29 National Cybersecurity Center jobs in Saudi Arabia
(Saudi National Required) Cybersecurity Consultant
Posted 26 days ago
Job Viewed
Job Description
At NetWitness , we empower organizations to detect, respond to, and neutralize cyber threats in real time. Our cutting-edge security solutions provide deep visibility, advanced threat intelligence, and rapid incident response capabilities to help businesses stay ahead of evolving cyber threats.
We are looking for a Resident Security Consultant to work on-site with our clients, providing expert guidance on cybersecurity best practices, incident response, and threat intelligence. In this role, you will leverage NetWitness technology to assess vulnerabilities, enhance security postures, and deliver hands-on support to protect critical assets. If you have a passion for cybersecurity and thrive in a customer-facing role, we’d love to hear from you!
We are looking for someone who has or knows the following:
- Knowledge of IT and Networking Systems: Understanding of various IT and networking technologies is crucial.
- Security Assessment and Audit: Ability to conduct security assessments and audits to identify vulnerabilities.
- Vulnerability Management: Knowledge of vulnerability management processes and tools.
- Incident Response: Familiarity with incident response procedures and methodologies
- Threat Intelligence: Understanding of current cyber threats and attack vectors.
- Security Technologies: Knowledge of various security technologies, such as firewalls, intrusion detection systems, and endpoint security solutions
- Outsourcing Experience: Having previously faced customers/clients in providing advise and counsel on cybersecurity strategies and vulnerability risks
- Programming Skills: Some roles may require basic programming or scripting skills
- Cloud Security: Knowledge of on premise and cloud security principles and technologies
- Soft Skills: Direct customer interaction and conflict management as well as presentation skills
Requirements:
- Bachelor's Degree (preferred): A bachelor's degree in computer science, information security, or a related field is often preferred, though some roles may accept equivalent experience or certifications.
- Industry Certifications: Certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Security+ are highly valued.
- Experience: Prior experience in IT, networking, security roles, or related fields can be beneficial.
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Computer and Network Security
Referrals increase your chances of interviewing at NetWitness by 2x
Get notified about new Cyber Security Consultant jobs in Riyadh, Saudi Arabia .
Cybersecurity Risk Management SpecialistRiyadh, Riyadh, Saudi Arabia 11 hours ago
Senior Internal Auditor IT & Cybersecurity Cyber Security Consultant - Saudi Region Cybersecurity Governance, Risk and Compliance Manager Cybersecurity Governance & Compliance Officer "GRC" Cyber Security Consultant - Saudi Region Senior Consultant/Manager | Cyber | Talent & Culture Transformation | UAE, KSA, Jordan Cybersecurity Governance, Risk and Compliance (GRC) Officer P-3 - Rome, Italy IT & Cyber Security Senior Sales Account ManagerRiyadh, Riyadh, Saudi Arabia 10 hours ago
Cybersecurity Principal Engineering Consultant Cybersecurity MSS (Managed Security Services) Presales Consultant Cybersecurity Risk and Compliance Manager/Lead Professional Services Consultant - Riyadh Senior Consultant/Manager | Cyber | Extended Enterprise | UAE, KSA, JordanWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr(Saudi National Required) Cybersecurity Consultant
Posted 25 days ago
Job Viewed
Job Description
At NetWitness , we empower organizations to detect, respond to, and neutralize cyber threats in real time. Our cutting-edge security solutions provide deep visibility, advanced threat intelligence, and rapid incident response capabilities to help businesses stay ahead of evolving cyber threats.
We are looking for a Resident Security Consultant to work on-site with our clients, providing expert guidance on cybersecurity best practices, incident response, and threat intelligence. In this role, you will leverage NetWitness technology to assess vulnerabilities, enhance security postures, and deliver hands-on support to protect critical assets. If you have a passion for cybersecurity and thrive in a customer-facing role, we'd love to hear from you!
We are looking for someone who has or knows the following:
- Knowledge of IT and Networking Systems: Understanding of various IT and networking technologies is crucial.
- Security Assessment and Audit: Ability to conduct security assessments and audits to identify vulnerabilities.
- Vulnerability Management: Knowledge of vulnerability management processes and tools.
- Incident Response: Familiarity with incident response procedures and methodologies
- Threat Intelligence: Understanding of current cyber threats and attack vectors.
- Security Technologies: Knowledge of various security technologies, such as firewalls, intrusion detection systems, and endpoint security solutions
- Outsourcing Experience: Having previously faced customers/clients in providing advise and counsel on cybersecurity strategies and vulnerability risks
- Programming Skills: Some roles may require basic programming or scripting skills
- Cloud Security: Knowledge of on premise and cloud security principles and technologies
- Soft Skills: Direct customer interaction and conflict management as well as presentation skills
Requirements:
- Bachelor's Degree (preferred): A bachelor's degree in computer science, information security, or a related field is often preferred, though some roles may accept equivalent experience or certifications.
- Industry Certifications: Certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Security+ are highly valued.
- Experience: Prior experience in IT, networking, security roles, or related fields can be beneficial.
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Computer and Network Security
Referrals increase your chances of interviewing at NetWitness by 2x
Get notified about new Cyber Security Consultant jobs in Riyadh, Saudi Arabia .
Cybersecurity Risk Management SpecialistRiyadh, Riyadh, Saudi Arabia 11 hours ago
Senior Internal Auditor IT & Cybersecurity Cyber Security Consultant - Saudi Region Cybersecurity Governance, Risk and Compliance Manager Cybersecurity Governance & Compliance Officer "GRC" Cyber Security Consultant - Saudi Region Senior Consultant/Manager Cyber Talent & Culture Transformation UAE, KSA, Jordan Cybersecurity Governance, Risk and Compliance (GRC) Officer P-3 - Rome, Italy IT & Cyber Security Senior Sales Account ManagerRiyadh, Riyadh, Saudi Arabia 10 hours ago
Cybersecurity Principal Engineering Consultant Cybersecurity MSS (Managed Security Services) Presales Consultant Cybersecurity Risk and Compliance Manager/Lead Professional Services Consultant - Riyadh Senior Consultant/Manager Cyber Extended Enterprise UAE, KSA, JordanWe're unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Cybersecurity Auditor (KSA National)
Posted 12 days ago
Job Viewed
Job Description
Designs, performs and manages cybersecurity audits to assess an organization s compliance with applicable requirements, policies, standards and controls. Prepares audit reports and communicates them to authorized parties.
Duties and Responsibilities:
- Maintain a deployable cyber defense audit toolkit based on industry best practice to support cyber defense audits. Perform system administration on specialized cybersecurity applications and systems.
- Perform risk analysis whenever an application or system undergoes a major change. Prepare cybersecurity assessment and audit reports that identify technical and procedural findings, and include recommended remediation strategies and solutions.
- Track audit findings and recommendations to ensure that appropriate mitigation actions are taken. Effectively manage vulnerability remediation. Ensure an audit log of evidence of security measures is maintained. Review, conduct, or participate in audits of cyber programs and projects.
- Maintain knowledge of applicable cybersecurity defense policies, regulations and compliance documents as they pertain to cybersecurity defense auditing.
- Carry out an audit of application software/network/system security against documented cybersecurity policies and provide recommendations for remediation where gaps appear.
- Develop cybersecurity compliance processes and audits for services provided by third parties.
- Regularly review and ensure that cybersecurity policies and related documentation are aligned with the organization's stated business objectives and strategy.
- Ensure that security design and cybersecurity development activities are appropriately documented.
- Ensure that cybersecurity audits test all relevant aspects of the organization's infrastructure and policy compliance.
- Develop processes with any external auditors on information sharing in a secure manner.
Desired Candidate Profile
Skills
- Skill in applying core cybersecurity principles.
- Skill in determining the normal operational state for security systems and how that state is affected by change.
- Skill in effectively recognizing and categorizing types of vulnerabilities and associated attacks.
- Skill in conducting cybersecurity audits or reviews of technical systems.
- Skill in designing appropriate cybersecurity test plans.
- Skill in assessing security controls based on cybersecurity principles and tenets.
- Skill in using security event correlation tools effectively.
- Skill in using code analysis tools effectively.
- Skill in effectively performing root cause analysis for cybersecurity issues.
- Skill in effectively preparing and presenting briefings in a clear and concise manner.
- Skill in utilizing feedback to improve cybersecurity processes, products and services.
- Skill in determining the security control requirements of information systems and networks.
- Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance as necessary.
- Skill in applying appropriate cybersecurity controls.
- Skill in identifying test and evaluation infrastructure requirements.
- Skill in communicating with customers.
- Skill in managing test assets and resources to ensure effective completion of test events.
- Skill in preparing test and evaluation reports. Skill in reviewing logs to identify evidence of intrusions and other suspicious behavior.
- Skill in troubleshooting and diagnosing cybersecurity defense infrastructure anomalies and determining the root cause.
- Skill in using HR IT systems.
- Skill in conducting cybersecurity reviews of systems.
- Skill in understanding network systems management principles, models, methods and tools.
Needed Knowledge:
- Knowledge of network components, their operation and appropriate network security controls and methods.
- Knowledge and understanding of risk assessment, mitigation and management methods.
- Knowledge of relevant cybersecurity aspects of legislative and regulatory requirements, relating to ethics and privacy. Knowledge of the principles of cybersecurity and privacy
- Knowledge of cybersecurity related threats and vulnerabilities.
- Knowledge of the likely operational impact on an organization of cybersecurity breaches.
- Knowledge of cybersecurity authentication, authorization and access control methods.
- Knowledge of business practices within organizations.
- Knowledge of cybersecurity defense and vulnerability assessment tools and their capabilities.
- Knowledge of cybersecurity aspects of business continuity and disaster recovery planning and including testing.
- Knowledge of the organization's enterprise cybersecurity architecture.
- Knowledge of cybersecurity assessment and authorization processes.
- Knowledge of cybersecurity and privacy principles and organizational requirements.
- Knowledge of IT security principles and methods.
- Knowledge of all aspects of system lifecycle management.
- Knowledge of the national cybersecurity regulations and requirements relevant to the organization.
- Knowledge of the organization's core business processes and how cybersecurity affects them.
- Knowledge of organizational process improvement concepts and process maturity models.
- Knowledge of an organization's cybersecurity data classification requirement.
- Knowledge of the principal methods, procedures and techniques for gathering, producing, reporting and sharing cybersecurity information.
- Knowledge of the organization's evaluation and validation requirements in relation to cybersecurity risk management.
- Knowledge of the organization's local and wide area network connections and the risks they pose to its cybersecurity.
- Knowledge of best practices for reviewing and determining the suitability of technology solutions to meet cybersecurity requirements.
- Knowledge of all-source reporting and appropriate dissemination procedures.
- Knowledge of best practice auditing and logging procedures.
- Knowledge of formats and best practice for issuing cybersecurity compliance reports to external partners.
- Knowledge of the organization's formats for management and compliance reporting relating to cybersecurity risks, readiness and progress against plans.
- Knowledge of national and organizational document and information classification and marking standards, policies and procedures.
Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at
People Looking for Auditor Jobs also searched #J-18808-LjbffrCybersecurity Specialist - Saudi National
Posted 20 days ago
Job Viewed
Job Description
Job Title: Cybersecurity Specialist
Contract Type: Full-Time
- Bachelor’s degree in Cybersecurity or a related field from a recognized Saudi university.
- 1–3 years of practical experience in cybersecurity or information security.
- Familiarity with international standards and frameworks such as ISO 27001 and NIST Cybersecurity Framework .
- Knowledge of network security tools and incident management processes.
- Monitor and analyze security threats across systems and networks.
- Implement cybersecurity policies and procedures, ensuring compliance.
- Participate in vulnerability assessments and penetration testing activities.
- Respond to and document security incidents.
Cybersecurity Specialist - Saudi National
Posted today
Job Viewed
Job Description
Job Title: Cybersecurity Specialist
Contract Type: Full-Time
- Bachelor’s degree in Cybersecurity or a related field from a recognized Saudi university.
- 1–3 years of practical experience in cybersecurity or information security.
- Familiarity with international standards and frameworks such as ISO 27001 and NIST Cybersecurity Framework .
- Knowledge of network security tools and incident management processes.
- Monitor and analyze security threats across systems and networks.
- Implement cybersecurity policies and procedures, ensuring compliance.
- Participate in vulnerability assessments and penetration testing activities.
- Respond to and document security incidents.
Cybersecurity Operations Manager (KSA National)
Posted 24 days ago
Job Viewed
Job Description
Our Culture:
At Zaintech we are proud of our culture and how it drives everything we do. We are looking for individuals who share our values and want to be part of a unique and engaging culture that revolves around collaboration and innovation. If you are looking for a role where you can drive engagement and excellence across teams through commitment and collaboration, and are someone who is customer-centric and appreciates an organization with uncompromised integrity that focuses on employee engagement then read on to learn more about how you can become part of the Zaintech family.
Our Code of Conduct:
At Zaintech we strictly adhere to our code of conduct, which is there to serve as a moral compass, offering a framework for responsible behaviours and enabling ethical choices that cultivate positive relationships and a better future. It also outlines policies, standards, and procedures for our global operations, promoting integrity and ethical excellence across the countries we engage with.
Every year, all employees are required to review, comprehend, confirm, and adhere to the code of conduct. Additionally, all newly hired employees are subject to the same as part of their onboarding process.
Role Summary
The Cybersecurity Operations Manager is responsible for the organisation’s 24×7 Security Operations Centre (SOC) in the Kingdom of Saudi Arabia. Reporting to the Cyber Security Manager (KSA)—with functional alignment to the Regional CISO and Cyber Governance Office—the role drives continuous improvement of SOC capabilities, communicates operational risk and performance metrics to senior leadership, and champions a culture of security across the enterprise.
In addition to provide high-level security guidance and approving architecture decisions to ensure all new solutions align with regional standards, zero-trust principles, and Saudi NCA ECC/CCC controls.
Duties and Responsibilities:
- Maintain a resilient 24×7 SOC that meets agreed service-level objectives for mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR).
- Ensure full compliance with Saudi national cybersecurity regulations (NCA ECC/CCC) and other applicable legislation and standards (ISO27001, PCI-DSS, etc.).
- Optimise cybersecurity budget and resources to balance risk reduction with business value.
- Develop and retain talent, building a high-performing cybersecurity-operations team with clearly defined career paths.
- Embed secure-by-design architecture governance, guaranteeing that material technology changes and projects pass security-design review and conform to the enterprise reference architecture.
Key Responsibilities
Responsibilities are grouped for clarity; operations remain the primary focus, with architecture covered in a dedicated secondary section.
Leadership & Strategy
- Lead the 24×7 SOC in KSA, ensuring effective monitoring, detection, triage, analysis, containment, eradication and recovery from cybersecurity incidents.
- Develop, communicate and periodically review SOC strategy, policies and procedures to align with organisational objectives and the cybersecurity strategy.
- Advocate cybersecurity topics with senior management, ensuring strategic goals include robust cyber-defence capabilities.
- Obtain and manage resources (people, technology, budget) to achieve strategic cybersecurity goals.
- Maintain knowledge of emerging threats, technologies and regulatory changes impacting the SOC.
Risk Governance & Compliance
- Ensure cybersecurity risks identified by SOC monitoring are logged, assessed and treated through the organisation’s risk-governance process.
- Track audit findings and recommendations, ensuring timely mitigation.
- Collaborate with stakeholders to integrate cybersecurity requirements into business continuity (BCP) and disaster-recovery (DR) programmes.
- Periodically review cybersecurity strategy, policies and related documents for compliance with Saudi NCA regulations, UAE IASv2 (where relevant) and other applicable standards.
SOC Operations & Incident Response
- Direct daily SOC operations, validating that protection, detection and response capabilities are operating as designed.
- Coordinate cybersecurity inspections, tests, and red-team / purple-team exercises.
- Serve as escalation point and executive liaison during major incidents, ensuring effective communication with internal stakeholders and third parties.
- Oversee incident post-mortems, root-cause analysis and continuous-improvement actions.
- Ensure accurate, timely operational and management reporting (KPIs, KRIs, compliance dashboards, executive summaries).
Threat & Vulnerability Management
- Maintain robust vulnerability identification, prioritisation and remediation processes; track remediation metrics.
- Oversee threat-intelligence collection, analysis and operational use.
- Evaluate new technologies, tools and upgrades, approving cybersecurity capabilities before adoption.
- Ensure supply-chain and third-party cybersecurity risks are identified and managed, especially in mergers, acquisitions and outsourcing.
Security Architecture
- Conduct security-architecture gap assessments and maintain the cybersecurity reference architecture for on-prem, cloud, and OT environments.
- Contribute to the Cyber Security Steering committee, approving or rejecting architectural decisions for new systems, integrations and major cloud migrations.
- Define and maintain secure-configuration baselines (e.g., CIS) and champion infrastructure-as-code patterns that enforce them.
- Provide security input to procurement specifications and evaluate vendor architectures during RFPs.
- Translate business and regulatory requirements into technical security controls, ensuring alignment with zero-trust principles and regional governance standards.
Training, Awareness & Talent Management
- Ensure regular cybersecurity awareness and role-based training for all staff.
- Develop SOC-analyst competency frameworks and certification paths (e.g., GSEC, GCIA, GCIH, GCFE).
- Mentor, coach and evaluate team members; foster a culture of knowledge-sharing and continuous learning.
1.Minimum Qualification and certifications
- Education: Bachelor’s in Computer Science, Information Security or related field (Master’s preferred).
- Experience: 8+years in cybersecurity with at least 3years managing SOC or security-operations teams; exposure to security-architecture or design-review boards is highly desirable.
- Certifications (preferred): CISSP, CISM, CCSP, GCIH, GCIA, TOGAF.
- Language: Fluent English and Arabic.
2.Skills and knowledge
Operations-focused knowledge remains unchanged (network security, incident response, risk, compliance, cloud, cryptography). Additional architecture-specific competencies include: secure-configuration management, security-design methodologies, enterprise architecture frameworks, security-design trade-off analysis, and evaluation of emerging technologies.
- Develop and maintain policies reflecting business and cybersecurity strategic objectives.
- Evaluate vendor solutions, negotiate agreements, and manage MSSP relationships.
- Lead multidisciplinary teams in a high-pressure, 24×7 environment.
- Design countermeasures to identified architectural security risks and translate operational needs into protection requirements.
Cybersecurity Operations Manager (KSA National)
Posted today
Job Viewed
Job Description
Our Culture:
At Zaintech we are proud of our culture and how it drives everything we do. We are looking for individuals who share our values and want to be part of a unique and engaging culture that revolves around collaboration and innovation. If you are looking for a role where you can drive engagement and excellence across teams through commitment and collaboration, and are someone who is customer-centric and appreciates an organization with uncompromised integrity that focuses on employee engagement then read on to learn more about how you can become part of the Zaintech family.
Our Code of Conduct:
At Zaintech we strictly adhere to our code of conduct, which is there to serve as a moral compass, offering a framework for responsible behaviours and enabling ethical choices that cultivate positive relationships and a better future. It also outlines policies, standards, and procedures for our global operations, promoting integrity and ethical excellence across the countries we engage with.
Every year, all employees are required to review, comprehend, confirm, and adhere to the code of conduct. Additionally, all newly hired employees are subject to the same as part of their onboarding process.
Role Summary
The Cybersecurity Operations Manager is responsible for the organisation’s 24×7 Security Operations Centre (SOC) in the Kingdom of Saudi Arabia. Reporting to the Cyber Security Manager (KSA)—with functional alignment to the Regional CISO and Cyber Governance Office—the role drives continuous improvement of SOC capabilities, communicates operational risk and performance metrics to senior leadership, and champions a culture of security across the enterprise.
In addition to provide high-level security guidance and approving architecture decisions to ensure all new solutions align with regional standards, zero-trust principles, and Saudi NCA ECC/CCC controls.
Duties and Responsibilities:
- Maintain a resilient 24×7 SOC that meets agreed service-level objectives for mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR).
- Ensure full compliance with Saudi national cybersecurity regulations (NCA ECC/CCC) and other applicable legislation and standards (ISO27001, PCI-DSS, etc.).
- Optimise cybersecurity budget and resources to balance risk reduction with business value.
- Develop and retain talent, building a high-performing cybersecurity-operations team with clearly defined career paths.
- Embed secure-by-design architecture governance, guaranteeing that material technology changes and projects pass security-design review and conform to the enterprise reference architecture.
Key Responsibilities
Responsibilities are grouped for clarity; operations remain the primary focus, with architecture covered in a dedicated secondary section.
Leadership & Strategy
- Lead the 24×7 SOC in KSA, ensuring effective monitoring, detection, triage, analysis, containment, eradication and recovery from cybersecurity incidents.
- Develop, communicate and periodically review SOC strategy, policies and procedures to align with organisational objectives and the cybersecurity strategy.
- Advocate cybersecurity topics with senior management, ensuring strategic goals include robust cyber-defence capabilities.
- Obtain and manage resources (people, technology, budget) to achieve strategic cybersecurity goals.
- Maintain knowledge of emerging threats, technologies and regulatory changes impacting the SOC.
Risk Governance & Compliance
- Ensure cybersecurity risks identified by SOC monitoring are logged, assessed and treated through the organisation’s risk-governance process.
- Track audit findings and recommendations, ensuring timely mitigation.
- Collaborate with stakeholders to integrate cybersecurity requirements into business continuity (BCP) and disaster-recovery (DR) programmes.
- Periodically review cybersecurity strategy, policies and related documents for compliance with Saudi NCA regulations, UAE IASv2 (where relevant) and other applicable standards.
SOC Operations & Incident Response
- Direct daily SOC operations, validating that protection, detection and response capabilities are operating as designed.
- Coordinate cybersecurity inspections, tests, and red-team / purple-team exercises.
- Serve as escalation point and executive liaison during major incidents, ensuring effective communication with internal stakeholders and third parties.
- Oversee incident post-mortems, root-cause analysis and continuous-improvement actions.
- Ensure accurate, timely operational and management reporting (KPIs, KRIs, compliance dashboards, executive summaries).
Threat & Vulnerability Management
- Maintain robust vulnerability identification, prioritisation and remediation processes; track remediation metrics.
- Oversee threat-intelligence collection, analysis and operational use.
- Evaluate new technologies, tools and upgrades, approving cybersecurity capabilities before adoption.
- Ensure supply-chain and third-party cybersecurity risks are identified and managed, especially in mergers, acquisitions and outsourcing.
Security Architecture
- Conduct security-architecture gap assessments and maintain the cybersecurity reference architecture for on-prem, cloud, and OT environments.
- Contribute to the Cyber Security Steering committee, approving or rejecting architectural decisions for new systems, integrations and major cloud migrations.
- Define and maintain secure-configuration baselines (e.g., CIS) and champion infrastructure-as-code patterns that enforce them.
- Provide security input to procurement specifications and evaluate vendor architectures during RFPs.
- Translate business and regulatory requirements into technical security controls, ensuring alignment with zero-trust principles and regional governance standards.
Training, Awareness & Talent Management
- Ensure regular cybersecurity awareness and role-based training for all staff.
- Develop SOC-analyst competency frameworks and certification paths (e.g., GSEC, GCIA, GCIH, GCFE).
- Mentor, coach and evaluate team members; foster a culture of knowledge-sharing and continuous learning.
1.Minimum Qualification and certifications
- Education: Bachelor’s in Computer Science, Information Security or related field (Master’s preferred).
- Experience: 8+years in cybersecurity with at least 3years managing SOC or security-operations teams; exposure to security-architecture or design-review boards is highly desirable.
- Certifications (preferred): CISSP, CISM, CCSP, GCIH, GCIA, TOGAF.
- Language: Fluent English and Arabic.
2.Skills and knowledge
Operations-focused knowledge remains unchanged (network security, incident response, risk, compliance, cloud, cryptography). Additional architecture-specific competencies include: secure-configuration management, security-design methodologies, enterprise architecture frameworks, security-design trade-off analysis, and evaluation of emerging technologies.
- Develop and maintain policies reflecting business and cybersecurity strategic objectives.
- Evaluate vendor solutions, negotiate agreements, and manage MSSP relationships.
- Lead multidisciplinary teams in a high-pressure, 24×7 environment.
- Design countermeasures to identified architectural security risks and translate operational needs into protection requirements.
Be The First To Know
About the latest National cybersecurity center Jobs in Saudi Arabia !
Cybersecurity Operations Manager (KSA National)
Posted today
Job Viewed
Job Description
Our Culture
At Zaintech we are proud of our culture and how it drives everything we do. We are looking for individuals who share our values and want to be part of a unique and engaging culture that revolves around collaboration and innovation. If you are looking for a role where you can drive engagement and excellence across teams through commitment and collaboration, and are someone who is customer-centric and appreciates an organization with uncompromised integrity that focuses on employee engagement then read on to learn more about how you can become part of the Zaintech family.
Our Code of ConductAt Zaintech we strictly adhere to our code of conduct, which is there to serve as a moral compass, offering a framework for responsible behaviours and enabling ethical choices that cultivate positive relationships and a better future. It also outlines policies, standards, and procedures for our global operations, promoting integrity and ethical excellence across the countries we engage with.
Every year, all employees are required to review, comprehend, confirm, and adhere to the code of conduct. Additionally, all newly hired employees are subject to the same as part of their onboarding process.
Role SummaryThe Cybersecurity Operations Manager is responsible for the organisation’s 24×7 Security Operations Centre (SOC) in the Kingdom of Saudi Arabia. Reporting to the Cyber Security Manager (KSA)—with functional alignment to the Regional CISO and Cyber Governance Office—the role drives continuous improvement of SOC capabilities, communicates operational risk and performance metrics to senior leadership, and champions a culture of security across the enterprise.
In addition to provide high-level security guidance and approving architecture decisions to ensure all new solutions align with regional standards, zero-trust principles, and Saudi NCA ECC/CCC controls.
Duties and Responsibilities- Maintain a resilient 24×7 SOC that meets agreed service-level objectives for mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR).
- Ensure full compliance with Saudi national cybersecurity regulations (NCA ECC/CCC) and other applicable legislation and standards (ISO27001, PCI-DSS, etc.).
- Optimise cybersecurity budget and resources to balance risk reduction with business value.
- Develop and retain talent, building a high-performing cybersecurity-operations team with clearly defined career paths.
- Embed secure-by-design architecture governance, guaranteeing that material technology changes and projects pass security-design review and conform to the enterprise reference architecture.
Responsibilities are grouped for clarity; operations remain the primary focus, with architecture covered in a dedicated secondary section.
Leadership & Strategy- Lead the 24×7 SOC in KSA, ensuring effective monitoring, detection, triage, analysis, containment, eradication and recovery from cybersecurity incidents.
- Develop, communicate and periodically review SOC strategy, policies and procedures to align with organisational objectives and the cybersecurity strategy.
- Advocate cybersecurity topics with senior management, ensuring strategic goals include robust cyber-defence capabilities.
- Obtain and manage resources (people, technology, budget) to achieve strategic cybersecurity goals.
- Maintain knowledge of emerging threats, technologies and regulatory changes impacting the SOC.
- Ensure cybersecurity risks identified by SOC monitoring are logged, assessed and treated through the organisation’s risk-governance process.
- Track audit findings and recommendations, ensuring timely mitigation.
- Collaborate with stakeholders to integrate cybersecurity requirements into business continuity (BCP) and disaster-recovery (DR) programmes.
- Periodically review cybersecurity strategy, policies and related documents for compliance with Saudi NCA regulations, UAE IASv2 (where relevant) and other applicable standards.
- Direct daily SOC operations, validating that protection, detection and response capabilities are operating as designed.
- Coordinate cybersecurity inspections, tests, and red-team / purple-team exercises.
- Serve as escalation point and executive liaison during major incidents, ensuring effective communication with internal stakeholders and third parties.
- Oversee incident post-mortems, root-cause analysis and continuous-improvement actions.
- Ensure accurate, timely operational and management reporting (KPIs, KRIs, compliance dashboards, executive summaries).
- Maintain robust vulnerability identification, prioritisation and remediation processes; track remediation metrics.
- Oversee threat-intelligence collection, analysis and operational use.
- Evaluate new technologies, tools and upgrades, approving cybersecurity capabilities before adoption.
- Ensure supply-chain and third-party cybersecurity risks are identified and managed, especially in mergers, acquisitions and outsourcing.
- Conduct security-architecture gap assessments and maintain the cybersecurity reference architecture for on-prem, cloud, and OT environments.
- Contribute to the Cyber Security Steering committee, approving or rejecting architectural decisions for new systems, integrations and major cloud migrations.
- Define and maintain secure-configuration baselines (e.g., CIS) and champion infrastructure-as-code patterns that enforce them.
- Provide security input to procurement specifications and evaluate vendor architectures during RFPs.
- Translate business and regulatory requirements into technical security controls, ensuring alignment with zero-trust principles and regional governance standards.
- Ensure regular cybersecurity awareness and role-based training for all staff.
- Develop SOC-analyst competency frameworks and certification paths (e.g., GSEC, GCIA, GCIH, GCFE).
- Mentor, coach and evaluate team members; foster a culture of knowledge-sharing and continuous learning.
- Education: Bachelor’s in Computer Science, Information Security or related field (Master’s preferred).
- Experience: 8+ years in cybersecurity with at least 3 years managing SOC or security-operations teams; exposure to security-architecture or design-review boards is highly desirable.
- Certifications (preferred): CISSP, CISM, CCSP, GCIH, GCIA, TOGAF.
- Language: Fluent English and Arabic.
Operations-focused knowledge remains unchanged (network security, incident response, risk, compliance, cloud, cryptography). Additional architecture-specific competencies include: secure-configuration management, security-design methodologies, enterprise architecture frameworks, security-design trade-off analysis, and evaluation of emerging technologies.
- Develop and maintain policies reflecting business and cybersecurity strategic objectives.
- Evaluate vendor solutions, negotiate agreements, and manage MSSP relationships.
- Lead multidisciplinary teams in a high-pressure, 24×7 environment.
- Design countermeasures to identified architectural security risks and translate operational needs into protection requirements.
Data Center Technician (Saudi National Only)
Posted 3 days ago
Job Viewed
Job Description
Description
AWS Infrastructure Services owns the design, planning, delivery, and operation of all AWS global infrastructure. In other words, we’re the people who keep the cloud running. We support all AWS data centers and all of the servers, storage, networking, power, and cooling equipment that ensure our customers have continual access to the innovation they rely on. We work on the most challenging problems, with thousands of variables impacting the supply chain — and we’re looking for talented people who want to help.
You’ll join a diverse team of software, hardware, and network engineers, supply chain specialists, security experts, operations managers, and other vital roles. You’ll collaborate with people across AWS to help us deliver the highest standards for safety and security while providing seemingly infinite capacity at the lowest possible cost for our customers. And you’ll experience an inclusive culture that welcomes bold ideas and empowers you to own them to completion
TWe are looking for Data Center Technicians to join our expanding Infrastructure Operations team. Data Center Technicians are the primary resolver and troubleshoot and solve a range of datacenter infrastructure issues including, but not limited to: hardware, fiber, networking, and related problems. You will be part of the Data Center Operations (DCO) team, overseeing the operation and maintenance of the IT infrastructure and hardware for data centers in AWS Cloud regions. You will become the primary resolver for your support team, and gain troubleshooting skills on different hardware and software cases.
You will be able to troubleshoot and solve most infrastructure issues and engage other appropriate solutions groups on more complex problems to drive solutions.
Key job responsibilities
SAFETY
- Follow and maintain the highest safety standards and diligently encourage a world-class safety culture. Own the safety initiatives and projects to foster a strong safety culture.
DATA CENTER OPERATIONS (DCO)
This position involves:
Diagnosing hardware and network problems followed by physical repairs
Troubleshooting events within internal Service Level Agreements (SLAs)
Performing root cause analysis of equipment failures
Manual handling and lifting of equipment may be required (weight limits in accordance with regulations)
About the team
Diverse Experiences
AWS values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn’t followed a traditional path, or includes alternative experiences, don’t let it stop you from applying.
Why AWS?
Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform. We pioneered cloud computing and never stopped innovating — that’s why customers from the most successful startups to Global 500 companies trust our robust suite of products and services to power their businesses.
Inclusive Team Culture
Here at AWS, it’s in our nature to learn and be curious. Our employee-led affinity groups foster a culture of inclusion that empower us to be proud of our differences. Ongoing events and learning experiences, including our Conversations on Race and Ethnicity (CORE) and AmazeCon (gender diversity) conferences, inspire us to never stop embracing our uniqueness.
Mentorship & Career Growth
We’re continuously raising our performance bar as we strive to become Earth’s Best Employer. That’s why you’ll find endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional.
Work/Life Balance
We value work-life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why we strive for flexibility as part of our working culture. When we feel supported in the workplace and at home, there’s nothing we can’t achieve in the cloud.
Basic Qualifications
Bachelor's degree in information technology or computer science
Experience with computer hardware troubleshooting and repair
Must have Saudi Arabian citizenship
Preferred Qualifications
Experience dealing effectively with customers during problem resolution and operating efficiently under pressure
Large Scale Data Center experience
Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit for more information. If the country/region you’re applying in isn’t listed, please contact your Recruiting Partner.
#J-18808-LjbffrData Center Technician (Saudi National Only)
Posted 24 days ago
Job Viewed
Job Description
DESCRIPTION
AWS Infrastructure Services owns the design, planning, delivery, and operation of all AWS global infrastructure. In other words, we’re the people who keep the cloud running. We support all AWS data centers and all of the servers, storage, networking, power, and cooling equipment that ensure our customers have continual access to the innovation they rely on. We work on the most challenging problems, with thousands of variables impacting the supply chain — and we’re looking for talented people who want to help.
You’ll join a diverse team of software, hardware, and network engineers, supply chain specialists, security experts, operations managers, and other vital roles. You’ll collaborate with people across AWS to help us deliver the highest standards for safety and security while providing seemingly infinite capacity at the lowest possible cost for our customers. And you’ll experience an inclusive culture that welcomes bold ideas and empowers you to own them to completion
TWe are looking for Data Center Technicians to join our expanding Infrastructure Operations team. Data Center Technicians are the primary resolver and troubleshoot and solve a range of datacenter infrastructure issues including, but not limited to: hardware, fiber, networking, and related problems. You will be part of the Data Center Operations (DCO) team, overseeing the operation and maintenance of the IT infrastructure and hardware for data centers in AWS Cloud regions. You will become the primary resolver for your support team, and gain troubleshooting skills on different hardware and software cases.
You will be able to troubleshoot and solve most infrastructure issues and engage other appropriate solutions groups on more complex problems to drive solutions.
Key job responsibilities
SAFETY
– Follow and maintain the highest safety standards and diligently encourage a world-class safety culture. Own the safety initiatives and projects to foster a strong safety culture.
DATA CENTER OPERATIONS (DCO)
This position involves:
– Diagnosing hardware and network problems followed by physical repairs
– Troubleshooting events within internal Service Level Agreements (SLAs)
– Performing root cause analysis of equipment failures
– Manual handling and lifting of equipment may be required (weight limits in accordance with regulations)
About the team
Diverse Experiences
AWS values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn’t followed a traditional path, or includes alternative experiences, don’t let it stop you from applying.
Why AWS?
Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform. We pioneered cloud computing and never stopped innovating — that’s why customers from the most successful startups to Global 500 companies trust our robust suite of products and services to power their businesses.
Inclusive Team Culture
Here at AWS, it’s in our nature to learn and be curious. Our employee-led affinity groups foster a culture of inclusion that empower us to be proud of our differences. Ongoing events and learning experiences, including our Conversations on Race and Ethnicity (CORE) and AmazeCon (gender diversity) conferences, inspire us to never stop embracing our uniqueness.
Mentorship & Career Growth
We’re continuously raising our performance bar as we strive to become Earth’s Best Employer. That’s why you’ll find endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional.
Work/Life Balance
We value work-life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why we strive for flexibility as part of our working culture. When we feel supported in the workplace and at home, there’s nothing we can’t achieve in the cloud.
BASIC QUALIFICATIONS
– Bachelor’s degree in information technology or computer science
– Experience with computer hardware troubleshooting and repair
– Must have Saudi Arabian citizenship
PREFERRED QUALIFICATIONS
– Experience dealing effectively with customers during problem resolution and operating efficiently under pressure
– Large Scale Data Center experience
Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit for more information. If the country/region you’re applying in isn’t listed, please contact your Recruiting Partner.
Tagged as: and Support Engineering , IT , operations
#J-18808-Ljbffr