EN | AR

24 Defense Analyst jobs in Saudi Arabia

Cybersecurity Defense Analyst

Riyadh, Riyadh Help AG

Posted today

Job Viewed

Tap Again To Close

Job Description

Help AG is looking for a talented and enthusiastic Cybersecurity Defense Analyst to join our Cybersecurity Operations Center (CSOC) team as part of our Managed Security Services (MSS) business unit. If you have strong knowledge and interest in Cybersecurity, this position might be the right one for you. The Senior Cybersecurity Defense Analyst will be responsible for monitoring multiple client environments, guiding, leading other Security Analysts, and conducting forensic analysis and threat hunting to detect and identify Cybersecurity incidents/breaches. The candidate is also expected to be up to date with Cybersecurity intelligence and threat landscape.

Responsibilities
  • Monitor multiple security technologies, such as IDS/IPS, Firewalls, Switches, VPNs, and other security threat data sources.
  • Correlate and analyze events using SIEM tools to detect security incidents.
  • Create, follow and present detailed operational process and procedures to appropriately analyze, escalate, and assist in remediation of critical information security incidents.
  • Respond to inbound requests via phone and other electronic means for technical assistance with managed services.
  • Respond in a timely manner (within documented SLA) to support, investigate, and other cases.
  • Document actions in cases to effectively communicate information internally and to customers.
  • Resolve problems independently and understand escalation procedure.
  • Maintain a high degree of awareness of current threat landscape and cybersecurity intelligence.
  • Spread the cybersecurity intelligence across the team of analysts and engage in threat hunting activities.
  • Lead delivery, and support others in the delivery, of knowledge sharing with analysts and writing technical articles for Internal knowledge bases, blog posts and reports as requested.
  • Perform other essential duties as assigned.
  • Analysis of log files, includes forensic analysis of system resource access.
  • Create, follow and present customer reports to ensure quality, accuracy, and value to clients.
  • Creation of new content (Use Cases, Queries, Reports) within the SIEM platform.
  • Education and training of other analysts in use and operation of SIEM platform.
  • On-site work with clients as required.
  • Engage with client Incident Response team as required.
  • Generate cybersecurity Threat Intelligence reports.
Qualifications and Skills
  • Saudi National will be preferrable.
  • Bachelor’s or master’s degree in Cybersecurity, Computer Science, Information Systems, Electrical Engineering, or a closely related degree.
  • An active interest and passion in cybersecurity, incident detection, network, and systems security.
  • 1 - 5 years of experience in cybersecurity, in areas such as security operations, intrusion detection, incident analysis, incident handling, log analysis, threat intelligence/hunting or digital forensics.
  • A sound knowledge of IT security best practices, common attack types and detection / prevention methods.
  • Demonstrable experience of analyzing and interpreting system, security, and application logs. Knowledge of the type of events that both Firewalls, IDS/IPS and other security related devices produce.
  • Experience in using Splunk as an analyst for Threat and Incident Detection is required.
  • Experience with ArcSight, LogRhythm, QRadar, is preferable but not mandatory.
  • Strong understanding of Cyber Kill Chain and MITRE ATT&CK frameworks and techniques.
  • Solid understanding of TCP/IP and network concepts and principles.
  • Possible attack activities, such as scans, man in the middle, sniffing, DoS, DDoS.
  • Professional certificates are highly preferred (e.g., CCIE, OSCP, CISSP, GSEC, GCIA, GCIH, GMON, GREM, GDAT, GCFE, etc.).
  • An experienced Analyst who aspires to be a leader and is committed to learning the principles of leadership and the role of a leader.
  • Outstanding organizational skills.
  • Exclusive focus and vast experience in IT.
  • Very good communication skills.
  • Strong analytical and problem-solving skills.
  • A motivated, self-managed, individual who can demonstrate exceptional analytical skills and work professionally with peers and customers even under pressure.
  • Strong written and verbal skills.
  • Strong interpersonal skills with the ability to collaborate well with others.
  • Ability to speak and write in English is required; Ability to speak and write in both English and Arabic is preferred.
  • Well-versed in developing content for SIEM (creating, fine tuning) use cases and rules.
  • Experience with automation tools (SOAR) is preferred.
  • Experience in Malware Analysis / Reverse Engineering is preferred.
Benefits
  • Health insurance with one of the leading global providers for medical insurance.
  • Career progression and growth through challenging projects and work.
  • Employee engagement activities throughout the year.
  • Tailored training & development program.
About Us

Help AG is the cyber security arm of e& enterprise and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.

Present in the Middle East since 2004, Help AG was strategically acquired by Etisalat group in Feb 2020, hence creating a cyber security and digital transformation powerhouse in the region.

Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendoragnostic, trustworthy, independent, and cyber security focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Defense Analyst

New
SAR60000 - SAR120000 Y JAL International Co. Ltd.

Posted today

Job Viewed

Tap Again To Close

Job Description

Cybersecurity Defense Analyst

Department:
CISO

Job Purpose

A Cybersecurity Defense Analyst monitors, detects, and responds to cyber threats to protect an organization's IT infrastructure. Responsibilities include analyzing security events, investigating incidents, implementing and upgrading security measures (firewalls, SIEM, vulnerability assessments), and developing incident response strategies. The role requires staying updated on emerging threats, collaborating with IT teams, and delivering reports and training to maintain network security and data integrity.

Core Responsibilities

  • Ensure 24/7/365 security monitoring is performed.
  • Escalate validated/confirmed incidents to the incident response team.
  • Notify stakeholders of incidents and required mitigation steps.
  • Fine-tune SIEM rules to reduce false positives/negatives.
  • Collect and analyze global and internal threat intelligence, recommending preventive actions.
  • Proactively research and monitor security information to detect potential threats.
  • Develop/distribute alerts and reports with corrective actions.
  • Learn new attack patterns and actively participate in security forums.
  • Collaborate with Vulnerability Assessment Lead and incident response teams.
  • Track and update incidents/requests based on client updates and analysis.
  • Correlate incident data to identify vulnerabilities.
  • Document and escalate incidents causing immediate or ongoing impact.
  • Correlate information from multiple sources to contextualize observed threats.
  • Analyze network alerts from multiple sources to determine causes.
  • Provide timely detection, identification, and alerting of possible attacks, anomalies, or misuse activities.
  • Report suspected cyber incidents according to organizational procedures.

Qualifications

Education:

  • Bachelor's degree in Cybersecurity, Information Technology, or related field.

Experience:

  • 2–0 years of experience.

Knowledge/Exposure:

  • Familiarity with risk management frameworks (ISO 27001, NIST, COBIT, GDPR, SOX).
  • Experience with GRC tools (e.g., ServiceNow, Archer) is a plus.

Skills:

  • Strong ability to analyze complex data, identify anomalies, and correlate events to understand threat contexts.
  • Ability to assess risks, evaluate vulnerabilities, and develop effective strategies to mitigate threats.
This advertiser has chosen not to accept applicants from your region.

Cyber Defense Analyst (L2/L3)

Riyadh, Riyadh Help AG

Posted today

Job Viewed

Tap Again To Close

Job Description

Help AG is looking for a talented and enthusiastic individual to join our Cybersecurity Operations Center (CSOC) team as part of the Managed Security Services (MSS) business unit. If you have strong knowledge and interest in Cybersecurity, this position might be the right one for you. The Cyber Defense Analyst (L2/L3) will be responsible for monitoring multiple client environments, guiding, leading other Security Analysts, and conducting forensic analysis and threat hunting to detect and identify Cybersecurity incidents/breaches. The candidate is also expected to be up to date with Cybersecurity intelligence and threat landscape.

Responsibilities

  • Monitor multiple security technologies, such as IDS/IPS, Firewalls, Switches, VPNs, and other security threat data sources.

  • Correlate and analyze events using SIEM tools to detect security incidents.

  • Create, follow and present detailed operational process and procedures to appropriately analyze, escalate, and assist in remediation of critical information security incidents.

  • Respond to inbound requests via phone and other electronic means for technical assistance with managed services.

  • Respond in a timely manner (within documented SLA) to support, investigate, and other cases.

  • Document actions in cases to effectively communicate information internally and to customers.

  • Resolve problems independently and understand escalation procedure.

  • Maintain a high degree of awareness of current threat landscape and cybersecurity intelligence.

  • Spread the cybersecurity intelligence across the team of analysts and engage in threat hunting activities.

  • Lead delivery, and support others in the delivery, of knowledge sharing with analysts and writing technical articles for Internal knowledge bases, blog posts and reports as requested.

  • Perform other essential duties as assigned.

  • Analysis of log files, includes forensic analysis of system resource access.

  • Create, follow and present customer reports to ensure quality, accuracy, and value to clients.

  • Creation of new content (Use Cases, Queries, Reports) within the SIEM platform.

  • Education and training of other analysts in use and operation of SIEM platform.

  • On-site work with clients as required.

  • Engage with client Incident Response team as required.

  • Generate cybersecurity Threat Intelligence reports.

Qualifications

  • 2-5 years of experience in cybersecurity, in areas such as security operations, intrusion detection, incident analysis, incident handling, log analysis, threat intelligence/hunting or digital forensics.

  • Bachelor’s/Master’s Degree in Cybersecurity, Computer Science, Information Systems, Electrical Engineering, or a closely related degree.

  • An active interest and passion in cybersecurity, incident detection, network, and systems security.

  • A sound knowledge of IT security best practices, common attack types and detection / prevention methods.

  • Demonstrable experience of analyzing and interpreting system, security, and application logs.

  • Knowledge of the type of events that both Firewalls, IDS/IPS and other security related devices produce.

  • Experience in using Splunk as an analyst for Threat and Incident Detection is required.

  • Experience with ArcSight, LogRhythm, QRadar, is preferable but not mandatory.

  • Strong understanding of Cyber Kill Chain and MITRE ATT&CK frameworks and techniques.

  • Solid understanding of TCP/IP and network concepts and principles.

  • Possible attack activities, such as scans, man in the middle, sniffing, DoS, DDoS.

  • Professional certificates are highly preferred (e.g., CCIE, OSCP, CISSP, GSEC, GCIA, GCIH, GMON, GREM, GDAT, GCFE…etc.).

  • An experienced Analyst who aspires to be a leader, and is committed to learning the principles of leadership and the role of a leader.

  • Outstanding organizational skills.

  • Exclusive focus and vast experience in IT.

  • Very good communication skills.

  • Strong analytical and problem-solving skills.

  • A motivated, self-managed, individual who can demonstrate exceptional analytical skills and work professionally with peers and customers even under pressure.

  • Strong written and verbal skills.

  • Strong interpersonal skills with the ability to collaborate well with others.

  • Ability to speak and write in English is required; Ability to speak and write in both English and Arabic is preferred.

  • Well-versed in developing content for SIEM (creating, fine tuning) use cases and rules.

  • Experience with automation tools (SOAR) is preferred.

  • Experience in Malware Analysis / Reverse Engineering is preferred.

Benefits

  • Health insurance with one of the leading global providers for medical insurance.

  • Career progression and growth through challenging projects and work.

  • Employee engagement activities throughout the year.

  • Tailored training & development program.

About Us

Help AG is the cybersecurity arm of e& enterprise and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a

competitive edge.

Present in the Middle East since 2004, Help AG was strategically acquired by Etisalat in Feb 2020, hence creating a cyber security and digital transformation powerhouse in the region.

Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor dagnostic, trustworthy, independent, and cyber security focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Defense Center Analyst

New
SAR120000 - SAR240000 Y Eram Talent

Posted today

Job Viewed

Tap Again To Close

Job Description

A leading Talent Acquisition Company in Saudi Arabia is looking for a talented Cyber Defense Center Analyst to join our esteemed team in Saudi Arabia. In this critical role, you will play a key part in monitoring, analyzing, and responding to cybersecurity incidents within an operational environment. Your expertise will help safeguard our clients' information systems, and you'll work closely with other cybersecurity professionals to develop and enhance incident response strategies.

The Cyber Defense Center Analyst will be responsible for utilizing state-of-the-art security tools to detect, analyze, and mitigate potential threats and vulnerabilities. You will conduct thorough investigations into incidents, prepare reports, and collaborate with various stakeholders to improve overall security posture.

Your analytical skills and attention to detail will be vital as you support the mission of ensuring information security and defending against cyber threats.

Key Responsibilities
  • Monitor security events from SIEM, tickets, email, and phone channels.
  • Investigate and escalate incidents based on severity.
  • Analyze cyber threat intelligence and emerging threats.
  • Perform incident triage and provide remediation recommendations.
  • Track and document cyber incidents.
  • Support configuration and management of security monitoring tools (SIEM, NETFLOW, etc.).
  • Collaborate with technical teams to enhance security systems and processes.
  • Document security procedures, configurations, and incidents.

Knowledge

 Knowledge of cybersecurity considerations for database systems.

Knowledge in Threat Hunting and MITRE ATT&CK Methodology.

nowledge of network traffic protocols, methods and management.

nowledge of cyber threat intelligence sources and their respective capabilities.

Skills

kill in SIEM query languages to do basic filtering etc.

kill in scripting – Python and PowerShell.

 ll in security tools – commercial and open-source.

 ll in safely and effectively conducting research using deep web.

kill in defensive technologies – NGFW, AV, VPN, IPS, NETFLOW, DAM, WAF, Proxy, and Web Abilities

 lity to create signature rules such as Snort, Yara.

bility to create Sigma detection rules.

bility to determine whether CTI is reliable, valid and relevant. Cyber Security Expertise:

ecurity Concepts: In-depth understanding of network security architecture, defense-in-depth principles, and incident response.

Requirements
  • Bachelor's degree in Cybersecurity, Information Technology, or a related field.
  • Strong knowledge of security concepts, technologies, and best practices.
  • Experience in incident response, threat hunting, or security monitoring.
  • 4+ years of experience in cybersecurity with 2+ year in SOC/SIEM operations.
  • The CDC Analyst monitors security events from the various SOC entry channels (SIEM, Tickets, Email and Phone) based on the security event severity
  • Knowledge of network security, incident response, and MITRE ATT&CK.
  • Proficiency in SIEM, scripting (Python, PowerShell), and security tools.
  • Knowledge of network and application security, firewalls, intrusion detection systems, and other security technologies.
  • Ability to work effectively under pressure and prioritize multiple tasks.
  • Relevant industry certifications (e.g. CySA+, CEH, eJPT, eCIR, eTHP, SOC-200)
  • A commitment to continuous learning and staying current with the evolving cybersecurity landscape.
This advertiser has chosen not to accept applicants from your region.

Cyber Defense Center Analyst

New
SAR120000 - SAR240000 Y Eram Talent

Posted today

Job Viewed

Tap Again To Close

Job Description

A leading Talent Acquisition Company in Saudi Arabia is looking for a talented Cyber Defense Center Analyst to join our esteemed team in Saudi Arabia. In this critical role, you will play a key part in monitoring, analyzing, and responding to cybersecurity incidents within an operational environment. Your expertise will help safeguard our clients' information systems, and you'll work closely with other cybersecurity professionals to develop and enhance incident response strategies.

The Cyber Defense Center Analyst will be responsible for utilizing state-of-the-art security tools to detect, analyze, and mitigate potential threats and vulnerabilities. You will conduct thorough investigations into incidents, prepare reports, and collaborate with various stakeholders to improve overall security posture.

Your analytical skills and attention to detail will be vital as you support the mission of ensuring information security and defending against cyber threats.

Key Responsibilities
  • Monitor security events from SIEM, tickets, email, and phone channels.
  • Investigate and escalate incidents based on severity.
  • Analyze cyber threat intelligence and emerging threats.
  • Perform incident triage and provide remediation recommendations.
  • Track and document cyber incidents.
  • Support configuration and management of security monitoring tools (SIEM, NETFLOW, etc.).
  • Collaborate with technical teams to enhance security systems and processes.
  • Document security procedures, configurations, and incidents.

Knowledge

 Knowledge of cybersecurity considerations for database systems.

Knowledge in Threat Hunting and MITRE ATT&CK Methodology.

nowledge of network traffic protocols, methods and management.

nowledge of cyber threat intelligence sources and their respective capabilities.

Skills

kill in SIEM query languages to do basic filtering etc.

kill in scripting – Python and PowerShell.

 ll in security tools – commercial and open-source.

 ll in safely and effectively conducting research using deep web.

kill in defensive technologies – NGFW, AV, VPN, IPS, NETFLOW, DAM, WAF, Proxy, and Web Abilities

 lity to create signature rules such as Snort, Yara.

bility to create Sigma detection rules.

bility to determine whether CTI is reliable, valid and relevant. Cyber Security Expertise:

ecurity Concepts: In-depth understanding of network security architecture, defense-in-depth principles, and incident response.

Requirements
  • Bachelor's degree in Cybersecurity, Information Technology, or a related field.
  • Strong knowledge of security concepts, technologies, and best practices.
  • Experience in incident response, threat hunting, or security monitoring.
  • 4+ years of experience in cybersecurity with 2+ year in SOC/SIEM operations.
  • The CDC Analyst monitors security events from the various SOC entry channels (SIEM, Tickets, Email and Phone) based on the security event severity
  • Knowledge of network security, incident response, and MITRE ATT&CK.
  • Proficiency in SIEM, scripting (Python, PowerShell), and security tools.
  • Knowledge of network and application security, firewalls, intrusion detection systems, and other security technologies.
  • Ability to work effectively under pressure and prioritize multiple tasks.
  • Relevant industry certifications (e.g. CySA+, CEH, eJPT, eCIR, eTHP, SOC-200)
  • A commitment to continuous learning and staying current with the evolving cybersecurity landscape.
This advertiser has chosen not to accept applicants from your region.

Cyber Defense Center Analyst

New
SAR120000 - SAR240000 Y Eram Talent

Posted today

Job Viewed

Tap Again To Close

Job Description

A leading Talent Acquisition Company in Saudi Arabia is looking for a talented Cyber Defense Center Analyst to join our esteemed team in Saudi Arabia. In this critical role, you will play a key part in monitoring, analyzing, and responding to cybersecurity incidents within an operational environment. Your expertise will help safeguard our clients' information systems, and you'll work closely with other cybersecurity professionals to develop and enhance incident response strategies.

The Cyber Defense Center Analyst will be responsible for utilizing state-of-the-art security tools to detect, analyze, and mitigate potential threats and vulnerabilities. You will conduct thorough investigations into incidents, prepare reports, and collaborate with various stakeholders to improve overall security posture.

Your analytical skills and attention to detail will be vital as you support the mission of ensuring information security and defending against cyber threats.

Key Responsibilities
  • Monitor security events from SIEM, tickets, email, and phone channels.
  • Investigate and escalate incidents based on severity.
  • Analyze cyber threat intelligence and emerging threats.
  • Perform incident triage and provide remediation recommendations.
  • Track and document cyber incidents.
  • Support configuration and management of security monitoring tools (SIEM, NETFLOW, etc.).
  • Collaborate with technical teams to enhance security systems and processes.
  • Document security procedures, configurations, and incidents.

Knowledge

 Knowledge of cybersecurity considerations for database systems.

Knowledge in Threat Hunting and MITRE ATT&CK Methodology.

nowledge of network traffic protocols, methods and management.

nowledge of cyber threat intelligence sources and their respective capabilities.

Skills

kill in SIEM query languages to do basic filtering etc.

kill in scripting – Python and PowerShell.

 ll in security tools – commercial and open-source.

 ll in safely and effectively conducting research using deep web.

kill in defensive technologies – NGFW, AV, VPN, IPS, NETFLOW, DAM, WAF, Proxy, and Web Abilities

 lity to create signature rules such as Snort, Yara.

bility to create Sigma detection rules.

bility to determine whether CTI is reliable, valid and relevant. Cyber Security Expertise:

ecurity Concepts: In-depth understanding of network security architecture, defense-in-depth principles, and incident response.

Requirements
  • Bachelor's degree in Cybersecurity, Information Technology, or a related field.
  • Strong knowledge of security concepts, technologies, and best practices.
  • Experience in incident response, threat hunting, or security monitoring.
  • 4+ years of experience in cybersecurity with 2+ year in SOC/SIEM operations.
  • The CDC Analyst monitors security events from the various SOC entry channels (SIEM, Tickets, Email and Phone) based on the security event severity
  • Knowledge of network security, incident response, and MITRE ATT&CK.
  • Proficiency in SIEM, scripting (Python, PowerShell), and security tools.
  • Knowledge of network and application security, firewalls, intrusion detection systems, and other security technologies.
  • Ability to work effectively under pressure and prioritize multiple tasks.
  • Relevant industry certifications (e.g. CySA+, CEH, eJPT, eCIR, eTHP, SOC-200)
  • A commitment to continuous learning and staying current with the evolving cybersecurity landscape.
This advertiser has chosen not to accept applicants from your region.

Cyber Defense Center Analyst

New
SAR120000 - SAR240000 Y Eram Talent

Posted today

Job Viewed

Tap Again To Close

Job Description

A leading Talent Acquisition Company in Saudi Arabia is looking for a talented Cyber Defense Center Analyst to join our esteemed team in Saudi Arabia. In this critical role, you will play a key part in monitoring, analyzing, and responding to cybersecurity incidents within an operational environment. Your expertise will help safeguard our clients' information systems, and you'll work closely with other cybersecurity professionals to develop and enhance incident response strategies.

The Cyber Defense Center Analyst will be responsible for utilizing state-of-the-art security tools to detect, analyze, and mitigate potential threats and vulnerabilities. You will conduct thorough investigations into incidents, prepare reports, and collaborate with various stakeholders to improve overall security posture.

Your analytical skills and attention to detail will be vital as you support the mission of ensuring information security and defending against cyber threats.

Key Responsibilities
  • Monitor security events from SIEM, tickets, email, and phone channels.
  • Investigate and escalate incidents based on severity.
  • Analyze cyber threat intelligence and emerging threats.
  • Perform incident triage and provide remediation recommendations.
  • Track and document cyber incidents.
  • Support configuration and management of security monitoring tools (SIEM, NETFLOW, etc.).
  • Collaborate with technical teams to enhance security systems and processes.
  • Document security procedures, configurations, and incidents.

Knowledge

 Knowledge of cybersecurity considerations for database systems.

Knowledge in Threat Hunting and MITRE ATT&CK Methodology.

nowledge of network traffic protocols, methods and management.

nowledge of cyber threat intelligence sources and their respective capabilities.

Skills

kill in SIEM query languages to do basic filtering etc.

kill in scripting – Python and PowerShell.

 ll in security tools – commercial and open-source.

 ll in safely and effectively conducting research using deep web.

kill in defensive technologies – NGFW, AV, VPN, IPS, NETFLOW, DAM, WAF, Proxy, and Web Abilities

 lity to create signature rules such as Snort, Yara.

bility to create Sigma detection rules.

bility to determine whether CTI is reliable, valid and relevant. Cyber Security Expertise:

ecurity Concepts: In-depth understanding of network security architecture, defense-in-depth principles, and incident response.

Requirements
  • Bachelor's degree in Cybersecurity, Information Technology, or a related field.
  • Strong knowledge of security concepts, technologies, and best practices.
  • Experience in incident response, threat hunting, or security monitoring.
  • 4+ years of experience in cybersecurity with 2+ year in SOC/SIEM operations.
  • The CDC Analyst monitors security events from the various SOC entry channels (SIEM, Tickets, Email and Phone) based on the security event severity
  • Knowledge of network security, incident response, and MITRE ATT&CK.
  • Proficiency in SIEM, scripting (Python, PowerShell), and security tools.
  • Knowledge of network and application security, firewalls, intrusion detection systems, and other security technologies.
  • Ability to work effectively under pressure and prioritize multiple tasks.
  • Relevant industry certifications (e.g. CySA+, CEH, eJPT, eCIR, eTHP, SOC-200)
  • A commitment to continuous learning and staying current with the evolving cybersecurity landscape.
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Defense analyst Jobs in Saudi Arabia !

Cyber Defense Center Analyst (Saudi Arabia)

Eram Group

Posted today

Job Viewed

Tap Again To Close

Job Description

A leading Talent Acquisition Company in Saudi Arabia is seeking a talented Cyber Defense Center Analyst to join our esteemed team in Saudi Arabia. In this critical role, you will monitor, analyze, and respond to cybersecurity incidents within an operational environment. Your expertise will help safeguard our clients’ information systems, and you will collaborate closely with other cybersecurity professionals to develop and enhance incident response strategies.

The Cyber Defense Center Analyst will utilize advanced security tools to detect, analyze, and mitigate potential threats and vulnerabilities. Responsibilities include conducting thorough investigations into incidents, preparing reports, and working with various stakeholders to improve overall security posture.

Your analytical skills and attention to detail are vital in supporting the mission of ensuring information security and defending against cyber threats.

Key Responsibilities
  • Monitor security events from SIEM, tickets, email, and phone channels.
  • Investigate and escalate incidents based on severity.
  • Analyze cyber threat intelligence and emerging threats.
  • Perform incident triage and provide remediation recommendations.
  • Track and document cyber incidents.
  • Support configuration and management of security monitoring tools (SIEM, NETFLOW, etc.).
  • Collaborate with technical teams to enhance security systems and processes.
  • Document security procedures, configurations, and incidents.
Knowledge and Skills
  • Knowledge of cybersecurity considerations for database systems.
  • Knowledge of Threat Hunting and MITRE ATT&CK methodology.
  • Knowledge of network traffic protocols, methods, and management.
  • Knowledge of cyber threat intelligence sources and their capabilities.
  • Proficiency in SIEM query languages for basic filtering.
  • Scripting skills in Python and PowerShell.
  • Experience with security tools—both commercial and open-source.
  • Ability to conduct research using the deep web safely and effectively.
  • Familiarity with defensive technologies such as NGFW, AV, VPN, IPS, NETFLOW, DAM, WAF, Proxy, and Web Abilities.
  • Ability to create signature rules (e.g., Snort, Yara) and Sigma detection rules.
  • Ability to assess the reliability, validity, and relevance of cyber threat intelligence.
Cybersecurity Expertise
  • Deep understanding of network security architecture, defense-in-depth principles, and incident response.
  • Bachelor's degree in Cybersecurity, Information Technology, or a related field.
  • Strong knowledge of security concepts, technologies, and best practices.
  • Experience in incident response, threat hunting, or security monitoring.
  • Minimum 4 years of cybersecurity experience, including at least 2 years in SOC/SIEM operations.
  • Knowledge of network security, incident response, and MITRE ATT&CK framework.
  • Proficiency in SIEM, scripting (Python, PowerShell), and security tools.
  • Familiarity with network and application security technologies such as firewalls and intrusion detection systems.
  • Ability to work effectively under pressure and prioritize tasks.
  • Relevant industry certifications (e.g., CySA+, CEH, eJPT, eCIR, eTHP, SOC-200).
  • Commitment to continuous learning and staying current with cybersecurity developments.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Business Intelligence Analyst

New
SAR120000 - SAR240000 Y Lucid Motors Middle East

Posted today

Job Viewed

Tap Again To Close

Job Description

Leading the future in luxury electric and mobility
At Lucid, we set out to introduce the most captivating, luxury electric vehicles that elevate the human experience and transcend the perceived limitations of space, performance, and intelligence. Vehicles that are intuitive, liberating, and designed for the future of mobility.

We plan to lead in this new era of luxury electric by returning to the fundamentals of great design – where every decision we make is in service of the individual and environment. Because when you are no longer bound by convention, you are free to define your own experience.

Come work alongside some of the most accomplished minds in the industry. Beyond providing competitive salaries, we're providing a community for innovators who want to make an immediate and significant impact. If you are driven to create a better, more sustainable future, then this is the right place for you.

Lucid Motors is seeking a BI Analyst to support our Supply Chain Digital Operations team. This role requires strong business intelligence expertise and a deep understanding of supply chain analytics in a manufacturing environment. The Analyst will lead KPI development and data-driven initiatives to enhance visibility, efficiency, and agility across supply chain functions.

You Will

  • Partner with Procurement, Planning, Logistics, Program Management, and other stakeholders to identify KPIs and analytics that drive operational value.
  • Identify gaps in supply chain data and propose solutions to improve visibility and decision-making.
  • Lead cross-functional initiatives, define project plans, and track progress against timelines.
  • Align BI and digital strategies with broader business objectives.
  • Integrate BI solutions with existing systems in collaboration with IT, Operations, and Procurement.
  • Translate stakeholder requirements into actionable data solutions.
  • Analyze large datasets from multiple sources to generate insights and support strategic decisions.
  • Apply best practices in data visualization to solve supply chain challenges.

You Bring

  • Bachelor's degree in Engineering, Supply Chain, Computer Science, Finance, or related field (Master's preferred).
  • 3+ years of experience in supply chain BI development and analytics.
  • Proficiency in SQL, Python/R, Power BI, Tableau, and data modeling.
  • Strong analytical skills and familiarity with financial decision models (ROI, TCO, Cash-to-Cash).
  • Experience with SAP or other ERP/MRP systems.
  • Solid understanding of supply chain functions, including procurement, logistics, and materials management.
  • Ability to translate business needs into technical requirements and data solutions.
  • Strong communication and stakeholder engagement skills.
  • Proven ability to lead cross-functional projects in a fast-paced environment.
  • Familiarity with software implementation best practices.

Additional Compensation and Benefits
: Lucid offers a wide range of competitive benefits, including medical, dental, vision, life insurance, disability insurance, vacation, and 401k. The successful candidate may also be eligible to participate in Lucid's equity program and/or a discretionary annual incentive program, subject to the rules governing such programs. (Cash or equity incentive awards, if any, will depend on various factors, including, without limitation, individual and company performance.)

By Submitting your application, you understand and agree that your personal data will be processed in accordance with our Candidate Privacy Notice. If you are a California resident, please refer to our California Candidate Privacy Notice.

To all recruitment agencies
:
Lucid Motors
does not
accept agency resumes. Please do not forward resumes to our careers alias or other Lucid Motors employees. Lucid Motors is not responsible for any fees related to unsolicited resumes.

This advertiser has chosen not to accept applicants from your region.

Business Intelligence Analyst

New
SAR90000 - SAR120000 Y REEF | ريف

Posted today

Job Viewed

Tap Again To Close

Job Description

Power BI & Power Query Specialist | Reef Holding

Position Title:
Power BI & Power Query Specialist

Location:
Riyadh, Saudi Arabia

Job Type:
Full-Time

About the Role:

We are seeking a highly skilled
Power BI & Power Query Specialist
to develop, automate, and optimize data reporting and visualization solutions. The role requires strong analytical abilities, expertise in data modeling and dashboard creation, and a keen eye for accuracy and clarity in financial and operational reporting.

You will play a key role in transforming raw data into actionable insights for executive management, driving smarter business decisions across multiple departments and markets.

Key Responsibilities:

  • Develop and maintain automated dashboards and reports using
    Power BI
    and
    Power Query
    .
  • Integrate data from
    ERP systems (such as Microsoft Dynamics 365)
    and other sources to ensure accurate and efficient reporting.
  • Automate periodic reports for
    Sales, P&L, Budgets, Forecasts, and Marketing Expenditures
    .
  • Enhance data models and reporting processes to improve accuracy and efficiency.
  • Collaborate with
    FP&A, Finance, and Operations
    teams to identify reporting needs and KPIs.
  • Ensure
    data quality, consistency, and integrity
    across all reports.
  • Provide
    ad-hoc analyses
    and customized reports for the
    CFO and senior leadership
    .
  • Continuously improve reporting solutions to enhance usability and performance.
  • Train users from other departments on how to navigate and interpret dashboards.

Required Qualifications:

  • Bachelor's degree
    in
    Finance, Accounting, Business Administration, or Data Science
    .
  • Strong
    analytical skills
    and high accuracy in data handling.
  • Ability to
    simplify complex data
    and present it clearly to senior management.
  • Proficiency in
    data modeling and programming (DAX, SQL)
    .
  • Strong
    collaboration and communication skills
    across multiple teams.
  • Ability to
    continuously improve processes
    and drive efficiency.
  • Strategic thinking
    and the ability to deliver data-driven recommendations.
  • Excellent command of
    Arabic and English (written and spoken)
    .
  • Required Training: Computer Skills – Administrative Skills – Effective Communication Skills.

Why Join Us?

This is an excellent opportunity to leverage your technical and analytical expertise to enhance decision-making at a strategic level. You will work closely with executive management and finance teams to build a robust data-driven culture, helping shape the company's financial and operational success.

This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Defense Analyst Jobs