drjobs IT Security Specialist العربية

IT Security Specialist

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Jobs by Experience drjobs

Not Mentionedyears

Job Location drjobs

Kuwait City - Kuwait

Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Nationality

Kuwaiti

Gender

Male

Vacancy

1 Vacancy

Job Description

Roles and responsibilities

  • Identify and fix vulnerabilities within existing security systems.
  • Develop organization-wide security measures.
  • Document known security breaches and vulnerabilities.
  • Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards.
  • Monitor and analyze security events and incidents to identify and respond to potential threats promptly.
  • Perform penetration tests to assess potential security problems.
  • Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks.
  • Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications.
  • Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required.
  • Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements.
  • Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR).
  • Establish relationships with external cybersecurity partners, vendors, and service providers.
  • Plan incident response activities, including investigating security breaches and recommending corrective actions.
  • Participate in the change management process.

Required Qualification

  • Education: Bachelor's degree in Computer Science, Information Systems, or a related field.
  • Experience: 3 to 4 years of experience in an IT security role.
  • Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels.
  • Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills.
  • Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines.
  • Strategic Thinking: Ability to align solution deliverables with the organization's goals.

Required Professional Skills

  • Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems.
  • Operating System Administration: Proficiency in securing Windows, Linux, and macOS.
  • Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures.
  • Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell.
  • Encryption Techniques: Knowledge of implementing and managing encryption for data protection.
  • Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware).
  • Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.

Desired candidate profile

1. Cybersecurity Knowledge and Expertise

  • Understanding of Threats: Knowledge of various cybersecurity threats such as malware, ransomware, phishing, DDoS (Distributed Denial of Service) attacks, insider threats, and zero-day vulnerabilities.
  • Security Frameworks and Standards: Familiarity with industry-standard cybersecurity frameworks (e.g., NIST, ISO 27001, CIS Controls, etc.) and regulatory standards like GDPR, HIPAA, or PCI DSS that guide security practices.
  • Security Technologies: Expertise in security technologies, including firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), antivirus software, VPNs, and encryption protocols.

2. Risk Management and Assessment

  • Risk Analysis: Conducting risk assessments to identify vulnerabilities within the organization's IT infrastructure, applications, and networks.
  • Vulnerability Management: Identifying and prioritizing security vulnerabilities, applying patches and updates, and testing systems for weaknesses that could be exploited by attackers.
  • Security Audits: Performing regular security audits and assessments to ensure that security policies and procedures are followed and systems are compliant with industry standards.

3. Incident Response and Crisis Management

  • Incident Detection and Investigation: Monitoring security systems and logs to detect potential security incidents, and conducting detailed investigations to determine the scope and nature of the incident.
  • Incident Response Plans: Developing and implementing incident response protocols to address security breaches and minimize damage.
  • Forensic Analysis: Conducting post-incident analysis to identify the root cause of security incidents, how the breach occurred, and how to prevent similar attacks in the future.

4. Network Security

  • Firewall Management: Configuring and maintaining firewalls to prevent unauthorized access to the organization’s networks.
  • VPN Setup and Management: Setting up and managing virtual private networks (VPNs) to ensure secure remote access for employees.
  • Secure Network Architecture: Designing and implementing secure network architectures, ensuring segmentation, and minimizing the risk of unauthorized access or data exfiltration.

5. Data Protection and Encryption

  • Encryption Techniques: Implementing encryption protocols for data at rest and in transit, including the use of secure file systems, SSL/TLS for web traffic, and encrypted email services.
  • Data Loss Prevention (DLP): Implementing strategies and tools to prevent sensitive data from being leaked or accessed by unauthorized parties.
  • Backup and Recovery: Ensuring that secure, encrypted backups of critical data are regularly made and can be quickly restored in the event of data loss or breach.

6. Endpoint Security

  • Endpoint Protection: Installing and configuring endpoint protection software (antivirus, anti-malware) on all company devices, including laptops, desktops, mobile devices, and servers.
  • Mobile Device Management (MDM): Managing and securing mobile devices that access company networks and data, ensuring they meet the organization's security requirements.
  • Patch Management: Ensuring that all devices are up-to-date with the latest security patches and software updates to prevent vulnerabilities.

Employment Type

Full-time

Company Industry

Food and Beverage

Department / Functional Area

Information Technology (IT)

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.