
IAVM Compliance Manager
- Kuwait City
- Permanent
- Full-time
Responsibilities
- Utilize automated compliance assessment tools to generate, store, and report using quantitative vulnerability metrics.
- Ensure compliance with DoD and federal cybersecurity policies, regulations, and standards.
- Develop and implement incident response plans to address cybersecurity incidents promptly.
- Investigate and analyze security incidents, providing detailed reports and recommendations for improvements.
- Contribute to the development and maintenance of security policies, procedures, and guidelines.
- Conduct risk assessments to evaluate the potential impact of security threats and vulnerabilities.
- Demonstrate knowledge of automated patch management tools in the Linux environment.
- Collaborate with stakeholders to develop and implement risk mitigation strategies.
- Recommend improvements to enhance the overall security posture of the network.
- Manage access controls, identity management, and permissions consistent with security clearance status and level.
- Automation of routine vulnerability scans and remediation processes.
- Collaborate with other cybersecurity professionals, IT teams, and stakeholders.
- Employ effective communication with technical and non-technical stakeholders to articulate the posture of the DODIN in the SWA AOR.
- Use a proactive approach to implementing continuous monitoring programs to identify and resolve security threats.
- Stay informed of emerging cybersecurity threats, technologies, and professional certification requirements, defined under DoD 8571.01M and DODD 8140 to enhance skills and advance working knowledge.
- Perform any additional duties as assigned.
- Qualifications
- Security Clearance:
- Requires an active Secret Clearance
- Education / Certifications: One year of related experience may be substituted for one year of education if degree is required.
- Bachelor’s Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field.
- This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.
- The authorized certifications for this job title are listed as follows:
- IAT Level: IAT III
- BASELINE:
- Cisco: CCNP Security
- CompTIA: CASP+ ce: Advanced Security Practitioner
- GIAC: GCED: Certified Enterprise Defender
- GIAC: GCIH: Certified Incident Handler
- ISACA: CISA: Certified Information Systems Auditor
- ISC2: CCSP: Certified Cloud Security Professional
- ISC2: CISSP (or Associate): Certified Information Systems Security Professional
- COMPUTING ENVIRONMENT (CE):
- CEH - Certified Ethical Hacker
- CHFI - Computer Hacking Forensic Investigator
- CIH - Certified Incident Handler
- Cisco: CCIE - Certified Internetwork Expert - ANY
- Cisco: CCNP - Certified Network Professional - ANY
- CND - Certified Network Defender
- GCIH - Certified Incident Handler
- MCSE - Certified Solutions Expert (ANY above 2012)
- Microsoft: 365 Certified: Enterprise Administrator Expert
- Microsoft: Certified: Azure Associate (ANY)
- Microsoft: Certified: Azure Expert (ANY)
- Red Hat: RHCA - Certified Architect
- Red Hat: RHCE - Certified Engineer
- RHCSA: Red Hat Certified System Administrator
- Experience:
- Requires a minimum of seven (7) years of experience in telecommunications sector.