507 Cybersecurity Specialists jobs in Saudi Arabia
Cyber threat intelligence Analyst
Posted 1 day ago
Job Viewed
Job Description
The Cyber Threat Intelligence Analyst will deliver and develop strategic and tactical Cyber Threat Intelligence capabilities within the cyber security operations team.
The role holder will maintain a clear understanding of the threat landscape, identify new sources of intelligence, and aggregate and analyze data to provide accurate and actionable recommendations. They will help manage the complete cyber threat intelligence lifecycle and ensure that this is appropriately integrated into relevant processes and tools.
The Cyber Threat Intelligence Analyst will be responsible for compiling, articulating and presenting cyber threat intelligence briefings for the Senior Cyber Threat Analyst as well as compiling clear and concise threat intelligence reports.
Job Responsibilities
- Help develop, configure and manage a suite of cyber threat intelligence sources
- Evaluate intelligence for accuracy, reliability, and relevance across multiple intelligence sources
- Help develop and maintain close links with cyber threat intelligence functions within partner organizations and government agencies
- Perform analysis across the estate, looking for threats to critical infrastructure, resources and services
- Help develop and produce threat intelligence reports, to provide key metrics into other internal cyber functions (Security Incident Response, Threat Hunting, etc.).
- Carry out research and discovery across the estate with a view to producing reports on CTI detections and trends (i.e. highlighted IOCs, Vulnerabilities, Malware).
- Manage the complete IoC lifecycle
- Provide analysis to feed into the overall security posture, assisting with supporting activities to further increase defenses, harden potential attack surfaces and implement better protection mechanisms.
- Act as CTI lead in the handling and remediation of security incidents.
- Maintain strong awareness with stakeholder groups of current threat landscape
- Review, analyze and contextualize complex threat intelligence data for wider consumption with business partners
What You'll Need
Qualification Requirements (Desirable)
- Certifications in security (i.e. GCTI, GREM, GCFA, GCIH) desirable but not essential
- Degree or equivalent (i.e. MBA) desirable but not essential
- Comprehensive knowledge about vulnerability and security policies such as ISO standards
Skills / Experience Requirements
- 5+ years operational experience as a threat intelligence analyst, with good working knowledge of security incident response and malware analysis.
- Experience in threat modeling and common frameworks such as the cyber kill chain and MITRE.
- Hands-on experience with Network Security, Digital Forensics and IPS/IDS systems.
- Hands-on experience with dark web analysis, including the associated tooling and adversarial slang.
- Solid understanding of supporting frameworks like MITRE ATT&CK, LM Cyber Kill Chain, IA Diamond Model, etc.
- Knowledge of supporting processes, like DFIR, Threat Hunting, Malware Analysis and red/purple team exercises.
- Knowledge of threat intelligence tooling, both commercial and open source.
- Understanding of Security Operations and supporting functions, technologies and methodologies.
- Ability to document findings into reports that can be understood across all levels of the organization.
- Strong presentation and communication skills, both verbal and written.
- Working knowledge of threat hunting
No of Positions: 1
Note: The candidate would be expected to work in diverse consulting engagements and is willing to travel to Middle East countries for project execution at least 50% of their time.
Preference to candidates who can join immediately or within 15 days at the max.
Employment Type: Full-time
#J-18808-LjbffrCyber Threat Intelligence Analyst
Posted 12 days ago
Job Viewed
Job Description
Help Ag is looking for a Cyber Threat Intelligence Analyst (TIA) who will be a part of the Cyber Defense team, responsible to help collect, analyze, and disseminate cyber intelligence impacting the company or its customers. The ideal candidate will be a professional with experience in cyber intelligence/cyber risk, delivering equivalent services to organizations, with drive and creativity. This is a fantastic opportunity for a passionate professional that wants to evolve in the Cyber Intelligence world. The position will involve essential duties and responsibilities that must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work.
Responsibilities
Identify, collect, and perform analysis of raw, primary, and secondary data derived from various sources.
Create and update General Intelligence Requirements (GIR)s, Priority Intelligence Requirements (PIR)s, and Organization Specific Intelligence Requirements (OSIR)s for customers.
Create threat profiles and threat landscapes for companies and or customers.
Create diamond models around customers and threat adversaries.
Improve the creation and delivery of intelligence information to customers and partners, via different reports and tools, linking the dots and adding value to the service delivered.
Perform investigations on the internet and dark web on different topics, from broad investigations to specific searches.
Identify, assess, and track tactics, techniques, and procedures of cyber threat actors.
Provide threat review and validation to customers on their exposure to cyber security risks, threats, and potential impact.
Provide actionable strategic, technical, and tactical cyber intelligence to company & its subsidiaries through weekly, monthly, and ad hoc reports, briefings, and presentations.
Conduct Internet searches, in English and Arabic, to profile customers’ online presence and optimize data feeds into back end cyber threat harvesting and analysis solutions.
Apply advanced search techniques (e.g., Boolean terms) in Google/Bing search engines, social sites, domain databases, darknet, etc. to reduce false positives.
Support customers in take down efforts to remove fraudulent, offensive, and suspicious online content.
Be up to date on knowledge of attacker tools/techniques, country and regional cyber threats, business, and political landscapes to reflect their context into detected/created threats to reduce false positives to help improve generated reports.
Provide feedback and recommendations to Backend Cyber defense teams such as the MDR Team to enhance detection's (e.g., false positives, generic data, fine-tuning, updated info, etc.) and improve portal performance and/or experience.
Understand customer industries to generate Arabic keywords to support searches of online Arabic content.
Identify new information sources (English and Arabic), search keywords (English and Arabic) and best practices to achieve more accurate and customer related threat detection.
When customers request ad-hoc investigations, assist in defining the investigation scope, delivery date and present the findings to the customer (report).
Understand and perform analysis of competing hypotheses (ACH) for use in threat hunting and advisory production.
Manage the life cycle of threat intelligence.
Maintain a high degree of awareness of the current threat landscape.
Assist in providing threat and vulnerability analysis as well as security advisory services.
Participate in knowledge sharing with other Analysts and writing technical articles for Internal Knowledge Bases.
Perform tasks independently with some oversight.
Deliver Cyber Intelligence services.
Research and craft analytic papers and deliver intelligence briefings under short deadlines on various geographical and functional topics.
Use knowledge, creativity, and analytic tradecraft best practices to obtain solutions to complex problems.
Qualifications & Skills:
A Degree in Computer Science, Information Systems, Electronics Engineering, or a closely related degree.
1 - 4 years’ experience as a TIA or related position.
An active, demonstrable interest in cyber threat detection, and cyber threat intelligence.
A thorough understanding of IT systems and network security concepts, network protocols.
Thorough understanding of cyber threats and warfare such as Internet services attacks, User attacks, APTs, malicious mobile apps, online fraud, dark-net, hackers’ tools/techniques, hacktivist, etc.
Knowledge of latest global cyber-attacks, prominent ransomware, APT groups.
Demonstrable knowledge around GIR creations and threat profiling/landscaping.
Demonstrable knowledge of cyber threat intelligence, threat actors, malware, tactics, techniques, and procedures (TTPs), intelligence analysis, use of diamond models and various security methodologies and processes.
Demonstrable knowledge analysis of competing hypotheses (ACH) for evaluating multiple competing hypotheses for observed data.
Deep knowledge of IT security best practices, common attack types, and detection/prevention methods.
Demonstrable knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cybercrime.
Demonstrable knowledge on deep and dark web.
Good understanding of the cyber kill chain or attack vectors.
Excellent verbal and written communication skills including the ability to clearly articulate technical and strategic level cyber matters to a variety of audiences.
Ability to multitask, prioritize, and manage time effectively.
Strong attention to detail.
Excellent interpersonal skills and professional demeanor.
Excellent customer service skills.
Formal Intelligence Analysis training & certifications like GCTI, GOSI, C|TIA, Security+, RCIA, CTIP, CPTIA, CRTIA, CTIS-I and or CTIS-II.
Benefits:
Health insurance with one of the leading global providers for medical insurance.
Career progression and growth through challenging projects and work.
Employee engagement activities throughout the year.
Tailored training & development program.
About Us:
Help AG is the cyber security arm of e& enterprise and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Present in the Middle East since 2004, Help AG was strategically acquired by Etisalat group in Feb 2020, hence creating a cyber security and digital transformation powerhouse in the region.
Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and cyber security focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.
#J-18808-LjbffrCyber Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Help Ag is looking for a Cyber Threat Intelligence Analyst (TIA) who will be a part of the Cyber Defense team, responsible to help collect, analyze, and disseminate cyber intelligence impacting the company or its customers. The ideal candidate will be a professional with experience in cyber intelligence/cyber risk, delivering equivalent services to organizations, with drive and creativity. This is a fantastic opportunity for a passionate professional that wants to evolve in the Cyber Intelligence world. The position will involve essential duties and responsibilities that must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work.
Responsibilities
Identify, collect, and perform analysis of raw, primary, and secondary data derived from various sources.
Create and update General Intelligence Requirements (GIR)s, Priority Intelligence Requirements (PIR)s, and Organization Specific Intelligence Requirements (OSIR)s for customers.
Create threat profiles and threat landscapes for companies and or customers.
Create diamond models around customers and threat adversaries.
Improve the creation and delivery of intelligence information to customers and partners, via different reports and tools, linking the dots and adding value to the service delivered.
Perform investigations on the internet and dark web on different topics, from broad investigations to specific searches.
Identify, assess, and track tactics, techniques, and procedures of cyber threat actors.
Provide threat review and validation to customers on their exposure to cyber security risks, threats, and potential impact.
Provide actionable strategic, technical, and tactical cyber intelligence to company & its subsidiaries through weekly, monthly, and ad hoc reports, briefings, and presentations.
Conduct Internet searches, in English and Arabic, to profile customers’ online presence and optimize data feeds into back end cyber threat harvesting and analysis solutions.
Apply advanced search techniques (e.g., Boolean terms) in Google/Bing search engines, social sites, domain databases, darknet, etc. to reduce false positives.
Support customers in take down efforts to remove fraudulent, offensive, and suspicious online content.
Be up to date on knowledge of attacker tools/techniques, country and regional cyber threats, business, and political landscapes to reflect their context into detected/created threats to reduce false positives to help improve generated reports.
Provide feedback and recommendations to Backend Cyber defense teams such as the MDR Team to enhance detection's (e.g., false positives, generic data, fine-tuning, updated info, etc.) and improve portal performance and/or experience.
Understand customer industries to generate Arabic keywords to support searches of online Arabic content.
Identify new information sources (English and Arabic), search keywords (English and Arabic) and best practices to achieve more accurate and customer related threat detection.
When customers request ad-hoc investigations, assist in defining the investigation scope, delivery date and present the findings to the customer (report).
Understand and perform analysis of competing hypotheses (ACH) for use in threat hunting and advisory production.
Manage the life cycle of threat intelligence.
Maintain a high degree of awareness of the current threat landscape.
Assist in providing threat and vulnerability analysis as well as security advisory services.
Participate in knowledge sharing with other Analysts and writing technical articles for Internal Knowledge Bases.
Perform tasks independently with some oversight.
Deliver Cyber Intelligence services.
Research and craft analytic papers and deliver intelligence briefings under short deadlines on various geographical and functional topics.
Use knowledge, creativity, and analytic tradecraft best practices to obtain solutions to complex problems.
Qualifications & Skills:
A Degree in Computer Science, Information Systems, Electronics Engineering, or a closely related degree.
1 - 4 years’ experience as a TIA or related position.
An active, demonstrable interest in cyber threat detection, and cyber threat intelligence.
A thorough understanding of IT systems and network security concepts, network protocols.
Thorough understanding of cyber threats and warfare such as Internet services attacks, User attacks, APTs, malicious mobile apps, online fraud, dark-net, hackers’ tools/techniques, hacktivist, etc.
Knowledge of latest global cyber-attacks, prominent ransomware, APT groups.
Demonstrable knowledge around GIR creations and threat profiling/landscaping.
Demonstrable knowledge of cyber threat intelligence, threat actors, malware, tactics, techniques, and procedures (TTPs), intelligence analysis, use of diamond models and various security methodologies and processes.
Demonstrable knowledge analysis of competing hypotheses (ACH) for evaluating multiple competing hypotheses for observed data.
Deep knowledge of IT security best practices, common attack types, and detection/prevention methods.
Demonstrable knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cybercrime.
Demonstrable knowledge on deep and dark web.
Good understanding of the cyber kill chain or attack vectors.
Excellent verbal and written communication skills including the ability to clearly articulate technical and strategic level cyber matters to a variety of audiences.
Ability to multitask, prioritize, and manage time effectively.
Strong attention to detail.
Excellent interpersonal skills and professional demeanor.
Excellent customer service skills.
Formal Intelligence Analysis training & certifications like GCTI, GOSI, C|TIA, Security+, RCIA, CTIP, CPTIA, CRTIA, CTIS-I and or CTIS-II.
Benefits:
Health insurance with one of the leading global providers for medical insurance.
Career progression and growth through challenging projects and work.
Employee engagement activities throughout the year.
Tailored training & development program.
About Us:
Help AG is the cyber security arm of e& enterprise and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Present in the Middle East since 2004, Help AG was strategically acquired by Etisalat group in Feb 2020, hence creating a cyber security and digital transformation powerhouse in the region.
Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and cyber security focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.
#J-18808-LjbffrCyber threat intelligence Analyst
Posted today
Job Viewed
Job Description
The Cyber Threat Intelligence Analyst will deliver and develop strategic and tactical Cyber Threat Intelligence capabilities within the cyber security operations team.
The role holder will maintain a clear understanding of the threat landscape, identify new sources of intelligence, and aggregate and analyze data to provide accurate and actionable recommendations. They will help manage the complete cyber threat intelligence lifecycle and ensure that this is appropriately integrated into relevant processes and tools.
The Cyber Threat Intelligence Analyst will be responsible for compiling, articulating and presenting cyber threat intelligence briefings for the Senior Cyber Threat Analyst as well as compiling clear and concise threat intelligence reports.
Job Responsibilities
- Help develop, configure and manage a suite of cyber threat intelligence sources
- Evaluate intelligence for accuracy, reliability, and relevance across multiple intelligence sources
- Help develop and maintain close links with cyber threat intelligence functions within partner organizations and government agencies
- Perform analysis across the estate, looking for threats to critical infrastructure, resources and services
- Help develop and produce threat intelligence reports, to provide key metrics into other internal cyber functions (Security Incident Response, Threat Hunting, etc.).
- Carry out research and discovery across the estate with a view to producing reports on CTI detections and trends (i.e. highlighted IOCs, Vulnerabilities, Malware).
- Manage the complete IoC lifecycle
- Provide analysis to feed into the overall security posture, assisting with supporting activities to further increase defenses, harden potential attack surfaces and implement better protection mechanisms.
- Act as CTI lead in the handling and remediation of security incidents.
- Maintain strong awareness with stakeholder groups of current threat landscape
- Review, analyze and contextualize complex threat intelligence data for wider consumption with business partners
What You'll Need
Qualification Requirements (Desirable)
- Certifications in security (i.e. GCTI, GREM, GCFA, GCIH) desirable but not essential
- Degree or equivalent (i.e. MBA) desirable but not essential
- Comprehensive knowledge about vulnerability and security policies such as ISO standards
Skills / Experience Requirements
- 5+ years operational experience as a threat intelligence analyst, with good working knowledge of security incident response and malware analysis.
- Experience in threat modeling and common frameworks such as the cyber kill chain and MITRE.
- Hands-on experience with Network Security, Digital Forensics and IPS/IDS systems.
- Hands-on experience with dark web analysis, including the associated tooling and adversarial slang.
- Solid understanding of supporting frameworks like MITRE ATT&CK, LM Cyber Kill Chain, IA Diamond Model, etc.
- Knowledge of supporting processes, like DFIR, Threat Hunting, Malware Analysis and red/purple team exercises.
- Knowledge of threat intelligence tooling, both commercial and open source.
- Understanding of Security Operations and supporting functions, technologies and methodologies.
- Ability to document findings into reports that can be understood across all levels of the organization.
- Strong presentation and communication skills, both verbal and written.
- Working knowledge of threat hunting
No of Positions: 1
Note: The candidate would be expected to work in diverse consulting engagements and is willing to travel to Middle East countries for project execution at least 50% of their time.
Preference to candidates who can join immediately or within 15 days at the max.
Employment Type: Full-time
#J-18808-LjbffrCyber threat intelligence Analyst
Posted today
Job Viewed
Job Description
The Cyber Threat Intelligence Analyst will deliver and develop strategic and tactical Cyber Threat Intelligence capabilities within the cyber security operations team.
The role holder will maintain a clear understanding of the threat landscape, identify new sources of intelligence, and aggregate and analyze data to provide accurate and actionable recommendations. They will help manage the complete cyber threat intelligence lifecycle and ensure that this is appropriately integrated into relevant processes and tools.
The Cyber Threat Intelligence Analyst will be responsible for compiling, articulating and presenting cyber threat intelligence briefings for the Senior Cyber Threat Analyst as well as compiling clear and concise threat intelligence reports.
Job Responsibilities
- Help develop, configure and manage a suite of cyber threat intelligence sources
- Evaluate intelligence for accuracy, reliability, and relevance across multiple intelligence sources
- Help develop and maintain close links with cyber threat intelligence functions within partner organizations and government agencies
- Perform analysis across the estate, looking for threats to critical infrastructure, resources and services
- Help develop and produce threat intelligence reports, to provide key metrics into other internal cyber functions (Security Incident Response, Threat Hunting, etc.).
- Carry out research and discovery across the estate with a view to producing reports on CTI detections and trends (i.e. highlighted IOCs, Vulnerabilities, Malware).
- Manage the complete IoC lifecycle
- Providing analysis to feed into the overall security posture, assisting with supporting activities to further increase defences, harden potential attack surfaces and implement better protection mechanisms.
- Act as CTI lead in the handling and remediation of security incidents.
- Maintain strong awareness with stakeholder groups of current threat landscape
- Review, analyse and contextualise complex threat intelligence data for wider consumption with business partners
What You'll Need
Qualification Requirements (Desirable)
- Certifications in security (i.e. GCTI, GREM, GCFA, GCIH) desirable but not essential
- Degree or equivalent (i.e. MBA) desirable but not essential
- Comprehensive knowledge about vulnerability and security policies such as ISO standards
Skills / Experience Requirements
- 5+ years operational experience as a threat intelligence analyst, with good working knowledge of security incident response and malware analysis.
- Experience in threat modeling and common frameworks such as the cyber kill chain and MITRE.
- Hands-on experience with Network Security, Digital Forensics and IPS/IDS systems.
- Hands-on experience with dark web analysis, including the associated tooling and adversarial slang.
- Solid understanding of supporting frameworks like MITRE ATT&CK, LM Cyber Kill Chain, IA Diamond Model, etc.
- Knowledge of supporting processes, like DFIR, Threat Hunting, Malware Analysis and red/purple team exercises.
- Knowledge of threat intelligence tooling, both commercial and open source.
- Understanding of Security Operations and supporting functions, technologies and methodologies.
- Ability to document findings into reports that can be understood across all levels of the organization.
- Strong presentation and communication skills, both verbal and written.
- Working knowledge of threat hunting
No of Positions: 1
Note: The candidate would be expected to work in diverse consulting engagements and are willing to travel to Middle East countries for project execution at least 50% of their time.
Preference to candidates who can join immediately or within 15 days at the max.
Employment Type : Full-time
Cybersecurity Specialist
Posted 8 days ago
Job Viewed
Job Description
Join to apply for the Cybersecurity Specialist role at Help AG, an e& enterprise company .
Help AG is looking for a talented and experienced Cybersecurity Specialist to join our Support Center team in KSA. This role focuses on break-and-fix support for cybersecurity products, including troubleshooting incidents, resolving technical issues, and delivering high-quality solutions to customers.
The ideal candidate will have hands-on expertise with:
- Palo Alto Networks firewalls
- F5 Application Delivery Controllers
- Fortinet solutions
- OPSWAT
- Other related cybersecurity technologies
Responsibilities:
- Provide L2/L3 break-and-fix support for cybersecurity products including Palo Alto Firewalls, F5 devices, and related solutions.
- Troubleshoot and resolve configuration issues, hardware/software faults, and performance bottlenecks.
- Manage product tickets in line with defined SLAs, escalating to vendors when necessary.
- Perform root cause analysis (RCA) for recurring incidents and recommend preventive measures.
- Document incidents, troubleshooting steps, and resolutions in the Support Knowledge Base.
- Collaborate with internal teams and vendors to ensure timely resolution and service quality.
- Participate in 24x7 on-call rotations as required for critical issue handling.
- Provide technical guidance and best product practices to customers and internal teams.
Qualifications and Skills:
- Bachelor’s degree in Computer Science, Information Security, or related field.
- Relevant certifications (preferred):
- Palo Alto (PCNSE/PCNSA)
- F5 Certified Administrator / Specialist
- CISSP, CISM, CISA, CCNP Security (advantageous).
- 2–5 years of experience in cybersecurity support, SOC, or NOC environments.
- Proven hands-on experience with:
- Palo Alto firewalls (policies, NAT, VPN, Panorama).
- F5 load balancers and WAF (LTM, ASM, iRules, SSL offloading).
- Security technologies (IPS/IDS, VPN, proxy, SSL inspection).
- Strong understanding of networking protocols (TCP/IP, DNS, HTTP/HTTPS, BGP, OSPF).
- Strong analytical and problem-solving skills.
- Ability to work under pressure and meet SLA-driven timelines.
- Excellent communication in Arabic and English.
- Strong customer service orientation.
Benefits
- Health insurance with one of the leading global providers for medical insurance.
- Career progression and growth through challenging projects and work.
- Employee engagement and wellness campaigns activities throughout the year.
- Tailored training & development program.
About Us
Help AG is the cybersecurity arm of e& enterprise (formerly Etisalat Digital) and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Present in the Middle East since 2004, Help AG was strategically acquired by e& (formerly Etisalat Group) in 2020, hence creating a cybersecurity and digital transformation powerhouse in the region. Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and maintaining its focus on all aspects of cybersecurity. With best of breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the-art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.
Seniority level
- Not Applicable
Employment type
- Full-time
Job function
- Information Technology
- Industries: IT Services and IT Consulting
Referrals increase your chances of interviewing at Help AG, an e& enterprise company by 2x
#J-18808-LjbffrCybersecurity Specialist
Posted 8 days ago
Job Viewed
Job Description
Overview
Help AG is looking for a talented and experienced Cybersecurity Specialist to join our Support Center team in KSA. This role focuses on break-and-fix support for cybersecurity products, including troubleshooting incidents, resolving technical issues, and delivering high-quality solutions to customers.
The ideal candidate will have hands-on expertise with:
- Palo Alto Networks firewalls
- F5 Application Delivery Controllers
- Fortinet solutions
- OPSWAT
- Other related cybersecurity technologies
- Provide L2/L3 break-and-fix support for cybersecurity products including Palo Alto Firewalls, F5 devices, and related solutions.
- Troubleshoot and resolve configuration issues, hardware/software faults, and performance bottlenecks.
- Manage product tickets in line with defined SLAs, escalating to vendors when necessary.
- Perform root cause analysis (RCA) for recurring incidents and recommend preventive measures.
- Document incidents, troubleshooting steps, and resolutions in the Support Knowledge Base.
- Collaborate with internal teams and vendors to ensure timely resolution and service quality.
- Participate in 24x7 on-call rotations as required for critical issue handling.
- Provide technical guidance and best product practices to customers and internal teams.
- Bachelor’s degree in Computer Science, Information Security, or related field.
- Relevant certifications (preferred):
- Palo Alto (PCNSE/PCNSA)
- F5 Certified Administrator / Specialist
- CISSP, CISM, CISA, CCNP Security (advantageous)
- 2–5 years of experience in cybersecurity support, SOC, or NOC environments.
- Proven hands-on experience with:
- Palo Alto firewalls (policies, NAT, VPN, Panorama).
- F5 load balancers and WAF (LTM, ASM, iRules, SSL offloading).
- Security technologies (IPS/IDS, VPN, proxy, SSL inspection).
- Strong understanding of networking protocols (TCP/IP, DNS, HTTP/HTTPS, BGP, OSPF).
- Strong analytical and problem-solving skills.
- Ability to work under pressure and meet SLA-driven timelines.
- Excellent communication in Arabic and English .
- Strong customer service orientation.
- Health insurance with one of the leading global providers for medical insurance.
- Career progression and growth through challenging projects and work.
- Employee engagement and wellness campaigns activities throughout the year.
- Tailored training & development program.
Help AG is the cybersecurity arm of e& enterprise (formerly Etisalat Digital) and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Present in the Middle East since 2004, Help AG was strategically acquired by e& (formerly Etisalat Group) in 2020, hence creating a cybersecurity and digital transformation powerhouse in the region.
Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and maintaining its focus on all aspects of cybersecurity.
With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the-art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.
#J-18808-LjbffrBe The First To Know
About the latest Cybersecurity specialists Jobs in Saudi Arabia !
Cybersecurity specialist
Posted today
Job Viewed
Job Description
A cybersecurity specialist develops, implements, and manages security measures to protect an organization's computer systems, networks, and data from cyber threats.
Job Type: Full-time
Pay: ﷼15, ﷼30,000.00 per month
Cybersecurity Specialist
Posted today
Job Viewed
Job Description
Company Description
NectarSource is an agile IT consulting and training partner for forward-thinking enterprises and individuals. As a leader in IT recruitment, corporate training, and digital workforce development, we help organizations bridge skill gaps and enhance workforce productivity. Our expertise includes Data Science, Data Analytics, AI/ML, ServiceNow, Mainframe, and other Digital Transformation technologies. With a diverse team of industry experts, we provide scalable training solutions and staffing services to meet the evolving needs of businesses worldwide. Our AI-powered learning and recruitment automation ensure clients achieve sustainable success in an ever-changing digital landscape.
Role Description
This is a full-time remote role for a Cybersecurity Specialist. The Cybersecurity Specialist will be responsible for monitoring and securing network and IT infrastructure, identifying and mitigating potential threats, conducting vulnerability assessments and penetration tests, and ensuring compliance with security policies and regulations. Additional responsibilities include developing security protocols, training staff on security best practices, and responding to security breaches.
Qualifications
- Network Security and IT Infrastructure skills
- Experience in Threat Mitigation and Vulnerability Assessments
- Proficiency in Penetration Testing and Security Compliance
- Knowledge of developing Security Protocols and Policies
- Ability to train staff on Security Best Practices and respond to Security Breaches
- Excellent problem-solving and analytical skills
- Bachelor's degree in Cybersecurity, Information Technology, or a related field
- Relevant certifications such as CISSP, CISM, or CEH are a plus
Cybersecurity Specialist
Posted today
Job Viewed
Job Description
Help AG is looking for a talented and experienced
Cybersecurity Specialist
to join our Support Center team in KSA. This role focuses on
break-and-fix support
for cybersecurity products, including troubleshooting incidents, resolving technical issues, and delivering high-quality solutions to customers.
The ideal candidate will have hands-on expertise with:
- Palo Alto Networks firewalls
- F5 Application Delivery Controllers
- Fortinet solutions
- OPSWAT
- Other related cybersecurity technologies
Responsibilities:
- Provide L2/L3 break-and-fix support for cybersecurity products including Palo Alto Firewalls, F5 devices, and related solutions.
- Troubleshoot and resolve configuration issues, hardware/software faults, and performance bottlenecks.
- Manage product tickets in line with defined SLAs, escalating to vendors when necessary.
- Perform root cause analysis (RCA) for recurring incidents and recommend preventive measures.
- Document incidents, troubleshooting steps, and resolutions in the Support Knowledge Base.
- Collaborate with internal teams and vendors to ensure timely resolution and service quality.
- Participate in 24x7 on-call rotations as required for critical issue handling.
- Provide technical guidance and best product practices to customers and internal teams.
Qualifications and Skills:
- Bachelor's degree in Computer Science, Information Security, or related field.
- Relevant certifications (preferred):
Palo Alto (PCNSE/PCNSA)
F5 Certified Administrator / Specialist
CISSP, CISM, CISA, CCNP Security
(advantageous).
- 2–5 years of experience in cybersecurity support, SOC, or NOC environments.
- Proven hands-on experience with:
Palo Alto firewalls (policies, NAT, VPN, Panorama).
F5 load balancers and WAF (LTM, ASM, iRules, SSL offloading).
Security technologies (IPS/IDS, VPN, proxy, SSL inspection).
- Strong understanding of networking protocols (TCP/IP, DNS, HTTP/HTTPS, BGP, OSPF).
- Strong analytical and problem-solving skills.
- Ability to work under pressure and meet SLA-driven timelines.
- Excellent communication in Arabic and English.
- Strong customer service orientation.
Benefits
- Health insurance with one of the leading global providers for medical insurance.
- Career progression and growth through challenging projects and work.
- Employee engagement and wellness campaigns activities throughout the year.
- Tailored training & development program.
About Us
Help AG is the cybersecurity arm of e& enterprise (formerly Etisalat Digital) and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Present in the Middle East since 2004, Help AG was strategically acquired by e& (formerly Etisalat Group) in 2020, hence creating a cybersecurity and digital transformation powerhouse in the region.
Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and maintaining its focus on all aspects of cybersecurity.
With best of breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the-art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.