EN | AR

18 Cybersecurity jobs in Jeddah

Cybersecurity Consultant

Jeddah, Makkah confidential

Posted 14 days ago

Job Viewed

Tap Again To Close

Job Description

Position Overview

Position Overview We are seeking a skilled and motivated Cybersecurity Consultant to join our team. The consultant will be responsible for assessing cybersecurity risks, developing solutions, and ensuring compliance with relevant frameworks and regulations, including the National Cybersecurity Authority (NCA) Operational Technology Cybersecurity Controls (OTCC). This role requires a strong background in OT/IT security, risk management, and advisory services.

Responsibilities
  • Conduct comprehensive cybersecurity assessments for IT and OT environments.
  • Map and document OT assets, including hardware, software, and network components.
  • Evaluate security controls, incident detection, monitoring, and response capabilities.
  • Identify compliance gaps against NCA OTCC and international standards.
  • Develop recommendations and cybersecurity roadmaps with prioritized solutions.
  • Review contractor deliverables to ensure alignment with technical specifications and compliance requirements.
  • Prepare and present detailed reports including risk assessments, solution proposals, and compliance documentation.
  • Support incident response planning, disaster recovery, and business continuity initiatives.
  • Provide cybersecurity training and awareness sessions to staff.
  • Stay current with emerging threats, vulnerabilities, and cybersecurity technologies.
Qualifications
  • Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field (Master’s preferred).
  • Minimum 5+ years of experience in cybersecurity consulting, OT/ICS security, or risk management.
  • Strong understanding of NCA frameworks, OT security controls, and industry standards (e.g., ISA/IEC 62443, NIST CSF, ISO 27001).
  • Experience with security technologies such as SIEM, firewalls, IDS/IPS, and endpoint protection.
  • Demonstrated ability to perform risk assessments, gap analysis, and compliance audits.
Preferred Certifications
  • CISSP (Certified Information Systems Security Professional)
  • CISM (Certified Information Security Manager)
  • CEH (Certified Ethical Hacker)
  • GICSP (Global Industrial Cyber Security Professional)
  • CompTIA Security+, OSCP, or equivalent
Key Skills
  • Strong analytical and problem-solving skills.
  • Excellent verbal and written communication abilities.
  • Ability to explain complex technical issues to non-technical stakeholders.
  • Strong organizational skills with attention to detail.
  • Ability to work independently and as part of a team

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Engineer II

Jeddah, Makkah Scientific Research Corporation

Posted today

Job Viewed

Tap Again To Close

Job Description

Description
  • Supporting various Cybersecurity efforts related to Command, Control, Communications, Computers and Intelligence (C4I) systems for naval vessels and shore sites in the Kingdom of Saudi Arabia

FILLING THIS POSITION IS CONTINGENT UPON AWARD

#LI-SF1

Requirements
  • Bachelor's degree in a technical field such as Engineering, Science or a related field of study from an accredited college or university
  • Three+ (3) years of experience working as an Information Systems Security Engineer (ISSE); or Information Systems Security Manager (ISSM); or Fully Qualified Validator (FQV); or Network Security Engineer supporting C4I systems
  • Experience assisting Partner Nations (PN), Service Components, and other stakeholders with assessing a PN system or network utilizing the Risk Management Framework (RMF)
  • Experience guiding a PN through the RMF process as required by the JS J6 Foreign Partner Connection Guide
  • Experience working OCONUS in security cooperation efforts or for foreign customers (i.e., not for US military bases or USG facilities)
Desired Skills
  • Three+ (3) years of experience with NAVWAR prime mission products
  • Experience interacting with USG and foreign senior military/government officials
  • Completion of DISAM SCM courses such as SCM-C
  • DISAM International Affairs Certification Level 1 or above
  • IAM Level III Certification (CISSP)
  • Experience working in austere locations (e.g., Middle Eastern nations) in security cooperation/assistance efforts or for foreign customers (i.e., not for US military bases or USG facilities)
  • Experience working with other Program Offices to ensure that Program of Record (PoR) andnon-PoR solutions meet FMS Cybersecurity requirements
  • Experience providing Subject Matter Expertise identifying Cybersecurity solutions to meet PN requirements
  • Experience generating Cybersecurity functional requirements derived from Partner Nation Operational Requirements and desired capabilities
  • Experience assisting a PN assessing their security architecture, identifying security gaps, and recommending solutions to mitigate risk
  • Experience assisting a PN with developing RMF artifacts such as the Security Categorization Form (SCF), Security Controls Selection Form (SCCF), Security Assessment Report (SAR), Security Assessment Plan (SAP), Plan of Action and Milestones (POAM), Ports Protocols and Services Matrix (PPSM), etc.
  • Experience assisting a PN with developing security artifacts from the PN in the proper format to generate an Authority to Connect (ATC) package to the Defense Cybersecurity Authorization Working Group (DSAWG) and Information Security Risk Management Committee (ISRMC)
Clearance Information

SRC IS A CONTRACTOR FOR THE U.S. GOVERNMENT, THIS POSITION WILL REQUIRE U.S. CITIZENSHIP AND ELIGIBILITY FOR A U.S. GOVERNMENT SECURITY CLEARANCE AT THE SECRET LEVEL

Travel Requirements
  • Work location is Kingdom of Saudi Arabia (KSA)
  • Travel to the United States will be in accordance with KSA visa requirements
About Us

Scientific Research Corporation is an advanced information technology and engineering company that provides innovative products and services to government and private industry, as well as independent institutions. At the core of our capabilities is a seasoned team of highly skilled engineers and scientists with multidisciplinary backgrounds. This team is challenged daily to provide cutting edge technology solutions to our clients.

SRC offers a generous benefit package, including medical, dental, and vision plans, 401(k) with a company match, life insurance, vacation and sick paid time off accruals starting at 10 days of vacation and 5 days of sick leave annually, 11 paid holidays, tuition reimbursement, and a work environment that encourages excellence and more. For positions requiring a security clearance, selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information.

EEO

Scientific Research Corporation is an equal opportunity employer that does not discriminate in employment.

All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other protected characteristic under federal, state or local law.

Scientific Research Corporation endeavors to make accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Faculty in Cybersecurity

Jeddah, Makkah Baas International Group

Posted 10 days ago

Job Viewed

Tap Again To Close

Job Description

Responsibilities

  • Teach assigned courses as per contract
  • prepare course syllabus for course taught
  • prepare course file and course report for course taught
  • Give regular feedback to students for course taught
  • Post course grades on blackboard according to university policy
  • Advise Department Chair/ Director of concerns regarding assigned course
  • Prepare class materials before start of class
  • Attend the departmental council meetings when available
  • Explore new ideas and innovative teaching strategiesfor the courses taught
Department

Cybersecurity Program

Qualifications & Skills

Teaching or professional experience in areas such as Ethical Hacking, Computer Forensics, and Network Security

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

BD Executive – Cybersecurity

Jeddah, Makkah Paramount Computer Systems LLC

Posted 27 days ago

Job Viewed

Tap Again To Close

Job Description

Designation: BD Executive – Cybersecurity

Preference: Saudi Nationalitiespreferred/Any Nationals with Arabic Speaking

Experience: Mandatory cybersecurity sales experience

Overview:

We are seeking a dynamic Cybersecurity Sales Executive to join our growing team in Riyadh and Jeddah. The ideal candidate will have a proven track record in cybersecurity sales and deep familiarity with the KSA market.

Key Responsibilities:

  • Drive sales of cybersecurity products and services within the Saudi market.
  • Identify and build relationships with key clients across public and private sectors.
  • Meet or exceed quarterly and annual sales targets.
  • Collaborate with internal technical teams to design and present tailored solutions to clients.
  • Keep abreast of industry trends and competitor activities in the cybersecurity domain.
  • Prepare proposals, presentations, and RFP responses.
  • Develop and manage a robust sales pipeline.
Requirements:
  • Minimum 2 + years of direct cybersecurity sales experience.
  • Existing network of relationships in the KSA enterprise and government sectors.
  • Excellent communication and negotiation skills.
  • Bachelor's degree in business, IT, or a related field.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Faculty in Cybersecurity

New
Jeddah, Makkah Baas International Group

Posted today

Job Viewed

Tap Again To Close

Job Description

Responsibilities

  • Teach assigned courses as per contract
  • prepare course syllabus for course taught
  • prepare course file and course report for course taught
  • Give regular feedback to students for course taught
  • Post course grades on blackboard according to university policy
  • Advise Department Chair/ Director of concerns regarding assigned course
  • Prepare class materials before start of class
  • Attend the departmental council meetings when available
  • Explore new ideas and innovative teaching strategiesfor the courses taught
Department

Cybersecurity Program

Qualifications & Skills

Teaching or professional experience in areas such as Ethical Hacking, Computer Forensics, and Network Security

#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

Cybersecurity Engineer II

New
Jeddah, Makkah Scientific Research Corporation

Posted today

Job Viewed

Tap Again To Close

Job Description

Description
  • Supporting various Cybersecurity efforts related to Command, Control, Communications, Computers and Intelligence (C4I) systems for naval vessels and shore sites in the Kingdom of Saudi Arabia

FILLING THIS POSITION IS CONTINGENT UPON AWARD

#LI-SF1

Requirements
  • Bachelor's degree in a technical field such as Engineering, Science or a related field of study from an accredited college or university
  • Three+ (3) years of experience working as an Information Systems Security Engineer (ISSE); or Information Systems Security Manager (ISSM); or Fully Qualified Validator (FQV); or Network Security Engineer supporting C4I systems
  • Experience assisting Partner Nations (PN), Service Components, and other stakeholders with assessing a PN system or network utilizing the Risk Management Framework (RMF)
  • Experience guiding a PN through the RMF process as required by the JS J6 Foreign Partner Connection Guide
  • Experience working OCONUS in security cooperation efforts or for foreign customers (i.e., not for US military bases or USG facilities)
Desired Skills
  • Three+ (3) years of experience with NAVWAR prime mission products
  • Experience interacting with USG and foreign senior military/government officials
  • Completion of DISAM SCM courses such as SCM-C
  • DISAM International Affairs Certification Level 1 or above
  • IAM Level III Certification (CISSP)
  • Experience working in austere locations (e.g., Middle Eastern nations) in security cooperation/assistance efforts or for foreign customers (i.e., not for US military bases or USG facilities)
  • Experience working with other Program Offices to ensure that Program of Record (PoR) andnon-PoR solutions meet FMS Cybersecurity requirements
  • Experience providing Subject Matter Expertise identifying Cybersecurity solutions to meet PN requirements
  • Experience generating Cybersecurity functional requirements derived from Partner Nation Operational Requirements and desired capabilities
  • Experience assisting a PN assessing their security architecture, identifying security gaps, and recommending solutions to mitigate risk
  • Experience assisting a PN with developing RMF artifacts such as the Security Categorization Form (SCF), Security Controls Selection Form (SCCF), Security Assessment Report (SAR), Security Assessment Plan (SAP), Plan of Action and Milestones (POAM), Ports Protocols and Services Matrix (PPSM), etc.
  • Experience assisting a PN with developing security artifacts from the PN in the proper format to generate an Authority to Connect (ATC) package to the Defense Cybersecurity Authorization Working Group (DSAWG) and Information Security Risk Management Committee (ISRMC)
Clearance Information

SRC IS A CONTRACTOR FOR THE U.S. GOVERNMENT, THIS POSITION WILL REQUIRE U.S. CITIZENSHIP AND ELIGIBILITY FOR A U.S. GOVERNMENT SECURITY CLEARANCE AT THE SECRET LEVEL

Travel Requirements
  • Work location is Kingdom of Saudi Arabia (KSA)
  • Travel to the United States will be in accordance with KSA visa requirements
About Us

Scientific Research Corporation is an advanced information technology and engineering company that provides innovative products and services to government and private industry, as well as independent institutions. At the core of our capabilities is a seasoned team of highly skilled engineers and scientists with multidisciplinary backgrounds. This team is challenged daily to provide cutting edge technology solutions to our clients.

SRC offers a generous benefit package, including medical, dental, and vision plans, 401(k) with a company match, life insurance, vacation and sick paid time off accruals starting at 10 days of vacation and 5 days of sick leave annually, 11 paid holidays, tuition reimbursement, and a work environment that encourages excellence and more. For positions requiring a security clearance, selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information.

EEO

Scientific Research Corporation is an equal opportunity employer that does not discriminate in employment.

All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other protected characteristic under federal, state or local law.

Scientific Research Corporation endeavors to make accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Assistant Manager / Manager

Jeddah, Makkah TechBiz Global GmbH

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

At TechBiz Global, we are providing recruitment service to our TOP clients from our portfolio. We are currently seeking a Cybersecurity Assistant Manager / Manager to join one of our clients' teams. If you're looking for an exciting opportunity to grow in an innovative environment, this could be the perfect fit for you.

Responsibilities
  • Lead and manage cybersecurity initiatives and daily operations, delivering projects independently.
  • Ensure compliance with SAMA regulations and other relevant cybersecurity frameworks.
  • Conduct risk assessments, vulnerability management, and security audits.
  • Develop and implement security policies, procedures, and standards.
  • Monitor, detect, and respond to security threats and incidents.
  • Prepare clear reports and present findings to senior management.
  • Mentor and guide junior cybersecurity staff.
Qualifications
  • 5–6 years experience in cybersecurity, with proven ability to deliver independently.
  • Strong knowledge of SAMA regulations and cybersecurity best practices.
  • Familiarity with risk management, incident response, and security governance.
  • Professional certifications preferred: CISSP, CISM, CEH, ISO 27001 Lead Implementer.
  • Excellent analytical, communication, and leadership skills.
  • Available for on-site contract in KSA (3–6 months).

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Cybersecurity Jobs in Jeddah !

Enterprise Account Manager (Cybersecurity)

New
Jeddah, Makkah Opswat

Posted today

Job Viewed

Tap Again To Close

Job Description

Enterprise Account Manager (Cybersecurity) Protecting the World’s Critical Infrastructure

OPSWAT, a global leader in IT, OT, and ICS critical infrastructure cybersecurity, delivers an end-to-end platform that gives public and private sector organizations and enterprises the critical advantage needed to protect their complex networks, secure their devices, and ensure compliance. Over the last 20 years, our commitment to innovative technology has earned the trust of more than 1,700 organizations, governments, and institutions globally, solidifying our role in protecting the world’s critical infrastructure and securing our way of life.

The Position

The KSA Enterprise Account Manager is a significant driver of Company revenue and growth in the META region. This position is remote and will be located in Riyadh, KSA. Your responsibilities will include developing and implementing strategic account plans targeting deployments of our Metadefender and MetaAccess Security platforms. You will build the right relationships inside a target account, know how to leverage your company resources to the fullest, and negotiate and close new business. The ideal candidate will have previous work experience as a member of a corporate sales team and a career track record of exceeding multi-million-dollar sales quotas. Candidates selling into critical infrastructure and data diode sales experience are given a preference.

What You Will Be Doing

  • Strategically hunt for new business opportunities that leverage high-value use cases in key verticals.
  • In close partnership with your Solutions Engineer, develop and execute sales strategies and tactics to sell OPSWAT products, solutions, and services to exceed your sales targets.
  • Communicate value propositions to clients that speak intimately to their needs and requirements.
  • Utilize client-centric, solutions-oriented selling strategies and a hunter’s mentality to identify, qualify, and convert enterprise sales.
  • Effectively articulate financial ROI/TCO value, and build value throughout the negotiation process.
  • Maintain extensive and accurate account and opportunity detail in Salesforce CRM, including account win plans, customer touch points, sales inhibitors, etc.
  • Leverage all cross-functional resources to achieve your quota: Executive management, Inside Sales Development, Customer Success, Field and Event Marketing, Sales Operations, and others.
  • Forecast and report revenue projections to manage and deliver a predictable pipeline to drive forecast accuracy.
  • Overachieve on annual quota, measured quarterly.

What We Need From You

  • A minimum of 7 years of successfully selling technology products and solutions to businesses.
  • Excellent vendor management in Government/Public sector.
  • Bachelor’s degree, preferably in a technical discipline or equivalent experience.
  • Successful track record selling complex solutions directly to enterprise customers.
  • You’re persuasive and have excellent negotiation and presentation skills. You can effectively communicate with technology-oriented and senior business executives at the “C” level and are comfortable articulating the technical and business value of the Metadefender platform.
  • Your work is a mix of strategic and proactive account activity, and you have a demonstrated ability to uncover, qualify, develop, and close new accounts.
  • Ability to set goals, prioritize tasks, and achieve success with minimal oversight in a sometimes ambiguous work environment.
  • You keep your pipeline accurate and your forecast updated for management.
  • Possess, at minimum, a fundamental understanding of security threats, solutions, and security tools.
  • Excellent time management skills and work with high levels of autonomy and self-direction.
  • You’re highly competitive, ramp quickly, are incredibly adaptive, and pride yourself on exceeding sales goals.
  • Ability to travel as necessary to your assigned accounts and Company meetings.
  • Highly ethical and professional personal conduct.
  • Must be fluent in both English and Arabic.

OPSWAT is an equal opportunity employer. We celebrate diversity and are committed to providing an environment where equal employment opportunities are extended to all employees and applicants, free of discrimination and harassment of any type. All employment decisions are based on individual qualifications, job requirements, and business needs without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other category protected by federal, state, or local laws.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Threat Intelligence Analyst (Saudi Only)

Jeddah, Makkah Dar Al Tamleek

Posted 16 days ago

Job Viewed

Tap Again To Close

Job Description

Job overview

Cybersecurity Threat Intelligence Analyst (Saudi Only) — Jeddah

Job summary

Collects and analyzes multi-source information about cybersecurity threats to develop deep understanding and awareness of cyber threats and actors’ Tactics, Techniques and Procedures (TTPs), and to derive and report indicators that help organizations detect and predict cyber incidents and protect systems and networks from cyber threats. Proactively searches for undetected threats in networks and systems, identifies Indicators of Compromise (IOCs), and recommends mitigation plans. Monitor, validate, and report threat activities, and continuously ensure compliance with SAMA CSF, SAMA CTIP, and NCA-related controls.

Responsibilities
  • Conduct research and analysis with regard to cybersecurity/information security threats.
  • Track the status of requests for information in line with the organization’s policies.
  • Use knowledge of threat actor’s activities to inform the organization’s response to a cyber-incident, and to build a common understanding of the organization’s current cyber risk profile.
  • Coordinate, validate, and manage the organization’s cyber threat intelligence sources and feeds.
  • Identify information gaps in threat intelligence and assess their implications for the organization.
  • Prepare and deliver briefs on specific threats to the organization.
  • Evaluate threat decision-making processes.
  • Identify the principal threats to the organization’s known vulnerabilities.
  • Identify threat tactics and methodologies.
  • Monitor and report changes in threat dispositions, activities, tactics, capabilities, and objectives.
  • Monitor and report on validated threat activities.
  • Monitor open-source websites for hostile content directed towards organizational or partner interests.
  • Monitor and report on threat actor activities to fulfill the organization’s threat intelligence and reporting requirements.
  • Use expertise on threat actors and activities to support activities to plan and develop the organization’s cybersecurity strategy and resources.
  • Provide information and assessments of threat actors to assist stakeholders in planning and executing cybersecurity activities.
  • Provide real-time cyber threat intelligence analysis and support during cybersecurity incidents and exercises.
  • Monitor cyber threat intelligence feeds and report significant network events and intrusions.
  • Provide current intelligence support to critical internal/external stakeholders as appropriate.
  • Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations.
  • Provide timely notice of imminent or hostile intentions or activities that may impact organization objectives, resources, or capabilities.
  • Utilize the existing related security tools, SIEM, SOAR, EDR, NDR, Threat Management solutions, and Sandboxing, for day-to-day activities and prepare knowledge base articles for investigation cases.
  • Monitor and report on validated threat activities.
  • Use packet analysis tools to validate intrusion detection system alerts.
  • Provide timely detection, identification, and alerting of possible attacks, anomalous activities, and misuse activities and distinguish them from benign activities.
  • Perform incident handling, event triage, network analysis, threat detection, trend analysis, metric development, and vulnerability information dissemination.
  • Maintain an updated repository of YARA & Sigma rules.
  • Maintain an updated repository of sanitized IOCs.
Compliance
  • Ensure compliance with SAMA CSF Framework, with regard to function-related domains/controls.
  • Ensure compliance with SAMA Financial Sector CTIP Framework.
  • Ensure compliance with NCA Frameworks, with regard to function-related domains/controls.
  • Conduct reviews annually on function-related policies and procedures and provide corrective changes accordingly.
  • Conduct GAP assessment regularly, to identify gaps, and recommend action plans for implementation.
  • Defined Framework function-related KPIs and monitored them quarterly.
  • Ensure the Frameworks-related domains/controls evidence folder is updated quarterly.
  • Provide a report quarterly to the direct manager with regard to the Framework compliance status.
  • On a monthly basis prepare a threat advisory based on “SAMA Guideline on Cyber Security Sharing of Incidents and Imminent Threats with SAMA” and “SAMA Threat Advisory guidelines” to the direct manager.
Qualifications
  • Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related discipline.
  • Preferably 1-2 years of relevant post-qualification experience.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Threat Intelligence Analyst (Saudi Only)

New
Jeddah, Makkah Dar Al Tamleek

Posted today

Job Viewed

Tap Again To Close

Job Description

Job overview

Cybersecurity Threat Intelligence Analyst (Saudi Only) — Jeddah

Job summary

Collects and analyzes multi-source information about cybersecurity threats to develop deep understanding and awareness of cyber threats and actors’ Tactics, Techniques and Procedures (TTPs), and to derive and report indicators that help organizations detect and predict cyber incidents and protect systems and networks from cyber threats. Proactively searches for undetected threats in networks and systems, identifies Indicators of Compromise (IOCs), and recommends mitigation plans. Monitor, validate, and report threat activities, and continuously ensure compliance with SAMA CSF, SAMA CTIP, and NCA-related controls.

Responsibilities
  • Conduct research and analysis with regard to cybersecurity/information security threats.
  • Track the status of requests for information in line with the organization’s policies.
  • Use knowledge of threat actor’s activities to inform the organization’s response to a cyber-incident, and to build a common understanding of the organization’s current cyber risk profile.
  • Coordinate, validate, and manage the organization’s cyber threat intelligence sources and feeds.
  • Identify information gaps in threat intelligence and assess their implications for the organization.
  • Prepare and deliver briefs on specific threats to the organization.
  • Evaluate threat decision-making processes.
  • Identify the principal threats to the organization’s known vulnerabilities.
  • Identify threat tactics and methodologies.
  • Monitor and report changes in threat dispositions, activities, tactics, capabilities, and objectives.
  • Monitor and report on validated threat activities.
  • Monitor open-source websites for hostile content directed towards organizational or partner interests.
  • Monitor and report on threat actor activities to fulfill the organization’s threat intelligence and reporting requirements.
  • Use expertise on threat actors and activities to support activities to plan and develop the organization’s cybersecurity strategy and resources.
  • Provide information and assessments of threat actors to assist stakeholders in planning and executing cybersecurity activities.
  • Provide real-time cyber threat intelligence analysis and support during cybersecurity incidents and exercises.
  • Monitor cyber threat intelligence feeds and report significant network events and intrusions.
  • Provide current intelligence support to critical internal/external stakeholders as appropriate.
  • Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations.
  • Provide timely notice of imminent or hostile intentions or activities that may impact organization objectives, resources, or capabilities.
  • Utilize the existing related security tools, SIEM, SOAR, EDR, NDR, Threat Management solutions, and Sandboxing, for day-to-day activities and prepare knowledge base articles for investigation cases.
  • Monitor and report on validated threat activities.
  • Use packet analysis tools to validate intrusion detection system alerts.
  • Provide timely detection, identification, and alerting of possible attacks, anomalous activities, and misuse activities and distinguish them from benign activities.
  • Perform incident handling, event triage, network analysis, threat detection, trend analysis, metric development, and vulnerability information dissemination.
  • Maintain an updated repository of YARA & Sigma rules.
  • Maintain an updated repository of sanitized IOCs.
Compliance
  • Ensure compliance with SAMA CSF Framework, with regard to function-related domains/controls.
  • Ensure compliance with SAMA Financial Sector CTIP Framework.
  • Ensure compliance with NCA Frameworks, with regard to function-related domains/controls.
  • Conduct reviews annually on function-related policies and procedures and provide corrective changes accordingly.
  • Conduct GAP assessment regularly, to identify gaps, and recommend action plans for implementation.
  • Defined Framework function-related KPIs and monitored them quarterly.
  • Ensure the Frameworks-related domains/controls evidence folder is updated quarterly.
  • Provide a report quarterly to the direct manager with regard to the Framework compliance status.
  • On a monthly basis prepare a threat advisory based on “SAMA Guideline on Cyber Security Sharing of Incidents and Imminent Threats with SAMA” and “SAMA Threat Advisory guidelines” to the direct manager.
Qualifications
  • Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related discipline.
  • Preferably 1-2 years of relevant post-qualification experience.
#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybersecurity Jobs View All Jobs in Jeddah