risk analyses in business terms and recommend a responsible course of action
- Develop templates and materials to help with self-service risk management actions
- Monitor and identify opportunities to improve the effectiveness of risk management processes
- Launch campaigns to perform security assessments and help mitigate security risks across the company
- Build evaluation methods and performance indicators to measure efficiency of security functions and capabilities.
- An exceptional academic track record
- Undergraduate degree in Computer Science or STEM, or a compelling narrative about your alternative path
- Drive and a track record of going above-and-beyond expectations
- Deep personal motivation to be at the forefront of technology security
- Leadership and management ability
- Excellent business English writing and presentation skills
- Problem-solver with excellent communication skills, a deep technical understanding of security assessments and risk management
- Expertise in threat modelling and risk management frameworks
- Broad knowledge of how to operationalize the management of security risk
- Experience in Secure Development Lifecycle and Security by Design methodology
We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.
- Distributed work environment with twice-yearly team sprints in person
- Personal learning and development budget of USD 2,000 per year
- Annual compensation review
- Recognition rewards
- Annual holiday leave
- Maternity and paternity leave
- Employee Assistance Programme
- Opportunity to travel to new locations to meet colleagues
- Priority Pass, and travel upgrades for long haul company events
Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.
Canonical is an equal opportunity employer
We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.
#J-18808-LjbffrSecurity Risk Management Specialist
Posted 6 days ago
Job Viewed
Job Description
Overview
In security risk management we're looking to harness the power of industry best practice combined with driving new innovation on how we do security risk assessments and modelling. Our security risk management team is the primary owner of the strategy and practices of how we identify, track and reduce our security risk across everything we do. To support this we need to use industry best practices paired with emerging threat information to promote risk identification, quantification, impact analysis, and modelling to ultimately drive decision making. In this role, you will help establish and execute a broad strategic vision for the security risk program at Canonical. You will not only work within the team but also cross-functionally with various teams across the organisation. The team contributes ideas and requirements for Canonical product security, improving the resilience and robustness of all Ubuntu customers and users subject to cyber attacks. Additionally, the team collaborates with our Organisational Learning and Development team to develop playbooks and facilitate security training across Canonical.
The security risk management team's mission is not only to secure Canonical, but also to contribute to the security of the wider open source ecosystem. They might share knowledge through public presentations and industry events, and share threat intelligence with the wider community or represent Canonical in sector-specific governance bodies.
What you will do in this role- Define Canonical's security risk management standards and playbooks
- Analyse and improve Canonical's security risk practices
- Evaluate, select and implement new security requirements, tools and practices
- Grow the presence and thought leadership of Canonical security risk management practice
- Develop Canonical security risk learning and development materials
- Work with Security leadership to present information and influence change
- Participate in developing key risk indicators, provide inputs to the development of key control indicators, and key performance indicators for various programs
- Apply statistical models to risk frameworks (such as FAIR, sensitivity analysis, and others)
- Participate in risk management, decision-making, and collaborative discussions
- Lead quantified risk assessments and understand the value of qualitative data for improvements to quality and engineering processes
- Interpret internal or external cyber security risk analyses in business terms and recommend a responsible course of action
- Develop templates and materials to help with self-service risk management actions
- Monitor and identify opportunities to improve the effectiveness of risk management processes
- Launch campaigns to perform security assessments and help mitigate security risks across the company
- Build evaluation methods and performance indicators to measure efficiency of security functions and capabilities.
- An exceptional academic track record
- Undergraduate degree in Computer Science or STEM, or a compelling narrative about your alternative path
- Drive and a track record of going above-and-beyond expectations
- Deep personal motivation to be at the forefront of technology security
- Leadership and management ability
- Excellent business English writing and presentation skills
- Problem-solver with excellent communication skills, a deep technical understanding of security assessments and risk management
- Expertise in threat modelling and risk management frameworks
- Broad knowledge of how to operationalize the management of security risk
- Experience in Secure Development Lifecycle and Security by Design methodology
We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.
- Distributed work environment with twice-yearly team sprints in person
- Personal learning and development budget of USD 2,000 per year
- Annual compensation review
- Recognition rewards
- Annual holiday leave
- Maternity and paternity leave
- Employee Assistance Programme
- Opportunity to travel to new locations to meet colleagues
- Priority Pass, and travel upgrades for long haul company events
Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.
Canonical is an equal opportunity employer
We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.
#J-18808-Ljbffr