507 Cybersecurity jobs in Saudi Arabia

Cyber threat intelligence Analyst

Securseed

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Job description

The Cyber Threat Intelligence Analyst will deliver and develop strategic and tactical Cyber Threat Intelligence capabilities within the cyber security operations team.

The role holder will maintain a clear understanding of the threat landscape, identify new sources of intelligence, and aggregate and analyze data to provide accurate and actionable recommendations. They will help manage the complete cyber threat intelligence lifecycle and ensure that this is appropriately integrated into relevant processes and tools.

The Cyber Threat Intelligence Analyst will be responsible for compiling, articulating and presenting cyber threat intelligence briefings for the Senior Cyber Threat Analyst as well as compiling clear and concise threat intelligence reports.

Job Responsibilities

  1. Help develop, configure and manage a suite of cyber threat intelligence sources
  2. Evaluate intelligence for accuracy, reliability, and relevance across multiple intelligence sources
  3. Help develop and maintain close links with cyber threat intelligence functions within partner organizations and government agencies
  4. Perform analysis across the estate, looking for threats to critical infrastructure, resources and services
  5. Help develop and produce threat intelligence reports, to provide key metrics into other internal cyber functions (Security Incident Response, Threat Hunting, etc.).
  6. Carry out research and discovery across the estate with a view to producing reports on CTI detections and trends (i.e. highlighted IOCs, Vulnerabilities, Malware).
  7. Manage the complete IoC lifecycle
  8. Provide analysis to feed into the overall security posture, assisting with supporting activities to further increase defenses, harden potential attack surfaces and implement better protection mechanisms.
  9. Act as CTI lead in the handling and remediation of security incidents.
  10. Maintain strong awareness with stakeholder groups of current threat landscape
  11. Review, analyze and contextualize complex threat intelligence data for wider consumption with business partners

What You'll Need

Qualification Requirements (Desirable)

  1. Certifications in security (i.e. GCTI, GREM, GCFA, GCIH) desirable but not essential
  2. Degree or equivalent (i.e. MBA) desirable but not essential
  3. Comprehensive knowledge about vulnerability and security policies such as ISO standards

Skills / Experience Requirements

  1. 5+ years operational experience as a threat intelligence analyst, with good working knowledge of security incident response and malware analysis.
  2. Experience in threat modeling and common frameworks such as the cyber kill chain and MITRE.
  3. Hands-on experience with Network Security, Digital Forensics and IPS/IDS systems.
  4. Hands-on experience with dark web analysis, including the associated tooling and adversarial slang.
  5. Solid understanding of supporting frameworks like MITRE ATT&CK, LM Cyber Kill Chain, IA Diamond Model, etc.
  6. Knowledge of supporting processes, like DFIR, Threat Hunting, Malware Analysis and red/purple team exercises.
  7. Knowledge of threat intelligence tooling, both commercial and open source.
  8. Understanding of Security Operations and supporting functions, technologies and methodologies.
  9. Ability to document findings into reports that can be understood across all levels of the organization.
  10. Strong presentation and communication skills, both verbal and written.
  11. Working knowledge of threat hunting

No of Positions: 1

Note: The candidate would be expected to work in diverse consulting engagements and is willing to travel to Middle East countries for project execution at least 50% of their time.

Preference to candidates who can join immediately or within 15 days at the max.

Employment Type: Full-time

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Threat Intelligence Analyst

Riyadh, Riyadh Help AG

Posted 12 days ago

Job Viewed

Tap Again To Close

Job Description

Help Ag is looking for a Cyber Threat Intelligence Analyst (TIA) who will be a part of the Cyber Defense team, responsible to help collect, analyze, and disseminate cyber intelligence impacting the company or its customers. The ideal candidate will be a professional with experience in cyber intelligence/cyber risk, delivering equivalent services to organizations, with drive and creativity. This is a fantastic opportunity for a passionate professional that wants to evolve in the Cyber Intelligence world. The position will involve essential duties and responsibilities that must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work.


Responsibilities

  • Identify, collect, and perform analysis of raw, primary, and secondary data derived from various sources.

  • Create and update General Intelligence Requirements (GIR)s, Priority Intelligence Requirements (PIR)s, and Organization Specific Intelligence Requirements (OSIR)s for customers.

  • Create threat profiles and threat landscapes for companies and or customers.

  • Create diamond models around customers and threat adversaries.

  • Improve the creation and delivery of intelligence information to customers and partners, via different reports and tools, linking the dots and adding value to the service delivered.

  • Perform investigations on the internet and dark web on different topics, from broad investigations to specific searches.

  • Identify, assess, and track tactics, techniques, and procedures of cyber threat actors.

  • Provide threat review and validation to customers on their exposure to cyber security risks, threats, and potential impact.

  • Provide actionable strategic, technical, and tactical cyber intelligence to company & its subsidiaries through weekly, monthly, and ad hoc reports, briefings, and presentations.

  • Conduct Internet searches, in English and Arabic, to profile customers’ online presence and optimize data feeds into back end cyber threat harvesting and analysis solutions.

  • Apply advanced search techniques (e.g., Boolean terms) in Google/Bing search engines, social sites, domain databases, darknet, etc. to reduce false positives.

  • Support customers in take down efforts to remove fraudulent, offensive, and suspicious online content.

  • Be up to date on knowledge of attacker tools/techniques, country and regional cyber threats, business, and political landscapes to reflect their context into detected/created threats to reduce false positives to help improve generated reports.

  • Provide feedback and recommendations to Backend Cyber defense teams such as the MDR Team to enhance detection's (e.g., false positives, generic data, fine-tuning, updated info, etc.) and improve portal performance and/or experience.

  • Understand customer industries to generate Arabic keywords to support searches of online Arabic content.

  • Identify new information sources (English and Arabic), search keywords (English and Arabic) and best practices to achieve more accurate and customer related threat detection.

  • When customers request ad-hoc investigations, assist in defining the investigation scope, delivery date and present the findings to the customer (report).

  • Understand and perform analysis of competing hypotheses (ACH) for use in threat hunting and advisory production.

  • Manage the life cycle of threat intelligence.

  • Maintain a high degree of awareness of the current threat landscape.

  • Assist in providing threat and vulnerability analysis as well as security advisory services.

  • Participate in knowledge sharing with other Analysts and writing technical articles for Internal Knowledge Bases.

  • Perform tasks independently with some oversight.

  • Deliver Cyber Intelligence services.

  • Research and craft analytic papers and deliver intelligence briefings under short deadlines on various geographical and functional topics.

  • Use knowledge, creativity, and analytic tradecraft best practices to obtain solutions to complex problems.

Qualifications & Skills:

  • A Degree in Computer Science, Information Systems, Electronics Engineering, or a closely related degree.

  • 1 - 4 years’ experience as a TIA or related position.

  • An active, demonstrable interest in cyber threat detection, and cyber threat intelligence.

  • A thorough understanding of IT systems and network security concepts, network protocols.

  • Thorough understanding of cyber threats and warfare such as Internet services attacks, User attacks, APTs, malicious mobile apps, online fraud, dark-net, hackers’ tools/techniques, hacktivist, etc.

  • Knowledge of latest global cyber-attacks, prominent ransomware, APT groups.

  • Demonstrable knowledge around GIR creations and threat profiling/landscaping.

  • Demonstrable knowledge of cyber threat intelligence, threat actors, malware, tactics, techniques, and procedures (TTPs), intelligence analysis, use of diamond models and various security methodologies and processes.

  • Demonstrable knowledge analysis of competing hypotheses (ACH) for evaluating multiple competing hypotheses for observed data.

  • Deep knowledge of IT security best practices, common attack types, and detection/prevention methods.

  • Demonstrable knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cybercrime.

  • Demonstrable knowledge on deep and dark web.

  • Good understanding of the cyber kill chain or attack vectors.

  • Excellent verbal and written communication skills including the ability to clearly articulate technical and strategic level cyber matters to a variety of audiences.

  • Ability to multitask, prioritize, and manage time effectively.

  • Strong attention to detail.

  • Excellent interpersonal skills and professional demeanor.

  • Excellent customer service skills.

  • Formal Intelligence Analysis training & certifications like GCTI, GOSI, C|TIA, Security+, RCIA, CTIP, CPTIA, CRTIA, CTIS-I and or CTIS-II.

Benefits:

  • Health insurance with one of the leading global providers for medical insurance.

  • Career progression and growth through challenging projects and work.

  • Employee engagement activities throughout the year.

  • Tailored training & development program.

About Us:

Help AG is the cyber security arm of e& enterprise and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.

Present in the Middle East since 2004, Help AG was strategically acquired by Etisalat group in Feb 2020, hence creating a cyber security and digital transformation powerhouse in the region.

Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and cyber security focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Threat Intelligence Analyst

Riyadh, Riyadh Help AG

Posted today

Job Viewed

Tap Again To Close

Job Description

Help Ag is looking for a Cyber Threat Intelligence Analyst (TIA) who will be a part of the Cyber Defense team, responsible to help collect, analyze, and disseminate cyber intelligence impacting the company or its customers. The ideal candidate will be a professional with experience in cyber intelligence/cyber risk, delivering equivalent services to organizations, with drive and creativity. This is a fantastic opportunity for a passionate professional that wants to evolve in the Cyber Intelligence world. The position will involve essential duties and responsibilities that must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work.

Responsibilities

  • Identify, collect, and perform analysis of raw, primary, and secondary data derived from various sources.

  • Create and update General Intelligence Requirements (GIR)s, Priority Intelligence Requirements (PIR)s, and Organization Specific Intelligence Requirements (OSIR)s for customers.

  • Create threat profiles and threat landscapes for companies and or customers.

  • Create diamond models around customers and threat adversaries.

  • Improve the creation and delivery of intelligence information to customers and partners, via different reports and tools, linking the dots and adding value to the service delivered.

  • Perform investigations on the internet and dark web on different topics, from broad investigations to specific searches.

  • Identify, assess, and track tactics, techniques, and procedures of cyber threat actors.

  • Provide threat review and validation to customers on their exposure to cyber security risks, threats, and potential impact.

  • Provide actionable strategic, technical, and tactical cyber intelligence to company & its subsidiaries through weekly, monthly, and ad hoc reports, briefings, and presentations.

  • Conduct Internet searches, in English and Arabic, to profile customers’ online presence and optimize data feeds into back end cyber threat harvesting and analysis solutions.

  • Apply advanced search techniques (e.g., Boolean terms) in Google/Bing search engines, social sites, domain databases, darknet, etc. to reduce false positives.

  • Support customers in take down efforts to remove fraudulent, offensive, and suspicious online content.

  • Be up to date on knowledge of attacker tools/techniques, country and regional cyber threats, business, and political landscapes to reflect their context into detected/created threats to reduce false positives to help improve generated reports.

  • Provide feedback and recommendations to Backend Cyber defense teams such as the MDR Team to enhance detection's (e.g., false positives, generic data, fine-tuning, updated info, etc.) and improve portal performance and/or experience.

  • Understand customer industries to generate Arabic keywords to support searches of online Arabic content.

  • Identify new information sources (English and Arabic), search keywords (English and Arabic) and best practices to achieve more accurate and customer related threat detection.

  • When customers request ad-hoc investigations, assist in defining the investigation scope, delivery date and present the findings to the customer (report).

  • Understand and perform analysis of competing hypotheses (ACH) for use in threat hunting and advisory production.

  • Manage the life cycle of threat intelligence.

  • Maintain a high degree of awareness of the current threat landscape.

  • Assist in providing threat and vulnerability analysis as well as security advisory services.

  • Participate in knowledge sharing with other Analysts and writing technical articles for Internal Knowledge Bases.

  • Perform tasks independently with some oversight.

  • Deliver Cyber Intelligence services.

  • Research and craft analytic papers and deliver intelligence briefings under short deadlines on various geographical and functional topics.

  • Use knowledge, creativity, and analytic tradecraft best practices to obtain solutions to complex problems.

Qualifications & Skills:

  • A Degree in Computer Science, Information Systems, Electronics Engineering, or a closely related degree.

  • 1 - 4 years’ experience as a TIA or related position.

  • An active, demonstrable interest in cyber threat detection, and cyber threat intelligence.

  • A thorough understanding of IT systems and network security concepts, network protocols.

  • Thorough understanding of cyber threats and warfare such as Internet services attacks, User attacks, APTs, malicious mobile apps, online fraud, dark-net, hackers’ tools/techniques, hacktivist, etc.

  • Knowledge of latest global cyber-attacks, prominent ransomware, APT groups.

  • Demonstrable knowledge around GIR creations and threat profiling/landscaping.

  • Demonstrable knowledge of cyber threat intelligence, threat actors, malware, tactics, techniques, and procedures (TTPs), intelligence analysis, use of diamond models and various security methodologies and processes.

  • Demonstrable knowledge analysis of competing hypotheses (ACH) for evaluating multiple competing hypotheses for observed data.

  • Deep knowledge of IT security best practices, common attack types, and detection/prevention methods.

  • Demonstrable knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cybercrime.

  • Demonstrable knowledge on deep and dark web.

  • Good understanding of the cyber kill chain or attack vectors.

  • Excellent verbal and written communication skills including the ability to clearly articulate technical and strategic level cyber matters to a variety of audiences.

  • Ability to multitask, prioritize, and manage time effectively.

  • Strong attention to detail.

  • Excellent interpersonal skills and professional demeanor.

  • Excellent customer service skills.

  • Formal Intelligence Analysis training & certifications like GCTI, GOSI, C|TIA, Security+, RCIA, CTIP, CPTIA, CRTIA, CTIS-I and or CTIS-II.

Benefits:

  • Health insurance with one of the leading global providers for medical insurance.

  • Career progression and growth through challenging projects and work.

  • Employee engagement activities throughout the year.

  • Tailored training & development program.

About Us:

Help AG is the cyber security arm of e& enterprise and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.

Present in the Middle East since 2004, Help AG was strategically acquired by Etisalat group in Feb 2020, hence creating a cyber security and digital transformation powerhouse in the region.

Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and cyber security focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber threat intelligence Analyst

Securseed

Posted today

Job Viewed

Tap Again To Close

Job Description

Job description

The Cyber Threat Intelligence Analyst will deliver and develop strategic and tactical Cyber Threat Intelligence capabilities within the cyber security operations team.

The role holder will maintain a clear understanding of the threat landscape, identify new sources of intelligence, and aggregate and analyze data to provide accurate and actionable recommendations. They will help manage the complete cyber threat intelligence lifecycle and ensure that this is appropriately integrated into relevant processes and tools.

The Cyber Threat Intelligence Analyst will be responsible for compiling, articulating and presenting cyber threat intelligence briefings for the Senior Cyber Threat Analyst as well as compiling clear and concise threat intelligence reports.

Job Responsibilities

  1. Help develop, configure and manage a suite of cyber threat intelligence sources
  2. Evaluate intelligence for accuracy, reliability, and relevance across multiple intelligence sources
  3. Help develop and maintain close links with cyber threat intelligence functions within partner organizations and government agencies
  4. Perform analysis across the estate, looking for threats to critical infrastructure, resources and services
  5. Help develop and produce threat intelligence reports, to provide key metrics into other internal cyber functions (Security Incident Response, Threat Hunting, etc.).
  6. Carry out research and discovery across the estate with a view to producing reports on CTI detections and trends (i.e. highlighted IOCs, Vulnerabilities, Malware).
  7. Manage the complete IoC lifecycle
  8. Provide analysis to feed into the overall security posture, assisting with supporting activities to further increase defenses, harden potential attack surfaces and implement better protection mechanisms.
  9. Act as CTI lead in the handling and remediation of security incidents.
  10. Maintain strong awareness with stakeholder groups of current threat landscape
  11. Review, analyze and contextualize complex threat intelligence data for wider consumption with business partners

What You'll Need

Qualification Requirements (Desirable)

  1. Certifications in security (i.e. GCTI, GREM, GCFA, GCIH) desirable but not essential
  2. Degree or equivalent (i.e. MBA) desirable but not essential
  3. Comprehensive knowledge about vulnerability and security policies such as ISO standards

Skills / Experience Requirements

  1. 5+ years operational experience as a threat intelligence analyst, with good working knowledge of security incident response and malware analysis.
  2. Experience in threat modeling and common frameworks such as the cyber kill chain and MITRE.
  3. Hands-on experience with Network Security, Digital Forensics and IPS/IDS systems.
  4. Hands-on experience with dark web analysis, including the associated tooling and adversarial slang.
  5. Solid understanding of supporting frameworks like MITRE ATT&CK, LM Cyber Kill Chain, IA Diamond Model, etc.
  6. Knowledge of supporting processes, like DFIR, Threat Hunting, Malware Analysis and red/purple team exercises.
  7. Knowledge of threat intelligence tooling, both commercial and open source.
  8. Understanding of Security Operations and supporting functions, technologies and methodologies.
  9. Ability to document findings into reports that can be understood across all levels of the organization.
  10. Strong presentation and communication skills, both verbal and written.
  11. Working knowledge of threat hunting

No of Positions: 1

Note: The candidate would be expected to work in diverse consulting engagements and is willing to travel to Middle East countries for project execution at least 50% of their time.

Preference to candidates who can join immediately or within 15 days at the max.

Employment Type: Full-time

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber threat intelligence Analyst

SAR104000 - SAR130878 Y Skarpsinne Labs

Posted today

Job Viewed

Tap Again To Close

Job Description

Job description

The Cyber Threat Intelligence Analyst will deliver and develop strategic and tactical Cyber Threat Intelligence capabilities within the cyber security operations team.

The role holder will maintain a clear understanding of the threat landscape, identify new sources of intelligence, and aggregate and analyze data to provide accurate and actionable recommendations. They will help manage the complete cyber threat intelligence lifecycle and ensure that this is appropriately integrated into relevant processes and tools.

The Cyber Threat Intelligence Analyst will be responsible for compiling, articulating and presenting cyber threat intelligence briefings for the Senior Cyber Threat Analyst as well as compiling clear and concise threat intelligence reports.

Job Responsibilities

  • Help develop, configure and manage a suite of cyber threat intelligence sources
  • Evaluate intelligence for accuracy, reliability, and relevance across multiple intelligence sources
  • Help develop and maintain close links with cyber threat intelligence functions within partner organizations and government agencies
  • Perform analysis across the estate, looking for threats to critical infrastructure, resources and services
  • Help develop and produce threat intelligence reports, to provide key metrics into other internal cyber functions (Security Incident Response, Threat Hunting, etc.).
  • Carry out research and discovery across the estate with a view to producing reports on CTI detections and trends (i.e. highlighted IOCs, Vulnerabilities, Malware).
  • Manage the complete IoC lifecycle
  • Providing analysis to feed into the overall security posture, assisting with supporting activities to further increase defences, harden potential attack surfaces and implement better protection mechanisms.
  • Act as CTI lead in the handling and remediation of security incidents.
  • Maintain strong awareness with stakeholder groups of current threat landscape
  • Review, analyse and contextualise complex threat intelligence data for wider consumption with business partners

What You'll Need

Qualification Requirements (Desirable)

  • Certifications in security (i.e. GCTI, GREM, GCFA, GCIH) desirable but not essential
  • Degree or equivalent (i.e. MBA) desirable but not essential
  • Comprehensive knowledge about vulnerability and security policies such as ISO standards

Skills / Experience Requirements

  • 5+ years operational experience as a threat intelligence analyst, with good working knowledge of security incident response and malware analysis.
  • Experience in threat modeling and common frameworks such as the cyber kill chain and MITRE.
  • Hands-on experience with Network Security, Digital Forensics and IPS/IDS systems.
  • Hands-on experience with dark web analysis, including the associated tooling and adversarial slang.
  • Solid understanding of supporting frameworks like MITRE ATT&CK, LM Cyber Kill Chain, IA Diamond Model, etc.
  • Knowledge of supporting processes, like DFIR, Threat Hunting, Malware Analysis and red/purple team exercises.
  • Knowledge of threat intelligence tooling, both commercial and open source.
  • Understanding of Security Operations and supporting functions, technologies and methodologies.
  • Ability to document findings into reports that can be understood across all levels of the organization.
  • Strong presentation and communication skills, both verbal and written.
  • Working knowledge of threat hunting

No of Positions: 1

Note: The candidate would be expected to work in diverse consulting engagements and are willing to travel to Middle East countries for project execution at least 50% of their time.

Preference to candidates who can join immediately or within 15 days at the max.

Employment Type : Full-time

This advertiser has chosen not to accept applicants from your region.

Cybersecurity Engineer

Yokogawa

Posted today

Job Viewed

Tap Again To Close

Job Description

Overview

Not just a job, but a career. Yokogawa, award winner for ‘Best Asset Monitoring Technology’ and ‘Best Digital Twin Technology’ at the HP Awards, is a leading provider of industrial automation, test and measurement, information systems and industrial services in several industries. Our aim is to shape a better future for our planet through supporting the energy transition, (bio)technology, artificial intelligence, industrial cybersecurity, etc. We are committed to the United Nations sustainable development goals by utilizing our ability to measure and connect.

About The Team

Our 18,000 employees work in over 60 countries with one corporate mission, to "co-innovate tomorrow". We are looking for dynamic colleagues who share our passion for technology and care for our planet. In return, we offer you great career opportunities to grow yourself in a truly global culture where respect, value creation, collaboration, integrity, and gratitude are highly valued and exhibited in everything we do.

We are seeking Cyber Security Engineers with extensive experience in the Oil & Gas sector. The ideal candidate will have a minimum of 5 years of hands-on experience and possess key certifications, particularly in OT cybersecurity.

Requirements

Certifications:

  • Preferably certified in MCSE, VMWare & CCNA
  • OT certifications such as IEC62443, GICSP will be an added advantage.

General Skills:

  • Demonstrated expertise in cyber security engineering, preferably within process control environments.
  • Exceptional communication and documentation abilities
  • Bachelor's degree in computer science or a related field

Technical Experience:

Endpoint Protection:

  • Proficiency with Trellix (formerly McAfee) ePO suite, ENS, & Application Control (Whitelisting)
  • Experience with Symantec Endpoint Protection

Microsoft Platform:

  • Skilled in Active Directory Services, Group Policy, and System Hardening
  • Familiarity with WSUS patch management and Terminal Services

Backup & Recovery:

  • Experience with Symantec/Veritas Backup Exec & SSR, Acronis, etc.
  • Knowledge of bare metal backup & recovery, SAN/NAS, LTO Tape library setup

Virtualization:

  • Proficient in VMWare ESXi, Hyper-V, and Shared Storage Services for high availability setups

Hardware:

  • Experience with HP, Dell, SAN, Tape Library hardware.
  • Competence in Switching, Routing & Firewalls
Roles & Responsibilities
  • The Cyber Security engineer principal role is to lead initiatives to implement and maintain Cyber security architecture onto the manufacturing environment.
  • Complying to network security guideline specifications, design approach and documents, for project implementation.
  • Supporting the activities of the multinational engineering team with the project manager.
  • Implement and maintain cybersecurity architecture on projects.
  • Conduct inspections and healthiness audits of Yokogawa cyber security solutions.
  • Work with teams of DCS/ESD/SCADA system service engineers for lifecycle support of Yokogawa’s cyber security solutions.

Yokogawa is an Equal Opportunity Employer. Yokogawa wants a diverse, equitable and inclusive culture. We will actively recruit, develop, and promote people from a variety of backgrounds who differ in terms of experience, knowledge, thinking styles, perspective, cultural background, and socioeconomic status. We will not discriminate based on race, skin color, age, sex, gender identity and expression, sexual orientation, religion, belief, political opinion, nationality, ethnicity, place of origin, disability, family relations or any other circumstances. Yokogawa values differences and enables everyone to belong, contribute, succeed, and demonstrate their full potential.

Are you being referred to one of our roles? If so, ask your connection at Yokogawa about our Employee Referral process!

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Architect

Riyadh, Riyadh Lendo

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

As Lendo continues to scale, we’re looking for a proactive and visionary Cybersecurity Architect to ensure our systems, applications, and infrastructure are secure by design. In this role, you’ll define security architecture frameworks, design and review solutions, and guide the implementation of IAM, PAM, and security tooling across the business.

You’ll collaborate closely with engineering, product, and compliance teams to embed secure-by-design principles into every layer of our technology. By conducting risk assessments, shaping policies, and aligning with regulatory requirements, you’ll help safeguard our operations while enabling innovation.

Key Requirements
  • Develop and maintain security architecture frameworks, ensuring alignment with business objectives and regulatory requirements.

  • Provide security design guidance for infrastructure, applications, and cloud deployments.

  • Define and enforce secure design principles, standards, and patterns across IT and development lifecycles.

  • Conduct technical risk assessments and threat modeling to identify potential vulnerabilities and recommend mitigation strategies.

  • Assess and recommend security tools and technologies, ensuring scalability and resilience.

  • Partner with IT, developers, DevOps, and business units to embed security into projects from the ground up.

  • Provide architectural guidance during incident response, forensic investigations, and lessons-learned exercises.

  • Ensure designs adhere to frameworks and standards (e.g., NIST CSF, ISO 27001).

  • Stay current with evolving threats, emerging technologies, and industry best practices to strengthen enterprise security.

  • Define and oversee identity, access, and privilege management strategies, ensuring strong authentication, role-based access, and least-privilege principles.

  • Design and guide configuration of key security technologies (SIEM, EDR, firewalls, WAF, DLP, CASB, etc.) to ensure they are integrated and optimized.

  • Review architectural changes (e.g., new integrations, design changes, core network modifications, security tooling updates).

  • Guide and mentor security engineers, analysts, and developers in secure design best practices.

Qualifications
  • Bachelor’s degree in Computer Science, Cybersecurity, Information Systems, or related field (Master’s preferred).

  • 5+ years of IT/security experience, with at least 2 years in a dedicated security architecture role.

  • Expertise in network, application, cloud, and data security architecture.

  • Strong knowledge of identity and access management (IAM), encryption, key management, and endpoint security.

  • Familiarity with DevSecOps practices and secure CI/CD pipeline integration.

  • Hands-on experience with security solutions (firewalls, SIEM, EDR, WAF, DLP, etc.).

  • Understanding compliance and regulatory requirements (e.g., GDPR, HIPAA, PCI-DSS, SOX).

  • Relevant certifications are strongly preferred: CISSP, CCSP, CISM, or cloud security certifications

  • Fluency in both English and Arabic (written and verbal), with the ability to communicate effectively with technical teams and executive leadership.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Cybersecurity Jobs in Saudi Arabia !

Cybersecurity Engineer

Messilat

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Join us as a Cybersecurity Specialist , contributing to the strategic direction and governance of our cybersecurity practices.

If you're: bilingual (Arabic/English), hold a Cybersecurity degree, have 5+ years of experience : apply now to shape our secure future.

Responsibilities

1. Evaluation of the Current Situation:

• Assess the existing cybersecurity landscape within the organization.

• Identify gaps and craft a robust development plan based on industry-leading cybersecurity practices.

2. Developing the Governance System:

• Define roles and responsibilities in cybersecurity management and secretariat departments.

• Formulate a comprehensive compliance plan for cybersecurity controls.

3. Developing the Financing System:

• Identify project types within the program’s scope.

• Create a brochure encompassing all controls of the National Cybersecurity Authority.

4. Monthly Reporting:

• Prepare and submit detailed monthly reports to the secretariat outlining completed tasks.

• Conduct necessary meetings to discuss progress.

• Conduct necessary meetings to discuss progress.

5. Operating Team Provision:

• Source and provide a skilled operating team for the duration of the contract, adhering to specifications.

6. Remote Consulting Team:

• Supply a specialized cybersecurity consulting team for remote work.

7. Cybersecurity Assessment:

• Scrutinize all systems and devices within the secretariat from a cybersecurity perspective.

8. Incident Response:

• Act promptly in response to cybersecurity incidents and compile necessary reports.

9. System and Program Reviews:

• Evaluate and review the configurations of cybersecurity systems and programs.

10. Document and Form Review:

• Examine documents and forms for adherence to cybersecurity policies.

Qualifications

• Bachelor's degree in Cybersecurity or a related Computer Science field.

• Minimum of 5 years of experience in Cybersecurity Policies .

• Professional certifications in the same field.

ISO27001 certification for Cybersecurity Policy Specialist or equivalent.

• Proficiency in spoken and written English.

• Successful completion of a personal interview.

• Strong knowledge of networking and operating systems.

• Experience with security tools and software.

• Knowledge of security protocols and standards.

• Knowledge of security policies and regulations.

• Experience with security assessments and audits.

• Knowledge of Risk management and compliance.

• Analytical and problem-solving skills.

• Attention to detail.

• Strong communication and teamwork skills.

• Ability to work under pressure.

Interested candidates should submit their resume and a cover letter detailing their relevant experience to . Please include "Cybersecurity Application" in the subject line of your email.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Manager

Tishman Speyer Properties

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Cybersecurity Manager page is loaded# Cybersecurity Managerlocations: Dhahran, Saudi Arabiatime type: Full timeposted on: Posted Todaytime left to apply: End Date: September 11, 2025 (14 days left to apply)job requisition id: JR- At Air Products, our purpose is to bring people together to reimagine what’s possible, collaborate and innovate solutions to the world’s most significant energy and environmental sustainability challenges. Grow with us as we embark on building tomorrow together by being the safest, most diverse and most profitable industrial gas company in the world.**Reimagine What’s Possible**# Blue Hydrogen Industrial Gases (BHIG)# Cybersecurity ManagerLocation: Dhahran, Saudi ArabiaDepartment: Operations and MaintenanceReports To: O&M Director# About the CompanyBlue Hydrogen Industrial Gases is developing to become a leading provider of industrial gases. Serving a wide range of industries including refining, chemicals, manufacturing, and healthcare. As we continue to expand our presence in the Kingdom of Saudi Arabia, we are seeking a seasoned Cybersecurity Manager to lead our cybersecurity initiatives and safeguard our critical infrastructure.# Job SummaryThe Cybersecurity Manager will be responsible for developing and executing cybersecurity strategies to protect the company’s operational technology (OT) and information technology (IT) environments. This role is critical in ensuring the security of industrial control systems (ICS), SCADA networks, and enterprise systems in compliance with Saudi cybersecurity regulations.# Key Responsibilities* Lead the design and implementation of cybersecurity frameworks tailored to industrial environments.* Oversee security operations for both IT and OT systems, including SCADA and DCS networks.* Conduct risk assessments and vulnerability scans across plant and enterprise systems.* Ensure compliance with Saudi regulatory bodies such as NCA, SAMA, HCIS, and CITC.* Manage incident response plans and lead investigations of security breaches.* Collaborate with engineering and plant operations teams to embed security in industrial processes.* Implement and manage cybersecurity tools (e.g., firewalls, SIEM, endpoint protection).* Deliver cybersecurity awareness training across departments.* Report regularly to senior leadership on security posture and risk mitigation efforts.# Qualifications* Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or a related field.* Minimum 7 years of experience in cybersecurity, with at least 3 years in a leadership role.* Experience in securing industrial environments (ICS/SCADA/OT).* Professional certifications such as CISSP, CISM, GICSP, or IEC 62443 are highly desirable.* Strong knowledge of cybersecurity frameworks (NIST, ISO 27001) and Saudi regulations.# Preferred Skills* Deep understanding of OT/IT convergence and industrial cybersecurity challenges.* Strong leadership and project management capabilities.* Excellent communication and stakeholder engagement skills.* Experience with cloud security and secure remote access solutions.* Be part of a mission-critical team protecting essential infrastructure.* Work in a dynamic, innovation-driven environment.* Competitive compensation and benefits.* Opportunities for professional growth and international collaboration.We are the world’s largest hydrogen producer with over 80 years of industrial gas experience. We are hydrogen and industrial gas experts delivering safe, end-to-end solutions, investing in real, clean energy projects at scale, and driving the industry forward to generate a cleaner future.At Air Products, we work in an environment where we put safety first, diversity is essential, inclusion is our culture, and each person knows they belong and matter. To learn more, visitAbout Air Products.Register for Job Alerts Follow these simple steps: 1) Register by clicking ‘Join our Talent Network’ at the top of this page, where you can create your account. 2) Sign up for ‘job alerts’ to stay informed of vacancies based on your skillset and location preferences.More than 23,000 passionate, talented and committed employees from diverse backgrounds are driven by Air Products’ higher purpose to create innovative solutions that benefit the environment, enhance sustainability and reimagine what's possible to address the challenges facing customers, communities, and the world.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Architect

Riyadh, Riyadh Lendo Inc.

Posted 7 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

As Lendo continues to scale, we’re looking for a proactive and visionary Cybersecurity Architect to ensure our systems, applications, and infrastructure are secure by design. In this role, you’ll define security architecture frameworks, design and review solutions, and guide the implementation of IAM, PAM, and security tooling across the business.


You’ll collaborate closely with engineering, product, and compliance teams to embed secure-by-design principles into every layer of our technology. By conducting risk assessments, shaping policies, and aligning with regulatory requirements, you’ll help safeguard our operations while enabling innovation.



Responsibilities

  • Develop and maintain security architecture frameworks, ensuring alignment with business objectives and regulatory requirements.

  • Provide security design guidance for infrastructure, applications, and cloud deployments.

  • Define and enforce secure design principles, standards, and patterns across IT and development lifecycles.

  • Conduct technical risk assessments and threat modeling to identify potential vulnerabilities and recommend mitigation strategies.

  • Assess and recommend security tools and technologies, ensuring scalability and resilience.

  • Partner with IT, developers, DevOps, and business units to embed security into projects from the ground up.

  • Provide architectural guidance during incident response, forensic investigations, and lessons-learned exercises.

  • Ensure designs adhere to frameworks and standards (e.g., NIST CSF, ISO 27001).

  • Stay current with evolving threats, emerging technologies, and industry best practices to strengthen enterprise security.

  • Define and oversee identity, access, and privilege management strategies, ensuring strong authentication, role-based access, and least-privilege principles.

  • Design and guide configuration of key security technologies (SIEM, EDR, firewalls, WAF, DLP, CASB, etc.) to ensure they are integrated and optimized.

  • Review architectural changes (e.g., new integrations, design changes, core network modifications, security tooling updates).

  • Guide and mentor security engineers, analysts, and developers in secure design best practices.



Qualifications

  • Bachelor’s degree in Computer Science, Cybersecurity, Information Systems, or related field (Master’s preferred).

  • 5+ years of IT/security experience, with at least 2 years in a dedicated security architecture role.

  • Expertise in network, application, cloud, and data security architecture.

  • Strong knowledge of identity and access management (IAM), encryption, key management, and endpoint security.

  • Familiarity with DevSecOps practices and secure CI/CD pipeline integration.

  • Hands-on experience with security solutions (firewalls, SIEM, EDR, WAF, DLP, etc.).

  • Understanding compliance and regulatory requirements (e.g., GDPR, HIPAA, PCI-DSS, SOX).

  • Relevant certifications are strongly preferred: CISSP, CCSP, CISM, or cloud security certifications

  • Fluency in both English and Arabic (written and verbal), with the ability to communicate effectively with technical teams and executive leadership.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybersecurity Jobs