Enable job alerts via email!

IT Security Specialist – Information Security

HealthCare Dynamics Gen. Trading Company W.L.L

Farwaniya

On-site

KWD 15,000 - 30,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is on the lookout for a mid-level IT Security Specialist to enhance their cybersecurity framework. This role involves implementing robust security measures, monitoring for potential threats, and collaborating with various teams to ensure the integrity of systems and data. The ideal candidate will have a solid background in network security, operating system administration, and penetration testing, along with excellent communication and analytical skills. If you're passionate about cybersecurity and eager to make a significant impact in a dynamic environment, this opportunity is perfect for you.

Qualifications

  • 3-4 years of experience in IT security roles.
  • Bachelor's degree in Computer Science or related field required.

Responsibilities

  • Implement and maintain cybersecurity measures to protect networks and data.
  • Monitor security events and perform penetration tests to identify vulnerabilities.

Skills

Analytical Skills
Communication Skills
Time Management
Strategic Thinking

Education

Bachelor's degree in Computer Science
Bachelor's degree in Information Systems

Tools

Firewalls
VPNs
Intrusion Detection Systems
Security Software (anti-virus, anti-malware)
Endpoint Detection and Response (EDR)

Job description

Job Duties Include But Are Not Limited To:

We are currently seeking a mid-level, knowledgeable IT Security Specialist to join our IT team.

The candidate will be responsible for implementing and maintaining cybersecurity measures to protect our company's networks, systems, and data from potential threats.

  1. Identify and fix vulnerabilities within existing security systems.
  2. Develop organization-wide security measures.
  3. Document known security breaches and vulnerabilities.
  4. Maintain security policies, procedures, and guidelines to ensure compliance with regulatory frameworks and industry standards.
  5. Monitor and analyze security events and incidents to identify and respond to potential threats promptly.
  6. Perform penetration tests to assess potential security problems.
  7. Stay up to date with the latest threats, vulnerabilities, and security technologies to mitigate emerging risks.
  8. Collaborate with cross-functional teams to integrate security measures into the development of new systems and applications.
  9. Scan and discover network and system vulnerabilities using various tools, and perform penetration testing when required.
  10. Maintain documentation and reports related to cybersecurity incidents, actions taken, and compliance requirements.
  11. Perform configuration reviews for security systems like firewalls and Endpoint Detection and Response (EDR).
  12. Establish relationships with external cybersecurity partners, vendors, and service providers.
  13. Plan incident response activities, including investigating security breaches and recommending corrective actions.
  14. Participate in the change management process.

Required Qualification:

  1. Education: Bachelor's degree in Computer Science, Information Systems, or a related field.
  2. Experience: 3 to 4 years of experience in an IT security role.
  3. Communication Skills: Excellent verbal, written communication, and interpersonal skills for effective collaboration with team members and stakeholders at all levels.
  4. Analytical Skills: Strong analytical, troubleshooting, performance tuning, and debugging skills.
  5. Time Management: Effective time management and organizational skills to prioritize tasks and meet deadlines.
  6. Strategic Thinking: Ability to align solution deliverables with the organization's goals.

Required Professional Skills:

  1. Network Security: Understanding of network architecture, including firewalls, VPNs, and intrusion detection systems.
  2. Operating System Administration: Proficiency in securing Windows, Linux, and macOS.
  3. Penetration Testing: Experience in identifying and exploiting vulnerabilities to improve security measures.
  4. Programming Languages: Familiarity with Python, C++, Java, and scripting languages like PowerShell.
  5. Encryption Techniques: Knowledge of implementing and managing encryption for data protection.
  6. Software Configuration: Proficiency in configuring and managing security software (anti-virus, anti-malware).
  7. Cyber Operations: Knowledge of cyber operations and strategies to defend against threats.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.