29 National Cybersecurity Center jobs in Saudi Arabia

(Saudi National Required) Cybersecurity Consultant

Riyadh, Riyadh NetWitness

Posted 26 days ago

Job Viewed

Tap Again To Close

Job Description

(Saudi National Required) Cybersecurity Consultant (Saudi National Required) Cybersecurity Consultant

At NetWitness , we empower organizations to detect, respond to, and neutralize cyber threats in real time. Our cutting-edge security solutions provide deep visibility, advanced threat intelligence, and rapid incident response capabilities to help businesses stay ahead of evolving cyber threats.

We are looking for a Resident Security Consultant to work on-site with our clients, providing expert guidance on cybersecurity best practices, incident response, and threat intelligence. In this role, you will leverage NetWitness technology to assess vulnerabilities, enhance security postures, and deliver hands-on support to protect critical assets. If you have a passion for cybersecurity and thrive in a customer-facing role, we’d love to hear from you!

We are looking for someone who has or knows the following:

  • Knowledge of IT and Networking Systems: Understanding of various IT and networking technologies is crucial.
  • Security Assessment and Audit: Ability to conduct security assessments and audits to identify vulnerabilities.
  • Vulnerability Management: Knowledge of vulnerability management processes and tools.
  • Incident Response: Familiarity with incident response procedures and methodologies
  • Threat Intelligence: Understanding of current cyber threats and attack vectors.
  • Security Technologies: Knowledge of various security technologies, such as firewalls, intrusion detection systems, and endpoint security solutions
  • Outsourcing Experience: Having previously faced customers/clients in providing advise and counsel on cybersecurity strategies and vulnerability risks
  • Programming Skills: Some roles may require basic programming or scripting skills
  • Cloud Security: Knowledge of on premise and cloud security principles and technologies
  • Soft Skills: Direct customer interaction and conflict management as well as presentation skills

Requirements:

  • Bachelor's Degree (preferred): A bachelor's degree in computer science, information security, or a related field is often preferred, though some roles may accept equivalent experience or certifications.
  • Industry Certifications: Certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Security+ are highly valued.
  • Experience: Prior experience in IT, networking, security roles, or related fields can be beneficial.
Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Computer and Network Security

Referrals increase your chances of interviewing at NetWitness by 2x

Get notified about new Cyber Security Consultant jobs in Riyadh, Saudi Arabia .

Cybersecurity Risk Management Specialist

Riyadh, Riyadh, Saudi Arabia 11 hours ago

Senior Internal Auditor IT & Cybersecurity Cyber Security Consultant - Saudi Region Cybersecurity Governance, Risk and Compliance Manager Cybersecurity Governance & Compliance Officer "GRC" Cyber Security Consultant - Saudi Region Senior Consultant/Manager | Cyber | Talent & Culture Transformation | UAE, KSA, Jordan Cybersecurity Governance, Risk and Compliance (GRC) Officer P-3 - Rome, Italy IT & Cyber Security Senior Sales Account Manager

Riyadh, Riyadh, Saudi Arabia 10 hours ago

Cybersecurity Principal Engineering Consultant Cybersecurity MSS (Managed Security Services) Presales Consultant Cybersecurity Risk and Compliance Manager/Lead Professional Services Consultant - Riyadh Senior Consultant/Manager | Cyber | Extended Enterprise | UAE, KSA, Jordan

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

(Saudi National Required) Cybersecurity Consultant

Riyadh, Riyadh NetWitness

Posted 25 days ago

Job Viewed

Tap Again To Close

Job Description

(Saudi National Required) Cybersecurity Consultant (Saudi National Required) Cybersecurity Consultant

At NetWitness , we empower organizations to detect, respond to, and neutralize cyber threats in real time. Our cutting-edge security solutions provide deep visibility, advanced threat intelligence, and rapid incident response capabilities to help businesses stay ahead of evolving cyber threats.

We are looking for a Resident Security Consultant to work on-site with our clients, providing expert guidance on cybersecurity best practices, incident response, and threat intelligence. In this role, you will leverage NetWitness technology to assess vulnerabilities, enhance security postures, and deliver hands-on support to protect critical assets. If you have a passion for cybersecurity and thrive in a customer-facing role, we'd love to hear from you!

We are looking for someone who has or knows the following:

  • Knowledge of IT and Networking Systems: Understanding of various IT and networking technologies is crucial.
  • Security Assessment and Audit: Ability to conduct security assessments and audits to identify vulnerabilities.
  • Vulnerability Management: Knowledge of vulnerability management processes and tools.
  • Incident Response: Familiarity with incident response procedures and methodologies
  • Threat Intelligence: Understanding of current cyber threats and attack vectors.
  • Security Technologies: Knowledge of various security technologies, such as firewalls, intrusion detection systems, and endpoint security solutions
  • Outsourcing Experience: Having previously faced customers/clients in providing advise and counsel on cybersecurity strategies and vulnerability risks
  • Programming Skills: Some roles may require basic programming or scripting skills
  • Cloud Security: Knowledge of on premise and cloud security principles and technologies
  • Soft Skills: Direct customer interaction and conflict management as well as presentation skills

Requirements:

  • Bachelor's Degree (preferred): A bachelor's degree in computer science, information security, or a related field is often preferred, though some roles may accept equivalent experience or certifications.
  • Industry Certifications: Certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Security+ are highly valued.
  • Experience: Prior experience in IT, networking, security roles, or related fields can be beneficial.
Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Computer and Network Security

Referrals increase your chances of interviewing at NetWitness by 2x

Get notified about new Cyber Security Consultant jobs in Riyadh, Saudi Arabia .

Cybersecurity Risk Management Specialist

Riyadh, Riyadh, Saudi Arabia 11 hours ago

Senior Internal Auditor IT & Cybersecurity Cyber Security Consultant - Saudi Region Cybersecurity Governance, Risk and Compliance Manager Cybersecurity Governance & Compliance Officer "GRC" Cyber Security Consultant - Saudi Region Senior Consultant/Manager Cyber Talent & Culture Transformation UAE, KSA, Jordan Cybersecurity Governance, Risk and Compliance (GRC) Officer P-3 - Rome, Italy IT & Cyber Security Senior Sales Account Manager

Riyadh, Riyadh, Saudi Arabia 10 hours ago

Cybersecurity Principal Engineering Consultant Cybersecurity MSS (Managed Security Services) Presales Consultant Cybersecurity Risk and Compliance Manager/Lead Professional Services Consultant - Riyadh Senior Consultant/Manager Cyber Extended Enterprise UAE, KSA, Jordan

We're unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

This advertiser has chosen not to accept applicants from your region.

Cybersecurity Auditor (KSA National)

Riyadh, Riyadh Specialized Technical Services

Posted 12 days ago

Job Viewed

Tap Again To Close

Job Description

Designs, performs and manages cybersecurity audits to assess an organization s compliance with applicable requirements, policies, standards and controls. Prepares audit reports and communicates them to authorized parties.

Duties and Responsibilities:

  • Maintain a deployable cyber defense audit toolkit based on industry best practice to support cyber defense audits. Perform system administration on specialized cybersecurity applications and systems.
  • Perform risk analysis whenever an application or system undergoes a major change. Prepare cybersecurity assessment and audit reports that identify technical and procedural findings, and include recommended remediation strategies and solutions.
  • Track audit findings and recommendations to ensure that appropriate mitigation actions are taken. Effectively manage vulnerability remediation. Ensure an audit log of evidence of security measures is maintained. Review, conduct, or participate in audits of cyber programs and projects.
  • Maintain knowledge of applicable cybersecurity defense policies, regulations and compliance documents as they pertain to cybersecurity defense auditing.
  • Carry out an audit of application software/network/system security against documented cybersecurity policies and provide recommendations for remediation where gaps appear.
  • Develop cybersecurity compliance processes and audits for services provided by third parties.
  • Regularly review and ensure that cybersecurity policies and related documentation are aligned with the organization's stated business objectives and strategy.
  • Ensure that security design and cybersecurity development activities are appropriately documented.
  • Ensure that cybersecurity audits test all relevant aspects of the organization's infrastructure and policy compliance.
  • Develop processes with any external auditors on information sharing in a secure manner.

Desired Candidate Profile

Skills

  • Skill in applying core cybersecurity principles.
  • Skill in determining the normal operational state for security systems and how that state is affected by change.
  • Skill in effectively recognizing and categorizing types of vulnerabilities and associated attacks.
  • Skill in conducting cybersecurity audits or reviews of technical systems.
  • Skill in designing appropriate cybersecurity test plans.
  • Skill in assessing security controls based on cybersecurity principles and tenets.
  • Skill in using security event correlation tools effectively.
  • Skill in using code analysis tools effectively.
  • Skill in effectively performing root cause analysis for cybersecurity issues.
  • Skill in effectively preparing and presenting briefings in a clear and concise manner.
  • Skill in utilizing feedback to improve cybersecurity processes, products and services.
  • Skill in determining the security control requirements of information systems and networks.
  • Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance as necessary.
  • Skill in applying appropriate cybersecurity controls.
  • Skill in identifying test and evaluation infrastructure requirements.
  • Skill in communicating with customers.
  • Skill in managing test assets and resources to ensure effective completion of test events.
  • Skill in preparing test and evaluation reports. Skill in reviewing logs to identify evidence of intrusions and other suspicious behavior.
  • Skill in troubleshooting and diagnosing cybersecurity defense infrastructure anomalies and determining the root cause.
  • Skill in using HR IT systems.
  • Skill in conducting cybersecurity reviews of systems.
  • Skill in understanding network systems management principles, models, methods and tools.

Needed Knowledge:

  • Knowledge of network components, their operation and appropriate network security controls and methods.
  • Knowledge and understanding of risk assessment, mitigation and management methods.
  • Knowledge of relevant cybersecurity aspects of legislative and regulatory requirements, relating to ethics and privacy. Knowledge of the principles of cybersecurity and privacy
  • Knowledge of cybersecurity related threats and vulnerabilities.
  • Knowledge of the likely operational impact on an organization of cybersecurity breaches.
  • Knowledge of cybersecurity authentication, authorization and access control methods.
  • Knowledge of business practices within organizations.
  • Knowledge of cybersecurity defense and vulnerability assessment tools and their capabilities.
  • Knowledge of cybersecurity aspects of business continuity and disaster recovery planning and including testing.
  • Knowledge of the organization's enterprise cybersecurity architecture.
  • Knowledge of cybersecurity assessment and authorization processes.
  • Knowledge of cybersecurity and privacy principles and organizational requirements.
  • Knowledge of IT security principles and methods.
  • Knowledge of all aspects of system lifecycle management.
  • Knowledge of the national cybersecurity regulations and requirements relevant to the organization.
  • Knowledge of the organization's core business processes and how cybersecurity affects them.
  • Knowledge of organizational process improvement concepts and process maturity models.
  • Knowledge of an organization's cybersecurity data classification requirement.
  • Knowledge of the principal methods, procedures and techniques for gathering, producing, reporting and sharing cybersecurity information.
  • Knowledge of the organization's evaluation and validation requirements in relation to cybersecurity risk management.
  • Knowledge of the organization's local and wide area network connections and the risks they pose to its cybersecurity.
  • Knowledge of best practices for reviewing and determining the suitability of technology solutions to meet cybersecurity requirements.
  • Knowledge of all-source reporting and appropriate dissemination procedures.
  • Knowledge of best practice auditing and logging procedures.
  • Knowledge of formats and best practice for issuing cybersecurity compliance reports to external partners.
  • Knowledge of the organization's formats for management and compliance reporting relating to cybersecurity risks, readiness and progress against plans.
  • Knowledge of national and organizational document and information classification and marking standards, policies and procedures.

Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at

People Looking for Auditor Jobs also searched #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Specialist - Saudi National

Riyadh, Riyadh 21ck IT

Posted 20 days ago

Job Viewed

Tap Again To Close

Job Description

Cybersecurity Specialist - Saudi National

Job Title: Cybersecurity Specialist

Contract Type: Full-Time

  • Bachelor’s degree in Cybersecurity or a related field from a recognized Saudi university.
  • 1–3 years of practical experience in cybersecurity or information security.
  • Familiarity with international standards and frameworks such as ISO 27001 and NIST Cybersecurity Framework .
  • Knowledge of network security tools and incident management processes.
Key Responsibilities:
  • Monitor and analyze security threats across systems and networks.
  • Implement cybersecurity policies and procedures, ensuring compliance.
  • Participate in vulnerability assessments and penetration testing activities.
  • Respond to and document security incidents.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Specialist - Saudi National

Riyadh, Riyadh 21ck IT

Posted today

Job Viewed

Tap Again To Close

Job Description

Cybersecurity Specialist - Saudi National

Job Title: Cybersecurity Specialist

Contract Type: Full-Time

  • Bachelor’s degree in Cybersecurity or a related field from a recognized Saudi university.
  • 1–3 years of practical experience in cybersecurity or information security.
  • Familiarity with international standards and frameworks such as ISO 27001 and NIST Cybersecurity Framework .
  • Knowledge of network security tools and incident management processes.
Key Responsibilities:
  • Monitor and analyze security threats across systems and networks.
  • Implement cybersecurity policies and procedures, ensuring compliance.
  • Participate in vulnerability assessments and penetration testing activities.
  • Respond to and document security incidents.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Operations Manager (KSA National)

Riyadh, Riyadh Stsarabia

Posted 24 days ago

Job Viewed

Tap Again To Close

Job Description

Our Culture:

At Zaintech we are proud of our culture and how it drives everything we do. We are looking for individuals who share our values and want to be part of a unique and engaging culture that revolves around collaboration and innovation. If you are looking for a role where you can drive engagement and excellence across teams through commitment and collaboration, and are someone who is customer-centric and appreciates an organization with uncompromised integrity that focuses on employee engagement then read on to learn more about how you can become part of the Zaintech family.

Our Code of Conduct:

At Zaintech we strictly adhere to our code of conduct, which is there to serve as a moral compass, offering a framework for responsible behaviours and enabling ethical choices that cultivate positive relationships and a better future. It also outlines policies, standards, and procedures for our global operations, promoting integrity and ethical excellence across the countries we engage with.

Every year, all employees are required to review, comprehend, confirm, and adhere to the code of conduct. Additionally, all newly hired employees are subject to the same as part of their onboarding process.

Role Summary

The Cybersecurity Operations Manager is responsible for the organisation’s 24×7 Security Operations Centre (SOC) in the Kingdom of Saudi Arabia. Reporting to the Cyber Security Manager (KSA)—with functional alignment to the Regional CISO and Cyber Governance Office—the role drives continuous improvement of SOC capabilities, communicates operational risk and performance metrics to senior leadership, and champions a culture of security across the enterprise.

In addition to provide high-level security guidance and approving architecture decisions to ensure all new solutions align with regional standards, zero-trust principles, and Saudi NCA ECC/CCC controls.

Duties and Responsibilities:

  • Maintain a resilient 24×7 SOC that meets agreed service-level objectives for mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR).
  • Ensure full compliance with Saudi national cybersecurity regulations (NCA ECC/CCC) and other applicable legislation and standards (ISO27001, PCI-DSS, etc.).
  • Optimise cybersecurity budget and resources to balance risk reduction with business value.
  • Develop and retain talent, building a high-performing cybersecurity-operations team with clearly defined career paths.
  • Embed secure-by-design architecture governance, guaranteeing that material technology changes and projects pass security-design review and conform to the enterprise reference architecture.

Key Responsibilities

Responsibilities are grouped for clarity; operations remain the primary focus, with architecture covered in a dedicated secondary section.

Leadership & Strategy

  • Lead the 24×7 SOC in KSA, ensuring effective monitoring, detection, triage, analysis, containment, eradication and recovery from cybersecurity incidents.
  • Develop, communicate and periodically review SOC strategy, policies and procedures to align with organisational objectives and the cybersecurity strategy.
  • Advocate cybersecurity topics with senior management, ensuring strategic goals include robust cyber-defence capabilities.
  • Obtain and manage resources (people, technology, budget) to achieve strategic cybersecurity goals.
  • Maintain knowledge of emerging threats, technologies and regulatory changes impacting the SOC.

Risk Governance & Compliance

  • Ensure cybersecurity risks identified by SOC monitoring are logged, assessed and treated through the organisation’s risk-governance process.
  • Track audit findings and recommendations, ensuring timely mitigation.
  • Collaborate with stakeholders to integrate cybersecurity requirements into business continuity (BCP) and disaster-recovery (DR) programmes.
  • Periodically review cybersecurity strategy, policies and related documents for compliance with Saudi NCA regulations, UAE IASv2 (where relevant) and other applicable standards.

SOC Operations & Incident Response

  • Direct daily SOC operations, validating that protection, detection and response capabilities are operating as designed.
  • Coordinate cybersecurity inspections, tests, and red-team / purple-team exercises.
  • Serve as escalation point and executive liaison during major incidents, ensuring effective communication with internal stakeholders and third parties.
  • Oversee incident post-mortems, root-cause analysis and continuous-improvement actions.
  • Ensure accurate, timely operational and management reporting (KPIs, KRIs, compliance dashboards, executive summaries).

Threat & Vulnerability Management

  • Maintain robust vulnerability identification, prioritisation and remediation processes; track remediation metrics.
  • Oversee threat-intelligence collection, analysis and operational use.
  • Evaluate new technologies, tools and upgrades, approving cybersecurity capabilities before adoption.
  • Ensure supply-chain and third-party cybersecurity risks are identified and managed, especially in mergers, acquisitions and outsourcing.

Security Architecture

  • Conduct security-architecture gap assessments and maintain the cybersecurity reference architecture for on-prem, cloud, and OT environments.
  • Contribute to the Cyber Security Steering committee, approving or rejecting architectural decisions for new systems, integrations and major cloud migrations.
  • Define and maintain secure-configuration baselines (e.g., CIS) and champion infrastructure-as-code patterns that enforce them.
  • Provide security input to procurement specifications and evaluate vendor architectures during RFPs.
  • Translate business and regulatory requirements into technical security controls, ensuring alignment with zero-trust principles and regional governance standards.

Training, Awareness & Talent Management

  • Ensure regular cybersecurity awareness and role-based training for all staff.
  • Develop SOC-analyst competency frameworks and certification paths (e.g., GSEC, GCIA, GCIH, GCFE).
  • Mentor, coach and evaluate team members; foster a culture of knowledge-sharing and continuous learning.

1.Minimum Qualification and certifications

  • Education: Bachelor’s in Computer Science, Information Security or related field (Master’s preferred).
  • Experience: 8+years in cybersecurity with at least 3years managing SOC or security-operations teams; exposure to security-architecture or design-review boards is highly desirable.
  • Certifications (preferred): CISSP, CISM, CCSP, GCIH, GCIA, TOGAF.
  • Language: Fluent English and Arabic.

2.Skills and knowledge

Operations-focused knowledge remains unchanged (network security, incident response, risk, compliance, cloud, cryptography). Additional architecture-specific competencies include: secure-configuration management, security-design methodologies, enterprise architecture frameworks, security-design trade-off analysis, and evaluation of emerging technologies.

  • Develop and maintain policies reflecting business and cybersecurity strategic objectives.
  • Evaluate vendor solutions, negotiate agreements, and manage MSSP relationships.
  • Lead multidisciplinary teams in a high-pressure, 24×7 environment.
  • Design countermeasures to identified architectural security risks and translate operational needs into protection requirements.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Operations Manager (KSA National)

Riyadh, Riyadh Stsarabia

Posted today

Job Viewed

Tap Again To Close

Job Description

Our Culture:

At Zaintech we are proud of our culture and how it drives everything we do. We are looking for individuals who share our values and want to be part of a unique and engaging culture that revolves around collaboration and innovation. If you are looking for a role where you can drive engagement and excellence across teams through commitment and collaboration, and are someone who is customer-centric and appreciates an organization with uncompromised integrity that focuses on employee engagement then read on to learn more about how you can become part of the Zaintech family.

Our Code of Conduct:

At Zaintech we strictly adhere to our code of conduct, which is there to serve as a moral compass, offering a framework for responsible behaviours and enabling ethical choices that cultivate positive relationships and a better future. It also outlines policies, standards, and procedures for our global operations, promoting integrity and ethical excellence across the countries we engage with.

Every year, all employees are required to review, comprehend, confirm, and adhere to the code of conduct. Additionally, all newly hired employees are subject to the same as part of their onboarding process.

Role Summary

The Cybersecurity Operations Manager is responsible for the organisation’s 24×7 Security Operations Centre (SOC) in the Kingdom of Saudi Arabia. Reporting to the Cyber Security Manager (KSA)—with functional alignment to the Regional CISO and Cyber Governance Office—the role drives continuous improvement of SOC capabilities, communicates operational risk and performance metrics to senior leadership, and champions a culture of security across the enterprise.

In addition to provide high-level security guidance and approving architecture decisions to ensure all new solutions align with regional standards, zero-trust principles, and Saudi NCA ECC/CCC controls.

Duties and Responsibilities:

  • Maintain a resilient 24×7 SOC that meets agreed service-level objectives for mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR).
  • Ensure full compliance with Saudi national cybersecurity regulations (NCA ECC/CCC) and other applicable legislation and standards (ISO27001, PCI-DSS, etc.).
  • Optimise cybersecurity budget and resources to balance risk reduction with business value.
  • Develop and retain talent, building a high-performing cybersecurity-operations team with clearly defined career paths.
  • Embed secure-by-design architecture governance, guaranteeing that material technology changes and projects pass security-design review and conform to the enterprise reference architecture.

Key Responsibilities

Responsibilities are grouped for clarity; operations remain the primary focus, with architecture covered in a dedicated secondary section.

Leadership & Strategy

  • Lead the 24×7 SOC in KSA, ensuring effective monitoring, detection, triage, analysis, containment, eradication and recovery from cybersecurity incidents.
  • Develop, communicate and periodically review SOC strategy, policies and procedures to align with organisational objectives and the cybersecurity strategy.
  • Advocate cybersecurity topics with senior management, ensuring strategic goals include robust cyber-defence capabilities.
  • Obtain and manage resources (people, technology, budget) to achieve strategic cybersecurity goals.
  • Maintain knowledge of emerging threats, technologies and regulatory changes impacting the SOC.

Risk Governance & Compliance

  • Ensure cybersecurity risks identified by SOC monitoring are logged, assessed and treated through the organisation’s risk-governance process.
  • Track audit findings and recommendations, ensuring timely mitigation.
  • Collaborate with stakeholders to integrate cybersecurity requirements into business continuity (BCP) and disaster-recovery (DR) programmes.
  • Periodically review cybersecurity strategy, policies and related documents for compliance with Saudi NCA regulations, UAE IASv2 (where relevant) and other applicable standards.

SOC Operations & Incident Response

  • Direct daily SOC operations, validating that protection, detection and response capabilities are operating as designed.
  • Coordinate cybersecurity inspections, tests, and red-team / purple-team exercises.
  • Serve as escalation point and executive liaison during major incidents, ensuring effective communication with internal stakeholders and third parties.
  • Oversee incident post-mortems, root-cause analysis and continuous-improvement actions.
  • Ensure accurate, timely operational and management reporting (KPIs, KRIs, compliance dashboards, executive summaries).

Threat & Vulnerability Management

  • Maintain robust vulnerability identification, prioritisation and remediation processes; track remediation metrics.
  • Oversee threat-intelligence collection, analysis and operational use.
  • Evaluate new technologies, tools and upgrades, approving cybersecurity capabilities before adoption.
  • Ensure supply-chain and third-party cybersecurity risks are identified and managed, especially in mergers, acquisitions and outsourcing.

Security Architecture

  • Conduct security-architecture gap assessments and maintain the cybersecurity reference architecture for on-prem, cloud, and OT environments.
  • Contribute to the Cyber Security Steering committee, approving or rejecting architectural decisions for new systems, integrations and major cloud migrations.
  • Define and maintain secure-configuration baselines (e.g., CIS) and champion infrastructure-as-code patterns that enforce them.
  • Provide security input to procurement specifications and evaluate vendor architectures during RFPs.
  • Translate business and regulatory requirements into technical security controls, ensuring alignment with zero-trust principles and regional governance standards.

Training, Awareness & Talent Management

  • Ensure regular cybersecurity awareness and role-based training for all staff.
  • Develop SOC-analyst competency frameworks and certification paths (e.g., GSEC, GCIA, GCIH, GCFE).
  • Mentor, coach and evaluate team members; foster a culture of knowledge-sharing and continuous learning.

1.Minimum Qualification and certifications

  • Education: Bachelor’s in Computer Science, Information Security or related field (Master’s preferred).
  • Experience: 8+years in cybersecurity with at least 3years managing SOC or security-operations teams; exposure to security-architecture or design-review boards is highly desirable.
  • Certifications (preferred): CISSP, CISM, CCSP, GCIH, GCIA, TOGAF.
  • Language: Fluent English and Arabic.

2.Skills and knowledge

Operations-focused knowledge remains unchanged (network security, incident response, risk, compliance, cloud, cryptography). Additional architecture-specific competencies include: secure-configuration management, security-design methodologies, enterprise architecture frameworks, security-design trade-off analysis, and evaluation of emerging technologies.

  • Develop and maintain policies reflecting business and cybersecurity strategic objectives.
  • Evaluate vendor solutions, negotiate agreements, and manage MSSP relationships.
  • Lead multidisciplinary teams in a high-pressure, 24×7 environment.
  • Design countermeasures to identified architectural security risks and translate operational needs into protection requirements.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest National cybersecurity center Jobs in Saudi Arabia !

Cybersecurity Operations Manager (KSA National)

Riyadh, Riyadh Specialized Technical Services – STS

Posted today

Job Viewed

Tap Again To Close

Job Description

Our Culture

At Zaintech we are proud of our culture and how it drives everything we do. We are looking for individuals who share our values and want to be part of a unique and engaging culture that revolves around collaboration and innovation. If you are looking for a role where you can drive engagement and excellence across teams through commitment and collaboration, and are someone who is customer-centric and appreciates an organization with uncompromised integrity that focuses on employee engagement then read on to learn more about how you can become part of the Zaintech family.

Our Code of Conduct

At Zaintech we strictly adhere to our code of conduct, which is there to serve as a moral compass, offering a framework for responsible behaviours and enabling ethical choices that cultivate positive relationships and a better future. It also outlines policies, standards, and procedures for our global operations, promoting integrity and ethical excellence across the countries we engage with.

Every year, all employees are required to review, comprehend, confirm, and adhere to the code of conduct. Additionally, all newly hired employees are subject to the same as part of their onboarding process.

Role Summary

The Cybersecurity Operations Manager is responsible for the organisation’s 24×7 Security Operations Centre (SOC) in the Kingdom of Saudi Arabia. Reporting to the Cyber Security Manager (KSA)—with functional alignment to the Regional CISO and Cyber Governance Office—the role drives continuous improvement of SOC capabilities, communicates operational risk and performance metrics to senior leadership, and champions a culture of security across the enterprise.

In addition to provide high-level security guidance and approving architecture decisions to ensure all new solutions align with regional standards, zero-trust principles, and Saudi NCA ECC/CCC controls.

Duties and Responsibilities
  • Maintain a resilient 24×7 SOC that meets agreed service-level objectives for mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR).
  • Ensure full compliance with Saudi national cybersecurity regulations (NCA ECC/CCC) and other applicable legislation and standards (ISO27001, PCI-DSS, etc.).
  • Optimise cybersecurity budget and resources to balance risk reduction with business value.
  • Develop and retain talent, building a high-performing cybersecurity-operations team with clearly defined career paths.
  • Embed secure-by-design architecture governance, guaranteeing that material technology changes and projects pass security-design review and conform to the enterprise reference architecture.
Key Responsibilities

Responsibilities are grouped for clarity; operations remain the primary focus, with architecture covered in a dedicated secondary section.

Leadership & Strategy
  • Lead the 24×7 SOC in KSA, ensuring effective monitoring, detection, triage, analysis, containment, eradication and recovery from cybersecurity incidents.
  • Develop, communicate and periodically review SOC strategy, policies and procedures to align with organisational objectives and the cybersecurity strategy.
  • Advocate cybersecurity topics with senior management, ensuring strategic goals include robust cyber-defence capabilities.
  • Obtain and manage resources (people, technology, budget) to achieve strategic cybersecurity goals.
  • Maintain knowledge of emerging threats, technologies and regulatory changes impacting the SOC.
Risk Governance & Compliance
  • Ensure cybersecurity risks identified by SOC monitoring are logged, assessed and treated through the organisation’s risk-governance process.
  • Track audit findings and recommendations, ensuring timely mitigation.
  • Collaborate with stakeholders to integrate cybersecurity requirements into business continuity (BCP) and disaster-recovery (DR) programmes.
  • Periodically review cybersecurity strategy, policies and related documents for compliance with Saudi NCA regulations, UAE IASv2 (where relevant) and other applicable standards.
SOC Operations & Incident Response
  • Direct daily SOC operations, validating that protection, detection and response capabilities are operating as designed.
  • Coordinate cybersecurity inspections, tests, and red-team / purple-team exercises.
  • Serve as escalation point and executive liaison during major incidents, ensuring effective communication with internal stakeholders and third parties.
  • Oversee incident post-mortems, root-cause analysis and continuous-improvement actions.
  • Ensure accurate, timely operational and management reporting (KPIs, KRIs, compliance dashboards, executive summaries).
Threat & Vulnerability Management
  • Maintain robust vulnerability identification, prioritisation and remediation processes; track remediation metrics.
  • Oversee threat-intelligence collection, analysis and operational use.
  • Evaluate new technologies, tools and upgrades, approving cybersecurity capabilities before adoption.
  • Ensure supply-chain and third-party cybersecurity risks are identified and managed, especially in mergers, acquisitions and outsourcing.
Security Architecture
  • Conduct security-architecture gap assessments and maintain the cybersecurity reference architecture for on-prem, cloud, and OT environments.
  • Contribute to the Cyber Security Steering committee, approving or rejecting architectural decisions for new systems, integrations and major cloud migrations.
  • Define and maintain secure-configuration baselines (e.g., CIS) and champion infrastructure-as-code patterns that enforce them.
  • Provide security input to procurement specifications and evaluate vendor architectures during RFPs.
  • Translate business and regulatory requirements into technical security controls, ensuring alignment with zero-trust principles and regional governance standards.
Training, Awareness & Talent Management
  • Ensure regular cybersecurity awareness and role-based training for all staff.
  • Develop SOC-analyst competency frameworks and certification paths (e.g., GSEC, GCIA, GCIH, GCFE).
  • Mentor, coach and evaluate team members; foster a culture of knowledge-sharing and continuous learning.
Minimum Qualifications and Certifications
  • Education: Bachelor’s in Computer Science, Information Security or related field (Master’s preferred).
  • Experience: 8+ years in cybersecurity with at least 3 years managing SOC or security-operations teams; exposure to security-architecture or design-review boards is highly desirable.
  • Certifications (preferred): CISSP, CISM, CCSP, GCIH, GCIA, TOGAF.
  • Language: Fluent English and Arabic.
Skills and Knowledge

Operations-focused knowledge remains unchanged (network security, incident response, risk, compliance, cloud, cryptography). Additional architecture-specific competencies include: secure-configuration management, security-design methodologies, enterprise architecture frameworks, security-design trade-off analysis, and evaluation of emerging technologies.

  • Develop and maintain policies reflecting business and cybersecurity strategic objectives.
  • Evaluate vendor solutions, negotiate agreements, and manage MSSP relationships.
  • Lead multidisciplinary teams in a high-pressure, 24×7 environment.
  • Design countermeasures to identified architectural security risks and translate operational needs into protection requirements.
#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

Data Center Technician (Saudi National Only)

Amazon

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Description

AWS Infrastructure Services owns the design, planning, delivery, and operation of all AWS global infrastructure. In other words, we’re the people who keep the cloud running. We support all AWS data centers and all of the servers, storage, networking, power, and cooling equipment that ensure our customers have continual access to the innovation they rely on. We work on the most challenging problems, with thousands of variables impacting the supply chain — and we’re looking for talented people who want to help.

You’ll join a diverse team of software, hardware, and network engineers, supply chain specialists, security experts, operations managers, and other vital roles. You’ll collaborate with people across AWS to help us deliver the highest standards for safety and security while providing seemingly infinite capacity at the lowest possible cost for our customers. And you’ll experience an inclusive culture that welcomes bold ideas and empowers you to own them to completion

TWe are looking for Data Center Technicians to join our expanding Infrastructure Operations team. Data Center Technicians are the primary resolver and troubleshoot and solve a range of datacenter infrastructure issues including, but not limited to: hardware, fiber, networking, and related problems. You will be part of the Data Center Operations (DCO) team, overseeing the operation and maintenance of the IT infrastructure and hardware for data centers in AWS Cloud regions. You will become the primary resolver for your support team, and gain troubleshooting skills on different hardware and software cases.

You will be able to troubleshoot and solve most infrastructure issues and engage other appropriate solutions groups on more complex problems to drive solutions.

Key job responsibilities

SAFETY

  • Follow and maintain the highest safety standards and diligently encourage a world-class safety culture. Own the safety initiatives and projects to foster a strong safety culture.

DATA CENTER OPERATIONS (DCO)

This position involves:

  • Diagnosing hardware and network problems followed by physical repairs

  • Troubleshooting events within internal Service Level Agreements (SLAs)

  • Performing root cause analysis of equipment failures

  • Manual handling and lifting of equipment may be required (weight limits in accordance with regulations)

About the team

Diverse Experiences

AWS values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn’t followed a traditional path, or includes alternative experiences, don’t let it stop you from applying.

Why AWS?

Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform. We pioneered cloud computing and never stopped innovating — that’s why customers from the most successful startups to Global 500 companies trust our robust suite of products and services to power their businesses.

Inclusive Team Culture

Here at AWS, it’s in our nature to learn and be curious. Our employee-led affinity groups foster a culture of inclusion that empower us to be proud of our differences. Ongoing events and learning experiences, including our Conversations on Race and Ethnicity (CORE) and AmazeCon (gender diversity) conferences, inspire us to never stop embracing our uniqueness.

Mentorship & Career Growth

We’re continuously raising our performance bar as we strive to become Earth’s Best Employer. That’s why you’ll find endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional.

Work/Life Balance

We value work-life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why we strive for flexibility as part of our working culture. When we feel supported in the workplace and at home, there’s nothing we can’t achieve in the cloud.

Basic Qualifications

  • Bachelor's degree in information technology or computer science

  • Experience with computer hardware troubleshooting and repair

  • Must have Saudi Arabian citizenship

Preferred Qualifications

  • Experience dealing effectively with customers during problem resolution and operating efficiently under pressure

  • Large Scale Data Center experience

Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit for more information. If the country/region you’re applying in isn’t listed, please contact your Recruiting Partner.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Data Center Technician (Saudi National Only)

Riyadh, Riyadh Data Services Saudi Arabia Limited One Person Company (Amazon)

Posted 24 days ago

Job Viewed

Tap Again To Close

Job Description

DESCRIPTION

AWS Infrastructure Services owns the design, planning, delivery, and operation of all AWS global infrastructure. In other words, we’re the people who keep the cloud running. We support all AWS data centers and all of the servers, storage, networking, power, and cooling equipment that ensure our customers have continual access to the innovation they rely on. We work on the most challenging problems, with thousands of variables impacting the supply chain — and we’re looking for talented people who want to help.

You’ll join a diverse team of software, hardware, and network engineers, supply chain specialists, security experts, operations managers, and other vital roles. You’ll collaborate with people across AWS to help us deliver the highest standards for safety and security while providing seemingly infinite capacity at the lowest possible cost for our customers. And you’ll experience an inclusive culture that welcomes bold ideas and empowers you to own them to completion

TWe are looking for Data Center Technicians to join our expanding Infrastructure Operations team. Data Center Technicians are the primary resolver and troubleshoot and solve a range of datacenter infrastructure issues including, but not limited to: hardware, fiber, networking, and related problems. You will be part of the Data Center Operations (DCO) team, overseeing the operation and maintenance of the IT infrastructure and hardware for data centers in AWS Cloud regions. You will become the primary resolver for your support team, and gain troubleshooting skills on different hardware and software cases.

You will be able to troubleshoot and solve most infrastructure issues and engage other appropriate solutions groups on more complex problems to drive solutions.

Key job responsibilities
SAFETY
– Follow and maintain the highest safety standards and diligently encourage a world-class safety culture. Own the safety initiatives and projects to foster a strong safety culture.

DATA CENTER OPERATIONS (DCO)

This position involves:
– Diagnosing hardware and network problems followed by physical repairs
– Troubleshooting events within internal Service Level Agreements (SLAs)
– Performing root cause analysis of equipment failures
– Manual handling and lifting of equipment may be required (weight limits in accordance with regulations)

About the team
Diverse Experiences
AWS values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn’t followed a traditional path, or includes alternative experiences, don’t let it stop you from applying.

Why AWS?
Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform. We pioneered cloud computing and never stopped innovating — that’s why customers from the most successful startups to Global 500 companies trust our robust suite of products and services to power their businesses.

Inclusive Team Culture
Here at AWS, it’s in our nature to learn and be curious. Our employee-led affinity groups foster a culture of inclusion that empower us to be proud of our differences. Ongoing events and learning experiences, including our Conversations on Race and Ethnicity (CORE) and AmazeCon (gender diversity) conferences, inspire us to never stop embracing our uniqueness.

Mentorship & Career Growth
We’re continuously raising our performance bar as we strive to become Earth’s Best Employer. That’s why you’ll find endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional.

Work/Life Balance
We value work-life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why we strive for flexibility as part of our working culture. When we feel supported in the workplace and at home, there’s nothing we can’t achieve in the cloud.

BASIC QUALIFICATIONS

– Bachelor’s degree in information technology or computer science
– Experience with computer hardware troubleshooting and repair
– Must have Saudi Arabian citizenship

PREFERRED QUALIFICATIONS

– Experience dealing effectively with customers during problem resolution and operating efficiently under pressure
– Large Scale Data Center experience

Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit for more information. If the country/region you’re applying in isn’t listed, please contact your Recruiting Partner.

Tagged as: and Support Engineering , IT , operations

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All National Cybersecurity Center Jobs