158 Cybersecurity jobs in Saudi Arabia

Threat Intelligence Lead

Canonical

Posted 21 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Join to apply for the Threat Intelligence Lead role at Canonical

Join to apply for the Threat Intelligence Lead role at Canonical

Get AI-powered advice on this job and more exclusive features.

The Threat Intelligence Lead will own Canonical's threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our products and internal cybersecurity controls. You will collaborate with internal stakeholders as well as with the wider cybersecurity community, making sure that Canonical is recognised as a thought leader on open source threat intelligence.

This role will report to the CISO.

You will lead intelligence gathering and development activities on threat actors targeting software supply chains. You'll study attack trends across the wider open source software landscape, report findings to internal security teams, and advise the wider engineering community on the best course of action to detect and mitigate possible threats.

As the publisher of Ubuntu, Canonical products are directly or indirectly present in almost every organisation and household in the world, making them a prime target for threat actors. This team's mission is to help Canonical, and by extension countless community members and companies around the world, secure their software infrastructure.

What you'll do in this role

  • Build and own Canonical's threat intelligence strategy
  • Build and maintain OSINT research environments
  • Develop OSINT tradecraft, principals, and techniques
  • Identify and track targeted intrusion cyber threats, trends, and new developments by cyber threat actors through analysis of proprietary and open source datasets
  • Collaborate across teams to inform on activity of interest
  • Coordinate adversary/campaign tracking
  • Contribute to the wider threat intelligence community, establishing Canonical as a key contributor and thought leader in the space
  • Work with product and engineering teams to explain cybersecurity threats and advise on mitigation strategies
  • Work with the OPSEC and IS team to help implement/update security controls prioritising cyber defence
  • Identify intelligence gaps and propose new tools and research projects to fill them
  • Conduct briefings for executives, internal stakeholders and external customers

The successful Threat Intelligence Lead will be

  • An experienced threat intelligence leader (or similar)
  • Knowledgeable about the current open source threat landscape and computer networking/infrastructure concepts
  • Highly competent with OSINT tools (e.g., Buscador, Trace Labs OSINT VM, OSINT Framework, Maltego, Shodan, social media scraping tools, etc.)
  • Able to identify, organise, catalogue, and track adversary tradecraft trends — often with incomplete data
  • Experienced using threat intelligence data to influence enterprise architecture or product development decisions
  • An excellent communicator with the ability to clearly articulate and tailor technical content to a variety of audiences
  • Able to travel twice a year, for company events up to two weeks long

Desired Characteristics

  • A professional portfolio of OSINT related scripts, tools, or frameworks
  • Demonstrated involvement in the larger OSINT community (please share relevant links)
  • Degree qualified, with a bachelor's degree in computer science, information security, or a related field
  • Certifications in related areas (e.g. GOSI, SANS SEC487 & SEC587, IntelTechniques OSIP, etc)
  • Experience in a tech company or government/military signal intelligence departments

What we offer you

We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.

  • Distributed work environment with twice-yearly team sprints in person
  • Personal learning and development budget of USD 2,000 per year
  • Annual compensation review
  • Recognition rewards
  • Annual holiday leave
  • Maternity and paternity leave
  • Employee Assistance Programme
  • Opportunity to travel to new locations to meet colleagues
  • Priority Pass, and travel upgrades for long haul company events

About Canonical

Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.

Canonical is an equal opportunity employer

We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Software Development

Referrals increase your chances of interviewing at Canonical by 2x

Get notified about new Threat Intelligence Lead jobs in Jiddah, Makkah, Saudi Arabia .

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Threat Intelligence Lead

Canonical

Posted 21 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

The Threat Intelligence Lead will own Canonical's threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our products and internal cybersecurity controls. You will collaborate with internal stakeholders as well as with the wider cybersecurity community, making sure that Canonical is recognised as a thought leader on open source threat intelligence.

This role will report to the CISO.

You will lead intelligence gathering and development activities on threat actors targeting software supply chains. You'll study attack trends across the wider open source software landscape, report findings to internal security teams, and advise the wider engineering community on the best course of action to detect and mitigate possible threats.

As the publisher of Ubuntu, Canonical products are directly or indirectly present in almost every organisation and household in the world, making them a prime target for threat actors. This team's mission is to help Canonical, and by extension countless community members and companies around the world, secure their software infrastructure.

What you'll do in this role

  • Build and own Canonical's threat intelligence strategy
  • Build and maintain OSINT research environments
  • Develop OSINT tradecraft, principals, and techniques
  • Identify and track targeted intrusion cyber threats, trends, and new developments by cyber threat actors through analysis of proprietary and open source datasets
  • Collaborate across teams to inform on activity of interest
  • Coordinate adversary/campaign tracking
  • Contribute to the wider threat intelligence community, establishing Canonical as a key contributor and thought leader in the space
  • Work with product and engineering teams to explain cybersecurity threats and advise on mitigation strategies
  • Work with the OPSEC and IS team to help implement/update security controls prioritising cyber defence
  • Identify intelligence gaps and propose new tools and research projects to fill them
  • Conduct briefings for executives, internal stakeholders and external customers

The successful Threat Intelligence Lead will be

  • An experienced threat intelligence leader (or similar)
  • Knowledgeable about the current open source threat landscape and computer networking/infrastructure concepts
  • Highly competent with OSINT tools (e.g., Buscador, Trace Labs OSINT VM, OSINT Framework, Maltego, Shodan, social media scraping tools, etc.)
  • Able to identify, organise, catalogue, and track adversary tradecraft trends — often with incomplete data
  • Experienced using threat intelligence data to influence enterprise architecture or product development decisions
  • An excellent communicator with the ability to clearly articulate and tailor technical content to a variety of audiences
  • Able to travel twice a year, for company events up to two weeks long

Desired Characteristics

  • A professional portfolio of OSINT related scripts, tools, or frameworks
  • Demonstrated involvement in the larger OSINT community (please share relevant links)
  • Degree qualified, with a bachelor's degree in computer science, information security, or a related field
  • Certifications in related areas (e.g. GOSI, SANS SEC487 & SEC587, IntelTechniques OSIP, etc)
  • Experience in a tech company or government/military signal intelligence departments

What we offer you

We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.

  • Distributed work environment with twice-yearly team sprints in person
  • Personal learning and development budget of USD 2,000 per year
  • Annual compensation review
  • Recognition rewards
  • Annual holiday leave
  • Maternity and paternity leave
  • Employee Assistance Programme
  • Opportunity to travel to new locations to meet colleagues
  • Priority Pass, and travel upgrades for long haul company events

About Canonical

Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.

Canonical is an equal opportunity employer

We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Software Development

Referrals increase your chances of interviewing at Canonical by 2x

Get notified about new Threat Intelligence Lead jobs in Riyadh, Riyadh, Saudi Arabia .

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Threat Intelligence Analyst

CPX

Posted 7 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Senior Threat Intelligence Analyst role at CPX

1 week ago Be among the first 25 applicants

Join to apply for the Senior Threat Intelligence Analyst role at CPX

Job Purpose
At CPX, trust is at the heart of everything we do just because it is essential to every part of our connected digital world. Whether it is enjoying the freedom of a protected internet, secure transactions or safe communications - we protect, transform and nurture today so that all people can flourish with the freedom to achieve their potential tomorrow.
As a Senior Analyst - Threat Intelligence, you will have strong analytical and investigative skills and be capable of receiving mass data and translate it into bright intelligence findings. You will conduct research and analysis, and will collaborate to author various analytic documents, identifying findings and presenting hypotheses and intelligence gaps and recommendations. The analyst will also review weekly, monthly and on demand reports enabling discussions relating to our mission. The analyst will also contribute to the enhancement of the Threat Intelligence Center, processes, tool selection and capabilities through continuous innovation.
Job Responsibilities
Key Focus Area
Key Activities
Key Responsibilities

  • Collection, analysis and distribution of threat intelligence from multiple sources (All-Source Intelligence)
  • Manage threat intelligence platforms and monitor feed sources for efficacy
  • Preparation of intelligence products, including high-quality papers, assessments, briefings, recommendations, and findings.
  • Develop, manage, optimize and continuously improve processes to enhance the overall cyber threat intelligence function
  • Develops and validates templates
  • Validates TIP processes and procedures – assists in authoring
  • Assist in the definition of corporate intelligence requirements (both inside and outside of the team, to include key business areas or units) based on changes to business needs, structure, priorities and technology
  • Dissemination of Intel products, to include threat alerts, reports, briefings, etc.
  • Contribute to situational awareness activities or processes within the organization, and business, providing business context to active or emerging threats
  • Conduct intelligence assessments to determine key characteristics of the attack, attribution, and actor motivation, intent, and capability.
  • Enhance the Threat Intelligence Center, processes, tool selection and capabilities through continuous innovation.
AOR (Any Other Responsibilities)
Any other responsibilities as required by the Line Manager
Job Specifications
Skills/Certifications (Technical & Non-Technical)
  • Have in-depth analytical and monitoring skills, team cooperation and ability to work in a high-pressure environment.
  • Demonstrate the ability to communicate effectively with the other key stakeholders.
  • Have a passion for security, with a good understanding of adversary motivations, capability and intent and the tools and techniques of the trade
  • Expertise in understanding and applying the intelligence lifecycle.
  • In-depth awareness and use of open source intelligence-type tools and methods.
  • Expertise in collection methods, intelligence production and analysis, analytic writing, argument mapping, and structured analytic techniques.
  • Training in critical thinking, cyber intelligence, and cyber counterintelligence
  • Strong knowledge of threat intelligence platforms.
  • Strong analytic tradecraft is necessary, as is the ability to defend analysis in the face of countervailing opinion.
  • Strong understanding of the information security threat landscape
  • Formal intelligence analysis training and/or intelligence application experience
  • Ability to work well with others in a fast-paced dynamic environment
  • Excellent verbal and written communication skills with strong interpersonal, facilitation & communication skills
  • Ability to learn & perform analysis quickly while balancing attention to detail and thoroughness
  • In-depth knowledge and understanding of cyber-attack vectors, detection techniques, malware analysis, cybercrime networks and methodologies
  • Experience working in large scale security operations especially large corporations, military or government organizations
  • Experience with using threat intelligence analytics software
  • Strong understanding of threat models, including security kill chain and diamond model
  • CISSP, GIAC, or similar Information Security/CTI certification is preferred
Minimum Work Experience
6+ years' experience working in a cyber threat analyst, threat researcher and/or intelligence analyst
Education
Bachelor’s degree in Computer Information Systems or a related discipline, or equivalent experience

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Computer and Network Security

Referrals increase your chances of interviewing at CPX by 2x

Sign in to set job alerts for “Threat Intelligence Analyst” roles.

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Threat Intelligence Analyst

Riyadh, Riyadh Help AG

Posted 21 days ago

Job Viewed

Tap Again To Close

Job Description

Help Ag is looking for a Cyber Threat Intelligence Analyst (TIA) who will be a part of the Cyber Defense team, responsible to help collect, analyze, and disseminate cyber intelligence impacting the company or its customers. The ideal candidate will be a professional with experience in cyber intelligence/cyber risk, delivering equivalent services to organizations, with drive and creativity. This is a fantastic opportunity for a passionate professional that wants to evolve in the Cyber Intelligence world. The position will involve essential duties and responsibilities that must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work.


Responsibilities

  • Identify, collect, and perform analysis of raw, primary, and secondary data derived from various sources.

  • Create and update General Intelligence Requirements (GIR)s, Priority Intelligence Requirements (PIR)s, and Organization Specific Intelligence Requirements (OSIR)s for customers.

  • Create threat profiles and threat landscapes for companies and or customers.

  • Create diamond models around customers and threat adversaries.

  • Improve the creation and delivery of intelligence information to customers and partners, via different reports and tools, linking the dots and adding value to the service delivered.

  • Perform investigations on the internet and dark web on different topics, from broad investigations to specific searches.

  • Identify, assess, and track tactics, techniques, and procedures of cyber threat actors.

  • Provide threat review and validation to customers on their exposure to cyber security risks, threats, and potential impact.

  • Provide actionable strategic, technical, and tactical cyber intelligence to company & its subsidiaries through weekly, monthly, and ad hoc reports, briefings, and presentations.

  • Conduct Internet searches, in English and Arabic, to profile customers’ online presence and optimize data feeds into back end cyber threat harvesting and analysis solutions.

  • Apply advanced search techniques (e.g., Boolean terms) in Google/Bing search engines, social sites, domain databases, darknet, etc. to reduce false positives.

  • Support customers in take down efforts to remove fraudulent, offensive, and suspicious online content.

  • Be up to date on knowledge of attacker tools/techniques, country and regional cyber threats, business, and political landscapes to reflect their context into detected/created threats to reduce false positives to help improve generated reports.

  • Provide feedback and recommendations to Backend Cyber defense teams such as the MDR Team to enhance detection's (e.g., false positives, generic data, fine-tuning, updated info, etc.) and improve portal performance and/or experience.

  • Understand customer industries to generate Arabic keywords to support searches of online Arabic content.

  • Identify new information sources (English and Arabic), search keywords (English and Arabic) and best practices to achieve more accurate and customer related threat detection.

  • When customers request ad-hoc investigations, assist in defining the investigation scope, delivery date and present the findings to the customer (report).

  • Understand and perform analysis of competing hypotheses (ACH) for use in threat hunting and advisory production.

  • Manage the life cycle of threat intelligence.

  • Maintain a high degree of awareness of the current threat landscape.

  • Assist in providing threat and vulnerability analysis as well as security advisory services.

  • Participate in knowledge sharing with other Analysts and writing technical articles for Internal Knowledge Bases.

  • Perform tasks independently with some oversight.

  • Deliver Cyber Intelligence services.

  • Research and craft analytic papers and deliver intelligence briefings under short deadlines on various geographical and functional topics.

  • Use knowledge, creativity, and analytic tradecraft best practices to obtain solutions to complex problems.

Qualifications & Skills:

  • A Degree in Computer Science, Information Systems, Electronics Engineering, or a closely related degree.

  • 1 - 4 years’ experience as a TIA or related position.

  • An active, demonstrable interest in cyber threat detection, and cyber threat intelligence.

  • A thorough understanding of IT systems and network security concepts, network protocols.

  • Thorough understanding of cyber threats and warfare such as Internet services attacks, User attacks, APTs, malicious mobile apps, online fraud, dark-net, hackers’ tools/techniques, hacktivist, etc.

  • Knowledge of latest global cyber-attacks, prominent ransomware, APT groups.

  • Demonstrable knowledge around GIR creations and threat profiling/landscaping.

  • Demonstrable knowledge of cyber threat intelligence, threat actors, malware, tactics, techniques, and procedures (TTPs), intelligence analysis, use of diamond models and various security methodologies and processes.

  • Demonstrable knowledge analysis of competing hypotheses (ACH) for evaluating multiple competing hypotheses for observed data.

  • Deep knowledge of IT security best practices, common attack types, and detection/prevention methods.

  • Demonstrable knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cybercrime.

  • Demonstrable knowledge on deep and dark web.

  • Good understanding of the cyber kill chain or attack vectors.

  • Excellent verbal and written communication skills including the ability to clearly articulate technical and strategic level cyber matters to a variety of audiences.

  • Ability to multitask, prioritize, and manage time effectively.

  • Strong attention to detail.

  • Excellent interpersonal skills and professional demeanor.

  • Excellent customer service skills.

  • Formal Intelligence Analysis training & certifications like GCTI, GOSI, C|TIA, Security+, RCIA, CTIP, CPTIA, CRTIA, CTIS-I and or CTIS-II.

Benefits:

  • Health insurance with one of the leading global providers for medical insurance.

  • Career progression and growth through challenging projects and work.

  • Employee engagement activities throughout the year.

  • Tailored training & development program.

About Us:

Help AG is the cyber security arm of e& enterprise and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.

Present in the Middle East since 2004, Help AG was strategically acquired by Etisalat group in Feb 2020, hence creating a cyber security and digital transformation powerhouse in the region.

Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and cyber security focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Engineer

Cyberspace LLC

Posted today

Job Viewed

Tap Again To Close

Job Description

Ryiadh, Saudi Arabia | Posted on 07/14/2025

Job Summary

We Are seeking a Cybersecurity Engineer to support enterprise-level security operations. The Cybersecurity Engineer will play a pivotal role in implementing, maintaining, and enhancing the organization’s cybersecurity posture. This role involves direct support in executing the organization’s cybersecurity roadmap, aligning with national frameworks such as the CST Cybersecurity Regulatory Framework (CRF), and ensuring operational compliance and threat resilience.

Responsibilities
  • Ensure compliance with regulatory frameworks and assist in the integration of CRF controls into daily operations.
  • Lead the deployment, configuration, and management of critical security technologies, including firewalls, endpoint protection, and network security tools.
  • Enforce acceptable use policies for information assets and assist in awareness training efforts.
  • Assist in network segmentation projects and apply segmentation best practices to improve internal defense mechanisms.
  • Contribute to incident response plans, risk mitigation strategies, and the development of audit-ready documentation.
  • Maintain confidentiality, integrity, and availability of systems and data at all times.
Technical Skills & Expertise
  • Identity & Access Management (IAM): Proficient in implementing RBAC, Single Sign-On (SSO), Multi-Factor Authentication (MFA), and directory integrations.
  • Privileged Access Management (PAM): Experience in managing elevated access.
  • Firewall Administration: Hands-on experience with firewall management.
  • Network Access Control (NAC): Proficiency in NAC deployment and policy enforcement.
  • Web Application Firewalls (WAF): Practical knowledge in deploying and tuning WAFs.
  • Endpoint Detection & Response (EDR): Familiarity with leading EDR solutions.
  • SIEM & Log Management: Experience using log management tools for event correlation and threat monitoring.
  • Intrusion Detection/Prevention Systems (IDS/IPS): Skills in configuring and tuning IDS/IPS.
  • Cloud Security: Understanding of native security controls in major cloud platforms.
  • Data Loss Prevention (DLP): Experience in configuring and managing DLP tools to prevent sensitive data leakage.
  • Vulnerability Management: Proficient in using vulnerability scanning and reporting tools.
  • Incident Response & Forensics: Knowledge of creating incident response playbooks and conducting investigations.
  • Patching & Configuration Management: Familiarity with automated configuration tools and system patching workflows.
Requirements
  • Bachelor’s degree in Cybersecurity, Information Systems, Computer Science, ora related field.
  • Minimum 3 years of experience in cybersecurity engineering or security operations roles. Strong communication skills.
  • Certifications (Preferred): Security+, CCNA, Network, CISSP, CISM, CISA, OSCP, CEH, GSEC, Fortinet NSE, Palo Alto PCNSE, Cisco CCNP Security.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Engineer

Riyadh, Riyadh SSC HR Solutions

Posted 18 days ago

Job Viewed

Tap Again To Close

Job Description

  • Working with the team to manage all cybersecurity systems in Health Affairs, such as Firewall, WAF, SIEM, AV, EDR, Proxy
  • Continuous monitoring of alerts and security incidents
  • Classifying incidents into appropriate categories
  • Taking actions based on the severity of the incident, such as:
  • Notifying system administrators
  • Following the incident response plan
  • Escalating incidents according to incident response procedures
  • Properly documenting incidents
  • Documenting and reporting incidents
  • Resolving issues related to user requests
  • Tracking cyberattacks and collecting information about attackers
  • Creating or updating use cases for new systems and applications
  • Analyzing cyber events and incidents reported by the Cybersecurity Authority
  • Conducting regular vulnerability scans against internal IP addresses
  • Monitoring the level of system compliance with the technical security standards of the National Guard, which will be approved by the IT department after evaluation
  • Communicating with other departments during incident investigations
  • Preparing a monthly report, which should summarize the main incidents that were handled
  • Maintaining and operating the latest available versions of cybersecurity systems in Health Affairs
  • Identifying, classifying, prioritizing, and investigating related events collected from firewalls, network devices, proxies, IDS/IPS systems, antivirus systems, databases, servers, and endpoints

Responsibilities:

  • Working with the team to manage all cybersecurity systems in Health Affairs, such as Firewall, WAF, SIEM, AV, EDR, Proxy
  • Continuous monitoring of alerts and security incidents
  • Classifying incidents into appropriate categories
  • Taking actions based on the severity of the incident, such as:
    • Notifying system administrators
    • Following the incident response plan
    • Escalating incidents according to incident response procedures
    • Properly documenting incidents
  • Documenting and reporting incidents
  • Resolving issues related to user requests
  • Tracking cyberattacks and collecting information about attackers
  • Creating or updating use cases for new systems and applications
  • Analyzing cyber events and incidents reported by the Cybersecurity Authority
  • Conducting regular vulnerability scans against internal IP addresses
  • Monitoring the level of system compliance with the technical security standards of the National Guard, which will be approved by the IT department after evaluation
  • Communicating with other departments during incident investigations
  • Preparing a monthly report, which should summarize the main incidents that were handled
  • Maintaining and operating the latest available versions of cybersecurity systems in Health Affairs
  • Identifying, classifying, prioritizing, and investigating related events collected from firewalls, network devices, proxies, IDS/IPS systems, antivirus systems, databases, servers, and endpoints

Requirements

  • Bachelor's degree in computer science, Information Technology, or a related field
  • 1 to 3 years of experience in cybersecurity or a related area
  • Strong knowledge of network security, application security, and data protection
  • Experience with SIEM tools, firewalls, intrusion detection systems (IDS), and encryption technologies
  • Relevant certifications such as CISSP, CISM, or CEH are highly desirable

Skills:

  • Excellent problem-solving and analytical skills
  • Strong communication skills in both English and Arabic
  • Ability to work independently and collaboratively in a team environment
Seniority level
  • Seniority level Entry level
Employment type
  • Employment type Full-time
Job function
  • Industries IT Services and IT Consulting

Referrals increase your chances of interviewing at SSC HR Solutions by 2x

Get notified about new Cyber Security Engineer jobs in Riyadh, Riyadh, Saudi Arabia .

Penetration Testing Engineer I Ethical Hacker Senior Information Security Presales Engineer Cybersecurity Governance, Risk and Compliance Manager

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Analyst

Dammam Team Yamama

Posted 21 days ago

Job Viewed

Tap Again To Close

Job Description

We are seeking a skilled and proactive Cybersecurity Analyst to join our team in Dammam, Saudi Arabia. The ideal candidate will be responsible for monitoring, analyzing, and responding to cybersecurity incidents while ensuring the confidentiality, integrity, and availability of the organization’s systems and data.

Key Responsibilities:

Monitor network and system activity for security breaches using SIEM tools and intrusion detection systems.

Conduct vulnerability assessments and penetration testing.

Analyze security alerts and determine appropriate response actions.

Investigate and document security incidents and breaches.

Collaborate with IT teams to implement security controls and best practices.

Assist in the development and enforcement of company-wide security policies and procedures.

Stay up to date with the latest security trends, threats, and technology solutions.

Support audits and compliance initiatives (e.g., ISO 27001, NCA, etc.).

Provide security awareness training to internal teams.

Requirements:

Bachelor’s degree in Computer Science, Information Security, or related field.

Minimum 1 year of experience in cybersecurity or a related IT security role.

Strong understanding of network protocols, firewalls, VPNs, IDS/IPS, and endpoint protection.

Hands-on experience with security tools like SIEM, antivirus software, and vulnerability scanners.

Knowledge of cybersecurity frameworks (NIST, ISO, etc.).

Experience with incident response and digital forensics is a plus.

Industry certifications such as CEH, CompTIA Security+, CISSP (preferred but not mandatory).

Excellent problem-solving and analytical skills.

Strong communication and documentation abilities.

Location: Experience:

1+ Years

Employment Type:

Full-time

How to Apply:

Interested candidates are invited to submit their resume to with the subject line “Cybersecurity Analyst Application”.

Apply for this position

Life at TeamYamama is more than just delivering exceptional work for our clients. We are a global community of passionate and skilled professionals who embrace challenges, celebrate achievements, foster diversity, and strive for continuous growth.

Full Name *

Email *

Phone *

Upload CV/Resume * Allowed Type(s): .pdf, .doc, .docx

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Cybersecurity Jobs in Saudi Arabia !

Cybersecurity Manager

Riyadh, Riyadh Tap Payments

Posted 21 days ago

Job Viewed

Tap Again To Close

Job Description

As a Tapster you will:
• Ensure the organization complies with key financial regulations, such as GDPR, PCI DSS, and ISO 27001.
• Conduct regular audits and assessments to verify compliance with industry standards and regulatory requirements, utilizing the SAMA CyberSecurity Framework, NIST or COBIT.
• Monitor security systems, networks, and applications using advanced tools to detect potential threats and vulnerabilities, focusing on financial data and sensitive information.
• Respond to, investigate, and resolve security incidents promptly, providing root cause analysis and implementing remediation plans within agreed timelines.
• Collaborate with internal teams across Cybersecurity, IT, Compliance, and Product Development to improve incident response processes and ensure quick resolution.
• Work closely with compliance, legal, and risk management teams to ensure that security policies align with regulatory requirements.
• Carry out other duties as assigned, based on the demands of the business and the role's growth.
What you will bring to the party:
• 2-4 years of role-specific experience with an understanding of Fintech.
• Degree in Cybersecurity, Computer Science, or related field.
• Certification in CISSP, CISM, CEH, or similar technical certifications.
• Proven expertise in network security, firewalls, intrusion detection/prevention, and endpoint protection.
• Proficiency in cloud security (AWS, Azure, OCI), including hands-on experience implementing cloud security best practices in multi-cloud environments.
• Familiarity with scripting languages (Python, PowerShell, Bash) is preferred.
• Knowledge of/experience with international compliance requirements/standards, including GDPR and ISO 27001.
• Ability to build credibility and develop client, merchant, and stakeholder relationships.
• Ability to articulate support and meet client requirements effectively.
• Growth mindset and solution-driven approach.
• Strong interpersonal skills and ability to lead small engagements.
• Effective prioritization and organization of work.
• High productivity and innovation focus.
• Excellent communication skills in English; proficiency in Arabic is strongly preferred for engaging with regional clients and stakeholders.
• Saudi nationality is a mandatory requirement.

Company Industry

  • Banking
  • Broking

Department / Functional Area

Keywords

  • Cybersecurity Manager

Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or

This advertiser has chosen not to accept applicants from your region.

Cybersecurity Engineer

PartnerOne Capital

Posted 21 days ago

Job Viewed

Tap Again To Close

Job Description

Job Description :

At NetWitness, we empower organizations to detect, respond to, and neutralize cyber threats in real time. Our cutting-edge security solutions provide deep visibility, advanced threat intelligence, and rapid incident response capabilities to help businesses stay ahead of evolving cyber threats.

We are looking for a Resident Security Consultant to work on-site with our clients, providing expert guidance on cybersecurity best practices, incident response, and threat intelligence. In this role, you will leverage NetWitness technology to assess vulnerabilities, enhance security postures, and deliver hands-on support to protect critical assets. If you have a passion for cybersecurity and thrive in a customer-facing role, we’d love to hear from you!

We are looking for someone who has or knows the following:

  • Knowledge of IT and Networking Systems: Understanding of various IT and networking technologies is crucial.
  • Security Assessment and Audit: Ability to conduct security assessments and audits to identify vulnerabilities.
  • Vulnerability Management: Knowledge of vulnerability management processes and tools.
  • Incident Response: Familiarity with incident response procedures and methodologies
  • Threat Intelligence: Understanding of current cyber threats and attack vectors.
  • Security Technologies: Knowledge of various security technologies, such as firewalls, intrusion detection systems, and endpoint security solutions
  • Outsourcing Experience: Having previously faced customers/clients in providing advise and counsel on cybersecurity strategies and vulnerability risks
  • Programming Skills: Some roles may require basic programming or scripting skills
  • Cloud Security: Knowledge of on premise and cloud security principles and technologies
  • Soft Skills: Direct customer interaction and conflict management as well as presentation skills
Job Specification :
  • Bachelor's Degree (preferred): A bachelor's degree in computer science, information security, or a related field is often preferred, though some roles may accept equivalent experience or certifications.
  • Industry Certifications: Certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Security+ are highly valued.
  • Experience: Prior experience in IT, networking, security roles, or related fields can be beneficial. Experience working as a consultant, assessing customers' systems and environments to provide advise on cybersecurity strategies and approach is a MUST.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Engineer

Tandemsearch

Posted 21 days ago

Job Viewed

Tap Again To Close

Job Description

We are seeking Cyber Security Engineers with extensive experience in the Oil & Gas sector. The ideal candidate will have a minimum of 5 years of hands-on experience and possess key certifications, particularly in OT cybersecurity.

Requirements Certifications:
  • Preferably certified in MCSE, VMWare & CCNA
  • OT certifications such as IEC62443, GICSP will be an added advantage.
General Skills
  • Demonstrated expertise in cyber security engineering, preferably within process control environments.
  • Exceptional communication and documentation abilities.
  • Bachelor's degree in computer science or a related field.
Technical Experience Endpoint Protection:
  • Proficiency with Trellix (formerly McAfee) ePO suite, ENS, & Application Control (Whitelisting).
  • Experience with Symantec Endpoint Protection.
Microsoft Platform
  • Skilled in Active Directory Services, Group Policy, and System Hardening.
  • Familiarity with WSUS patch management and Terminal Services.
Backup & Recovery
  • Experience with Symantec/Veritas Backup Exec & SSR, Acronis, etc.
  • Knowledge of bare metal backup & recovery, SAN/NAS, LTO Tape library setup.
Virtualization
  • Proficient in VMWare ESXi, Hyper-V, and Shared Storage Services for high availability setups.
Hardware
  • Experience with HP, Dell, SAN, Tape Library hardware.
  • Competence in Switching, Routing & Firewalls.
Roles & Responsibilities
  • The Cyber Security engineer's principal role is to lead initiatives to implement and maintain cybersecurity architecture in the manufacturing environment.
  • Ensure compliance with network security guidelines, design specifications, and project documentation.
  • Support the activities of the multinational engineering team with the project manager.
  • Implement and maintain cybersecurity architecture on projects.
  • Conduct inspections and healthiness audits of Yokogawa cybersecurity solutions.
  • Collaborate with DCS/ESD/SCADA system service engineers for lifecycle support of Yokogawa’s cybersecurity solutions.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybersecurity Jobs