19 Threat Analyst jobs in Kuwait

Vulnerability Analyst I

Kuwait City, Al Kuwayt V2X Inc

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Vulnerability Analyst I role at V2X Inc

3 days ago Be among the first 25 applicants

Join to apply for the Vulnerability Analyst I role at V2X Inc

Overview

Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.

As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties would encompass a wide range of responsibilities aimed at ensuring the security and integrity of sensitive information and systems.

Overview

Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.

As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties would encompass a wide range of responsibilities aimed at ensuring the security and integrity of sensitive information and systems.

Vulnerability Analysts conduct comprehensive assessments of computing systems, networks, and applications to identify and mitigate potential security risks. While leveraging cybersecurity methodologies, analysts analyze vulnerabilities, assess their impact, and collaborate with cross-functional teams to implement effective remediation plans of action with milestones. Seeks to protect and defend information and information systems by ensuring data confidentiality and integrity with non-repudiation, authentication, and availability of data and technology through assessments of control frameworks.

Vulnerability Analysts strategically plan, coordinate, scan, analyze, and report compliance of the Department of Defense Information Network (DoDIN) to its Cybersecurity Services customers on the SWA regional and theater level. Program: OMDAC-SWACA

This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!

You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.

Responsibilities

  • Conduct regular security assessments and audits of information systems with the DoD SWA network.
  • Develop and implement action plans to manage common vulnerabilities and exposures.
  • Design report templates for daily use and distribution to customers and subordinate personnel to maintain at minimum a 95% overall vulnerability compliancy rating.
  • Monitor Information Assurance Security Alerts & Bulletins to detect and ensure rapid initial response to any cybersecurity related incident or event that could cause harm to the SWA AOR of the DoDIN.
  • Maintain cross-communication with other cybersecurity division (e.g. IDS/IPS & ArcSight) to discover attempts to exploit known and zero-day vulnerabilities.
  • Recommend improvements to the overall cybersecurity posture.
  • Possess the ability to communicate effectively with management and upper echelon military personnel to ensure information is disseminated timely and efficiently.
  • Maintain working knowledge of vulnerability management systems (Tenable & Nessus) Provides technical and operational support to functional end users of vulnerability tools (e.g. Assured Compliance Assessment Solution) ACAS and TYCHON.
  • Prepares vulnerability scanning reports to submit to commanders and higher headquarters. Interfaces with the IAVM Manager and ISSO regarding vulnerability and remediation issues.
  • Additional requirements may vary depending upon location.
  • Performs other duties and assignments as required.

Qualifications

  • Qualifications
  • Security Clearance:
    • Requires an active Secret Clearance
  • Education / Certifications: One-year related experience can be substituted for one year of education if the degree is required.
    • Bachelor’s Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field.
    • This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.
    • The authorized certifications for this job title are listed as follows:
  • BASELINE:
    • Cisco: CCNP: Certified Network Professional - Security
    • CompTIA: CASP+ ce: Advanced Security Practitioner
    • GIAC: GCED: Certified Enterprise Defender
    • GIAC: GCIH: Certified Incident Handler
    • ISACA: CISA: Certified Information Systems Auditor
    • ISC2: CCSP: Certified Cloud Security Professional
    • ISC2: CISSP (or Associate): Certified Information Systems Security Professional
    • ISC2: CCSP: Certified Cloud Security Professional
  • COMPUTING ENVIRONMENT (CE):
    • Cisco: CCIE: Certified Internetwork Expert (Any)
    • Cisco: CCNP: Certified Network Professional (Any)
    • EC Council: CEH: Certified Ethical Hacker
    • EC Council: ECIH: Certified Incident Handler
    • EC-Council: CHFI: Certified Hacking Forensic Investigator
    • EC-Council: CND: Certified Network Defender
    • GIAC: GCIH: Certified Incident Handler
    • Microsoft: 365 Certified: Enterprise Administrator Expert
    • Microsoft: Certified: Azure Associate (Any)
    • Microsoft: Certified: Azure Expert (Any)
    • Microsoft: MCSE: (Any above 2012)
    • Red Hat: RHCA: Certified Architect
    • Red Hat: RHCE: Certified Engineer
    • Red Hat: RHSA: Certified Systems Administrator
  • Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Software Engineering or Business Information Systems discipline for three years general experience.
    • Requires a minimum of seven (7) years of experience in telecommunications sector.
    • Experience with a customer service-oriented company.
At V2X, we are deeply committed to both equal employment opportunity, including protection for Veterans and individuals with disabilities, and fostering an inclusive and diverse workplace. We ensure all individuals are treated with fairness, respect, and dignity, recognizing the strength that comes from a workforce rich in diverse experiences, perspectives, and skills. This commitment, aligned with our core Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation, and expand our success in the global marketplace, ultimately enabling us to best serve our clients.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Business Development and Sales
  • Industries Defense and Space Manufacturing

Referrals increase your chances of interviewing at V2X Inc by 2x

Sign in to set job alerts for “Analyst” roles. Assistant/Associate Professor- Accounting Logistics Operations Center (LOC) Analyst II (Supply) Cyber Recovery Solutions Senior Consultant Looking for Sales Specialist /Immigration Consultant

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Vulnerability Analyst I

Kuwait City, Al Kuwayt V2X, Inc.

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Vulnerability Analyst I role at V2X Inc .

Get AI-powered advice on this job and more exclusive features.

Overview

Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Our $3.9B company and 16,000 employees work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.

As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties encompass conducting comprehensive assessments of systems, networks, and applications to identify and mitigate security risks. You will analyze vulnerabilities, assess their impact, and collaborate with teams to implement remediation plans, ensuring data confidentiality, integrity, and availability.

This position involves planning, coordinating, scanning, analyzing, and reporting on compliance of the DoDIN to Cybersecurity Services customers at the regional and theater level. The role offers company-paid housing and transportation, a completion bonus, and tuition reimbursement. Candidates must meet all host country requirements to work legally.

Responsibilities
  • Conduct security assessments and audits of the DoD SWA network.
  • Develop and implement action plans for vulnerabilities and exposures.
  • Create report templates for daily use to maintain a minimum 95% vulnerability compliance rating.
  • Monitor security alerts and bulletins to respond rapidly to cybersecurity incidents.
  • Coordinate with cybersecurity teams to detect exploits of vulnerabilities.
  • Recommend improvements to cybersecurity posture.
  • Communicate effectively with management and military personnel to disseminate information timely.
  • Support vulnerability management systems (Tenable, Nessus, ACAS, TYCHON).
  • Prepare vulnerability scanning reports for commanders and higher headquarters.
  • Perform additional duties as required.
Qualifications
  • Active Secret Security Clearance.
  • Bachelor’s Degree in Computer Science, MIS, IS, Engineering, or related field, or equivalent experience.
  • Adherence to DoD 8570.01M, maintaining at least one baseline and one CE certification (e.g., CISSP, CCNP Security, CASP+).
  • Minimum of 7 years of experience in telecommunications sector.

V2X is committed to equal employment opportunity, fostering an inclusive workplace that respects diversity and promotes fairness, dignity, and innovation.

Additional Details
  • Seniority level: Mid-Senior level
  • Employment type: Full-time
  • Job function: Business Development and Sales
  • Industries: Defense and Space Manufacturing
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Vulnerability Analyst I

Kuwait City, Al Kuwayt V2X

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

Overview Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism. As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties would encompass a wide range of responsibilities aimed at ensuring the security and integrity of sensitive information and systems. Vulnerability Analysts conduct comprehensive assessments of computing systems, networks, and applications to identify and mitigate potential security risks. While leveraging cybersecurity methodologies, analysts analyze vulnerabilities, assess their impact, and collaborate with cross-functional teams to implement effective remediation plans of action with milestones. Seeks to protect and defend information and information systems by ensuring data confidentiality and integrity with non-repudiation, authentication, and availability of data and technology through assessments of control frameworks. Vulnerability Analysts strategically plan, coordinate, scan, analyze, and report compliance of the Department of Defense Information Network (DoDIN) to its Cybersecurity Services customers on the SWA regional and theater level. Program: OMDAC-SWACA This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program! You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position. Responsibilities Conduct regular security assessments and audits of information systems with the DoD SWA network. Develop and implement action plans to manage common vulnerabilities and exposures. Design report templates for daily use and distribution to customers and subordinate personnel to maintain at minimum a 95% overall vulnerability compliancy rating. Monitor Information Assurance Security Alerts & Bulletins to detect and ensure rapid initial response to any cybersecurity related incident or event that could cause harm to the SWA AOR of the DoDIN. Maintain cross-communication with other cybersecurity division (e.g. IDS/IPS & ArcSight) to discover attempts to exploit known and zero-day vulnerabilities. Recommend improvements to the overall cybersecurity posture. Possess the ability to communicate effectively with management and upper echelon military personnel to ensure information is disseminated timely and efficiently. Maintain working knowledge of vulnerability management systems (Tenable & Nessus) Provides technical and operational support to functional end users of vulnerability tools (e.g. Assured Compliance Assessment Solution) ACAS and TYCHON. Prepares vulnerability scanning reports to submit to commanders and higher headquarters. Interfaces with the IAVM Manager and ISSO regarding vulnerability and remediation issues. Additional requirements may vary depending upon location. Perform any additional duties as required/assigned. Qualifications Qualifications Security Clearance: Requires an active Secret Clearance Education / Certifications: One-year related experience can be substituted for one year of education if the degree is required. Bachelor s Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field. This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification. The authorized certifications for this job title are listed as follows: IAT Level: IT II / IAT III BASELINE: Cisco: CCNP: Certified Network Professional - Security CompTIA: CASP+ ce: Advanced Security Practitioner GIAC: GCED: Certified Enterprise Defender GIAC: GCIH: Certified Incident Handler ISACA: CISA: Certified Information Systems Auditor ISC2: CCSP: Certified Cloud Security Professional ISC2: CISSP (or Associate): Certified Information Systems Security Professional ISC2: CCSP: Certified Cloud Security Professional COMPUTING ENVIRONMENT (CE): Cisco: CCIE: Certified Internetwork Expert (Any) Cisco: CCNP: Certified Network Professional (Any) EC Council: CEH: Certified Ethical Hacker EC Council: ECIH: Certified Incident Handler EC-Council: CHFI: Certified Hacking Forensic Investigator EC-Council: CND: Certified Network Defender GIAC: GCIH: Certified Incident Handler Microsoft: 365 Certified: Enterprise Administrator Expert Microsoft: Certified: Azure Associate (Any) Microsoft: Certified: Azure Expert (Any) Microsoft: MCSE: (Any above 2012) Red Hat: RHCA: Certified Architect Red Hat: RHCE: Certified Engineer Red Hat: RHSA: Certified Systems Administrator Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Software Engineering or Business Information Systems discipline for three years general experience. Requires a minimum of seven (7) years of experience in telecommunications sector. We are committed to an inclusive and diverse workplace that values and supports the contributions of each individual. This commitment along with our common Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation and expand our success in the global marketplace. Vectrus is an Equal Opportunity /Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, national origin, protected veteran status or status as an individual with a disability. EOE/Minority/Female/Disabled/Veteran.

Company Industry

  • Facilities Management

Department / Functional Area

  • IT Software

Keywords

  • Vulnerability Analyst I

Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at

People Looking for Vulnerability Analyst I Jobs also searched #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Vulnerability Analyst I

Kuwait City, Al Kuwayt V2X

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties would encompass a wide range of responsibilities aimed at ensuring the security and integrity of sensitive information and systems.
Vulnerability Analysts conduct comprehensive assessments of computing systems, networks, and applications to identify and mitigate potential security risks. While leveraging cybersecurity methodologies, analysts analyze vulnerabilities, assess their impact, and collaborate with cross-functional teams to implement effective remediation plans of action with milestones. Seeks to protect and defend information and information systems by ensuring data confidentiality and integrity with non-repudiation, authentication, and availability of data and technology through assessments of control frameworks.
Vulnerability Analysts strategically plan, coordinate, scan, analyze, and report compliance of the Department of Defense Information Network (DoDIN) to its Cybersecurity Services customers on the SWA regional and theater level. Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
+ Conduct regular security assessments and audits of information systems with the DoD SWA network.
+ Develop and implement action plans to manage common vulnerabilities and exposures.
+ Design report templates for daily use and distribution to customers and subordinate personnel to maintain at minimum a 95% overall vulnerability compliancy rating.
+ Monitor Information Assurance Security Alerts & Bulletins to detect and ensure rapid initial response to any cybersecurity related incident or event that could cause harm to the SWA AOR of the DoDIN.
+ Maintain cross-communication with other cybersecurity division (e.g. IDS/IPS & ArcSight) to discover attempts to exploit known and zero-day vulnerabilities.
+ Recommend improvements to the overall cybersecurity posture.
+ Possess the ability to communicate effectively with management and upper echelon military personnel to ensure information is disseminated timely and efficiently.
+ Maintain working knowledge of vulnerability management systems (Tenable & Nessus) Provides technical and operational support to functional end users of vulnerability tools (e.g. Assured Compliance Assessment Solution) ACAS and TYCHON.
+ Prepares vulnerability scanning reports to submit to commanders and higher headquarters. Interfaces with the IAVM Manager and ISSO regarding vulnerability and remediation issues.
+ Additional requirements may vary depending upon location.
+ Performs other duties and assignments as required.
Qualifications
+ Qualifications
+ Security Clearance:
+ Requires an active Secret Clearance
+ Education / Certifications: One-year related experience can be substituted for one year of education if the degree is required.
+ Bachelor's Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field.
+ This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.
+ The authorized certifications for this job title are listed as follows:
+ BASELINE:
+ Cisco: CCNP: Certified Network Professional - Security
+ CompTIA: CASP+ ce: Advanced Security Practitioner
+ GIAC: GCED: Certified Enterprise Defender
+ GIAC: GCIH: Certified Incident Handler
+ ISACA: CISA: Certified Information Systems Auditor
+ ISC2: CCSP: Certified Cloud Security Professional
+ ISC2: CISSP (or Associate): Certified Information Systems Security Professional
+ ISC2: CCSP: Certified Cloud Security Professional
+ COMPUTING ENVIRONMENT (CE):
+ Cisco: CCIE: Certified Internetwork Expert (Any)
+ Cisco: CCNP: Certified Network Professional (Any)
+ EC Council: CEH: Certified Ethical Hacker
+ EC Council: ECIH: Certified Incident Handler
+ EC-Council: CHFI: Certified Hacking Forensic Investigator
+ EC-Council: CND: Certified Network Defender
+ GIAC: GCIH: Certified Incident Handler
+ Microsoft: 365 Certified: Enterprise Administrator Expert
+ Microsoft: Certified: Azure Associate (Any)
+ Microsoft: Certified: Azure Expert (Any)
+ Microsoft: MCSE: (Any above 2012)
+ Red Hat: RHCA: Certified Architect
+ Red Hat: RHCE: Certified Engineer
+ Red Hat: RHSA: Certified Systems Administrator
+ Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Software Engineering or Business Information Systems discipline for three years general experience.
+ Requires a minimum of seven (7) years of experience in telecommunications sector.
+ Experience with a customer service-oriented company.
At V2X, we are deeply committed to both equal employment opportunity, including protection for Veterans and individuals with disabilities, and fostering an inclusive and diverse workplace. We ensure all individuals are treated with fairness, respect, and dignity, recognizing the strength that comes from a workforce rich in diverse experiences, perspectives, and skills. This commitment, aligned with our core Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation, and expand our success in the global marketplace, ultimately enabling us to best serve our clients.
This advertiser has chosen not to accept applicants from your region.

Vulnerability Analyst I

Kuwait City, Al Kuwayt V2X

Posted 15 days ago

Job Viewed

Tap Again To Close

Job Description

Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties would encompass a wide range of responsibilities aimed at ensuring the security and integrity of sensitive information and systems.
Vulnerability Analysts conduct comprehensive assessments of computing systems, networks, and applications to identify and mitigate potential security risks. While leveraging cybersecurity methodologies, analysts analyze vulnerabilities, assess their impact, and collaborate with cross-functional teams to implement effective remediation plans of action with milestones. Seeks to protect and defend information and information systems by ensuring data confidentiality and integrity with non-repudiation, authentication, and availability of data and technology through assessments of control frameworks.
Vulnerability Analysts strategically plan, coordinate, scan, analyze, and report compliance of the Department of Defense Information Network (DoDIN) to its Cybersecurity Services customers on the SWA regional and theater level. Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
+ Conduct regular security assessments and audits of information systems with the DoD SWA network.
+ Develop and implement action plans to manage common vulnerabilities and exposures.
+ Design report templates for daily use and distribution to customers and subordinate personnel to maintain at minimum a 95% overall vulnerability compliancy rating.
+ Monitor Information Assurance Security Alerts & Bulletins to detect and ensure rapid initial response to any cybersecurity related incident or event that could cause harm to the SWA AOR of the DoDIN.
+ Maintain cross-communication with other cybersecurity division (e.g. IDS/IPS & ArcSight) to discover attempts to exploit known and zero-day vulnerabilities.
+ Recommend improvements to the overall cybersecurity posture.
+ Possess the ability to communicate effectively with management and upper echelon military personnel to ensure information is disseminated timely and efficiently.
+ Maintain working knowledge of vulnerability management systems (Tenable & Nessus) Provides technical and operational support to functional end users of vulnerability tools (e.g. Assured Compliance Assessment Solution) ACAS and TYCHON.
+ Prepares vulnerability scanning reports to submit to commanders and higher headquarters. Interfaces with the IAVM Manager and ISSO regarding vulnerability and remediation issues.
+ Additional requirements may vary depending upon location.
+ Perform any additional duties as required/assigned.
Qualifications
+ Qualifications
+ Security Clearance:
+ Requires an active Secret Clearance
+ Education / Certifications: One-year related experience can be substituted for one year of education if the degree is required.
+ Bachelor's Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field.
+ This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.
+ The authorized certifications for this job title are listed as follows:
+ IAT Level: IT II / IAT III
+ BASELINE:
+ Cisco: CCNP: Certified Network Professional - Security
+ CompTIA: CASP+ ce: Advanced Security Practitioner
+ GIAC: GCED: Certified Enterprise Defender
+ GIAC: GCIH: Certified Incident Handler
+ ISACA: CISA: Certified Information Systems Auditor
+ ISC2: CCSP: Certified Cloud Security Professional
+ ISC2: CISSP (or Associate): Certified Information Systems Security Professional
+ ISC2: CCSP: Certified Cloud Security Professional
+ COMPUTING ENVIRONMENT (CE):
+ Cisco: CCIE: Certified Internetwork Expert (Any)
+ Cisco: CCNP: Certified Network Professional (Any)
+ EC Council: CEH: Certified Ethical Hacker
+ EC Council: ECIH: Certified Incident Handler
+ EC-Council: CHFI: Certified Hacking Forensic Investigator
+ EC-Council: CND: Certified Network Defender
+ GIAC: GCIH: Certified Incident Handler
+ Microsoft: 365 Certified: Enterprise Administrator Expert
+ Microsoft: Certified: Azure Associate (Any)
+ Microsoft: Certified: Azure Expert (Any)
+ Microsoft: MCSE: (Any above 2012)
+ Red Hat: RHCA: Certified Architect
+ Red Hat: RHCE: Certified Engineer
+ Red Hat: RHSA: Certified Systems Administrator
+ Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Software Engineering or Business Information Systems discipline for three years general experience.
+ Requires a minimum of seven (7) years of experience in telecommunications sector.
At V2X, we are deeply committed to both equal employment opportunity, including protection for Veterans and individuals with disabilities, and fostering an inclusive and diverse workplace. We ensure all individuals are treated with fairness, respect, and dignity, recognizing the strength that comes from a workforce rich in diverse experiences, perspectives, and skills. This commitment, aligned with our core Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation, and expand our success in the global marketplace, ultimately enabling us to best serve our clients.
This advertiser has chosen not to accept applicants from your region.

Vulnerability Analyst I

Kuwait City, Al Kuwayt V2X Inc

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the

Vulnerability Analyst I

role at

V2X Inc 3 days ago Be among the first 25 applicants Join to apply for the

Vulnerability Analyst I

role at

V2X Inc Overview

Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.

As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties would encompass a wide range of responsibilities aimed at ensuring the security and integrity of sensitive information and systems. Overview

Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.

As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties would encompass a wide range of responsibilities aimed at ensuring the security and integrity of sensitive information and systems.

Vulnerability Analysts conduct comprehensive assessments of computing systems, networks, and applications to identify and mitigate potential security risks. While leveraging cybersecurity methodologies, analysts analyze vulnerabilities, assess their impact, and collaborate with cross-functional teams to implement effective remediation plans of action with milestones. Seeks to protect and defend information and information systems by ensuring data confidentiality and integrity with non-repudiation, authentication, and availability of data and technology through assessments of control frameworks.

Vulnerability Analysts strategically plan, coordinate, scan, analyze, and report compliance of the Department of Defense Information Network (DoDIN) to its Cybersecurity Services customers on the SWA regional and theater level. Program: OMDAC-SWACA

This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!

You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.

Responsibilities

Conduct regular security assessments and audits of information systems with the DoD SWA network. Develop and implement action plans to manage common vulnerabilities and exposures. Design report templates for daily use and distribution to customers and subordinate personnel to maintain at minimum a 95% overall vulnerability compliancy rating. Monitor Information Assurance Security Alerts & Bulletins to detect and ensure rapid initial response to any cybersecurity related incident or event that could cause harm to the SWA AOR of the DoDIN. Maintain cross-communication with other cybersecurity division (e.g. IDS/IPS & ArcSight) to discover attempts to exploit known and zero-day vulnerabilities. Recommend improvements to the overall cybersecurity posture. Possess the ability to communicate effectively with management and upper echelon military personnel to ensure information is disseminated timely and efficiently. Maintain working knowledge of vulnerability management systems (Tenable & Nessus) Provides technical and operational support to functional end users of vulnerability tools (e.g. Assured Compliance Assessment Solution) ACAS and TYCHON. Prepares vulnerability scanning reports to submit to commanders and higher headquarters. Interfaces with the IAVM Manager and ISSO regarding vulnerability and remediation issues. Additional requirements may vary depending upon location. Performs other duties and assignments as required.

Qualifications

Qualifications Security Clearance: Requires an active Secret Clearance Education / Certifications: One-year related experience can be substituted for one year of education if the degree is required. Bachelor’s Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field. This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification. The authorized certifications for this job title are listed as follows: BASELINE: Cisco: CCNP: Certified Network Professional - Security CompTIA: CASP+ ce: Advanced Security Practitioner GIAC: GCED: Certified Enterprise Defender GIAC: GCIH: Certified Incident Handler ISACA: CISA: Certified Information Systems Auditor ISC2: CCSP: Certified Cloud Security Professional ISC2: CISSP (or Associate): Certified Information Systems Security Professional ISC2: CCSP: Certified Cloud Security Professional COMPUTING ENVIRONMENT (CE): Cisco: CCIE: Certified Internetwork Expert (Any) Cisco: CCNP: Certified Network Professional (Any) EC Council: CEH: Certified Ethical Hacker EC Council: ECIH: Certified Incident Handler EC-Council: CHFI: Certified Hacking Forensic Investigator EC-Council: CND: Certified Network Defender GIAC: GCIH: Certified Incident Handler Microsoft: 365 Certified: Enterprise Administrator Expert Microsoft: Certified: Azure Associate (Any) Microsoft: Certified: Azure Expert (Any) Microsoft: MCSE: (Any above 2012) Red Hat: RHCA: Certified Architect Red Hat: RHCE: Certified Engineer Red Hat: RHSA: Certified Systems Administrator Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Software Engineering or Business Information Systems discipline for three years general experience. Requires a minimum of seven (7) years of experience in telecommunications sector. Experience with a customer service-oriented company.

At V2X, we are deeply committed to both equal employment opportunity, including protection for Veterans and individuals with disabilities, and fostering an inclusive and diverse workplace. We ensure all individuals are treated with fairness, respect, and dignity, recognizing the strength that comes from a workforce rich in diverse experiences, perspectives, and skills. This commitment, aligned with our core Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation, and expand our success in the global marketplace, ultimately enabling us to best serve our clients. Seniority level

Seniority level Mid-Senior level Employment type

Employment type Full-time Job function

Job function Business Development and Sales Industries Defense and Space Manufacturing Referrals increase your chances of interviewing at V2X Inc by 2x Sign in to set job alerts for “Analyst” roles.

Assistant/Associate Professor- Accounting

Logistics Operations Center (LOC) Analyst II (Supply)

Cyber Recovery Solutions Senior Consultant

Looking for Sales Specialist /Immigration Consultant

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Vulnerability Analyst I

Kuwait City, Al Kuwayt V2X, Inc.

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the

Vulnerability Analyst I

role at

V2X Inc . Get AI-powered advice on this job and more exclusive features. Overview

Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Our $3.9B company and 16,000 employees work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism. As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties encompass conducting comprehensive assessments of systems, networks, and applications to identify and mitigate security risks. You will analyze vulnerabilities, assess their impact, and collaborate with teams to implement remediation plans, ensuring data confidentiality, integrity, and availability. This position involves planning, coordinating, scanning, analyzing, and reporting on compliance of the DoDIN to Cybersecurity Services customers at the regional and theater level. The role offers company-paid housing and transportation, a completion bonus, and tuition reimbursement. Candidates must meet all host country requirements to work legally. Responsibilities

Conduct security assessments and audits of the DoD SWA network. Develop and implement action plans for vulnerabilities and exposures. Create report templates for daily use to maintain a minimum 95% vulnerability compliance rating. Monitor security alerts and bulletins to respond rapidly to cybersecurity incidents. Coordinate with cybersecurity teams to detect exploits of vulnerabilities. Recommend improvements to cybersecurity posture. Communicate effectively with management and military personnel to disseminate information timely. Support vulnerability management systems (Tenable, Nessus, ACAS, TYCHON). Prepare vulnerability scanning reports for commanders and higher headquarters. Perform additional duties as required. Qualifications

Active Secret Security Clearance. Bachelor’s Degree in Computer Science, MIS, IS, Engineering, or related field, or equivalent experience. Adherence to DoD 8570.01M, maintaining at least one baseline and one CE certification (e.g., CISSP, CCNP Security, CASP+). Minimum of 7 years of experience in telecommunications sector. V2X is committed to equal employment opportunity, fostering an inclusive workplace that respects diversity and promotes fairness, dignity, and innovation. Additional Details

Seniority level: Mid-Senior level Employment type: Full-time Job function: Business Development and Sales Industries: Defense and Space Manufacturing

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Threat analyst Jobs in Kuwait !

Vulnerability Analyst I

Kuwait City, Al Kuwayt V2X

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Overview Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism. As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties would encompass a wide range of responsibilities aimed at ensuring the security and integrity of sensitive information and systems. Vulnerability Analysts conduct comprehensive assessments of computing systems, networks, and applications to identify and mitigate potential security risks. While leveraging cybersecurity methodologies, analysts analyze vulnerabilities, assess their impact, and collaborate with cross-functional teams to implement effective remediation plans of action with milestones. Seeks to protect and defend information and information systems by ensuring data confidentiality and integrity with non-repudiation, authentication, and availability of data and technology through assessments of control frameworks. Vulnerability Analysts strategically plan, coordinate, scan, analyze, and report compliance of the Department of Defense Information Network (DoDIN) to its Cybersecurity Services customers on the SWA regional and theater level. Program: OMDAC-SWACA This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program! You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position. Responsibilities Conduct regular security assessments and audits of information systems with the DoD SWA network. Develop and implement action plans to manage common vulnerabilities and exposures. Design report templates for daily use and distribution to customers and subordinate personnel to maintain at minimum a 95% overall vulnerability compliancy rating. Monitor Information Assurance Security Alerts & Bulletins to detect and ensure rapid initial response to any cybersecurity related incident or event that could cause harm to the SWA AOR of the DoDIN. Maintain cross-communication with other cybersecurity division (e.g. IDS/IPS & ArcSight) to discover attempts to exploit known and zero-day vulnerabilities. Recommend improvements to the overall cybersecurity posture. Possess the ability to communicate effectively with management and upper echelon military personnel to ensure information is disseminated timely and efficiently. Maintain working knowledge of vulnerability management systems (Tenable & Nessus) Provides technical and operational support to functional end users of vulnerability tools (e.g. Assured Compliance Assessment Solution) ACAS and TYCHON. Prepares vulnerability scanning reports to submit to commanders and higher headquarters. Interfaces with the IAVM Manager and ISSO regarding vulnerability and remediation issues. Additional requirements may vary depending upon location. Perform any additional duties as required/assigned. Qualifications Qualifications Security Clearance: Requires an active Secret Clearance Education / Certifications: One-year related experience can be substituted for one year of education if the degree is required. Bachelor s Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field. This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification. The authorized certifications for this job title are listed as follows: IAT Level: IT II / IAT III BASELINE: Cisco: CCNP: Certified Network Professional - Security CompTIA: CASP+ ce: Advanced Security Practitioner GIAC: GCED: Certified Enterprise Defender GIAC: GCIH: Certified Incident Handler ISACA: CISA: Certified Information Systems Auditor ISC2: CCSP: Certified Cloud Security Professional ISC2: CISSP (or Associate): Certified Information Systems Security Professional ISC2: CCSP: Certified Cloud Security Professional COMPUTING ENVIRONMENT (CE): Cisco: CCIE: Certified Internetwork Expert (Any) Cisco: CCNP: Certified Network Professional (Any) EC Council: CEH: Certified Ethical Hacker EC Council: ECIH: Certified Incident Handler EC-Council: CHFI: Certified Hacking Forensic Investigator EC-Council: CND: Certified Network Defender GIAC: GCIH: Certified Incident Handler Microsoft: 365 Certified: Enterprise Administrator Expert Microsoft: Certified: Azure Associate (Any) Microsoft: Certified: Azure Expert (Any) Microsoft: MCSE: (Any above 2012) Red Hat: RHCA: Certified Architect Red Hat: RHCE: Certified Engineer Red Hat: RHSA: Certified Systems Administrator Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Software Engineering or Business Information Systems discipline for three years general experience. Requires a minimum of seven (7) years of experience in telecommunications sector. We are committed to an inclusive and diverse workplace that values and supports the contributions of each individual. This commitment along with our common Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation and expand our success in the global marketplace. Vectrus is an Equal Opportunity /Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, national origin, protected veteran status or status as an individual with a disability. EOE/Minority/Female/Disabled/Veteran.
Company Industry
Facilities Management
Department / Functional Area
IT Software
Keywords
Vulnerability Analyst I
Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at
People Looking for Vulnerability Analyst I Jobs also searched
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Auditor

Kuwait City, Al Kuwayt Boubyan Consulting Company

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company

Join to apply for the Senior Information Security Auditor role at Boubyan Consulting Company

  • Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
  • Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
  • Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
  • Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
  • Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
  • Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
  • Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
  • Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
  • Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
  • Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.

  • Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices.
  • Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks.
  • Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly.
  • Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings.
  • Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce.
  • Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements.
  • Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards.
  • Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process.
  • Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors.
  • Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.

Job Requirements

  • Relevant University Degree in Information Security or Information Technology.
  • Professional Qualifications in Information Security.
  • Minimum 5 Years of Experience in IT audit or Information Security Audit.
  • Have a Valid Transferrable Visa in Kuwait.

About Boubyan Consulting

We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- TrainingSeniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Business Consulting and Services

Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x

Sign in to set job alerts for “Security Auditor” roles. Technical Solutions Consultant, Security (Arabic) Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Auditor

Kuwait City, Al Kuwayt Boubyan Consulting Company

Posted 18 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the

Senior Information Security Auditor

role at

Boubyan Consulting Company Join to apply for the

Senior Information Security Auditor

role at

Boubyan Consulting Company Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices. Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks. Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly. Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings. Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce. Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements. Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards. Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process. Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors. Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.

Conducting IT and security audits: Lead and perform comprehensive IT security audits to evaluate the effectiveness of an organization's information security controls and measures. This involves assessing security policies, procedures, systems, and practices. Risk assessment: Identify and analyze potential security risks and vulnerabilities within an organization's information systems. Develop risk mitigation strategies, recommend remediation plans, and implement necessary controls to minimize risks. Compliance monitoring: Ensure that the organization complies with relevant security regulations, standards, and best practices such as ISO 27001, NIST, GDPR, etc. Keep track of regulatory changes and update security policies and procedures accordingly. Security incident response: Develop and implement incident response plans to address and resolve security breaches, incidents, or violations. Conduct forensic investigations, collect evidence, and provide reports on the findings. Security awareness and training: Develop and deliver security awareness programs and training sessions to educate employees about information security policies, procedures, and best practices. Promote a culture of security awareness and help create a cybersecurity-conscious workforce. Security controls evaluation: Evaluate the implementation and effectiveness of security controls such as access controls, encryption mechanisms, firewall configurations, intrusion detection systems, and other security technologies. Identify gaps or weaknesses and recommend improvements. Security documentation and reporting: Prepare detailed audit reports, documenting findings, recommendations, and remediation plans. Maintain accurate audit records and ensure compliance with documentation standards. Continuous improvement: Stay updated with the latest trends, technologies, and practices in information security. Continuously improve auditing methodologies, tools, and frameworks to enhance the effectiveness and efficiency of the audit process. Team leadership and collaboration: Provide guidance, support, and mentorship to junior auditors. Communication and stakeholder management: Effectively communicate audit findings, risks, and recommendations to results.

Job Requirements

Relevant University Degree in Information Security or Information Technology. Professional Qualifications in Information Security. Minimum 5 Years of Experience in IT audit or Information Security Audit. Have a Valid Transferrable Visa in Kuwait.

About Boubyan Consulting

We are offering the following services to clients:- Internal Audit - Risk Management - Corporate Governance - Internal Controls review and assessment - Regulatory Compliance Advisory Services- Management Consulting- Training Seniority level

Seniority level Mid-Senior level Employment type

Employment type Full-time Job function

Job function Information Technology Industries Business Consulting and Services Referrals increase your chances of interviewing at Boubyan Consulting Company by 2x Sign in to set job alerts for “Security Auditor” roles.

Technical Solutions Consultant, Security (Arabic)

Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required)

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Threat Analyst Jobs