121 Cybersecurity jobs in Riyadh
Cyber Threat Intelligence Analyst
Posted 12 days ago
Job Viewed
Job Description
Help Ag is looking for a Cyber Threat Intelligence Analyst (TIA) who will be a part of the Cyber Defense team, responsible to help collect, analyze, and disseminate cyber intelligence impacting the company or its customers. The ideal candidate will be a professional with experience in cyber intelligence/cyber risk, delivering equivalent services to organizations, with drive and creativity. This is a fantastic opportunity for a passionate professional that wants to evolve in the Cyber Intelligence world. The position will involve essential duties and responsibilities that must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work.
Responsibilities
Identify, collect, and perform analysis of raw, primary, and secondary data derived from various sources.
Create and update General Intelligence Requirements (GIR)s, Priority Intelligence Requirements (PIR)s, and Organization Specific Intelligence Requirements (OSIR)s for customers.
Create threat profiles and threat landscapes for companies and or customers.
Create diamond models around customers and threat adversaries.
Improve the creation and delivery of intelligence information to customers and partners, via different reports and tools, linking the dots and adding value to the service delivered.
Perform investigations on the internet and dark web on different topics, from broad investigations to specific searches.
Identify, assess, and track tactics, techniques, and procedures of cyber threat actors.
Provide threat review and validation to customers on their exposure to cyber security risks, threats, and potential impact.
Provide actionable strategic, technical, and tactical cyber intelligence to company & its subsidiaries through weekly, monthly, and ad hoc reports, briefings, and presentations.
Conduct Internet searches, in English and Arabic, to profile customers’ online presence and optimize data feeds into back end cyber threat harvesting and analysis solutions.
Apply advanced search techniques (e.g., Boolean terms) in Google/Bing search engines, social sites, domain databases, darknet, etc. to reduce false positives.
Support customers in take down efforts to remove fraudulent, offensive, and suspicious online content.
Be up to date on knowledge of attacker tools/techniques, country and regional cyber threats, business, and political landscapes to reflect their context into detected/created threats to reduce false positives to help improve generated reports.
Provide feedback and recommendations to Backend Cyber defense teams such as the MDR Team to enhance detection's (e.g., false positives, generic data, fine-tuning, updated info, etc.) and improve portal performance and/or experience.
Understand customer industries to generate Arabic keywords to support searches of online Arabic content.
Identify new information sources (English and Arabic), search keywords (English and Arabic) and best practices to achieve more accurate and customer related threat detection.
When customers request ad-hoc investigations, assist in defining the investigation scope, delivery date and present the findings to the customer (report).
Understand and perform analysis of competing hypotheses (ACH) for use in threat hunting and advisory production.
Manage the life cycle of threat intelligence.
Maintain a high degree of awareness of the current threat landscape.
Assist in providing threat and vulnerability analysis as well as security advisory services.
Participate in knowledge sharing with other Analysts and writing technical articles for Internal Knowledge Bases.
Perform tasks independently with some oversight.
Deliver Cyber Intelligence services.
Research and craft analytic papers and deliver intelligence briefings under short deadlines on various geographical and functional topics.
Use knowledge, creativity, and analytic tradecraft best practices to obtain solutions to complex problems.
Qualifications & Skills:
A Degree in Computer Science, Information Systems, Electronics Engineering, or a closely related degree.
1 - 4 years’ experience as a TIA or related position.
An active, demonstrable interest in cyber threat detection, and cyber threat intelligence.
A thorough understanding of IT systems and network security concepts, network protocols.
Thorough understanding of cyber threats and warfare such as Internet services attacks, User attacks, APTs, malicious mobile apps, online fraud, dark-net, hackers’ tools/techniques, hacktivist, etc.
Knowledge of latest global cyber-attacks, prominent ransomware, APT groups.
Demonstrable knowledge around GIR creations and threat profiling/landscaping.
Demonstrable knowledge of cyber threat intelligence, threat actors, malware, tactics, techniques, and procedures (TTPs), intelligence analysis, use of diamond models and various security methodologies and processes.
Demonstrable knowledge analysis of competing hypotheses (ACH) for evaluating multiple competing hypotheses for observed data.
Deep knowledge of IT security best practices, common attack types, and detection/prevention methods.
Demonstrable knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cybercrime.
Demonstrable knowledge on deep and dark web.
Good understanding of the cyber kill chain or attack vectors.
Excellent verbal and written communication skills including the ability to clearly articulate technical and strategic level cyber matters to a variety of audiences.
Ability to multitask, prioritize, and manage time effectively.
Strong attention to detail.
Excellent interpersonal skills and professional demeanor.
Excellent customer service skills.
Formal Intelligence Analysis training & certifications like GCTI, GOSI, C|TIA, Security+, RCIA, CTIP, CPTIA, CRTIA, CTIS-I and or CTIS-II.
Benefits:
Health insurance with one of the leading global providers for medical insurance.
Career progression and growth through challenging projects and work.
Employee engagement activities throughout the year.
Tailored training & development program.
About Us:
Help AG is the cyber security arm of e& enterprise and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Present in the Middle East since 2004, Help AG was strategically acquired by Etisalat group in Feb 2020, hence creating a cyber security and digital transformation powerhouse in the region.
Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and cyber security focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.
#J-18808-LjbffrCyber Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Help Ag is looking for a Cyber Threat Intelligence Analyst (TIA) who will be a part of the Cyber Defense team, responsible to help collect, analyze, and disseminate cyber intelligence impacting the company or its customers. The ideal candidate will be a professional with experience in cyber intelligence/cyber risk, delivering equivalent services to organizations, with drive and creativity. This is a fantastic opportunity for a passionate professional that wants to evolve in the Cyber Intelligence world. The position will involve essential duties and responsibilities that must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work.
Responsibilities
Identify, collect, and perform analysis of raw, primary, and secondary data derived from various sources.
Create and update General Intelligence Requirements (GIR)s, Priority Intelligence Requirements (PIR)s, and Organization Specific Intelligence Requirements (OSIR)s for customers.
Create threat profiles and threat landscapes for companies and or customers.
Create diamond models around customers and threat adversaries.
Improve the creation and delivery of intelligence information to customers and partners, via different reports and tools, linking the dots and adding value to the service delivered.
Perform investigations on the internet and dark web on different topics, from broad investigations to specific searches.
Identify, assess, and track tactics, techniques, and procedures of cyber threat actors.
Provide threat review and validation to customers on their exposure to cyber security risks, threats, and potential impact.
Provide actionable strategic, technical, and tactical cyber intelligence to company & its subsidiaries through weekly, monthly, and ad hoc reports, briefings, and presentations.
Conduct Internet searches, in English and Arabic, to profile customers’ online presence and optimize data feeds into back end cyber threat harvesting and analysis solutions.
Apply advanced search techniques (e.g., Boolean terms) in Google/Bing search engines, social sites, domain databases, darknet, etc. to reduce false positives.
Support customers in take down efforts to remove fraudulent, offensive, and suspicious online content.
Be up to date on knowledge of attacker tools/techniques, country and regional cyber threats, business, and political landscapes to reflect their context into detected/created threats to reduce false positives to help improve generated reports.
Provide feedback and recommendations to Backend Cyber defense teams such as the MDR Team to enhance detection's (e.g., false positives, generic data, fine-tuning, updated info, etc.) and improve portal performance and/or experience.
Understand customer industries to generate Arabic keywords to support searches of online Arabic content.
Identify new information sources (English and Arabic), search keywords (English and Arabic) and best practices to achieve more accurate and customer related threat detection.
When customers request ad-hoc investigations, assist in defining the investigation scope, delivery date and present the findings to the customer (report).
Understand and perform analysis of competing hypotheses (ACH) for use in threat hunting and advisory production.
Manage the life cycle of threat intelligence.
Maintain a high degree of awareness of the current threat landscape.
Assist in providing threat and vulnerability analysis as well as security advisory services.
Participate in knowledge sharing with other Analysts and writing technical articles for Internal Knowledge Bases.
Perform tasks independently with some oversight.
Deliver Cyber Intelligence services.
Research and craft analytic papers and deliver intelligence briefings under short deadlines on various geographical and functional topics.
Use knowledge, creativity, and analytic tradecraft best practices to obtain solutions to complex problems.
Qualifications & Skills:
A Degree in Computer Science, Information Systems, Electronics Engineering, or a closely related degree.
1 - 4 years’ experience as a TIA or related position.
An active, demonstrable interest in cyber threat detection, and cyber threat intelligence.
A thorough understanding of IT systems and network security concepts, network protocols.
Thorough understanding of cyber threats and warfare such as Internet services attacks, User attacks, APTs, malicious mobile apps, online fraud, dark-net, hackers’ tools/techniques, hacktivist, etc.
Knowledge of latest global cyber-attacks, prominent ransomware, APT groups.
Demonstrable knowledge around GIR creations and threat profiling/landscaping.
Demonstrable knowledge of cyber threat intelligence, threat actors, malware, tactics, techniques, and procedures (TTPs), intelligence analysis, use of diamond models and various security methodologies and processes.
Demonstrable knowledge analysis of competing hypotheses (ACH) for evaluating multiple competing hypotheses for observed data.
Deep knowledge of IT security best practices, common attack types, and detection/prevention methods.
Demonstrable knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cybercrime.
Demonstrable knowledge on deep and dark web.
Good understanding of the cyber kill chain or attack vectors.
Excellent verbal and written communication skills including the ability to clearly articulate technical and strategic level cyber matters to a variety of audiences.
Ability to multitask, prioritize, and manage time effectively.
Strong attention to detail.
Excellent interpersonal skills and professional demeanor.
Excellent customer service skills.
Formal Intelligence Analysis training & certifications like GCTI, GOSI, C|TIA, Security+, RCIA, CTIP, CPTIA, CRTIA, CTIS-I and or CTIS-II.
Benefits:
Health insurance with one of the leading global providers for medical insurance.
Career progression and growth through challenging projects and work.
Employee engagement activities throughout the year.
Tailored training & development program.
About Us:
Help AG is the cyber security arm of e& enterprise and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Present in the Middle East since 2004, Help AG was strategically acquired by Etisalat group in Feb 2020, hence creating a cyber security and digital transformation powerhouse in the region.
Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and cyber security focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.
#J-18808-LjbffrCybersecurity Architect
Posted 2 days ago
Job Viewed
Job Description
As Lendo continues to scale, we’re looking for a proactive and visionary Cybersecurity Architect to ensure our systems, applications, and infrastructure are secure by design. In this role, you’ll define security architecture frameworks, design and review solutions, and guide the implementation of IAM, PAM, and security tooling across the business.
You’ll collaborate closely with engineering, product, and compliance teams to embed secure-by-design principles into every layer of our technology. By conducting risk assessments, shaping policies, and aligning with regulatory requirements, you’ll help safeguard our operations while enabling innovation.
Key RequirementsDevelop and maintain security architecture frameworks, ensuring alignment with business objectives and regulatory requirements.
Provide security design guidance for infrastructure, applications, and cloud deployments.
Define and enforce secure design principles, standards, and patterns across IT and development lifecycles.
Conduct technical risk assessments and threat modeling to identify potential vulnerabilities and recommend mitigation strategies.
Assess and recommend security tools and technologies, ensuring scalability and resilience.
Partner with IT, developers, DevOps, and business units to embed security into projects from the ground up.
Provide architectural guidance during incident response, forensic investigations, and lessons-learned exercises.
Ensure designs adhere to frameworks and standards (e.g., NIST CSF, ISO 27001).
Stay current with evolving threats, emerging technologies, and industry best practices to strengthen enterprise security.
Define and oversee identity, access, and privilege management strategies, ensuring strong authentication, role-based access, and least-privilege principles.
Design and guide configuration of key security technologies (SIEM, EDR, firewalls, WAF, DLP, CASB, etc.) to ensure they are integrated and optimized.
Review architectural changes (e.g., new integrations, design changes, core network modifications, security tooling updates).
Guide and mentor security engineers, analysts, and developers in secure design best practices.
Bachelor’s degree in Computer Science, Cybersecurity, Information Systems, or related field (Master’s preferred).
5+ years of IT/security experience, with at least 2 years in a dedicated security architecture role.
Expertise in network, application, cloud, and data security architecture.
Strong knowledge of identity and access management (IAM), encryption, key management, and endpoint security.
Familiarity with DevSecOps practices and secure CI/CD pipeline integration.
Hands-on experience with security solutions (firewalls, SIEM, EDR, WAF, DLP, etc.).
Understanding compliance and regulatory requirements (e.g., GDPR, HIPAA, PCI-DSS, SOX).
Relevant certifications are strongly preferred: CISSP, CCSP, CISM, or cloud security certifications
Fluency in both English and Arabic (written and verbal), with the ability to communicate effectively with technical teams and executive leadership.
Cybersecurity Architect
Posted 7 days ago
Job Viewed
Job Description
Overview
As Lendo continues to scale, we’re looking for a proactive and visionary Cybersecurity Architect to ensure our systems, applications, and infrastructure are secure by design. In this role, you’ll define security architecture frameworks, design and review solutions, and guide the implementation of IAM, PAM, and security tooling across the business.
You’ll collaborate closely with engineering, product, and compliance teams to embed secure-by-design principles into every layer of our technology. By conducting risk assessments, shaping policies, and aligning with regulatory requirements, you’ll help safeguard our operations while enabling innovation.
Responsibilities- Develop and maintain security architecture frameworks, ensuring alignment with business objectives and regulatory requirements.
- Provide security design guidance for infrastructure, applications, and cloud deployments.
- Define and enforce secure design principles, standards, and patterns across IT and development lifecycles.
- Conduct technical risk assessments and threat modeling to identify potential vulnerabilities and recommend mitigation strategies.
- Assess and recommend security tools and technologies, ensuring scalability and resilience.
- Partner with IT, developers, DevOps, and business units to embed security into projects from the ground up.
- Provide architectural guidance during incident response, forensic investigations, and lessons-learned exercises.
- Ensure designs adhere to frameworks and standards (e.g., NIST CSF, ISO 27001).
- Stay current with evolving threats, emerging technologies, and industry best practices to strengthen enterprise security.
- Define and oversee identity, access, and privilege management strategies, ensuring strong authentication, role-based access, and least-privilege principles.
- Design and guide configuration of key security technologies (SIEM, EDR, firewalls, WAF, DLP, CASB, etc.) to ensure they are integrated and optimized.
- Review architectural changes (e.g., new integrations, design changes, core network modifications, security tooling updates).
- Guide and mentor security engineers, analysts, and developers in secure design best practices.
- Bachelor’s degree in Computer Science, Cybersecurity, Information Systems, or related field (Master’s preferred).
- 5+ years of IT/security experience, with at least 2 years in a dedicated security architecture role.
- Expertise in network, application, cloud, and data security architecture.
- Strong knowledge of identity and access management (IAM), encryption, key management, and endpoint security.
- Familiarity with DevSecOps practices and secure CI/CD pipeline integration.
- Hands-on experience with security solutions (firewalls, SIEM, EDR, WAF, DLP, etc.).
- Understanding compliance and regulatory requirements (e.g., GDPR, HIPAA, PCI-DSS, SOX).
- Relevant certifications are strongly preferred: CISSP, CCSP, CISM, or cloud security certifications
- Fluency in both English and Arabic (written and verbal), with the ability to communicate effectively with technical teams and executive leadership.
Cybersecurity Specialist
Posted 8 days ago
Job Viewed
Job Description
Join to apply for the Cybersecurity Specialist role at Help AG, an e& enterprise company .
Help AG is looking for a talented and experienced Cybersecurity Specialist to join our Support Center team in KSA. This role focuses on break-and-fix support for cybersecurity products, including troubleshooting incidents, resolving technical issues, and delivering high-quality solutions to customers.
The ideal candidate will have hands-on expertise with:
- Palo Alto Networks firewalls
- F5 Application Delivery Controllers
- Fortinet solutions
- OPSWAT
- Other related cybersecurity technologies
Responsibilities:
- Provide L2/L3 break-and-fix support for cybersecurity products including Palo Alto Firewalls, F5 devices, and related solutions.
- Troubleshoot and resolve configuration issues, hardware/software faults, and performance bottlenecks.
- Manage product tickets in line with defined SLAs, escalating to vendors when necessary.
- Perform root cause analysis (RCA) for recurring incidents and recommend preventive measures.
- Document incidents, troubleshooting steps, and resolutions in the Support Knowledge Base.
- Collaborate with internal teams and vendors to ensure timely resolution and service quality.
- Participate in 24x7 on-call rotations as required for critical issue handling.
- Provide technical guidance and best product practices to customers and internal teams.
Qualifications and Skills:
- Bachelor’s degree in Computer Science, Information Security, or related field.
- Relevant certifications (preferred):
- Palo Alto (PCNSE/PCNSA)
- F5 Certified Administrator / Specialist
- CISSP, CISM, CISA, CCNP Security (advantageous).
- 2–5 years of experience in cybersecurity support, SOC, or NOC environments.
- Proven hands-on experience with:
- Palo Alto firewalls (policies, NAT, VPN, Panorama).
- F5 load balancers and WAF (LTM, ASM, iRules, SSL offloading).
- Security technologies (IPS/IDS, VPN, proxy, SSL inspection).
- Strong understanding of networking protocols (TCP/IP, DNS, HTTP/HTTPS, BGP, OSPF).
- Strong analytical and problem-solving skills.
- Ability to work under pressure and meet SLA-driven timelines.
- Excellent communication in Arabic and English.
- Strong customer service orientation.
Benefits
- Health insurance with one of the leading global providers for medical insurance.
- Career progression and growth through challenging projects and work.
- Employee engagement and wellness campaigns activities throughout the year.
- Tailored training & development program.
About Us
Help AG is the cybersecurity arm of e& enterprise (formerly Etisalat Digital) and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Present in the Middle East since 2004, Help AG was strategically acquired by e& (formerly Etisalat Group) in 2020, hence creating a cybersecurity and digital transformation powerhouse in the region. Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and maintaining its focus on all aspects of cybersecurity. With best of breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the-art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.
Seniority level
- Not Applicable
Employment type
- Full-time
Job function
- Information Technology
- Industries: IT Services and IT Consulting
Referrals increase your chances of interviewing at Help AG, an e& enterprise company by 2x
#J-18808-LjbffrCybersecurity Specialist
Posted 8 days ago
Job Viewed
Job Description
Overview
Help AG is looking for a talented and experienced Cybersecurity Specialist to join our Support Center team in KSA. This role focuses on break-and-fix support for cybersecurity products, including troubleshooting incidents, resolving technical issues, and delivering high-quality solutions to customers.
The ideal candidate will have hands-on expertise with:
- Palo Alto Networks firewalls
- F5 Application Delivery Controllers
- Fortinet solutions
- OPSWAT
- Other related cybersecurity technologies
- Provide L2/L3 break-and-fix support for cybersecurity products including Palo Alto Firewalls, F5 devices, and related solutions.
- Troubleshoot and resolve configuration issues, hardware/software faults, and performance bottlenecks.
- Manage product tickets in line with defined SLAs, escalating to vendors when necessary.
- Perform root cause analysis (RCA) for recurring incidents and recommend preventive measures.
- Document incidents, troubleshooting steps, and resolutions in the Support Knowledge Base.
- Collaborate with internal teams and vendors to ensure timely resolution and service quality.
- Participate in 24x7 on-call rotations as required for critical issue handling.
- Provide technical guidance and best product practices to customers and internal teams.
- Bachelor’s degree in Computer Science, Information Security, or related field.
- Relevant certifications (preferred):
- Palo Alto (PCNSE/PCNSA)
- F5 Certified Administrator / Specialist
- CISSP, CISM, CISA, CCNP Security (advantageous)
- 2–5 years of experience in cybersecurity support, SOC, or NOC environments.
- Proven hands-on experience with:
- Palo Alto firewalls (policies, NAT, VPN, Panorama).
- F5 load balancers and WAF (LTM, ASM, iRules, SSL offloading).
- Security technologies (IPS/IDS, VPN, proxy, SSL inspection).
- Strong understanding of networking protocols (TCP/IP, DNS, HTTP/HTTPS, BGP, OSPF).
- Strong analytical and problem-solving skills.
- Ability to work under pressure and meet SLA-driven timelines.
- Excellent communication in Arabic and English .
- Strong customer service orientation.
- Health insurance with one of the leading global providers for medical insurance.
- Career progression and growth through challenging projects and work.
- Employee engagement and wellness campaigns activities throughout the year.
- Tailored training & development program.
Help AG is the cybersecurity arm of e& enterprise (formerly Etisalat Digital) and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Present in the Middle East since 2004, Help AG was strategically acquired by e& (formerly Etisalat Group) in 2020, hence creating a cybersecurity and digital transformation powerhouse in the region.
Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and maintaining its focus on all aspects of cybersecurity.
With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the-art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.
#J-18808-LjbffrCybersecurity Architect
Posted 9 days ago
Job Viewed
Job Description
Overview
As Lendo continues to scale, we’re looking for a proactive and visionary Cybersecurity Architect to ensure our systems, applications, and infrastructure are secure by design. In this role, you’ll define security architecture frameworks, design and review solutions, and guide the implementation of IAM, PAM, and security tooling across the business.
You’ll collaborate closely with engineering, product, and compliance teams to embed secure-by-design principles into every layer of our technology. By conducting risk assessments, shaping policies, and aligning with regulatory requirements, you’ll help safeguard our operations while enabling innovation.
Responsibilities- Develop and maintain security architecture frameworks, ensuring alignment with business objectives and regulatory requirements.
- Provide security design guidance for infrastructure, applications, and cloud deployments.
- Define and enforce secure design principles, standards, and patterns across IT and development lifecycles.
- Conduct technical risk assessments and threat modeling to identify potential vulnerabilities and recommend mitigation strategies.
- Assess and recommend security tools and technologies, ensuring scalability and resilience.
- Partner with IT, developers, DevOps, and business units to embed security into projects from the ground up.
- Provide architectural guidance during incident response, forensic investigations, and lessons-learned exercises.
- Ensure designs adhere to frameworks and standards (e.g., NIST CSF, ISO 27001).
- Stay current with evolving threats, emerging technologies, and industry best practices to strengthen enterprise security.
- Define and oversee identity, access, and privilege management strategies, ensuring strong authentication, role-based access, and least-privilege principles.
- Design and guide configuration of key security technologies (SIEM, EDR, firewalls, WAF, DLP, CASB, etc.) to ensure they are integrated and optimized.
- Review architectural changes (e.g., new integrations, design changes, core network modifications, security tooling updates).
- Guide and mentor security engineers, analysts, and developers in secure design best practices.
- Bachelor’s degree in Computer Science, Cybersecurity, Information Systems, or related field (Master’s preferred).
- 5+ years of IT/security experience, with at least 2 years in a dedicated security architecture role.
- Expertise in network, application, cloud, and data security architecture.
- Strong knowledge of identity and access management (IAM), encryption, key management, and endpoint security.
- Familiarity with DevSecOps practices and secure CI/CD pipeline integration.
- Hands-on experience with security solutions (firewalls, SIEM, EDR, WAF, DLP, etc.).
- Understanding compliance and regulatory requirements (e.g., GDPR, HIPAA, PCI-DSS, SOX).
- Relevant certifications are strongly preferred: CISSP, CCSP, CISM, or cloud security certifications
- Fluency in both English and Arabic (written and verbal), with the ability to communicate effectively with technical teams and executive leadership.
Be The First To Know
About the latest Cybersecurity Jobs in Riyadh !
Cybersecurity Lead
Posted 11 days ago
Job Viewed
Job Description
Overview
Role Purpose: The Cybersecurity Lead role purpose is to ensure cybersecurity posture (process, people, technology) at cluster level for the benefit of our business. He/she has a specific focus on ensuring compliance with cybersecurity policies and local regulations. This role brings a security-first culture to Schneider Electric while protecting and managing risks for customers and the company. It also supports and is an active member of the EMEA CISO team and reports to the Regional Cybersecurity Officer for Middle East and Africa (MEA).
Responsibilities- Continues monitoring and ensuring adequate implementation of cybersecurity controls. Monitor cybersecurity risks and ensure proper risk mitigation.
- Address cybersecurity requirements within business processes, and ensure effective deployment and communications, with acknowledgment of security processes.
- Manage cybersecurity incidents, including working closely with digital risk leaders, IT security, and other team members in the EMEA region.
- Ensure and control security execution of projects for customers, considering contracts, legal, HR, IT, products, and interactions with customer cybersecurity representatives.
- Raise and control cybersecurity awareness for people’s behavior, training and culture within the cluster, considering customer expectations.
- Implement and coordinate cybersecurity action plans with customers, ensuring regular cybersecurity meetings with project teams and the customer’s CISO office.
- Ensure and control endpoint security in the country, including laptop security on customer premises.
- Manage cybersecurity audits, certifications, and address compliance requirements.
- Execute security reviews at cluster level, including incidents, vulnerabilities, policies compliance, audits, security checks, and remediation of external scoring.
- Ensure delivery of KPIs and dashboards.
- Senior Professional (5 - 8 years of experience).
- Bachelor’s degree in computer science, Management Information Systems or Engineering/Science required or equivalent.
- MBA degree preferred.
- Certification as CISSP, CCISO, or CISM; demonstrated experience managing threat response.
- Security standards: ISO 27001, NIST, NIS, ISA/IEC 62443.
- English language proficiency.
Schneider Electric seeks to be an inclusive and caring company, upholding high ethics and compliance standards. The Trust Charter underpins our conduct and cybersecurity commitments. We are an Equal Opportunity Employer committed to providing equitable opportunities to all qualified individuals regardless of protected characteristics.
You must submit an online application to be considered for any position with us. This position will be posted until filled.
#J-18808-LjbffrCybersecurity Expert
Posted 14 days ago
Job Viewed
Job Description
Overview
We are seeking a highly experienced and motivated Cyber Security Expert with over 10 years of hands-on expertise in offensive and defensive security domains.
Responsibilities- Execute Vulnerability Assessments (VA) , Penetration Testing (PT) , and Red Teaming exercises.
- Manage regulatory threat tickets/cases, coordinate with internal teams for timely resolution.
- Maintain communication with external cybersecurity regulatory authorities.
- Over 10 years of hands-on experience in offensive and defensive security domains.
Cybersecurity Engineer
Posted 14 days ago
Job Viewed
Job Description
- Working with the team to manage all cybersecurity systems in Health Affairs, such as Firewall, WAF, SIEM, AV, EDR, Proxy
- Continuous monitoring of alerts and security incidents
- Classifying incidents into appropriate categories
- Taking actions based on the severity of the incident, such as:
- Notifying system administrators
- Following the incident response plan
- Escalating incidents according to incident response procedures
- Properly documenting incidents
- Documenting and reporting incidents
- Resolving issues related to user requests
- Tracking cyberattacks and collecting information about attackers
- Creating or updating use cases for new systems and applications
- Analyzing cyber events and incidents reported by the Cybersecurity Authority
- Conducting regular vulnerability scans against internal IP addresses
- Monitoring the level of system compliance with the technical security standards of the National Guard, which will be approved by the IT department after evaluation
- Communicating with other departments during incident investigations
- Preparing a monthly report, which should summarize the main incidents that were handled
- Maintaining and operating the latest available versions of cybersecurity systems in Health Affairs
- Identifying, classifying, prioritizing, and investigating related events collected from firewalls, network devices, proxies, IDS/IPS systems, antivirus systems, databases, servers, and endpoints
- Working with the team to manage all cybersecurity systems in Health Affairs, such as Firewall, WAF, SIEM, AV, EDR, Proxy
- Continuous monitoring of alerts and security incidents
- Classifying incidents into appropriate categories
- Taking actions based on the severity of the incident, such as:
- Notifying system administrators
- Following the incident response plan
- Escalating incidents according to incident response procedures
- Properly documenting incidents
- Documenting and reporting incidents
- Resolving issues related to user requests
- Tracking cyberattacks and collecting information about attackers
- Creating or updating use cases for new systems and applications
- Analyzing cyber events and incidents reported by the Cybersecurity Authority
- Conducting regular vulnerability scans against internal IP addresses
- Monitoring the level of system compliance with the technical security standards of the National Guard, which will be approved by the IT department after evaluation
- Communicating with other departments during incident investigations
- Preparing a monthly report, which should summarize the main incidents that were handled
- Maintaining and operating the latest available versions of cybersecurity systems in Health Affairs
- Identifying, classifying, prioritizing, and investigating related events collected from firewalls, network devices, proxies, IDS/IPS systems, antivirus systems, databases, servers, and endpoints
- Bachelor's degree in computer science, Information Technology, or a related field
- 1 to 3 years of experience in cybersecurity or a related area
- Strong knowledge of network security, application security, and data protection
- Experience with SIEM tools, firewalls, intrusion detection systems (IDS), and encryption technologies
- Relevant certifications such as CISSP, CISM, or CEH are highly desirable
- Excellent problem-solving and analytical skills
- Strong communication skills in both English and Arabic
- Ability to work independently and collaboratively in a team environment
- Seniority level Entry level
- Employment type Full-time
- Industries IT Services and IT Consulting
Referrals increase your chances of interviewing at SSC HR Solutions by 2x
Get notified about new Cyber Security Engineer jobs in Riyadh, Riyadh, Saudi Arabia .
Penetration Testing Engineer I Ethical Hacker Senior Information Security Presales Engineer Cybersecurity Governance, Risk and Compliance ManagerWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr