18 Cybersecurity jobs in Jeddah
Cybersecurity Consultant
Posted 14 days ago
Job Viewed
Job Description
Position Overview
Position Overview We are seeking a skilled and motivated Cybersecurity Consultant to join our team. The consultant will be responsible for assessing cybersecurity risks, developing solutions, and ensuring compliance with relevant frameworks and regulations, including the National Cybersecurity Authority (NCA) Operational Technology Cybersecurity Controls (OTCC). This role requires a strong background in OT/IT security, risk management, and advisory services.
Responsibilities- Conduct comprehensive cybersecurity assessments for IT and OT environments.
- Map and document OT assets, including hardware, software, and network components.
- Evaluate security controls, incident detection, monitoring, and response capabilities.
- Identify compliance gaps against NCA OTCC and international standards.
- Develop recommendations and cybersecurity roadmaps with prioritized solutions.
- Review contractor deliverables to ensure alignment with technical specifications and compliance requirements.
- Prepare and present detailed reports including risk assessments, solution proposals, and compliance documentation.
- Support incident response planning, disaster recovery, and business continuity initiatives.
- Provide cybersecurity training and awareness sessions to staff.
- Stay current with emerging threats, vulnerabilities, and cybersecurity technologies.
- Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field (Master’s preferred).
- Minimum 5+ years of experience in cybersecurity consulting, OT/ICS security, or risk management.
- Strong understanding of NCA frameworks, OT security controls, and industry standards (e.g., ISA/IEC 62443, NIST CSF, ISO 27001).
- Experience with security technologies such as SIEM, firewalls, IDS/IPS, and endpoint protection.
- Demonstrated ability to perform risk assessments, gap analysis, and compliance audits.
- CISSP (Certified Information Systems Security Professional)
- CISM (Certified Information Security Manager)
- CEH (Certified Ethical Hacker)
- GICSP (Global Industrial Cyber Security Professional)
- CompTIA Security+, OSCP, or equivalent
- Strong analytical and problem-solving skills.
- Excellent verbal and written communication abilities.
- Ability to explain complex technical issues to non-technical stakeholders.
- Strong organizational skills with attention to detail.
- Ability to work independently and as part of a team
Cybersecurity Engineer II
Posted today
Job Viewed
Job Description
- Supporting various Cybersecurity efforts related to Command, Control, Communications, Computers and Intelligence (C4I) systems for naval vessels and shore sites in the Kingdom of Saudi Arabia
FILLING THIS POSITION IS CONTINGENT UPON AWARD
#LI-SF1
Requirements- Bachelor's degree in a technical field such as Engineering, Science or a related field of study from an accredited college or university
- Three+ (3) years of experience working as an Information Systems Security Engineer (ISSE); or Information Systems Security Manager (ISSM); or Fully Qualified Validator (FQV); or Network Security Engineer supporting C4I systems
- Experience assisting Partner Nations (PN), Service Components, and other stakeholders with assessing a PN system or network utilizing the Risk Management Framework (RMF)
- Experience guiding a PN through the RMF process as required by the JS J6 Foreign Partner Connection Guide
- Experience working OCONUS in security cooperation efforts or for foreign customers (i.e., not for US military bases or USG facilities)
- Three+ (3) years of experience with NAVWAR prime mission products
- Experience interacting with USG and foreign senior military/government officials
- Completion of DISAM SCM courses such as SCM-C
- DISAM International Affairs Certification Level 1 or above
- IAM Level III Certification (CISSP)
- Experience working in austere locations (e.g., Middle Eastern nations) in security cooperation/assistance efforts or for foreign customers (i.e., not for US military bases or USG facilities)
- Experience working with other Program Offices to ensure that Program of Record (PoR) andnon-PoR solutions meet FMS Cybersecurity requirements
- Experience providing Subject Matter Expertise identifying Cybersecurity solutions to meet PN requirements
- Experience generating Cybersecurity functional requirements derived from Partner Nation Operational Requirements and desired capabilities
- Experience assisting a PN assessing their security architecture, identifying security gaps, and recommending solutions to mitigate risk
- Experience assisting a PN with developing RMF artifacts such as the Security Categorization Form (SCF), Security Controls Selection Form (SCCF), Security Assessment Report (SAR), Security Assessment Plan (SAP), Plan of Action and Milestones (POAM), Ports Protocols and Services Matrix (PPSM), etc.
- Experience assisting a PN with developing security artifacts from the PN in the proper format to generate an Authority to Connect (ATC) package to the Defense Cybersecurity Authorization Working Group (DSAWG) and Information Security Risk Management Committee (ISRMC)
SRC IS A CONTRACTOR FOR THE U.S. GOVERNMENT, THIS POSITION WILL REQUIRE U.S. CITIZENSHIP AND ELIGIBILITY FOR A U.S. GOVERNMENT SECURITY CLEARANCE AT THE SECRET LEVEL
Travel Requirements- Work location is Kingdom of Saudi Arabia (KSA)
- Travel to the United States will be in accordance with KSA visa requirements
Scientific Research Corporation is an advanced information technology and engineering company that provides innovative products and services to government and private industry, as well as independent institutions. At the core of our capabilities is a seasoned team of highly skilled engineers and scientists with multidisciplinary backgrounds. This team is challenged daily to provide cutting edge technology solutions to our clients.
SRC offers a generous benefit package, including medical, dental, and vision plans, 401(k) with a company match, life insurance, vacation and sick paid time off accruals starting at 10 days of vacation and 5 days of sick leave annually, 11 paid holidays, tuition reimbursement, and a work environment that encourages excellence and more. For positions requiring a security clearance, selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information.
EEOScientific Research Corporation is an equal opportunity employer that does not discriminate in employment.
All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other protected characteristic under federal, state or local law.
Scientific Research Corporation endeavors to make accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.
#J-18808-LjbffrFaculty in Cybersecurity
Posted 10 days ago
Job Viewed
Job Description
Responsibilities
- Teach assigned courses as per contract
- prepare course syllabus for course taught
- prepare course file and course report for course taught
- Give regular feedback to students for course taught
- Post course grades on blackboard according to university policy
- Advise Department Chair/ Director of concerns regarding assigned course
- Prepare class materials before start of class
- Attend the departmental council meetings when available
- Explore new ideas and innovative teaching strategiesfor the courses taught
Cybersecurity Program
Qualifications & SkillsTeaching or professional experience in areas such as Ethical Hacking, Computer Forensics, and Network Security
#J-18808-LjbffrBD Executive – Cybersecurity
Posted 27 days ago
Job Viewed
Job Description
Designation: BD Executive – Cybersecurity
Preference: Saudi Nationalitiespreferred/Any Nationals with Arabic Speaking
Experience: Mandatory cybersecurity sales experience
Overview:
We are seeking a dynamic Cybersecurity Sales Executive to join our growing team in Riyadh and Jeddah. The ideal candidate will have a proven track record in cybersecurity sales and deep familiarity with the KSA market.
Key Responsibilities:
- Drive sales of cybersecurity products and services within the Saudi market.
- Identify and build relationships with key clients across public and private sectors.
- Meet or exceed quarterly and annual sales targets.
- Collaborate with internal technical teams to design and present tailored solutions to clients.
- Keep abreast of industry trends and competitor activities in the cybersecurity domain.
- Prepare proposals, presentations, and RFP responses.
- Develop and manage a robust sales pipeline.
- Minimum 2 + years of direct cybersecurity sales experience.
- Existing network of relationships in the KSA enterprise and government sectors.
- Excellent communication and negotiation skills.
- Bachelor's degree in business, IT, or a related field.
Faculty in Cybersecurity
Posted today
Job Viewed
Job Description
Responsibilities
- Teach assigned courses as per contract
- prepare course syllabus for course taught
- prepare course file and course report for course taught
- Give regular feedback to students for course taught
- Post course grades on blackboard according to university policy
- Advise Department Chair/ Director of concerns regarding assigned course
- Prepare class materials before start of class
- Attend the departmental council meetings when available
- Explore new ideas and innovative teaching strategiesfor the courses taught
Cybersecurity Program
Qualifications & SkillsTeaching or professional experience in areas such as Ethical Hacking, Computer Forensics, and Network Security
#J-18808-LjbffrCybersecurity Engineer II
Posted today
Job Viewed
Job Description
- Supporting various Cybersecurity efforts related to Command, Control, Communications, Computers and Intelligence (C4I) systems for naval vessels and shore sites in the Kingdom of Saudi Arabia
FILLING THIS POSITION IS CONTINGENT UPON AWARD
#LI-SF1
Requirements- Bachelor's degree in a technical field such as Engineering, Science or a related field of study from an accredited college or university
- Three+ (3) years of experience working as an Information Systems Security Engineer (ISSE); or Information Systems Security Manager (ISSM); or Fully Qualified Validator (FQV); or Network Security Engineer supporting C4I systems
- Experience assisting Partner Nations (PN), Service Components, and other stakeholders with assessing a PN system or network utilizing the Risk Management Framework (RMF)
- Experience guiding a PN through the RMF process as required by the JS J6 Foreign Partner Connection Guide
- Experience working OCONUS in security cooperation efforts or for foreign customers (i.e., not for US military bases or USG facilities)
- Three+ (3) years of experience with NAVWAR prime mission products
- Experience interacting with USG and foreign senior military/government officials
- Completion of DISAM SCM courses such as SCM-C
- DISAM International Affairs Certification Level 1 or above
- IAM Level III Certification (CISSP)
- Experience working in austere locations (e.g., Middle Eastern nations) in security cooperation/assistance efforts or for foreign customers (i.e., not for US military bases or USG facilities)
- Experience working with other Program Offices to ensure that Program of Record (PoR) andnon-PoR solutions meet FMS Cybersecurity requirements
- Experience providing Subject Matter Expertise identifying Cybersecurity solutions to meet PN requirements
- Experience generating Cybersecurity functional requirements derived from Partner Nation Operational Requirements and desired capabilities
- Experience assisting a PN assessing their security architecture, identifying security gaps, and recommending solutions to mitigate risk
- Experience assisting a PN with developing RMF artifacts such as the Security Categorization Form (SCF), Security Controls Selection Form (SCCF), Security Assessment Report (SAR), Security Assessment Plan (SAP), Plan of Action and Milestones (POAM), Ports Protocols and Services Matrix (PPSM), etc.
- Experience assisting a PN with developing security artifacts from the PN in the proper format to generate an Authority to Connect (ATC) package to the Defense Cybersecurity Authorization Working Group (DSAWG) and Information Security Risk Management Committee (ISRMC)
SRC IS A CONTRACTOR FOR THE U.S. GOVERNMENT, THIS POSITION WILL REQUIRE U.S. CITIZENSHIP AND ELIGIBILITY FOR A U.S. GOVERNMENT SECURITY CLEARANCE AT THE SECRET LEVEL
Travel Requirements- Work location is Kingdom of Saudi Arabia (KSA)
- Travel to the United States will be in accordance with KSA visa requirements
Scientific Research Corporation is an advanced information technology and engineering company that provides innovative products and services to government and private industry, as well as independent institutions. At the core of our capabilities is a seasoned team of highly skilled engineers and scientists with multidisciplinary backgrounds. This team is challenged daily to provide cutting edge technology solutions to our clients.
SRC offers a generous benefit package, including medical, dental, and vision plans, 401(k) with a company match, life insurance, vacation and sick paid time off accruals starting at 10 days of vacation and 5 days of sick leave annually, 11 paid holidays, tuition reimbursement, and a work environment that encourages excellence and more. For positions requiring a security clearance, selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information.
EEOScientific Research Corporation is an equal opportunity employer that does not discriminate in employment.
All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other protected characteristic under federal, state or local law.
Scientific Research Corporation endeavors to make accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.
#J-18808-LjbffrCybersecurity Assistant Manager / Manager
Posted 3 days ago
Job Viewed
Job Description
Overview
At TechBiz Global, we are providing recruitment service to our TOP clients from our portfolio. We are currently seeking a Cybersecurity Assistant Manager / Manager to join one of our clients' teams. If you're looking for an exciting opportunity to grow in an innovative environment, this could be the perfect fit for you.
Responsibilities- Lead and manage cybersecurity initiatives and daily operations, delivering projects independently.
- Ensure compliance with SAMA regulations and other relevant cybersecurity frameworks.
- Conduct risk assessments, vulnerability management, and security audits.
- Develop and implement security policies, procedures, and standards.
- Monitor, detect, and respond to security threats and incidents.
- Prepare clear reports and present findings to senior management.
- Mentor and guide junior cybersecurity staff.
- 5–6 years experience in cybersecurity, with proven ability to deliver independently.
- Strong knowledge of SAMA regulations and cybersecurity best practices.
- Familiarity with risk management, incident response, and security governance.
- Professional certifications preferred: CISSP, CISM, CEH, ISO 27001 Lead Implementer.
- Excellent analytical, communication, and leadership skills.
- Available for on-site contract in KSA (3–6 months).
Be The First To Know
About the latest Cybersecurity Jobs in Jeddah !
Enterprise Account Manager (Cybersecurity)
Posted today
Job Viewed
Job Description
OPSWAT, a global leader in IT, OT, and ICS critical infrastructure cybersecurity, delivers an end-to-end platform that gives public and private sector organizations and enterprises the critical advantage needed to protect their complex networks, secure their devices, and ensure compliance. Over the last 20 years, our commitment to innovative technology has earned the trust of more than 1,700 organizations, governments, and institutions globally, solidifying our role in protecting the world’s critical infrastructure and securing our way of life.
The Position
The KSA Enterprise Account Manager is a significant driver of Company revenue and growth in the META region. This position is remote and will be located in Riyadh, KSA. Your responsibilities will include developing and implementing strategic account plans targeting deployments of our Metadefender and MetaAccess Security platforms. You will build the right relationships inside a target account, know how to leverage your company resources to the fullest, and negotiate and close new business. The ideal candidate will have previous work experience as a member of a corporate sales team and a career track record of exceeding multi-million-dollar sales quotas. Candidates selling into critical infrastructure and data diode sales experience are given a preference.
What You Will Be Doing
- Strategically hunt for new business opportunities that leverage high-value use cases in key verticals.
- In close partnership with your Solutions Engineer, develop and execute sales strategies and tactics to sell OPSWAT products, solutions, and services to exceed your sales targets.
- Communicate value propositions to clients that speak intimately to their needs and requirements.
- Utilize client-centric, solutions-oriented selling strategies and a hunter’s mentality to identify, qualify, and convert enterprise sales.
- Effectively articulate financial ROI/TCO value, and build value throughout the negotiation process.
- Maintain extensive and accurate account and opportunity detail in Salesforce CRM, including account win plans, customer touch points, sales inhibitors, etc.
- Leverage all cross-functional resources to achieve your quota: Executive management, Inside Sales Development, Customer Success, Field and Event Marketing, Sales Operations, and others.
- Forecast and report revenue projections to manage and deliver a predictable pipeline to drive forecast accuracy.
- Overachieve on annual quota, measured quarterly.
What We Need From You
- A minimum of 7 years of successfully selling technology products and solutions to businesses.
- Excellent vendor management in Government/Public sector.
- Bachelor’s degree, preferably in a technical discipline or equivalent experience.
- Successful track record selling complex solutions directly to enterprise customers.
- You’re persuasive and have excellent negotiation and presentation skills. You can effectively communicate with technology-oriented and senior business executives at the “C” level and are comfortable articulating the technical and business value of the Metadefender platform.
- Your work is a mix of strategic and proactive account activity, and you have a demonstrated ability to uncover, qualify, develop, and close new accounts.
- Ability to set goals, prioritize tasks, and achieve success with minimal oversight in a sometimes ambiguous work environment.
- You keep your pipeline accurate and your forecast updated for management.
- Possess, at minimum, a fundamental understanding of security threats, solutions, and security tools.
- Excellent time management skills and work with high levels of autonomy and self-direction.
- You’re highly competitive, ramp quickly, are incredibly adaptive, and pride yourself on exceeding sales goals.
- Ability to travel as necessary to your assigned accounts and Company meetings.
- Highly ethical and professional personal conduct.
- Must be fluent in both English and Arabic.
OPSWAT is an equal opportunity employer. We celebrate diversity and are committed to providing an environment where equal employment opportunities are extended to all employees and applicants, free of discrimination and harassment of any type. All employment decisions are based on individual qualifications, job requirements, and business needs without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other category protected by federal, state, or local laws.
#J-18808-LjbffrCybersecurity Threat Intelligence Analyst (Saudi Only)
Posted 16 days ago
Job Viewed
Job Description
Job overview
Cybersecurity Threat Intelligence Analyst (Saudi Only) — Jeddah
Job summaryCollects and analyzes multi-source information about cybersecurity threats to develop deep understanding and awareness of cyber threats and actors’ Tactics, Techniques and Procedures (TTPs), and to derive and report indicators that help organizations detect and predict cyber incidents and protect systems and networks from cyber threats. Proactively searches for undetected threats in networks and systems, identifies Indicators of Compromise (IOCs), and recommends mitigation plans. Monitor, validate, and report threat activities, and continuously ensure compliance with SAMA CSF, SAMA CTIP, and NCA-related controls.
Responsibilities- Conduct research and analysis with regard to cybersecurity/information security threats.
- Track the status of requests for information in line with the organization’s policies.
- Use knowledge of threat actor’s activities to inform the organization’s response to a cyber-incident, and to build a common understanding of the organization’s current cyber risk profile.
- Coordinate, validate, and manage the organization’s cyber threat intelligence sources and feeds.
- Identify information gaps in threat intelligence and assess their implications for the organization.
- Prepare and deliver briefs on specific threats to the organization.
- Evaluate threat decision-making processes.
- Identify the principal threats to the organization’s known vulnerabilities.
- Identify threat tactics and methodologies.
- Monitor and report changes in threat dispositions, activities, tactics, capabilities, and objectives.
- Monitor and report on validated threat activities.
- Monitor open-source websites for hostile content directed towards organizational or partner interests.
- Monitor and report on threat actor activities to fulfill the organization’s threat intelligence and reporting requirements.
- Use expertise on threat actors and activities to support activities to plan and develop the organization’s cybersecurity strategy and resources.
- Provide information and assessments of threat actors to assist stakeholders in planning and executing cybersecurity activities.
- Provide real-time cyber threat intelligence analysis and support during cybersecurity incidents and exercises.
- Monitor cyber threat intelligence feeds and report significant network events and intrusions.
- Provide current intelligence support to critical internal/external stakeholders as appropriate.
- Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations.
- Provide timely notice of imminent or hostile intentions or activities that may impact organization objectives, resources, or capabilities.
- Utilize the existing related security tools, SIEM, SOAR, EDR, NDR, Threat Management solutions, and Sandboxing, for day-to-day activities and prepare knowledge base articles for investigation cases.
- Monitor and report on validated threat activities.
- Use packet analysis tools to validate intrusion detection system alerts.
- Provide timely detection, identification, and alerting of possible attacks, anomalous activities, and misuse activities and distinguish them from benign activities.
- Perform incident handling, event triage, network analysis, threat detection, trend analysis, metric development, and vulnerability information dissemination.
- Maintain an updated repository of YARA & Sigma rules.
- Maintain an updated repository of sanitized IOCs.
- Ensure compliance with SAMA CSF Framework, with regard to function-related domains/controls.
- Ensure compliance with SAMA Financial Sector CTIP Framework.
- Ensure compliance with NCA Frameworks, with regard to function-related domains/controls.
- Conduct reviews annually on function-related policies and procedures and provide corrective changes accordingly.
- Conduct GAP assessment regularly, to identify gaps, and recommend action plans for implementation.
- Defined Framework function-related KPIs and monitored them quarterly.
- Ensure the Frameworks-related domains/controls evidence folder is updated quarterly.
- Provide a report quarterly to the direct manager with regard to the Framework compliance status.
- On a monthly basis prepare a threat advisory based on “SAMA Guideline on Cyber Security Sharing of Incidents and Imminent Threats with SAMA” and “SAMA Threat Advisory guidelines” to the direct manager.
- Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related discipline.
- Preferably 1-2 years of relevant post-qualification experience.
Cybersecurity Threat Intelligence Analyst (Saudi Only)
Posted today
Job Viewed
Job Description
Job overview
Cybersecurity Threat Intelligence Analyst (Saudi Only) — Jeddah
Job summaryCollects and analyzes multi-source information about cybersecurity threats to develop deep understanding and awareness of cyber threats and actors’ Tactics, Techniques and Procedures (TTPs), and to derive and report indicators that help organizations detect and predict cyber incidents and protect systems and networks from cyber threats. Proactively searches for undetected threats in networks and systems, identifies Indicators of Compromise (IOCs), and recommends mitigation plans. Monitor, validate, and report threat activities, and continuously ensure compliance with SAMA CSF, SAMA CTIP, and NCA-related controls.
Responsibilities- Conduct research and analysis with regard to cybersecurity/information security threats.
- Track the status of requests for information in line with the organization’s policies.
- Use knowledge of threat actor’s activities to inform the organization’s response to a cyber-incident, and to build a common understanding of the organization’s current cyber risk profile.
- Coordinate, validate, and manage the organization’s cyber threat intelligence sources and feeds.
- Identify information gaps in threat intelligence and assess their implications for the organization.
- Prepare and deliver briefs on specific threats to the organization.
- Evaluate threat decision-making processes.
- Identify the principal threats to the organization’s known vulnerabilities.
- Identify threat tactics and methodologies.
- Monitor and report changes in threat dispositions, activities, tactics, capabilities, and objectives.
- Monitor and report on validated threat activities.
- Monitor open-source websites for hostile content directed towards organizational or partner interests.
- Monitor and report on threat actor activities to fulfill the organization’s threat intelligence and reporting requirements.
- Use expertise on threat actors and activities to support activities to plan and develop the organization’s cybersecurity strategy and resources.
- Provide information and assessments of threat actors to assist stakeholders in planning and executing cybersecurity activities.
- Provide real-time cyber threat intelligence analysis and support during cybersecurity incidents and exercises.
- Monitor cyber threat intelligence feeds and report significant network events and intrusions.
- Provide current intelligence support to critical internal/external stakeholders as appropriate.
- Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations.
- Provide timely notice of imminent or hostile intentions or activities that may impact organization objectives, resources, or capabilities.
- Utilize the existing related security tools, SIEM, SOAR, EDR, NDR, Threat Management solutions, and Sandboxing, for day-to-day activities and prepare knowledge base articles for investigation cases.
- Monitor and report on validated threat activities.
- Use packet analysis tools to validate intrusion detection system alerts.
- Provide timely detection, identification, and alerting of possible attacks, anomalous activities, and misuse activities and distinguish them from benign activities.
- Perform incident handling, event triage, network analysis, threat detection, trend analysis, metric development, and vulnerability information dissemination.
- Maintain an updated repository of YARA & Sigma rules.
- Maintain an updated repository of sanitized IOCs.
- Ensure compliance with SAMA CSF Framework, with regard to function-related domains/controls.
- Ensure compliance with SAMA Financial Sector CTIP Framework.
- Ensure compliance with NCA Frameworks, with regard to function-related domains/controls.
- Conduct reviews annually on function-related policies and procedures and provide corrective changes accordingly.
- Conduct GAP assessment regularly, to identify gaps, and recommend action plans for implementation.
- Defined Framework function-related KPIs and monitored them quarterly.
- Ensure the Frameworks-related domains/controls evidence folder is updated quarterly.
- Provide a report quarterly to the direct manager with regard to the Framework compliance status.
- On a monthly basis prepare a threat advisory based on “SAMA Guideline on Cyber Security Sharing of Incidents and Imminent Threats with SAMA” and “SAMA Threat Advisory guidelines” to the direct manager.
- Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related discipline.
- Preferably 1-2 years of relevant post-qualification experience.