ZAK SERVICES IS A LEADING SERVICE PROVIDER IN KUWAIT, LOOKING TO FILL THIS POSITION.
FULL RELOCATION COST COVERAGE WILL BE PROVIDED FOR CANDIDATES TO MOVE AND LIVE IN KUWAIT, THIS IS AN ONSITE POSITION.
ALL CERTIFICATES MENTIONED IN THE JOB POST WILL BE REQUESTED BY ZAK HR.
An Information Security Office is needed as per the job description below.
Responsibilities
- Policies:
- Assist and coordinate in the development and review of information security policies, standards and procedures.
- Ensure policies comply with any external requirements.
- Information Security Awareness:
- Develop and conduct security awareness sessions and programs for IT Staff, End users and Contractors.
- Participate in planning and content contribution for security awareness campaigns.
- Information Security Incident Response
- Participate in Information Security response plan development.
- Participate in information security incident handling and response.
- Perform analysis of Information Security incidents.
- Recommend rectifications and provide lessons learned from incidents.
- Risk assessment and Incident Prevention:
- Participate in ongoing IT risk assessment activities.
- Recommend new and assess current security controls.
- Recommend methods for vulnerability detection and remediation.
- Vulnerability Assessment and Penetration testing
- Conduct periodic vulnerability assessment and penetration testing
- Information security metrics/KPis
- Develop, review and report for on Metrics and Key Performance indicators for information security.
- Disaster Recovery and Business Continuity
- Review disaster recovery plans and preparations and recommend improvements.
- Review and report on results of disaster recovery drills
- Knowledge Transfer
- Work closely with information security staff and transfer relevant information security knowledge.
- Reports:
- Assist in preparing information security reports for management and ISMS committee.
- The Information security Officer shall produce summary reports on all activities on a monthly and quarterly basis. The format and the detail shall be agreed between the two parties. The purpose is for client to assess whether the performance is being provided satisfactorily and that plans for continuous improvement are in effect.
Qualifications
- University degree in computer science/Electronic engineering/Information Technology
- CISSP - Certified Information Systems Security Professional
- CEH - Certified Ethical Hacker
- Knowledge of computer and network forensics
- Minimum 3 years of experience in the information security field Understanding of risk management principles
- Penetration testing and vulnerability assessment experience
Benefits
- University degree in computer science/Electronic engineering/Information Technology
- CISSP - Certified Information Systems Security Professional
- CEH - Certified Ethical Hacker
- Knowledge of computer and network forensics
- Minimum 3 years of experience in the information security field Understanding of risk management principles
- Penetration testing and vulnerability assessment experience
About the company
The smartest recruitment technology of 2024. Join a world-class team of innovators who are disrupting HR Tech field with the power of AI and creative designs.
182 Howard Street, San Francisco , 95121
San Francisco, California, United States
San Francisco, California, United States
Be vigilant about potential scams, phishing attempts, or fraudulent activities, and seek credible sources or reviews to assess the trustworthiness of the company. Remember, your personal and financial security is paramount, and taking preventive measures is crucial to safeguarding your information from potential risks and unauthorized use. SupportFinity is not responsible for any consequences that may arise from disclosing such information to unauthorized or fraudulent entities.
FT-034A0
Full-time
40 hrs/wk
Kuwait
On site
Master (>10 yrs)
Regular schedule
English