507 Cybersecurity jobs in Saudi Arabia
Cyber threat intelligence Analyst
Posted 1 day ago
Job Viewed
Job Description
The Cyber Threat Intelligence Analyst will deliver and develop strategic and tactical Cyber Threat Intelligence capabilities within the cyber security operations team.
The role holder will maintain a clear understanding of the threat landscape, identify new sources of intelligence, and aggregate and analyze data to provide accurate and actionable recommendations. They will help manage the complete cyber threat intelligence lifecycle and ensure that this is appropriately integrated into relevant processes and tools.
The Cyber Threat Intelligence Analyst will be responsible for compiling, articulating and presenting cyber threat intelligence briefings for the Senior Cyber Threat Analyst as well as compiling clear and concise threat intelligence reports.
Job Responsibilities
- Help develop, configure and manage a suite of cyber threat intelligence sources
- Evaluate intelligence for accuracy, reliability, and relevance across multiple intelligence sources
- Help develop and maintain close links with cyber threat intelligence functions within partner organizations and government agencies
- Perform analysis across the estate, looking for threats to critical infrastructure, resources and services
- Help develop and produce threat intelligence reports, to provide key metrics into other internal cyber functions (Security Incident Response, Threat Hunting, etc.).
- Carry out research and discovery across the estate with a view to producing reports on CTI detections and trends (i.e. highlighted IOCs, Vulnerabilities, Malware).
- Manage the complete IoC lifecycle
- Provide analysis to feed into the overall security posture, assisting with supporting activities to further increase defenses, harden potential attack surfaces and implement better protection mechanisms.
- Act as CTI lead in the handling and remediation of security incidents.
- Maintain strong awareness with stakeholder groups of current threat landscape
- Review, analyze and contextualize complex threat intelligence data for wider consumption with business partners
What You'll Need
Qualification Requirements (Desirable)
- Certifications in security (i.e. GCTI, GREM, GCFA, GCIH) desirable but not essential
- Degree or equivalent (i.e. MBA) desirable but not essential
- Comprehensive knowledge about vulnerability and security policies such as ISO standards
Skills / Experience Requirements
- 5+ years operational experience as a threat intelligence analyst, with good working knowledge of security incident response and malware analysis.
- Experience in threat modeling and common frameworks such as the cyber kill chain and MITRE.
- Hands-on experience with Network Security, Digital Forensics and IPS/IDS systems.
- Hands-on experience with dark web analysis, including the associated tooling and adversarial slang.
- Solid understanding of supporting frameworks like MITRE ATT&CK, LM Cyber Kill Chain, IA Diamond Model, etc.
- Knowledge of supporting processes, like DFIR, Threat Hunting, Malware Analysis and red/purple team exercises.
- Knowledge of threat intelligence tooling, both commercial and open source.
- Understanding of Security Operations and supporting functions, technologies and methodologies.
- Ability to document findings into reports that can be understood across all levels of the organization.
- Strong presentation and communication skills, both verbal and written.
- Working knowledge of threat hunting
No of Positions: 1
Note: The candidate would be expected to work in diverse consulting engagements and is willing to travel to Middle East countries for project execution at least 50% of their time.
Preference to candidates who can join immediately or within 15 days at the max.
Employment Type: Full-time
#J-18808-LjbffrCyber Threat Intelligence Analyst
Posted 12 days ago
Job Viewed
Job Description
Help Ag is looking for a Cyber Threat Intelligence Analyst (TIA) who will be a part of the Cyber Defense team, responsible to help collect, analyze, and disseminate cyber intelligence impacting the company or its customers. The ideal candidate will be a professional with experience in cyber intelligence/cyber risk, delivering equivalent services to organizations, with drive and creativity. This is a fantastic opportunity for a passionate professional that wants to evolve in the Cyber Intelligence world. The position will involve essential duties and responsibilities that must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work.
Responsibilities
Identify, collect, and perform analysis of raw, primary, and secondary data derived from various sources.
Create and update General Intelligence Requirements (GIR)s, Priority Intelligence Requirements (PIR)s, and Organization Specific Intelligence Requirements (OSIR)s for customers.
Create threat profiles and threat landscapes for companies and or customers.
Create diamond models around customers and threat adversaries.
Improve the creation and delivery of intelligence information to customers and partners, via different reports and tools, linking the dots and adding value to the service delivered.
Perform investigations on the internet and dark web on different topics, from broad investigations to specific searches.
Identify, assess, and track tactics, techniques, and procedures of cyber threat actors.
Provide threat review and validation to customers on their exposure to cyber security risks, threats, and potential impact.
Provide actionable strategic, technical, and tactical cyber intelligence to company & its subsidiaries through weekly, monthly, and ad hoc reports, briefings, and presentations.
Conduct Internet searches, in English and Arabic, to profile customers’ online presence and optimize data feeds into back end cyber threat harvesting and analysis solutions.
Apply advanced search techniques (e.g., Boolean terms) in Google/Bing search engines, social sites, domain databases, darknet, etc. to reduce false positives.
Support customers in take down efforts to remove fraudulent, offensive, and suspicious online content.
Be up to date on knowledge of attacker tools/techniques, country and regional cyber threats, business, and political landscapes to reflect their context into detected/created threats to reduce false positives to help improve generated reports.
Provide feedback and recommendations to Backend Cyber defense teams such as the MDR Team to enhance detection's (e.g., false positives, generic data, fine-tuning, updated info, etc.) and improve portal performance and/or experience.
Understand customer industries to generate Arabic keywords to support searches of online Arabic content.
Identify new information sources (English and Arabic), search keywords (English and Arabic) and best practices to achieve more accurate and customer related threat detection.
When customers request ad-hoc investigations, assist in defining the investigation scope, delivery date and present the findings to the customer (report).
Understand and perform analysis of competing hypotheses (ACH) for use in threat hunting and advisory production.
Manage the life cycle of threat intelligence.
Maintain a high degree of awareness of the current threat landscape.
Assist in providing threat and vulnerability analysis as well as security advisory services.
Participate in knowledge sharing with other Analysts and writing technical articles for Internal Knowledge Bases.
Perform tasks independently with some oversight.
Deliver Cyber Intelligence services.
Research and craft analytic papers and deliver intelligence briefings under short deadlines on various geographical and functional topics.
Use knowledge, creativity, and analytic tradecraft best practices to obtain solutions to complex problems.
Qualifications & Skills:
A Degree in Computer Science, Information Systems, Electronics Engineering, or a closely related degree.
1 - 4 years’ experience as a TIA or related position.
An active, demonstrable interest in cyber threat detection, and cyber threat intelligence.
A thorough understanding of IT systems and network security concepts, network protocols.
Thorough understanding of cyber threats and warfare such as Internet services attacks, User attacks, APTs, malicious mobile apps, online fraud, dark-net, hackers’ tools/techniques, hacktivist, etc.
Knowledge of latest global cyber-attacks, prominent ransomware, APT groups.
Demonstrable knowledge around GIR creations and threat profiling/landscaping.
Demonstrable knowledge of cyber threat intelligence, threat actors, malware, tactics, techniques, and procedures (TTPs), intelligence analysis, use of diamond models and various security methodologies and processes.
Demonstrable knowledge analysis of competing hypotheses (ACH) for evaluating multiple competing hypotheses for observed data.
Deep knowledge of IT security best practices, common attack types, and detection/prevention methods.
Demonstrable knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cybercrime.
Demonstrable knowledge on deep and dark web.
Good understanding of the cyber kill chain or attack vectors.
Excellent verbal and written communication skills including the ability to clearly articulate technical and strategic level cyber matters to a variety of audiences.
Ability to multitask, prioritize, and manage time effectively.
Strong attention to detail.
Excellent interpersonal skills and professional demeanor.
Excellent customer service skills.
Formal Intelligence Analysis training & certifications like GCTI, GOSI, C|TIA, Security+, RCIA, CTIP, CPTIA, CRTIA, CTIS-I and or CTIS-II.
Benefits:
Health insurance with one of the leading global providers for medical insurance.
Career progression and growth through challenging projects and work.
Employee engagement activities throughout the year.
Tailored training & development program.
About Us:
Help AG is the cyber security arm of e& enterprise and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Present in the Middle East since 2004, Help AG was strategically acquired by Etisalat group in Feb 2020, hence creating a cyber security and digital transformation powerhouse in the region.
Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and cyber security focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.
#J-18808-LjbffrCyber Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Help Ag is looking for a Cyber Threat Intelligence Analyst (TIA) who will be a part of the Cyber Defense team, responsible to help collect, analyze, and disseminate cyber intelligence impacting the company or its customers. The ideal candidate will be a professional with experience in cyber intelligence/cyber risk, delivering equivalent services to organizations, with drive and creativity. This is a fantastic opportunity for a passionate professional that wants to evolve in the Cyber Intelligence world. The position will involve essential duties and responsibilities that must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work.
Responsibilities
Identify, collect, and perform analysis of raw, primary, and secondary data derived from various sources.
Create and update General Intelligence Requirements (GIR)s, Priority Intelligence Requirements (PIR)s, and Organization Specific Intelligence Requirements (OSIR)s for customers.
Create threat profiles and threat landscapes for companies and or customers.
Create diamond models around customers and threat adversaries.
Improve the creation and delivery of intelligence information to customers and partners, via different reports and tools, linking the dots and adding value to the service delivered.
Perform investigations on the internet and dark web on different topics, from broad investigations to specific searches.
Identify, assess, and track tactics, techniques, and procedures of cyber threat actors.
Provide threat review and validation to customers on their exposure to cyber security risks, threats, and potential impact.
Provide actionable strategic, technical, and tactical cyber intelligence to company & its subsidiaries through weekly, monthly, and ad hoc reports, briefings, and presentations.
Conduct Internet searches, in English and Arabic, to profile customers’ online presence and optimize data feeds into back end cyber threat harvesting and analysis solutions.
Apply advanced search techniques (e.g., Boolean terms) in Google/Bing search engines, social sites, domain databases, darknet, etc. to reduce false positives.
Support customers in take down efforts to remove fraudulent, offensive, and suspicious online content.
Be up to date on knowledge of attacker tools/techniques, country and regional cyber threats, business, and political landscapes to reflect their context into detected/created threats to reduce false positives to help improve generated reports.
Provide feedback and recommendations to Backend Cyber defense teams such as the MDR Team to enhance detection's (e.g., false positives, generic data, fine-tuning, updated info, etc.) and improve portal performance and/or experience.
Understand customer industries to generate Arabic keywords to support searches of online Arabic content.
Identify new information sources (English and Arabic), search keywords (English and Arabic) and best practices to achieve more accurate and customer related threat detection.
When customers request ad-hoc investigations, assist in defining the investigation scope, delivery date and present the findings to the customer (report).
Understand and perform analysis of competing hypotheses (ACH) for use in threat hunting and advisory production.
Manage the life cycle of threat intelligence.
Maintain a high degree of awareness of the current threat landscape.
Assist in providing threat and vulnerability analysis as well as security advisory services.
Participate in knowledge sharing with other Analysts and writing technical articles for Internal Knowledge Bases.
Perform tasks independently with some oversight.
Deliver Cyber Intelligence services.
Research and craft analytic papers and deliver intelligence briefings under short deadlines on various geographical and functional topics.
Use knowledge, creativity, and analytic tradecraft best practices to obtain solutions to complex problems.
Qualifications & Skills:
A Degree in Computer Science, Information Systems, Electronics Engineering, or a closely related degree.
1 - 4 years’ experience as a TIA or related position.
An active, demonstrable interest in cyber threat detection, and cyber threat intelligence.
A thorough understanding of IT systems and network security concepts, network protocols.
Thorough understanding of cyber threats and warfare such as Internet services attacks, User attacks, APTs, malicious mobile apps, online fraud, dark-net, hackers’ tools/techniques, hacktivist, etc.
Knowledge of latest global cyber-attacks, prominent ransomware, APT groups.
Demonstrable knowledge around GIR creations and threat profiling/landscaping.
Demonstrable knowledge of cyber threat intelligence, threat actors, malware, tactics, techniques, and procedures (TTPs), intelligence analysis, use of diamond models and various security methodologies and processes.
Demonstrable knowledge analysis of competing hypotheses (ACH) for evaluating multiple competing hypotheses for observed data.
Deep knowledge of IT security best practices, common attack types, and detection/prevention methods.
Demonstrable knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cybercrime.
Demonstrable knowledge on deep and dark web.
Good understanding of the cyber kill chain or attack vectors.
Excellent verbal and written communication skills including the ability to clearly articulate technical and strategic level cyber matters to a variety of audiences.
Ability to multitask, prioritize, and manage time effectively.
Strong attention to detail.
Excellent interpersonal skills and professional demeanor.
Excellent customer service skills.
Formal Intelligence Analysis training & certifications like GCTI, GOSI, C|TIA, Security+, RCIA, CTIP, CPTIA, CRTIA, CTIS-I and or CTIS-II.
Benefits:
Health insurance with one of the leading global providers for medical insurance.
Career progression and growth through challenging projects and work.
Employee engagement activities throughout the year.
Tailored training & development program.
About Us:
Help AG is the cyber security arm of e& enterprise and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Present in the Middle East since 2004, Help AG was strategically acquired by Etisalat group in Feb 2020, hence creating a cyber security and digital transformation powerhouse in the region.
Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and cyber security focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.
#J-18808-LjbffrCyber threat intelligence Analyst
Posted today
Job Viewed
Job Description
The Cyber Threat Intelligence Analyst will deliver and develop strategic and tactical Cyber Threat Intelligence capabilities within the cyber security operations team.
The role holder will maintain a clear understanding of the threat landscape, identify new sources of intelligence, and aggregate and analyze data to provide accurate and actionable recommendations. They will help manage the complete cyber threat intelligence lifecycle and ensure that this is appropriately integrated into relevant processes and tools.
The Cyber Threat Intelligence Analyst will be responsible for compiling, articulating and presenting cyber threat intelligence briefings for the Senior Cyber Threat Analyst as well as compiling clear and concise threat intelligence reports.
Job Responsibilities
- Help develop, configure and manage a suite of cyber threat intelligence sources
- Evaluate intelligence for accuracy, reliability, and relevance across multiple intelligence sources
- Help develop and maintain close links with cyber threat intelligence functions within partner organizations and government agencies
- Perform analysis across the estate, looking for threats to critical infrastructure, resources and services
- Help develop and produce threat intelligence reports, to provide key metrics into other internal cyber functions (Security Incident Response, Threat Hunting, etc.).
- Carry out research and discovery across the estate with a view to producing reports on CTI detections and trends (i.e. highlighted IOCs, Vulnerabilities, Malware).
- Manage the complete IoC lifecycle
- Provide analysis to feed into the overall security posture, assisting with supporting activities to further increase defenses, harden potential attack surfaces and implement better protection mechanisms.
- Act as CTI lead in the handling and remediation of security incidents.
- Maintain strong awareness with stakeholder groups of current threat landscape
- Review, analyze and contextualize complex threat intelligence data for wider consumption with business partners
What You'll Need
Qualification Requirements (Desirable)
- Certifications in security (i.e. GCTI, GREM, GCFA, GCIH) desirable but not essential
- Degree or equivalent (i.e. MBA) desirable but not essential
- Comprehensive knowledge about vulnerability and security policies such as ISO standards
Skills / Experience Requirements
- 5+ years operational experience as a threat intelligence analyst, with good working knowledge of security incident response and malware analysis.
- Experience in threat modeling and common frameworks such as the cyber kill chain and MITRE.
- Hands-on experience with Network Security, Digital Forensics and IPS/IDS systems.
- Hands-on experience with dark web analysis, including the associated tooling and adversarial slang.
- Solid understanding of supporting frameworks like MITRE ATT&CK, LM Cyber Kill Chain, IA Diamond Model, etc.
- Knowledge of supporting processes, like DFIR, Threat Hunting, Malware Analysis and red/purple team exercises.
- Knowledge of threat intelligence tooling, both commercial and open source.
- Understanding of Security Operations and supporting functions, technologies and methodologies.
- Ability to document findings into reports that can be understood across all levels of the organization.
- Strong presentation and communication skills, both verbal and written.
- Working knowledge of threat hunting
No of Positions: 1
Note: The candidate would be expected to work in diverse consulting engagements and is willing to travel to Middle East countries for project execution at least 50% of their time.
Preference to candidates who can join immediately or within 15 days at the max.
Employment Type: Full-time
#J-18808-LjbffrCyber threat intelligence Analyst
Posted today
Job Viewed
Job Description
The Cyber Threat Intelligence Analyst will deliver and develop strategic and tactical Cyber Threat Intelligence capabilities within the cyber security operations team.
The role holder will maintain a clear understanding of the threat landscape, identify new sources of intelligence, and aggregate and analyze data to provide accurate and actionable recommendations. They will help manage the complete cyber threat intelligence lifecycle and ensure that this is appropriately integrated into relevant processes and tools.
The Cyber Threat Intelligence Analyst will be responsible for compiling, articulating and presenting cyber threat intelligence briefings for the Senior Cyber Threat Analyst as well as compiling clear and concise threat intelligence reports.
Job Responsibilities
- Help develop, configure and manage a suite of cyber threat intelligence sources
- Evaluate intelligence for accuracy, reliability, and relevance across multiple intelligence sources
- Help develop and maintain close links with cyber threat intelligence functions within partner organizations and government agencies
- Perform analysis across the estate, looking for threats to critical infrastructure, resources and services
- Help develop and produce threat intelligence reports, to provide key metrics into other internal cyber functions (Security Incident Response, Threat Hunting, etc.).
- Carry out research and discovery across the estate with a view to producing reports on CTI detections and trends (i.e. highlighted IOCs, Vulnerabilities, Malware).
- Manage the complete IoC lifecycle
- Providing analysis to feed into the overall security posture, assisting with supporting activities to further increase defences, harden potential attack surfaces and implement better protection mechanisms.
- Act as CTI lead in the handling and remediation of security incidents.
- Maintain strong awareness with stakeholder groups of current threat landscape
- Review, analyse and contextualise complex threat intelligence data for wider consumption with business partners
What You'll Need
Qualification Requirements (Desirable)
- Certifications in security (i.e. GCTI, GREM, GCFA, GCIH) desirable but not essential
- Degree or equivalent (i.e. MBA) desirable but not essential
- Comprehensive knowledge about vulnerability and security policies such as ISO standards
Skills / Experience Requirements
- 5+ years operational experience as a threat intelligence analyst, with good working knowledge of security incident response and malware analysis.
- Experience in threat modeling and common frameworks such as the cyber kill chain and MITRE.
- Hands-on experience with Network Security, Digital Forensics and IPS/IDS systems.
- Hands-on experience with dark web analysis, including the associated tooling and adversarial slang.
- Solid understanding of supporting frameworks like MITRE ATT&CK, LM Cyber Kill Chain, IA Diamond Model, etc.
- Knowledge of supporting processes, like DFIR, Threat Hunting, Malware Analysis and red/purple team exercises.
- Knowledge of threat intelligence tooling, both commercial and open source.
- Understanding of Security Operations and supporting functions, technologies and methodologies.
- Ability to document findings into reports that can be understood across all levels of the organization.
- Strong presentation and communication skills, both verbal and written.
- Working knowledge of threat hunting
No of Positions: 1
Note: The candidate would be expected to work in diverse consulting engagements and are willing to travel to Middle East countries for project execution at least 50% of their time.
Preference to candidates who can join immediately or within 15 days at the max.
Employment Type : Full-time
Cybersecurity Engineer
Posted today
Job Viewed
Job Description
Overview
Not just a job, but a career. Yokogawa, award winner for ‘Best Asset Monitoring Technology’ and ‘Best Digital Twin Technology’ at the HP Awards, is a leading provider of industrial automation, test and measurement, information systems and industrial services in several industries. Our aim is to shape a better future for our planet through supporting the energy transition, (bio)technology, artificial intelligence, industrial cybersecurity, etc. We are committed to the United Nations sustainable development goals by utilizing our ability to measure and connect.
About The TeamOur 18,000 employees work in over 60 countries with one corporate mission, to "co-innovate tomorrow". We are looking for dynamic colleagues who share our passion for technology and care for our planet. In return, we offer you great career opportunities to grow yourself in a truly global culture where respect, value creation, collaboration, integrity, and gratitude are highly valued and exhibited in everything we do.
We are seeking Cyber Security Engineers with extensive experience in the Oil & Gas sector. The ideal candidate will have a minimum of 5 years of hands-on experience and possess key certifications, particularly in OT cybersecurity.
RequirementsCertifications:
- Preferably certified in MCSE, VMWare & CCNA
- OT certifications such as IEC62443, GICSP will be an added advantage.
General Skills:
- Demonstrated expertise in cyber security engineering, preferably within process control environments.
- Exceptional communication and documentation abilities
- Bachelor's degree in computer science or a related field
Technical Experience:
Endpoint Protection:
- Proficiency with Trellix (formerly McAfee) ePO suite, ENS, & Application Control (Whitelisting)
- Experience with Symantec Endpoint Protection
Microsoft Platform:
- Skilled in Active Directory Services, Group Policy, and System Hardening
- Familiarity with WSUS patch management and Terminal Services
Backup & Recovery:
- Experience with Symantec/Veritas Backup Exec & SSR, Acronis, etc.
- Knowledge of bare metal backup & recovery, SAN/NAS, LTO Tape library setup
Virtualization:
- Proficient in VMWare ESXi, Hyper-V, and Shared Storage Services for high availability setups
Hardware:
- Experience with HP, Dell, SAN, Tape Library hardware.
- Competence in Switching, Routing & Firewalls
- The Cyber Security engineer principal role is to lead initiatives to implement and maintain Cyber security architecture onto the manufacturing environment.
- Complying to network security guideline specifications, design approach and documents, for project implementation.
- Supporting the activities of the multinational engineering team with the project manager.
- Implement and maintain cybersecurity architecture on projects.
- Conduct inspections and healthiness audits of Yokogawa cyber security solutions.
- Work with teams of DCS/ESD/SCADA system service engineers for lifecycle support of Yokogawa’s cyber security solutions.
Yokogawa is an Equal Opportunity Employer. Yokogawa wants a diverse, equitable and inclusive culture. We will actively recruit, develop, and promote people from a variety of backgrounds who differ in terms of experience, knowledge, thinking styles, perspective, cultural background, and socioeconomic status. We will not discriminate based on race, skin color, age, sex, gender identity and expression, sexual orientation, religion, belief, political opinion, nationality, ethnicity, place of origin, disability, family relations or any other circumstances. Yokogawa values differences and enables everyone to belong, contribute, succeed, and demonstrate their full potential.
Are you being referred to one of our roles? If so, ask your connection at Yokogawa about our Employee Referral process!
#J-18808-LjbffrCybersecurity Architect
Posted 2 days ago
Job Viewed
Job Description
As Lendo continues to scale, we’re looking for a proactive and visionary Cybersecurity Architect to ensure our systems, applications, and infrastructure are secure by design. In this role, you’ll define security architecture frameworks, design and review solutions, and guide the implementation of IAM, PAM, and security tooling across the business.
You’ll collaborate closely with engineering, product, and compliance teams to embed secure-by-design principles into every layer of our technology. By conducting risk assessments, shaping policies, and aligning with regulatory requirements, you’ll help safeguard our operations while enabling innovation.
Key RequirementsDevelop and maintain security architecture frameworks, ensuring alignment with business objectives and regulatory requirements.
Provide security design guidance for infrastructure, applications, and cloud deployments.
Define and enforce secure design principles, standards, and patterns across IT and development lifecycles.
Conduct technical risk assessments and threat modeling to identify potential vulnerabilities and recommend mitigation strategies.
Assess and recommend security tools and technologies, ensuring scalability and resilience.
Partner with IT, developers, DevOps, and business units to embed security into projects from the ground up.
Provide architectural guidance during incident response, forensic investigations, and lessons-learned exercises.
Ensure designs adhere to frameworks and standards (e.g., NIST CSF, ISO 27001).
Stay current with evolving threats, emerging technologies, and industry best practices to strengthen enterprise security.
Define and oversee identity, access, and privilege management strategies, ensuring strong authentication, role-based access, and least-privilege principles.
Design and guide configuration of key security technologies (SIEM, EDR, firewalls, WAF, DLP, CASB, etc.) to ensure they are integrated and optimized.
Review architectural changes (e.g., new integrations, design changes, core network modifications, security tooling updates).
Guide and mentor security engineers, analysts, and developers in secure design best practices.
Bachelor’s degree in Computer Science, Cybersecurity, Information Systems, or related field (Master’s preferred).
5+ years of IT/security experience, with at least 2 years in a dedicated security architecture role.
Expertise in network, application, cloud, and data security architecture.
Strong knowledge of identity and access management (IAM), encryption, key management, and endpoint security.
Familiarity with DevSecOps practices and secure CI/CD pipeline integration.
Hands-on experience with security solutions (firewalls, SIEM, EDR, WAF, DLP, etc.).
Understanding compliance and regulatory requirements (e.g., GDPR, HIPAA, PCI-DSS, SOX).
Relevant certifications are strongly preferred: CISSP, CCSP, CISM, or cloud security certifications
Fluency in both English and Arabic (written and verbal), with the ability to communicate effectively with technical teams and executive leadership.
Be The First To Know
About the latest Cybersecurity Jobs in Saudi Arabia !
Cybersecurity Engineer
Posted 2 days ago
Job Viewed
Job Description
Join us as a Cybersecurity Specialist , contributing to the strategic direction and governance of our cybersecurity practices.
If you're: bilingual (Arabic/English), hold a Cybersecurity degree, have 5+ years of experience : apply now to shape our secure future.
Responsibilities
1. Evaluation of the Current Situation:
• Assess the existing cybersecurity landscape within the organization.
• Identify gaps and craft a robust development plan based on industry-leading cybersecurity practices.
2. Developing the Governance System:
• Define roles and responsibilities in cybersecurity management and secretariat departments.
• Formulate a comprehensive compliance plan for cybersecurity controls.
3. Developing the Financing System:
• Identify project types within the program’s scope.
• Create a brochure encompassing all controls of the National Cybersecurity Authority.
4. Monthly Reporting:
• Prepare and submit detailed monthly reports to the secretariat outlining completed tasks.
• Conduct necessary meetings to discuss progress.
• Conduct necessary meetings to discuss progress.
5. Operating Team Provision:
• Source and provide a skilled operating team for the duration of the contract, adhering to specifications.
6. Remote Consulting Team:
• Supply a specialized cybersecurity consulting team for remote work.
7. Cybersecurity Assessment:
• Scrutinize all systems and devices within the secretariat from a cybersecurity perspective.
8. Incident Response:
• Act promptly in response to cybersecurity incidents and compile necessary reports.
9. System and Program Reviews:
• Evaluate and review the configurations of cybersecurity systems and programs.
10. Document and Form Review:
• Examine documents and forms for adherence to cybersecurity policies.
Qualifications
• Bachelor's degree in Cybersecurity or a related Computer Science field.
• Minimum of 5 years of experience in Cybersecurity Policies .
• Professional certifications in the same field.
• ISO27001 certification for Cybersecurity Policy Specialist or equivalent.
• Proficiency in spoken and written English.
• Successful completion of a personal interview.
• Strong knowledge of networking and operating systems.
• Experience with security tools and software.
• Knowledge of security protocols and standards.
• Knowledge of security policies and regulations.
• Experience with security assessments and audits.
• Knowledge of Risk management and compliance.
• Analytical and problem-solving skills.
• Attention to detail.
• Strong communication and teamwork skills.
• Ability to work under pressure.
Interested candidates should submit their resume and a cover letter detailing their relevant experience to . Please include "Cybersecurity Application" in the subject line of your email.
#J-18808-LjbffrCybersecurity Manager
Posted 4 days ago
Job Viewed
Job Description
#J-18808-Ljbffr
Cybersecurity Architect
Posted 7 days ago
Job Viewed
Job Description
Overview
As Lendo continues to scale, we’re looking for a proactive and visionary Cybersecurity Architect to ensure our systems, applications, and infrastructure are secure by design. In this role, you’ll define security architecture frameworks, design and review solutions, and guide the implementation of IAM, PAM, and security tooling across the business.
You’ll collaborate closely with engineering, product, and compliance teams to embed secure-by-design principles into every layer of our technology. By conducting risk assessments, shaping policies, and aligning with regulatory requirements, you’ll help safeguard our operations while enabling innovation.
Responsibilities- Develop and maintain security architecture frameworks, ensuring alignment with business objectives and regulatory requirements.
- Provide security design guidance for infrastructure, applications, and cloud deployments.
- Define and enforce secure design principles, standards, and patterns across IT and development lifecycles.
- Conduct technical risk assessments and threat modeling to identify potential vulnerabilities and recommend mitigation strategies.
- Assess and recommend security tools and technologies, ensuring scalability and resilience.
- Partner with IT, developers, DevOps, and business units to embed security into projects from the ground up.
- Provide architectural guidance during incident response, forensic investigations, and lessons-learned exercises.
- Ensure designs adhere to frameworks and standards (e.g., NIST CSF, ISO 27001).
- Stay current with evolving threats, emerging technologies, and industry best practices to strengthen enterprise security.
- Define and oversee identity, access, and privilege management strategies, ensuring strong authentication, role-based access, and least-privilege principles.
- Design and guide configuration of key security technologies (SIEM, EDR, firewalls, WAF, DLP, CASB, etc.) to ensure they are integrated and optimized.
- Review architectural changes (e.g., new integrations, design changes, core network modifications, security tooling updates).
- Guide and mentor security engineers, analysts, and developers in secure design best practices.
- Bachelor’s degree in Computer Science, Cybersecurity, Information Systems, or related field (Master’s preferred).
- 5+ years of IT/security experience, with at least 2 years in a dedicated security architecture role.
- Expertise in network, application, cloud, and data security architecture.
- Strong knowledge of identity and access management (IAM), encryption, key management, and endpoint security.
- Familiarity with DevSecOps practices and secure CI/CD pipeline integration.
- Hands-on experience with security solutions (firewalls, SIEM, EDR, WAF, DLP, etc.).
- Understanding compliance and regulatory requirements (e.g., GDPR, HIPAA, PCI-DSS, SOX).
- Relevant certifications are strongly preferred: CISSP, CCSP, CISM, or cloud security certifications
- Fluency in both English and Arabic (written and verbal), with the ability to communicate effectively with technical teams and executive leadership.