Urgently required IT Specialist, iiQ8 Jobs, Kuwait Vacancy Security Architect
 
 
đģ We’re Hiring! – Data
Entry Staff (Kuwait Based)
đ Location: Kuwait
đĒĒ Visa Type: Article 18 (Transferable)
đ Fresh Graduates Welcome!
 
đ About the Role
If you’re organized, detail-oriented, and comfortable
working with data, this is a great opportunity to kickstart your career!
We’re looking for a Data Entry Clerk to join our growing team in Kuwait.
You’ll help keep things running smoothly behind the scenes by managing
information accurately and efficiently every single day.
Whether you’re just starting out or have some experience —
if you’ve got a sharp eye for detail and a can-do attitude, we want to hear
from you.
đ§Š What You’ll Do
- Enter
     and update data accurately in company systems and spreadsheets.
 - Review
     information for errors or inconsistencies.
 - Organize
     files, maintain records, and ensure everything stays up-to-date.
 - Work
     closely with team members to support administrative and reporting needs.
 
✅ What We’re Looking For
- Currently
     residing in Kuwait (Article 18 visa – transferable only).
 - Up
     to 30 years old.
 - Proficient
     in MS Office (Excel, Word) and basic computer operations.
 - Good
     typing speed and excellent attention to detail.
 - Strong
     communication and organizational skills.
 - Can
     join immediately (preferred).
 - Fresh
     graduates are encouraged to apply!
 
đŠ How to Apply
Ready to join a supportive, fast-paced team?
đ Send your CV to abeer@almailco.com
 
#NowHiring #DataEntryJobs #KuwaitJobs #AdminJobs #OfficeJobs
#FreshGraduateJobs #KuwaitCareers #ClericalJobs #HiringInKuwait #Article18Visa
#DataEntryStaff #ImmediateHiring #JoinOurTeam
 
 
IT Specialist – Security Architect
Location: KW – Company: Alghanim Industries
Job Summary
For the role of Information Security Consultant – Platform Security Architect & Endpoint Security, Job duties typically include planning and implementing security measures to identify, detect and correct information security breach to protect computer systems, networks and data. The roles is also responsible for designing technical / people / process controls for preventing data loss and service interruptions by implementing these controls to effectively protect network, server & end point nodes of the organization.
Information security/risk/incident consultant will also support the front-line defense of computing Infrastructure, protecting information from unauthorized access and violations. This will be done by analyzing and assessing potential security risks, developing plans to deal with such incidents by putting measures in place such as firewalls and encryption, monitoring and auditing systems for abnormal activity, and executing corrective actions. They will also prepare technical reports
Job Responsibilities
Key Responsibility
- Well versed and experienced in Governance, Risk and Compliance of large scale enterprise.
 - Implement and operate the Information and Data Privacy and Security Policy, controls, processes and systems and procedures.
 - Assess and where applicable, measure process performance against ISMS policy, objectives and practical experience and prepare the relevant report for review.
 - Prepare the internal ISMS-PIMS audit team and impart necessary trainings
 - Business Support delivers pertinent, timely actionable against alert generating security incidents
 
- Platform Security Architect – designs, builds and oversees the implementation of overall computer security for an organization.
 - End point policy development – designs, builds and oversees the implementation of end point security policies for an organization
 - End point Antivirus Management ownership- – designs, builds and oversees the implementation of end point security AV controls
 - End point Patch management ownership – oversees the implementation of patching security controls
 
- To establish a framework based controls for the development and continuance of organizational standards with respect to security
- Policy management
 - Security Application Management
 - Compliance management & reporting
 
 
Candidate Requirements
•Engineering Degree in Computer science
•5-8 years experience
•Certifications preferred – CISSP, CISA, CISM, ISO27001, ISO 27701 and relevant.
•Well versed in the use of VA and PT tools such as Nipper, Nessus, Metasploit, Web App Scanners, tenable, qualys, Fortify etc.
•Familiarity with Java & .net technologies
•Web application security experience
•One or more scripting language like perl/ php/ python/ bash.
•Familiarity with Security Standards and groups (ISO 27001, ISO 27701, ISO 20001, ITIL, Cobit, OWASP, Cyber and Data Privacy Laws)
•Certified with CEH or other security related certification
•Must understand end point Microsoft technologies, Microsoft Application and operating systems, backend processes, java and ASP
•Intermediary knowledge of various technology and platforms on virtualization, cloud, data governance, endpoint, network, server and workstation technologies and platforms
•Understand a variety of protocols including TCP/IP, UDP, DHCP, FTP, SFTP, ATM, SNMP, SMTP, SSH, SSL, VPN, RDP, HTTP and HTTPS.
•Operate SIEM consoles in order to monitor the environment for events of interest.
•Perform analysis of security logs in an attempt to detect unauthorized access
•Document security incidents detected on the network
•Ability to read and understand packet level data.
•Analytical skills, ability to work with minimal supervision, good speaking and writing skills, working knowledge of word, excel and PowerPoint
•Ability to see potential problem areas and proactively resolve issues.
•Manage BAU, and Incident management workstyle
•Dealing with difficult people
Education
Female Staff Required in Kuwait, IT Support, HR Recruitment , iiQ8 job vacancy
Urgently required IT Specialist, iiQ8 Jobs, Kuwait Vacancy Security Architect | Data Entry Staff
Multiple Jobs in Kuwait, Trolley Company , iiQ8 classifieds
0 Comments: