43 Cybersecurity Specialist jobs in Riyadh
L1 Cyber Security Analyst
Posted today
Job Viewed
Job Description
The Cyber Analyst performs real-time event and incident management processes within the SOC, including internal security incident evaluation and response, following established guidelines and policies.
Responsibilities- Monitor and analyze logs in real-time using leading SIEM technology.
- Identify security incidents and conduct first-level investigations.
- Escalate incidents to Level 2 Analysts for further response.
- Bachelor's degree in Computer Science or a related field.
- Master's degree in Information Security is preferred.
- Ability to work on a flexible, rotational 24x7x365 schedule.
- Strong adherence to processes, procedures, and task prioritization.
- Knowledge of attack techniques and current threat landscape is desirable.
- Understanding of TCP/IP, Linux, Windows infrastructures, and basic network security concepts.
- Excellent communication skills in English.
- Analytical and troubleshooting skills for quick resolution.
- Prior experience with SIEM/Log Analysis is a plus but not required.
L1 Cyber Security Analyst
Posted 1 day ago
Job Viewed
Job Description
The Cyber Analyst performs real time event and incident management processes of SOC, as well as internal security incidents evaluation and response following the event management guidelines and policies of SOC.
- Real-Time Event & Log monitoring and analysis using leading SIEM Technology
- Security Incidents identification and 1st-level investigation
- Escalation to Level 2 Analysts for incident response
- Bachelor's degree in Computer Science or relevant field
- Master's degree in Information Security is desired
- Ability to work on a flexible, rotational 24x7x365 schedule
- Ability to follow processes and procedures and prioritize tasks
- Knowledge and understanding of standard & modern attack techniques and strong awareness of the current threat landscape is desired
- Knowledge of TCP/IP, Linux and Windows infrastructures and basic network security architecture concepts
- Excellent verbal and written communication skills in English
- Analytical and troubleshooting skills on short timeframes
- No prior working experience with SIEM/Log Analysis is required, but it will be considered a plus
- Dynamic and respectful environment - our people are the core of our business, we value each and every individual and support initiatives, promoting agility and work/life balance
- Continuous coaching - work with passionate people and receive both theoretical as well as hands-on training
- Career development. Expand your career internationally and work alongside knowledgeable people from diverse cultures and backgrounds
- A competitive compensation package dependent upon your experience and qualifications. We're focused on rewarding effοrts. Our salaries and benefits package will keep you motivated throughout your career
- Seniority level Entry level
- Employment type Contract
- Job function Information Technology
- Industries IT Services and IT Consulting
Referrals increase your chances of interviewing at Obrela by 2x
Get notified about new Cyber Security Analyst jobs in Riyadh, Riyadh, Saudi Arabia .
IT Security Implementation Lead EngineerRiyadh, Riyadh, Saudi Arabia 21 hours ago
Identity & Access Management (IAM) EngineerRiyadh, Riyadh, Saudi Arabia 10 minutes ago
Penetration Testing Engineer I Ethical HackerRiyadh, Riyadh, Saudi Arabia 22 hours ago
Privileged Access Management (PAM) EngineerRiyadh, Riyadh, Saudi Arabia 21 minutes ago
Application Security Engineer (Onsite, Riyadh) Senior Information Security Presales Engineer Digital Forensic and Incident Response Specialist Cybersecurity Governance, Risk and Compliance ManagerWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrL1 Cyber Security Analyst
Posted today
Job Viewed
Job Description
The Cyber Analyst performs real-time event and incident management processes within the SOC, including internal security incident evaluation and response, following established guidelines and policies.
Responsibilities- Monitor and analyze logs in real-time using leading SIEM technology.
- Identify security incidents and conduct first-level investigations.
- Escalate incidents to Level 2 Analysts for further response.
- Bachelor's degree in Computer Science or a related field.
- Master's degree in Information Security is preferred.
- Ability to work on a flexible, rotational 24x7x365 schedule.
- Strong adherence to processes, procedures, and task prioritization.
- Knowledge of attack techniques and current threat landscape is desirable.
- Understanding of TCP/IP, Linux, Windows infrastructures, and basic network security concepts.
- Excellent communication skills in English.
- Analytical and troubleshooting skills for quick resolution.
- Prior experience with SIEM/Log Analysis is a plus but not required.
Cyber Security Analyst | Riyadh, SA
Posted today
Job Viewed
Job Description
Job Description
- Robust knowledge of Cybersecurity regulations, standards, and controls.
- Fluent in Cyber Incident Detection, Response, and Management.
- Strong understanding of ICT, including Hardware, Software, and Networks.
- Expertise in preparing and analyzing Cybersecurity reports.
- Experience in ICT / Cybersecurity Audit / Compliance / Regulatory discussions. Professional Certifications: Security+, CCNA, CCNP, or NSE4A.
- Collaborative team player who fosters a culture of continuous improvement and empowers team members to achieve their best.
- An individual committed to quality, accountability, and ethical practices in project and change management.
- Passionate about mentoring and developing talent within the information and cybersecurity management functions.
- Fluent in Arabic and English languages.
Requirements
- Bachelor's degree in Computer Science, Information Security, or a related field.
- At least 3 years of experience in incident handling and reporting.
- Professional certifications related to incident response are preferred.
- Strong analytical and problem-solving skills.
- Knowledge of network security zones, firewall configurations, and IDS policies.
- Knowledge of systems communications from Layer 1 to 7.
- Experience with Systems Administration, Middleware, and Application Administration.
- Experience with Network and Security tools administration.
- Proficiency with log search tools and regular expressions.
- Knowledge of packet capture and analysis.
- Experience with Security Assessment tools (NMAP, Nessus, Metasploit, Netcat).
- Ability to create and execute containment strategies.
Cyber Security Specialist
Posted today
Job Viewed
Job Description
Get AI-powered advice on this job and more exclusive features.
The Cybersecurity Specialist is responsible for implementing, monitoring, and maintaining robust security measures to protect the organization's digital assets. This role focuses on identifying and mitigating cyber threats, responding to incidents, and ensuring compliance with security standards to safeguard data confidentiality, integrity, and availability.
Key Responsibilities:
Security Operations & Monitoring:
- Monitor security systems (e.g., SIEM, IDS/IPS, EDR) for anomalies, security breaches, and suspicious activities.
- Analyze security logs and alerts to identify potential threats and vulnerabilities.
- Perform real-time incident response activities, including investigation, containment, eradication, and recovery.
Vulnerability Management:
- Conduct regular vulnerability scans and penetration tests on systems, networks, and applications.
- Analyze assessment results, prioritize remediation efforts, and work with IT teams to address identified weaknesses.
Policy & Compliance:
- Assist in the development, implementation, and enforcement of cybersecurity policies, procedures, and standards.
- Ensure compliance with relevant industry regulations, data protection laws, and internal security guidelines.
- Participate in internal and external security audits.
- Stay updated on the latest cybersecurity threats, trends, and technologies.
- Provide recommendations for security enhancements and proactive defense strategies.
Security Awareness:
- Contribute to the development and delivery of cybersecurity awareness training for employees.
Documentation & Reporting:
- Maintain detailed documentation of security incidents, configurations, and procedures.
- Prepare regular reports on security posture, incidents, and compliance status.
- Collaborate with IT operations, network teams, development teams, and other departments to integrate security best practices into all aspects of the organization.
Qualifications:
- Education: Bachelor's degree in computer science, Information Technology, Cybersecurity, or a related field.
- Experience: Minimum of 2 years of progressive experience in cybersecurity, information security, or IT security operations.
Technical Skills:
- Solid understanding of networking protocols, operating systems (Windows, Linux), and cloud environments (e.g., AWS, Azure).
- Experience with security tools such as SIEM (Security Information and Event Management), EDR (Endpoint Detection and Response), firewalls, anti-virus, and vulnerability scanners.
- Familiarity with incident response methodologies and digital forensics concepts.
- Knowledge of common cyberattack techniques (e.g., phishing, malware, DDoS) and mitigation strategies.
Certifications (Preferred):
- CompTIA Security+, CySA+, CEH (Certified Ethical Hacker), CCNA Security.
- Certifications like CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager) are highly valued for more senior specialist roles.
Soft Skills:
- Strong analytical and problem-solving skills with a keen attention to detail.
- Excellent communication (written and verbal) and interpersonal skills.
- Ability to work independently and collaboratively in a fast-paced environment.
- High level of integrity and ability to handle confidential information.
- Seniority level Associate
- Employment type Full-time
- Job function Engineering and Information Technology
- Industries Government Administration
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrCyber Security Specialist
Posted today
Job Viewed
Job Description
The Job Description
- DLP Expertise: In-depth knowledge of Forcepoint DLP solutions, including policy creation, incident handling, and system management.
- Networking Knowledge: Strong understanding of networking protocols (TCP/IP, DNS, HTTP, etc.), firewalls, proxies, and VPNs.
- Operating Systems: Proficiency in Windows, Linux, and possibly Mac OS for endpoint DLP deployment.
- Database Knowledge: Understanding of SQL, databases, and querying to analyze incidents or logs.
- Security Tools: Familiarity with other security tools like SIEMs (e.g., Splunk), IDS/IPS systems, and firewalls.
- Scripting: Experience with scripting languages (Python, PowerShell, etc.) for automation of tasks.
Requirements:
- Problem-Solving: Strong troubleshooting skills, especially in identifying data leakage threats and resolving complex DLP issues.
- Communication: Ability to communicate with technical and non-technical stakeholders, providing clear insights into data protection strategies.
- Customer Service: Experience in handling client issues, providing high-level support and consultation, and managing escalations effectively.
- Project Management: Skills in managing DLP projects, including deployment, integration, and policy enforcement.
- Certifications: Preferred but not always required in security domains such as CISSP, CISM, or vendor-specific certifications (Forcepoint).
- Networking Certifications: Certifications like CCNA, CCNP may also be valuable.
Cyber Security Specialist
Posted today
Job Viewed
Job Description
**Cyber Security Specialist duties and responsibilities**:
- Maintain and update the organization’s risk register, including identifying and assessing cybersecurity risks, developing and implementing risk mitigation strategies, and monitoring and reporting on risk management activities.
- Conduct maturity level assessments of the organization’s cybersecurity program to identify areas for improvement.
- Ensure compliance with all applicable cybersecurity regulations, including developing and implementing policies and procedures, conducting training, and monitoring and reporting on compliance activities.
- Verify penetration test findings and work with remediation teams to address any identified vulnerabilities.
- Administer the organization’s WAF, including configuring rules, monitoring traffic, and responding to alerts.
- Follow up with audits and provide evidence of compliance with cybersecurity requirements.
- Develop and deliver cybersecurity awareness training to employees.
- Stay up-to-date on the latest cybersecurity threats and trends.
**Cyber Security Specialist requirements and qualifications**:
- Bachelor’s degree in Cybersecurity or a related field.
- 2+ years of experience in a cybersecurity role.
- Strong understanding of cybersecurity concepts and principles, including risk management, compliance, penetration testing, and WAF administration.
- Experience with cybersecurity tools and technologies.
- Excellent communication and interpersonal skills.
- Ability to work independently and as part of a team.
Be The First To Know
About the latest Cybersecurity specialist Jobs in Riyadh !
Cyber Security Admin
Posted today
Job Viewed
Job Description
” The Job Description”
- Bachelor’s degree in Systems Security, Computer Science, Networking, Telecommunications, Control Systems, or a related field.
- More than 3 years of experience in cybersecurity.
- Good experience in Antivirus.
- Certified in CCNA Security and CompTIA Security+.
- Good experience with the following protocols: (TCP/IP protocol stack, HTTP, HTTP/2, PKI, SSL, TLS, DTLS, mutual TLS, OAuth, Authentication, and Authorization).
- Good experience in implementing hardening on devices.
- Define and document a risk management strategy in alignment with the organization’s risk management framework.
- Analyze, evaluate, and assess the potential risks and their impact.
- “Identify and document risk management procedures within the organization, ensuring considerations for confidentiality, availability, and integrity of information assets.
- Implement and adhere to risk management methodologies and procedures on a regular basis within the organization.
- Regularly review the organization’s technical risk management methodologies and procedures.
- Manage and close vulnerabilities in control systems.
- Manage and close vulnerabilities in digital devices for control systems.
- Manage and close vulnerabilities in servers for control systems.
- Manage and close vulnerabilities in the wired network for control systems.
- Managing and closing wireless network vulnerabilities related to control systems.
- Managing and closing long-range microwave wireless network vulnerabilities related to control systems.
- Managing and closing database vulnerabilities related to control systems.
- Managing and closing backup vulnerabilities related to control systems.
- Managing and closing cloud computing vulnerabilities related to control systems.
- Preparing vulnerability management reports.
- Managing and securing the settings of control systems.
- Managing and securing the configurations of digital devices for control systems.
- Managing and securing server configurations for control systems.
- Managing and securing the settings of the wired network related to control systems.
- Managing and securing the settings of the wireless network for control systems.
- Managing and securing the settings of the long-range wireless network for control systems.
- Managing and securing the configurations of databases for control systems.
- Managing and securing the configurations of backups for control systems.
- Managing and securing the configurations of cloud computing for control systems.
- Preparing reports on configuration and security management.
- Secure management of encryption keys during their entire lifecycle.
- Managing database encryption during transmission and storage.
- Managing encryption for servers.
- Managing encryption for long-range wired and wireless networks, including microwave.
- Managing the firewall system for control systems.
- Operating the firewall system for control systems.
- Assessing & identifying business continuity requirements.
- Developing business continuity plans.
- Developing disaster recovery and crisis management plans.
- Conducting drills and tests to ensure disaster and crisis recovery.
- Implementing projects, monitoring their outcomes, and providing necessary reports for their success.
- Supporting the organization’s projects in general, and IT projects in particular, regarding management, departments, and units.
- Capable of handling any additional tasks and responsibilities as needed to support the organization’s objectives.
Tagged as: antivirus , ccnp , comptia security+ , dtls , http2 , IP , IT , mutual tls , oauth , PKI , SSL , TCP , TLS , virtualization security
#J-18808-LjbffrCyber Security Engineer
Posted today
Job Viewed
Job Description
GovCIO is currently hiring for a Cyber Security Engineer. This position will be located in Saudi Arabiaand will be an onsiteposition.
ResponsibilitiesCorrelates threat data from various sources to establish the identity and modus operandi of hackers active in client's networks and posing a potential threat. Provides the customer with assessments and reports facilitating situational awareness and understanding of current cyber threats and adversaries. Develops cyber threat profiles based on geographic region, country, group, or individual actors. Produces cyber threat assessments based on entity threat analysis. May provide computer forensic and intrusion support to high technology investigations in the form of computer evidence seizure, computer forensic analysis, data recovery, and network assessments. Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption.
- Collaborates with intrusion analysts to identify, report on, and coordinate remediation of cyber threats to the client.
- Provides timely and actionable sanitized intelligence to cyber incident response professionals.
- Leverages technical knowledge of computer systems and networks with cyber threat information to assess the client's security posture.
- Conducts intelligence analysis to assess intrusion signatures, tactics, techniques and procedures associated with preparation for and execution of cyber attacks.
- Researches hackers, hacker techniques, vulnerabilities, exploits, and provides detailed briefings and intelligence reports to leadership.
Bachelor's with 5 - 8 years (or commensurate experience)
Required Skills and Experience
- Clearance Required: Secret
- Bachelors Degree in Technical field
- Three+ (3) years experience working as an Information Systems Security Engineer (ISSE); or Information Systems Security Manager (ISSM); or Fully Qualified Validator (FQV); or Network Security Engineer supporting C4I systems
- Experience assisting Partner Nations (PN), Service Components, and other stakeholders with assessing a PN system or network utilizing the Risk Management Framework (RMF)
- Experience guiding a PN through the RMF process as required by the JS J6 Foreign Partner Connection Guide
- Experience working OCONUS in security cooperation efforts or for foreign customers (i.e., not for US military bases or USG facilities
***PENDING CONTRACT AWARD***
Preferred Skills and Experience:
- Three+ (3) years experience with NAVWAR prime mission products.
- Experience interacting with USG and foreign senior military/government officials.
- Completion of DISAM SCM courses such as SCM-C.
- DISAM International Affairs Certification Level 1 or above.
- IAM Level III Certification (CISSP).
- Experience working in austere locations (e.g., Middle Eastern nations) in security cooperation/assistance efforts or for foreign customers (i.e., not for US military bases or USG facilities).
- Experience working with other Program Offices to ensure that Program of Record (PoR) andnon-PoR solutions meet FMS Cybersecurity requirements.
- Experience providing Subject Matter Expertise identifying Cybersecurity solutions to meet PN requirements
- Experience assisting a PN with developing RMF artifacts such as the Security Categorization Form (SCF), Security Controls Selection Form (SCCF), Security Assessment Report (SAR), Security
GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens.But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer?We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets.
Posted Pay Range
The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an “at-will position” and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors.
Posted Salary Range USD $85,000.00 - USD $130,000.00 /Yr. #J-18808-LjbffrCyber Security Engineer

Posted 6 days ago
Job Viewed
Job Description
GovCIO is currently hiring for a Cyber Security Engineer. This position will be located in Saudi Arabia and will be an onsite position.
**Responsibilities**
Correlates threat data from various sources to establish the identity and modus operandi of hackers active in client's networks and posing a potential threat. Provides the customer with assessments and reports facilitating situational awareness and understanding of current cyber threats and adversaries. Develops cyber threat profiles based on geographic region, country, group, or individual actors. Produces cyber threat assessments based on entity threat analysis. May provide computer forensic and intrusion support to high technology investigations in the form of computer evidence seizure, computer forensic analysis, data recovery, and network assessments. Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption.
+ Collaborates with intrusion analysts to identify, report on, and coordinate remediation of cyber threats to the client.
+ Provides timely and actionable sanitized intelligence to cyber incident response professionals.
+ Leverages technical knowledge of computer systems and networks with cyber threat information to assess the client's security posture.
+ Conducts intelligence analysis to assess intrusion signatures, tactics, techniques and procedures associated with preparation for and execution of cyber attacks.
+ Researches hackers, hacker techniques, vulnerabilities, exploits, and provides detailed briefings and intelligence reports to leadership.
**Qualifications**
Bachelor's with 5 - 8 years (or commensurate experience)
Required Skills and Experience
+ Clearance Required: Secret
+ Bachelors Degree in Technical field
+ Three+ (3) years experience working as an Information Systems Security Engineer (ISSE); or Information Systems Security Manager (ISSM); or Fully Qualified Validator (FQV); or Network Security Engineer supporting C4I systems
+ Experience assisting Partner Nations (PN), Service Components, and other stakeholders with assessing a PN system or network utilizing the Risk Management Framework (RMF)
+ Experience guiding a PN through the RMF process as required by the JS J6 Foreign Partner Connection Guide
+ Experience working OCONUS in security cooperation efforts or for foreign customers (i.e., not for US military bases or USG facilities
***PENDING CONTRACT AWARD***
Preferred Skills and Experience:
+ Three+ (3) years experience with NAVWAR prime mission products.
+ Experience interacting with USG and foreign senior military/government officials.
+ Completion of DISAM SCM courses such as SCM-C.
+ DISAM International Affairs Certification Level 1 or above.
+ IAM Level III Certification (CISSP).
+ Experience working in austere locations (e.g., Middle Eastern nations) in security cooperation/assistance efforts or for foreign customers (i.e., not for US military bases or USG facilities).
+ Experience working with other Program Offices to ensure that Program of Record (PoR) andnon-PoR solutions meet FMS Cybersecurity requirements.
+ Experience providing Subject Matter Expertise identifying Cybersecurity solutions to meet PN requirements
+ Experience assisting a PN with developing RMF artifacts such as the Security Categorization Form (SCF), Security Controls Selection Form (SCCF), Security Assessment Report (SAR), Security
**Company Overview**
GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens.
But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer?
**What You Can Expect**
**Interview & Hiring Process**
If you are selected to move forward through the process, here's what you canexpect:
+ During the Interview Process
+ Virtual video interview conducted via video with the hiring manager and/or team
+ Camera must be on
+ A valid photo ID must be presented during each interview
+ During the Hiring Process
+ Enhanced Biometrics ID verification screening
+ Background check, to include:
+ Criminal history (past 7 years)
+ Verification of your highest level of education
+ Verification of your employment history (past 7 years), based on information provided in your application
**Employee Perks**
At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including:
+ Employee Assistance Program (EAP)
+ Corporate Discounts
+ Learning & Development platform, to include certification preparation content
+ Training, Education and Certification Assistance*
+ Referral Bonus Program
+ Internal Mobility Program
+ Pet Insurance
+ Flexible Work Environment
*Available to full-time employees
Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience.
**We are an Equal Opportunity Employer.** All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets.
**Posted Pay Range**
The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an "at-will position" and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors.
**Posted Salary Range**
USD $85,000.00 - USD $130,000.00 /Yr.
Submit a referral to this job ( _SA-Riyadh_
**ID** _2025-6097_
**Category** _Cyber Security & Intelligence_
**Position Type** _Full-Time_