366 Information Security Manager jobs in Saudi Arabia
Information Security Manager
Posted today
Job Viewed
Job Description
Location
Jeddah, Saudi Arabia
Experience
4
Job Type
Recruitment
Job Description
- The responsibility of this role is to oversee and ensure the establishment of a cybersecurity and IT risk management program across the client, and to act as the focal point for cybersecurity and IT risk governance activities.
- Responsible for the design, management and review of Client's cybersecurity and IT risk management policies, standards, and baselines to ensure secure operation of Client information & systems.
- Conduct both network and user activity audits where required to determine security needs.
- Providing guidance and required training on matters relating to cybersecurity, ensuring the implementation of necessary actions to adhere to applicable laws/regulations, standards, and guidelines.
Responsibilities -
Network Administration and Security
- Manage protection of information systems, the detection of threats to Client's systems, and the response to detected threats and cyber-attacks.
- Safeguards information system assets by identifying and solving potential and actual security problems.
- Protects system by defining access privileges, control structures, and resources.
Performance Monitoring-
- Manage and Troubleshoot network systems issues and submit recommendations for improvements in network operation and management.
- Plan for disaster recovery and create contingency plans in the event of any security breaches
- Engage in and manage 'ethical hacking', for example, simulating security breaches
- Identify potential weaknesses and implement measures, such as firewalls and encryption
Vendor Management-
- Coordinate with vendors to expedite the resolution of problems.
- Evaluate vendor solutions to ensure compliance with requirements and cost effectiveness.
Service Management-
- Act as an escalation point for all requests and incidents related to the network.
- Follow up on issues and provide subject matter expertise support for diagnosing and resolving problems.
Firewall Management (On-Premise and Cloud)-
- Oversee configuration, monitoring, and maintenance of on-premises and cloud-based firewalls, ensuring they are optimized to prevent unauthorized access and detect potential threats.
- Define and implement firewall rules and policies, including access controls, to secure network traffic according to organizational and compliance standards.
- Conduct regular audits and vulnerability assessments on firewalls to identify and mitigate any potential security weaknesses.
- Collaborate with network and system teams to troubleshoot and resolve firewall-related issues while minimizing downtime and disruption.
Cloud Security Management (Defender for Cloud)-
- Configure, manage, and optimize Microsoft Defender for Cloud settings to enhance security posture across cloud resources, including VMs, databases, and storage accounts.
- Develop and enforce security policies within Defender for Cloud to monitor and mitigate risks associated with cloud infrastructure, applications, and data.
Network Security-
- Design, implement, and maintain secure network architecture, incorporating firewalls, intrusion detection/prevention systems (IDS/IPS), VPNs, and network segmentation strategies.
- Conduct network traffic analysis and continuous monitoring to identify anomalies or suspicious activities that may indicate potential security threats.
Threat Monitoring and Incident Response-
- Implement and oversee threat monitoring processes using security information and event management (SIEM) systems, integrating data from firewalls, Defender for Cloud, and network devices.
- Develop and execute incident response protocols for network, firewall, and cloud security incidents, minimizing impact through quick containment, analysis, and remediation.
- Perform post-incident analysis and reporting to identify root causes, improve firewall configurations, and update security policies as needed.
Compliance and Documentation-
- Ensure firewall, network, and cloud security policies comply with relevant regulations and industry standards (e.g., NIST, ISO
- Maintain documentation for all security configurations, procedures, and policies to facilitate audits and enhance knowledge sharing across IT teams.
- Conduct regular security assessments, risk analyses, and penetration tests on cloud and onpremises systems to verify compliance and mitigate vulnerabilities.
Service Level Agreements (SLA)-
- Monitor production, outputs, and services to ensure that SLAs, and other quality metrics, are being met.
- Developing SLAs.
Education and Experience -
- A bachelor's degree in IT and a master's degree is desirable, Min 4 years of experience
- Advanced certifications such as SANS GIAC/GCIA/GCIH and/or SIEM-specific training and certification
- Relevant certifications are an advantage (such as IAM Level I Security+ CE, CAP, CND, Cloud+, CSLC, CEH, CISM, CISSP, CASP, CCNA-Security)
- DoD-8570 IAT Level 2 baseline certification (Security+ CE or equivalent)
Firewall and Network Security-
- Certifications like Checkpoint Certified Security Administrator (CCSA) or Palo Alto Networks Certified Network Security Engineer (PCNSE) show expertise in managing and configuring
firewall systems.
- Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM), which provide a comprehensive understanding of security management
practices.
Network Security:
- CompTIA Network+ or Cisco Certified CyberOps Associate for foundational and advanced knowledge in networking security principles and operations.
Competencies
- Firewall Management: Proficiency with firewall technologies and platforms (e.g., Cisco ASA, Palo Alto, Checkpoint) for setting up, configuring, and maintaining firewalls on both on-premises and cloud platforms.
- Cloud Security Expertise: In-depth understanding of cloud environments, especially
Microsoft Azure, to manage and secure cloud services, implement Defender for Cloud policies, and perform risk assessments.
- Networking Knowledge: Strong grasp of network protocols, segmentation, VPNs, IDS/IPS, and secure configuration of network devices.
- Security Monitoring and Incident Response: Proficiency in using SIEM tools (e.g., Splunk,
Microsoft Sentinel for monitoring, alerting, and responding to cybersecurity incidents across firewall and cloud environments.
- Risk Assessment and Compliance: Ability to assess risk in IT systems and ensure compliance with standards like NIST, ISO 27001, and PCI DSS.
Information Security Manager
Posted today
Job Viewed
Job Description
About the Role
We are seeking a highly experienced
Cybersecurity Manager
with a proven track record in
Governance, Risk & Compliance (GRC)
,
Network Security
, and
Infrastructure Security
. The ideal candidate will have extensive experience working with
System Integrators
, driving complex security projects, and ensuring robust cybersecurity frameworks across enterprise environments.
Key Responsibilities
- Lead and manage cybersecurity initiatives focusing on
GRC, Network, and Infrastructure security domains
. - Design, implement, and oversee cybersecurity strategies and frameworks in line with international standards and regulatory requirements.
- Work closely with clients, stakeholders, and technology teams to deliver end-to-end security solutions.
- Ensure security compliance across critical systems, networks, and infrastructures.
- Drive risk assessments, audits, and remediation strategies.
- Provide leadership, mentorship, and guidance to security teams.
Requirements
- Minimum
15 years of experience
in cybersecurity with a strong managerial background. - Expertise in
Governance, Risk & Compliance (GRC)
,
Network Security
, and
Infrastructure Security
. - Proven
System Integrator experience
in delivering large-scale cybersecurity projects. - Strong domain knowledge in
Airlines, Transport, or Tourism sectors
(preferred). - Excellent communication skills in
Arabic and English
. - Relevant certifications (CISSP, CISM, CISA, ISO 27001 Lead Implementer, etc.) are highly desirable.
Certified Information Security Manager
Posted 1 day ago
Job Viewed
Job Description
Responsibilities
- Develop, implement, and manage comprehensive information security programs aligned with organizational objectives.
- Oversee risk assessments and mitigation strategies to protect sensitive data and systems.
- Establish and enforce security policies, standards, and procedures across the organization.
- Lead incident response efforts, including investigation, containment, and remediation of security breaches.
- Collaborate with cross-functional teams to ensure security best practices are integrated into all business processes.
- Conduct regular security awareness training for staff and stakeholders.
- Monitor compliance with relevant regulations, frameworks, and industry standards.
- Evaluate and recommend security technologies, tools, and solutions.
- Prepare and present detailed security reports to executive leadership.
- Mentor and guide junior security team members and trainees.
- Minimum of 5 years of experience in information security management or a related field.
- Proven track record in developing and implementing security policies and procedures.
- Strong understanding of risk management and mitigation strategies.
- Experience with incident response and crisis management.
- Familiarity with regulatory requirements and industry standards (e.g., ISO 27001, NIST, GDPR).
- Excellent communication and leadership skills.
- Ability to work effectively in a remote environment.
- Demonstrated analytical and problem-solving abilities.
- Experience conducting security training and awareness programs.
- Commitment to continuous professional development in cybersecurity.
Information System Security Manager
Posted today
Job Viewed
Job Description
GENERAL DESCRIPTION OF THE JOB:
The
Systems Manage
r is responsible for overseeing the stability, security, and efficiency of NAQUA's IT Information Systems, ensuring seamless operations across corporate offices, remote sites, cold stores, retail locations, and work-from-home environments. This role involves managing a large-scale hybrid IT environment, including
Windows and Linux systems, Active Directory, Azure Hybrid Cloud, Microsoft 365, networking (UBNT), CCTV, IoT solutions, and enterprise security system
s
.
DETAILED RESPONSIBILITIESIT
Systems Manageme
nt
- Manage the lifecycle of IT Information Systems assets such as the hardware, the OS, peripherals and related components by ensuring continuous operation backed by expert maintenance support and agreements.
- Management o
f Windows Server environmen
ts, includin
g Active Directory (AD), DNS, DHCP, and Group Poli
cy. - Management o
f Azure Hybrid Cloud integrati
on, ensuring optimal performance and cost efficiency. - Overse
e Microsoft 365 servic
es, includin
g Exchange Hybrid, SharePoint Online, Teams, and OneDri
ve. - Management of Disaster Recovery processes and requirements.
- Management o
f file servers, backups, and disaster recovery solutio
ns to ensure business continuit
y.
Security & Compliance
- Ensure IT security policies and controls are enforced across all Information Systems in all locations including remote and work-from-home.
- Ensure the security and reliability o
f CCTV, IoT devices, and access control syste
ms.
Immediately respond to any incidents, breaches and vulnerabilities detected or reported and ensure coordination with IT management until the incident is resolved and closed.
Cloud & Hybrid Systems Administration
- Manag
e cloud servic
es, including virtual machines, storage, and identity management. - Manage Exchange Hybrid deploymen
ts, ensuring seamless email synchronization and security. - Manag
e SharePoint Online and cloud collaboration too
ls for operational efficiency.
Team Leadership & Vendor Coordination
- Lead and mentor a team of IT professionals, ensuring effective support and system administration.
- Coordinate wit
h external vendors, service providers, and IT contracto
rs for system upgrades and maintenance. - Participate i
n IT budgets, procurement, and asset lifecycle (hardware/software) procedur
es.
Team Leadership & Vendor Coordination.
- Lead and mentor a team of IT professionals, ensuring effective support and system administration.
- Coordinate wit
h external vendors, service providers, and IT contracto
rs for system upgrades and maintenance - Participate i
n IT budgets, procurement, and asset lifecycle (hardware/software) procedures
.
Educat
ion: Bachelor's degree in IT, Computer Science, or related field
(Master's preferred)
Knowledge:
- Knowledge in ISO27001controls
- Knowledge in Saudi Cybersecurity Framework (NCA)
- Windows environments (AD, DNS, DHCP, GPO).
- Deep expertise in Microsoft 365, Azure, Exchange Hybrid, and SharePoint.
- Experience with CCTV, IoT systems, and enterprise security tools.
- Certifications such as Microsoft Certified: Azure Administrator, MCSE, CISSP, or CCNP are a plus.
- Ability to work in a fast-paced, 24/7 agricultural and retail environment.
Information Security Control Associate Manager
Posted 7 days ago
Job Viewed
Job Description
Information Security Control Associate Manager Information Security Control Associate Manager
Get AI-powered advice on this job and more exclusive features.
Job Brief:To implement an organization’s internal control system through administering training and ensure employees have an intricate understanding of all internal control guidelines and standards. To conduct regular audits to verify whether departments follow the established procedures.
Responsibilities:
- To prepare and implement quality assurance policies and procedures and performe routine inspections and quality tests on security controls.
- To document quality assurance activities and creating audit reports.
- To identify and resolve workflow and production issues on security controls in alignment with IT Security department.
- To evaluate information security and associated risk exposures
- To create training materials and operating manuals for security controls function.
- To ensure standards and safety regulations are observed on continuous basis.
- Conduct a quarterly check on security controls and their status in terms of product versions, and agent version and coordinating with IT Security team to remediate issues raised.
- Preform compliance check on security controls efficiently and in proper manner.
- Conducting VA-PT exercises as per approved plan and communicate VA-PT results to stakeholders, and creating a master sheet to cater for all identified issues.
- Evaluate the organization’s readiness in case of business interruption.
- Review Capex project briefs and compliance with procedures.
- Checking the asset disposal bidding process.
- Prepare the required Information Security Control reports for tracking all related activities and to ensure all are well-documented and in a timely and quality manner.
- Maintain the confidentiality of information that they have access to or came across during their employment at EMKAN.
- Address and discuss any issues and proposed solutions with superiors.
- Adherence to all regulations and control function within the company in order to ensure that governance, Audit, risk and compliance matters are carried out.
- Fully adherence to the cybersecurity policies, processes, standards and regulations.
Qualification and Experience:
- Bachelor's degree in business administration or a technology-related field required.
- 5-6 years in information security, Compliance, IT management, and Network control.
- Seniority level Not Applicable
- Employment type Full-time
- Job function Management, Consulting, and Other
- Industries Financial Services, Banking, and Investment Banking
Get notified about new Information Security Manager jobs in Riyadh, Saudi Arabia .
Manager - Cybersecurity Compliance Management Senior Manager - GRC Cybersecurity (Security Compliance) Manager - Cybersecurity Risk Management (COR322) Senior Vulnerability and Patch Management Consultant (RE) Senior Specialist - Cybersecurity Compliance ManagementWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrInformation Security Control Associate Manager
Posted today
Job Viewed
Job Description
Job Brief:To implement an organization's internal control system through administering training and ensure employees have an intricate understanding of all internal control guidelines and standards. To conduct regular audits to verify whether departments follow the established procedures.
Responsibilities:
- To prepare and implement quality assurance policies and procedures and performe routine inspections and quality tests on security controls.
- To document quality assurance activities and creating audit reports.
- To identify and resolve workflow and production issues on security controls in alignment with IT Security department.
- To evaluate information security and associated risk exposures
- To create training materials and operating manuals for security controls function.
- To ensure standards and safety regulations are observed on continuous basis.
- Conduct a quarterly check on security controls and their status in terms of product versions, and agent version and coordinating with IT Security team to remediate issues raised.
- Preform compliance check on security controls efficiently and in proper manner.
- Conducting VA-PT exercises as per approved plan and communicate VA-PT results to stakeholders, and creating a master sheet to cater for all identified issues.
- Evaluate the organization's readiness in case of business interruption.
- Review Capex project briefs and compliance with procedures.
- Checking the asset disposal bidding process.
- Prepare the required Information Security Control reports for tracking all related activities and to ensure all are well-documented and in a timely and quality manner.
- Maintain the confidentiality of information that they have access to or came across during their employment at EMKAN.
- Address and discuss any issues and proposed solutions with superiors.
- Adherence to all regulations and control function within the company in order to ensure that governance, Audit, risk and compliance matters are carried out.
- Fully adherence to the cybersecurity policies, processes, standards and regulations.
Qualification and Experience:
- Bachelor's degree in business administration or a technology-related field required.
- 5-6 years in information security, Compliance, IT management, and Network control.
Senior Manager - Information Security
Posted 2 days ago
Job Viewed
Job Description
Overview
Be a part of a well-established financial services organisation in Jeddah. Handle all matters related to information security architecture and engineering.
The Successful ApplicantThe Senior Manager - Information Security will be / have :
- A Bachelor's or Master's degree in Information Technology, Computer Science or other relevant fields of study
- 6+ years of experience in Information Security, ideally within the Banking / Financial Services sector
- Expertise in information security architecture and engineering
- Strong understanding of Information Security frameworks such as ISO2700
- Relevant certifications such as CISSP, CISM, CCISO, etc. would be preferred
- Excellent knowledge of Saudi regulatory requirements (SAMA, NCA, etc.)
- Track record in designing secure systems and leading cyber security initiatives
- Strong project management skills
- Support the CISO in developing and executing the information security strategy and roadmap
- Contribute to long term planning and act as a key advisor on technical risks
- Serve as acting CISO as and when required
- Evaluate and recommend security technologies, tools and methodology ensure the organisation complies with SAMA cybersecurity framework and NCA
- Lead technical input for audits and regularities reviews
- Oversee security monitoring, threat and vulnerability management activities
- Lead incident response efforts
- Collaborate with IT, compliance, audit and other business unit
- Report Information Security KPIs and metrics to executive management
- Represent the Information Security function internally and externally as require
The salary for the Senior Manager - Information Security role will be based on experience.
ContactAniket Deo
Quote job ref
JN-
#J-18808-LjbffrBe The First To Know
About the latest Information security manager Jobs in Saudi Arabia !
Data Protection Consultant
Posted 2 days ago
Job Viewed
Job Description
Overview
The role involves data analysis using Oracle Primavera Unifier with construction experience, requiring knowledge of related software.
Responsibilities- Develop and enforce data security procedures, manage access controls, ensure data privacy compliance, and implement data governance frameworks with strong analytical skills.
- Oversee BIM execution plans, manage software integration, and recommend upgrades; requires a degree in Architecture or Engineering and creative problem-solving skills.
- Collaborate with technical teams on exploration programs, develop methodologies, mentor geologists, and manage projects in mineral exploration and data management.
- Collaborate with technical teams to enhance exploration, conduct structural analysis, and mentor geologists while utilizing GIS and data management skills.
- Develop and manage GIS databases, perform spatial analysis, and provide technical support while ensuring data quality and compliance with policies.
- Conduct in-depth HR data analysis, develop dashboards, ensure data integrity, and communicate insights using tools like Power BI and Excel.
- Responsible for project execution, performance measurement, risk management, and stakeholder communication, requiring strong problem-solving and organizational skills.
- The role involves client relationship management, sales opportunity identification, industry survey promotion, and training in compensation planning tools.
- Responsible for developing data governance policies, ensuring compliance with cybersecurity standards, and providing strategic guidance on data protection and risk management.
- Manage data privacy projects, ensure compliance with regulations, assess risks, and communicate effectively with stakeholders while implementing data protection technologies.
- Design and execute ETL processes, optimize SQL queries, ensure data quality, and collaborate with stakeholders for scalable data solutions.
- Design, develop, and implement ETL processes using Informatica tools, ensuring data quality and integrity while collaborating with stakeholders.
- The role involves designing ETL processes, managing data infrastructure, and collaborating with teams, requiring strong SQL, programming, and problem-solving skills.
- Architect and manage data solutions, build scalable data pipelines in Google Cloud, and ensure data accessibility and quality for analytical needs.
- Design and maintain spatial data pipelines, perform GIS analysis using ArcGIS and QGIS, and require strong Python scripting and spatial database skills.
- Responsible for data preparation, modeling, and predictive analytics using Python, machine learning, and ETL; requires strong analytical and software development skills.
- Design and optimize scalable data pipelines for real-time analytics using ClickHouse, Apache Kafka, and cloud platforms, ensuring data quality and performance.
- Seeking a candidate with expertise in data governance tools, strong communication skills, and familiarity with national data strategies and frameworks.
- The role involves developing data governance frameworks, ensuring compliance, and collaborating with stakeholders to manage data quality and security effectively.
- The role involves designing and maintaining data pipelines, ensuring data quality, and collaborating with teams, requiring proficiency in SQL, Python, and cloud platforms.
- The role requires a Senior SAP Data Engineer with GCP knowledge and an active visa for Dhahran, US, or UK.
- Seeking a skilled Data Engineer with expertise in Unix shell scripting, log analysis, and data restoration, exhibiting strong communication and analytical skills.
- Responsible for defining data architecture frameworks, translating business requirements into technical specifications, and collaborating with stakeholders to deliver data solut.
- The role involves designing GIS architecture using Esri technologies, developing spatial data models, and integrating systems for smart city projects.
- The role involves designing data models, ensuring data governance, collaborating on data solutions, and maintaining data security and compliance.
- Define data architecture strategies, develop data models, ensure data quality, and comply with TOGAF and NORA frameworks while collaborating with stakeholders.
- Lead the design and governance of smart city data ecosystems, ensuring data accessibility, security, and compliance while promoting a data-driven culture.
- Lead design and governance of smart city data ecosystems, ensuring data accessibility, security, and compliance while promoting a data-driven culture.
- Lead data management activities, ensure data accuracy, develop governance processes, and implement policies while possessing a degree in Data Science or Analytics.
- Degree in Architecture or Engineering (as indicated in responsibilities).
- Strong analytical skills, data governance and cybersecurity awareness.
- Experience with GIS (ArcGIS, QGIS) and spatial data management; Python scripting; SQL.
- Experience with ETL design and data integration (Informatica and other tools); cloud platform familiarity (e.g., Google Cloud).
- Knowledge of data privacy, governance frameworks, and regulatory compliance.
- Ability to collaborate with multidisciplinary teams and communicate data-driven insights to stakeholders.
Content originally included boilerplate job-welcome and location prompts which have been removed for clarity and relevance.
#J-18808-LjbffrData Protection Consultant
Posted 10 days ago
Job Viewed
Job Description
” The Job Description”
- Implement the requirements of the Personal Data Protection Law and its executive regulations.
- Develop and update data protection policies and procedures in accordance with national regulations.
- Assess the current state of data governance and provide appropriate recommendations.
- Raise awareness of data protection within the organization through workshops and training programs.
- Monitor compliance and submit periodic reports on actions taken and any violations identified.
- Maintain continuous coordination with the National Data Management Office and relevant regulatory bodies.
- Stay updated on legal and regulatory developments in data protection and update policies accordingly.
Requirements:
- Bachelor’s or Master’s degree in Information Systems, Cybersecurity, Law, or a related field.
- A minimum of 10 years of practical experience in data protection, privacy, or information security.
- Advanced knowledge of Saudi data protection laws, particularly the Personal Data Protection Law.
- Professional certifications in the field such as CIPP, CIPM, ISO 27701, or equivalent.
- Strong communication skills and the ability to provide high-level advisory services.
- Proficiency in Arabic (written and spoken); English is a plus.
Data Protection Officer
Posted 14 days ago
Job Viewed
Job Description
Overview
- Develop and implement data privacy policies, procedures, and controls to ensure compliance with global privacy regulations including GDPR, CCPA, and automotive-specific standards.
- Conduct privacy impact assessments for new initiatives, systems, and connected vehicle technologies that process personal data.
- Coordinate responses to data subject requests, ensuring timely fulfillment of rights to access, deletion, and portability of personal information.
- Provide privacy training and guidance to employees on handling personal data across business functions, with emphasis on customer data and connected vehicle telemetry.
- Manage privacy incident response procedures, cooperating with security teams to ensure appropriate breach notification and remediation activities.
- Technical/Professional Knowledge and Skills
- Communication
- Quality Orientation
- Building Positive Working Relationships
- Innovation