G
Cloud Security Architect
At Google
Posted Date
02 Jun 2025
Location
Kuwait
Salary Range
After Interview
Advertisement
About the Role
As a security consultant, you will be responsible for helping clients effectively prepare for, proactively mitigate, and detect and respond to cybersecurity threats. Security consultants have an understanding of computer science, operating system functionality and networking, cloud services, corporate network environments and how to apply this knowledge to cybersecurity threats.
Requirements
<b>Key Responsibilities:</b> <br> <br>
- Identify solution issue trends, and collaborate internally to proactively mitigate future risks. <br>
- Develop improved solution delivery methods and contribute to solution innovation initiatives. <br>
- Collaborate with stakeholders to define solutions and address escalations effectively. <br>
- Advise on tech best practices, optimize stakeholder processes, and build strategic relationships. <br> <br> <br> <b>- Qualifications:</b> <br> <br>
- Bachelor's degree in computer science, information systems, cybersecurity, related technical field, or equivalent practical experience. <br>
- 5 years of experience delivering cyber outcomes, identifying mission risks, and devising solutions to combat public sector focused threats. <br>
- 4 years of experience assessing and developing cybersecurity solutions across multiple security domains. <br>
- Ability to travel up to 50% of the time as required. <br>
- Ability to communicate in Arabic and English fluently as this is a customer-facing role that requires interactions in Arabic and English with local stakeholders. <br>
- Experience with enterprise networking and network segmentation strategies, agile program and project management, scrum methodology, descopes, GRC practices, NIST cybersecurity framework. <br>
- Experience with enterprise security controls in on premises and cloud infrastructures, zero trust architecture, secure enterprise platforms architecture, identity providers such as Google Cloud Platform, Active Directory, Salesforce, Business-to-Business/Business-to-Consumer identities and collaboration platforms. <br>
- Experience with privileged access management best practices. <br>
- Experience with Unix endpoint hardening and security control enforcement.
Apply
Advertisement