- ...the man who is actually in the arena.” We’re here, standing beside our customers, ready to serve and succeed. ITA is seeking a Security Forces Amorer Support to join the team in Kuwait. * Please note this position is contingent upon position vacancy * Responsibilities...
- ...Program | INSCOM GILE Referral Bonus Plan: * * * Job Description: The Opportunity: CACI has an immediate opening for a Security Systems Technician / PSEP to join our mission critical team in Kuwait. Responsibilities: Candidate will have knowledge in...
CAC/PKI Local Registration Authority (LRA) Information Security Specialist - Intermediate 160th[...]
...Position: CAC/PKI Local Registration Authority (LRA) Information Security Specialist You will support the Army Network Enterprise... ...Compliance Audits (annual and semi-annual). Assist the Army CIO/G6 Cyber Security Directorate and NETCOM G3/5 with audit findings,...- ...has positioned us as a trusted technology-driven organization, safeguarding customer businesses from the ever-evolving landscape of cyber threats and creating business values in customers' enterprise portfolios using our AI tools and services. We never stop pushing the...
- ...Overview: GovCIO is currently hiring for a Cyber Security. This position will be located in ASAB, Kuwait, SAB, KSA and UDAB, UAE. Position is an onsite position. Responsibilities: Correlates threat data from various sources to establish the identity and modus operandi...
- ...Description Key Talent Partners is seeking a skilled Cyber Security/System Engineer to join our client team in Kuwait City. As a mid to senior-level engineer, you will be responsible for ensuring the security and stability of their systems and networks. This is a full...
- ...area always clean and tidy Follows organizational rules and regulations / Policy & Procedures Follows company’s safety and security procedures Handles cash/credit payments and accurately counts customers’ money Counts and balances cash, credit slips, vouchers...
- ...training, scheduling, evaluating, counseling, disciplining, and motivating and coaching employees. Follow all company and safety and security policies and procedures; report maintenance problems, safety hazards, accidents, or injuries; and complete safety training and...
$60000 per year
...tailored for small healthcare businesses and private practices. Our mission is to help providers enhance efficiency, ensure data security, and adopt cost-effective technology solutions that support high-quality care. In addition to healthcare IT support, we develop custom...- ...delivery workflows. ~Troubleshoot and resolve daily system issues for operations, drivers, and reception counters. ~Ensure ERP security profiles and user roles are properly configured and maintained. ~Generate system reports and dashboards to support logistics...
- ...Collaborate with vendors and third-party support teams as needed. Maintain inventory of hardware and software assets. Follow IT security policies and best practices to protect data and systems. Requirements: Bachelor’s degree in Computer Science, Information...
- • Knowledge of VMs, servers, backups, firewalls, GPO, AD, and Exchange • Understanding of IT security concepts • Experience in project management and daily task coordination Requirements: • Must have a Bachelor’s degree in IT or a related field • Minimum 5 years...
- ...Compliance Auditing, Complying With Regulations, Data Analysis and Interpretation, Data Ingestion, Data Modeling, Data Quality, Data Security, Data Transformation, Data Visualization, Emotional Regulation, Empathy, External Audit, Financial Accounting, Financial Audit,...
- ...Location: KW Company: Alghanim Industries Long Description Job Summary Job Responsibilities Key Responsibilities: Secure contracts by working directly with individuals involved in construction and landscaping projects in outdoor locations across Kuwait...
- ...and Bahrain Splunk is here to build a safer and more resilient digital world. The world's leading enterprises use our unified security and observability platform to keep their digital systems secure and reliable. While customers love our technology, it's our people...Remote job
- ...communications issues, which include LAN/WAN, phone line and Iridium • Ensure applicable Information Assurance Vulnerability Alerts (IAVA) security patches are implemented and documented • Secure and account for government furnished equipment • Configure FDUs with a standard...
- ...communication skills for effective collaboration with internal teams and understanding user requirements. • Knowledge of implementing security measures to protect data and prevent breaches, adhering to best practices. • Ability to design and communicate effective...
- ...established Company policies, procedures, and standards, such as safekeeping of Company funds and property, personnel practices, security, inventory management, sales and record-keeping procedures. Train, coach, and manage all associates in execution of operations...
- ...make a real difference. Our team enjoys a strong sense of camaraderie and purpose, knowing that their work contributes to national security and global stability. If you are looking for a dynamic, rewarding career in geospatial intelligence, Geo Owl is the place for you....
- ...Job Description Do you find yourself constantly seeking better and more accurate information? Are you passionate about national security and ready to make a direct impact? We are seeking a Mid-Level Foreign Disclosure Representative (FDR) to join our team and...
- ...make a real difference. Our team enjoys a strong sense of camaraderie and purpose, knowing that their work contributes to national security and global stability. If you are looking for a dynamic, rewarding career in geospatial intelligence, Geo Owl is the place for you....
- ...Windows 10/11 and MacOS. Productivity Tools: Expert-level support for Office 365, OneDrive, CoPilot, Teams, and SharePoint. Security: Management of endpoint protection using SentinelOne Antivirus; setup and support for encryption technologies. Mobile Device...
- ...Running regular checks on network and data security. Identifying and acting on opportunities to improve and update software and systems. Developing and implementing IT policy and best practice guides for the organization. Notice Period: 2-3 months Director/Manager...
- ...customer shopping experience in the store. Provide support in identifying and developing the many talents in the goods flow team to secure succession planning. Live the IKEA values and nurture a strong and living IKEA culture that inspires extraordinary achievements...
- ...commitment to innovation through mobile-first technology, machine learning, and AI, we are seeking a Penetration Tester to ensure the security and integrity of our products. This role involves conducting rigorous penetration tests across our web and mobile banking...
- ...overall system testing and troubleshooting. # Ensure adherence to best practices in Salesforce development, including governance, security, and scalability. # Continuously monitor and optimize the performance of existing Salesforce applications. # Stay up-to-date...
- ...and analysis, and performance tuning; troubleshooting network problems; escalating. # Monitoring, evaluating and intercepting any security issues; suggesting and implementing suitable solutions. # Planning and executing the selection, installation, configuration, and...
- ...integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside...
- ...integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside...
- ...needed in existing applications/eservices to meet user requirements # Manage users' privileges and access to ensure application security # Log customer users’ suggestions and complaints # Produce technical documentation for new and existing applications/eservices...