30 National Cybersecurity Center jobs in Saudi Arabia
Incident Response Director - National Cybersecurity Center - Syria MOCT
Posted today
Job Viewed
Job Description
Get AI-powered advice on this job and more exclusive features.
Lead the establishment and operations of Syria's national cyber incident response capability at the newly formed National Cybersecurity Center led by Syria Ministry of communication and information Technology, in collaboration with Cipher Saudi Arabia. As Incident Response Director, you will build the country's first dedicated cyber crisis management function, capable of coordinating responses to incidents affecting critical national infrastructure, government institutions, and essential services. This pivotal leadership role will develop Syria's ability to detect, contain, and recover from sophisticated cyber attacks while building resilience across the nation's digital ecosystem.
Level
Location
Requirements
- 10+ years of experience in cybersecurity with focus on incident response
- 5+ years leading incident response teams or programs
- Bachelor's degree required; Advanced degree in Cybersecurity, Computer Science, or related field preferred
- Proven experience handling major security incidents or breaches
- Deep knowledge of incident response methodologies, frameworks, and playbooks
- Strong understanding of digital forensics techniques and toolsets
- Experience coordinating multi-stakeholder responses to complex security incidents
- Background in crisis management and emergency response operations
- Fluency in Arabic and English (written and verbal)
Who You Are
- A battle-tested incident response leader with exceptional crisis management skills
- Methodical thinker who can maintain clarity and structure during high-pressure situations
- Diplomatic professional capable of coordinating diverse stakeholders during incidents
- Technical expert with deep understanding of attack vectors and mitigation strategies
- Effective communicator able to translate technical details to both technical and non-technical audiences
- Adaptable problem-solver who thrives in ambiguous and rapidly evolving scenarios
- Meticulous planner who develops robust response protocols while remaining flexible
- Committed mentor focused on building sustainable incident response capabilities
Nice to Have
- Experience establishing national or sectoral CERT/CSIRT operations
- Background in national security, military, or law enforcement cyber operations
- GCIH, GCFA, CISM, or other incident response certifications
- Experience with critical infrastructure protection and ICS/SCADA security
- Knowledge of regional threat actors and cyber threat landscape in the Middle East
- Background in malware analysis and reverse engineering
- Experience coordinating with international incident response organizations
- Understanding of legal and regulatory aspects of cyber incident handling
What You Will Be Doing
- Establish Syria's national incident response capability from the ground up
- Develop comprehensive incident response frameworks, playbooks, and protocols
- Build and lead teams specialized in containment, eradication, and recovery from cyber attacks
- Create national incident classification scheme and escalation procedures
- Establish digital forensics capabilities for evidence collection and analysis
- Coordinate incident response activities with government agencies, critical infrastructure operators, and international partners
- Lead responses to significant national cyber incidents, serving as incident commander
- Develop post-incident analysis methodologies and lessons learned processes
- Create training programs to build incident response capabilities across Syrian organizations
- Represent Syria in international incident response communities and information sharing forums
What You Will Need
- Expert knowledge of incident response procedures and best practices
- Strong leadership abilities, especially during crisis situations
- Excellent analytical and problem-solving skills
- Digital forensics knowledge and experience
- Crisis communication capabilities
- Documentation and reporting skills
- Ability to work effectively under extreme pressure
- Willingness to relocate to Damascus, Syria
Why Join Us
This role offers an unprecedented opportunity to establish critical national security capabilities that will protect Syria's digital future. You'll build incident response functions from the foundation up, implementing world-class practices while adapting to local needs and challenges. Your work will directly impact the nation's ability to withstand and recover from cyber attacks, protecting essential services and critical infrastructure that millions of citizens depend on. Few cybersecurity positions offer this level of national impact and the chance to build lasting security capabilities.
Be Part of Cipher Syria
By joining Cipher Syria, you'll become part of an elite team establishing the country's premier cybersecurity institution. You'll leverage Cipher's global expertise, methodologies, and resources while having the autonomy to build response capabilities tailored to Syria's unique security landscape. This role combines the stability and backing of an established organization with the excitement and growth potential of a groundbreaking national initiative. Help us establish Syria as a leader in cybersecurity resilience while advancing your career at the forefront of national cyber defense.
Seniority level- Seniority level Director
- Employment type Full-time
- Job function Information Technology
- Industries Computer and Network Security
Referrals increase your chances of interviewing at Cipher | سايڤر by 2x
Get notified about new Director of Cyber Security jobs in Riyadh, Saudi Arabia .
Security Operations Director - National Cybersecurity Center - Syria MOCT Cyber Threat Intelligence Director - National Cybersecurity Center - Syria MOCT Infrastructure Security Director - National Cybersecurity Center - Syria MOCT Cloud Security Director - National Cybersecurity Center - Syria MOCT Sales Director – Embedded Security (Saudi Arabia) Director of Security Architecture & PlanningWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrChief Operating Officer - National Cybersecurity Center - Syria MOCT
Posted 6 days ago
Job Viewed
Job Description
Direct message the job poster from Cipher | سايڤر
HR Manager | Learning & Development | CIPD | Talent Management I Strategic HR Leader | HR Transformation | Culture & Talent Architect | Tech SectorDrive the operational excellence of Syria's pioneering National Cybersecurity Center led by Syria Ministry of communication and information Technology in collaboration with Cipher Saudi Arabia. As COO, you will be instrumental in translating strategic vision into effective day-to-day operations, establishing robust processes, and ensuring the center delivers on its critical national security mission. Working directly with the Director General, you'll build and manage the operational infrastructure that underpins Syria's cyber defense capabilities.
Level
Location
Requirements
- 12+ years of experience in operations management, preferably in cybersecurity or technology organizations
- 8+ years in senior management positions with P&L responsibility
- Bachelor's degree required, Advanced degree in Business Administration, Technology Management, or related field preferred
- Proven track record of scaling operations in complex environments
- Experience managing diverse teams across multiple departments
- Strong financial acumen and budget management experience
- Demonstrated ability to implement operational frameworks and quality management systems
- Fluency in Arabic and English (written and verbal)
Who You Are
- A hands-on operational leader who thrives in building organizations from the ground up
- Results-oriented professional with exceptional organizational and project management skills
- Analytical thinker capable of optimizing resources and improving operational efficiency
- Collaborative leader who excels at cross-functional coordination
- Adaptable problem-solver comfortable working in evolving environments
- Detail-oriented executor who can translate strategy into actionable plans
- Strong communicator able to align teams around common objectives
Nice to Have
- Experience in government or national security operations
- Background in establishing SOC/CERT operations
- Knowledge of ISO 27001, NIST, or similar cybersecurity frameworks
- Experience managing security clearance processes and classified operations
- Understanding of procurement and vendor management in government contexts
- Familiarity with Syrian or Middle Eastern business environment
- Previous experience establishing new offices or operations in challenging locations
What You Will Be Doing
- Develop and implement operational frameworks, policies, and procedures for the center
- Oversee daily operations across all departments including SOC, incident response, and support functions
- Manage the center's
- an resources, including recruitment, onboarding, and professional development
- Lead budget planning, financial management, and resource allocation
- Establish vendor and partner relationships, managing procurement processes
- Implement performance metrics and quality assurance frameworks
- Ensure compliance with relevant laws, regulations, and security requirements
- Coordinate with government stakeholders on operational matters
- Support the Director General in strategic planning and organizational development
What You Will Need
- Exceptional organizational and time management skills
- Strong financial and budget management abilities
- Talent for building and developing high-performing teams
- Experience with operational risk management
- Process design and optimization expertise
- Project and program management capabilities
- Ability to work effectively in high-pressure environments
- Willingness to relocate to Damascus, Syria
Why Join Us
This is a rare opportunity to help establish a critical national institution from the ground up. As COO, you'll shape the operational backbone of Syria's cyber defense capability, implementing world-class processes and systems that protect the nation's critical infrastructure and digital assets. You'll work at the intersection of technology, national security, and organizational development, making tangible impact on Syria's digital resilience while building a legacy of operational excellence.
Be Part of Cipher Syria
By joining Cipher Syria, you'll become an integral member of our expanding regional footprint. This landmark project represents Cipher's commitment to enhancing cybersecurity capabilities across the Middle East. You'll benefit from Cipher's global expertise and resources while having the autonomy to build and shape operations according to local needs. This role offers the best of both worlds—the stability and resources of an established organization with the excitement and growth potential of a new venture. Help us write the next chapter in Syria's digital transformation journey.
Seniority level- Seniority level Executive
- Employment type Full-time
- Job function Management and Manufacturing
- Industries Computer and Network Security
Referrals increase your chances of interviewing at Cipher | سايڤر by 2x
Sign in to set job alerts for “Chief Operating Officer” roles. CEO and Co-Founder - Cross-Border Trade Financing (KSA) Vice President, Business Development, Global Private Markets Institution, Riyadh Performance Improvement - Senior Vice President Director of Partner Operations - Based in Riyadh Director, Operations Set UP and Projects - (20005477) CDU700 Vice President Grocery Operations - Based in Cairo - Egypt Performance Improvement - Vice President Director, Technical Operations Middle East Franchise Operations Director, Multilateral Financial Institution (Role Based in GCC) Managing Director - Microsoft ERP Practice Vice President of Global Business Development(Global Sport Market) Vice President, M&A Investment Banking, MENA Coverage, Global Investment Bank, Riyadh CEO & CoFounder - Remit Now Pay Later (KSA)We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr(Saudi National Required) Cybersecurity Consultant
Posted 1 day ago
Job Viewed
Job Description
At NetWitness , we empower organizations to detect, respond to, and neutralize cyber threats in real time. Our cutting-edge security solutions provide deep visibility, advanced threat intelligence, and rapid incident response capabilities to help businesses stay ahead of evolving cyber threats.
We are looking for a Resident Security Consultant to work on-site with our clients, providing expert guidance on cybersecurity best practices, incident response, and threat intelligence. In this role, you will leverage NetWitness technology to assess vulnerabilities, enhance security postures, and deliver hands-on support to protect critical assets. If you have a passion for cybersecurity and thrive in a customer-facing role, we’d love to hear from you!
We are looking for someone who has or knows the following:
- Knowledge of IT and Networking Systems: Understanding of various IT and networking technologies is crucial.
- Security Assessment and Audit: Ability to conduct security assessments and audits to identify vulnerabilities.
- Vulnerability Management: Knowledge of vulnerability management processes and tools.
- Incident Response: Familiarity with incident response procedures and methodologies
- Threat Intelligence: Understanding of current cyber threats and attack vectors.
- Security Technologies: Knowledge of various security technologies, such as firewalls, intrusion detection systems, and endpoint security solutions
- Outsourcing Experience: Having previously faced customers/clients in providing advise and counsel on cybersecurity strategies and vulnerability risks
- Programming Skills: Some roles may require basic programming or scripting skills
- Cloud Security: Knowledge of on premise and cloud security principles and technologies
- Soft Skills: Direct customer interaction and conflict management as well as presentation skills
Requirements:
- Bachelor's Degree (preferred): A bachelor's degree in computer science, information security, or a related field is often preferred, though some roles may accept equivalent experience or certifications.
- Industry Certifications: Certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Security+ are highly valued.
- Experience: Prior experience in IT, networking, security roles, or related fields can be beneficial.
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Computer and Network Security
Referrals increase your chances of interviewing at NetWitness by 2x
Get notified about new Cyber Security Consultant jobs in Riyadh, Saudi Arabia .
Cybersecurity Risk Management SpecialistRiyadh, Riyadh, Saudi Arabia 11 hours ago
Senior Internal Auditor IT & Cybersecurity Cyber Security Consultant - Saudi Region Cybersecurity Governance, Risk and Compliance Manager Cybersecurity Governance & Compliance Officer "GRC" Cyber Security Consultant - Saudi Region Senior Consultant/Manager | Cyber | Talent & Culture Transformation | UAE, KSA, Jordan Cybersecurity Governance, Risk and Compliance (GRC) Officer P-3 - Rome, Italy IT & Cyber Security Senior Sales Account ManagerRiyadh, Riyadh, Saudi Arabia 10 hours ago
Cybersecurity Principal Engineering Consultant Cybersecurity MSS (Managed Security Services) Presales Consultant Cybersecurity Risk and Compliance Manager/Lead Professional Services Consultant - Riyadh Senior Consultant/Manager | Cyber | Extended Enterprise | UAE, KSA, JordanWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr(Saudi National Required) Cybersecurity Consultant
Posted 1 day ago
Job Viewed
Job Description
At NetWitness , we empower organizations to detect, respond to, and neutralize cyber threats in real time. Our cutting-edge security solutions provide deep visibility, advanced threat intelligence, and rapid incident response capabilities to help businesses stay ahead of evolving cyber threats.
We are looking for a Resident Security Consultant to work on-site with our clients, providing expert guidance on cybersecurity best practices, incident response, and threat intelligence. In this role, you will leverage NetWitness technology to assess vulnerabilities, enhance security postures, and deliver hands-on support to protect critical assets. If you have a passion for cybersecurity and thrive in a customer-facing role, we'd love to hear from you!
We are looking for someone who has or knows the following:
- Knowledge of IT and Networking Systems: Understanding of various IT and networking technologies is crucial.
- Security Assessment and Audit: Ability to conduct security assessments and audits to identify vulnerabilities.
- Vulnerability Management: Knowledge of vulnerability management processes and tools.
- Incident Response: Familiarity with incident response procedures and methodologies
- Threat Intelligence: Understanding of current cyber threats and attack vectors.
- Security Technologies: Knowledge of various security technologies, such as firewalls, intrusion detection systems, and endpoint security solutions
- Outsourcing Experience: Having previously faced customers/clients in providing advise and counsel on cybersecurity strategies and vulnerability risks
- Programming Skills: Some roles may require basic programming or scripting skills
- Cloud Security: Knowledge of on premise and cloud security principles and technologies
- Soft Skills: Direct customer interaction and conflict management as well as presentation skills
Requirements:
- Bachelor's Degree (preferred): A bachelor's degree in computer science, information security, or a related field is often preferred, though some roles may accept equivalent experience or certifications.
- Industry Certifications: Certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Security+ are highly valued.
- Experience: Prior experience in IT, networking, security roles, or related fields can be beneficial.
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Computer and Network Security
Referrals increase your chances of interviewing at NetWitness by 2x
Get notified about new Cyber Security Consultant jobs in Riyadh, Saudi Arabia .
Cybersecurity Risk Management SpecialistRiyadh, Riyadh, Saudi Arabia 11 hours ago
Senior Internal Auditor IT & Cybersecurity Cyber Security Consultant - Saudi Region Cybersecurity Governance, Risk and Compliance Manager Cybersecurity Governance & Compliance Officer "GRC" Cyber Security Consultant - Saudi Region Senior Consultant/Manager Cyber Talent & Culture Transformation UAE, KSA, Jordan Cybersecurity Governance, Risk and Compliance (GRC) Officer P-3 - Rome, Italy IT & Cyber Security Senior Sales Account ManagerRiyadh, Riyadh, Saudi Arabia 10 hours ago
Cybersecurity Principal Engineering Consultant Cybersecurity MSS (Managed Security Services) Presales Consultant Cybersecurity Risk and Compliance Manager/Lead Professional Services Consultant - Riyadh Senior Consultant/Manager Cyber Extended Enterprise UAE, KSA, JordanWe're unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Data Center Technician (Saudi National Only), Data Center Operations
Posted today
Job Viewed
Job Description
Join to apply for the Data Center Technician (Saudi National Only), Data Center Operations role at Amazon Web Services (AWS)
Data Center Technician (Saudi National Only), Data Center OperationsJoin to apply for the Data Center Technician (Saudi National Only), Data Center Operations role at Amazon Web Services (AWS)
Description
AWS Infrastructure Services owns the design, planning, delivery, and operation of all AWS global infrastructure. In other words, we’re the people who keep the cloud running. We support all AWS data centers and all of the servers, storage, networking, power, and cooling equipment that ensure our customers have continual access to the innovation they rely on. We work on the most challenging problems, with thousands of variables impacting the supply chain — and we’re looking for talented people who want to help.
Description
AWS Infrastructure Services owns the design, planning, delivery, and operation of all AWS global infrastructure. In other words, we’re the people who keep the cloud running. We support all AWS data centers and all of the servers, storage, networking, power, and cooling equipment that ensure our customers have continual access to the innovation they rely on. We work on the most challenging problems, with thousands of variables impacting the supply chain — and we’re looking for talented people who want to help.
You’ll join a diverse team of software, hardware, and network engineers, supply chain specialists, security experts, operations managers, and other vital roles. You’ll collaborate with people across AWS to help us deliver the highest standards for safety and security while providing seemingly infinite capacity at the lowest possible cost for our customers. And you’ll experience an inclusive culture that welcomes bold ideas and empowers you to own them to completion
TWe are looking for Data Center Technicians to join our expanding Infrastructure Operations team. Data Center Technicians are the primary resolver and troubleshoot and solve a range of datacenter infrastructure issues including, but not limited to: hardware, fiber, networking, and related problems. You will be part of the Data Center Operations (DCO) team, overseeing the operation and maintenance of the IT infrastructure and hardware for data centers in AWS Cloud regions. You will become the primary resolver for your support team, and gain troubleshooting skills on different hardware and software cases.
You will be able to troubleshoot and solve most infrastructure issues and engage other appropriate solutions groups on more complex problems to drive solutions.
Key job responsibilities
SAFETY
- Follow and maintain the highest safety standards and diligently encourage a world-class safety culture. Own the safety initiatives and projects to foster a strong safety culture.
This Position Involves
- Diagnosing hardware and network problems followed by physical repairs
- Troubleshooting events within internal Service Level Agreements (SLAs)
- Performing root cause analysis of equipment failures
- Manual handling and lifting of equipment may be required (weight limits in accordance with regulations)
Diverse Experiences
AWS values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn’t followed a traditional path, or includes alternative experiences, don’t let it stop you from applying.
Why AWS?
Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform. We pioneered cloud computing and never stopped innovating — that’s why customers from the most successful startups to Global 500 companies trust our robust suite of products and services to power their businesses.
Inclusive Team Culture
Here at AWS, it’s in our nature to learn and be curious. Our employee-led affinity groups foster a culture of inclusion that empower us to be proud of our differences. Ongoing events and learning experiences, including our Conversations on Race and Ethnicity (CORE) and AmazeCon (gender diversity) conferences, inspire us to never stop embracing our uniqueness.
Mentorship & Career Growth
We’re continuously raising our performance bar as we strive to become Earth’s Best Employer. That’s why you’ll find endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional.
Work/Life Balance
We value work-life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why we strive for flexibility as part of our working culture. When we feel supported in the workplace and at home, there’s nothing we can’t achieve in the cloud.
Basic Qualifications
- Experience with computer hardware troubleshooting and repair
- Bachelor's degree in information technology or computer science
- Must have Saudi Arabian citizenship
- Experience dealing effectively with customers during problem resolution and operating efficiently under pressure
Company - Data Services Saudi Arabia Limited One Person Company - H12
Job ID: A3027460 Seniority level
- Seniority level Not Applicable
- Employment type Full-time
- Job function Information Technology, Consulting, and Engineering
- Industries IT Services and IT Consulting
Referrals increase your chances of interviewing at Amazon Web Services (AWS) by 2x
Sign in to set job alerts for “Data Technician” roles. Data Center Technician (Saudi National Only)Riyadh, Riyadh, Saudi Arabia 22 hours ago
Data Analyst - Cost & Commercial Systems (CDU4) - 20004834 Senior Associate - Reporting & Analytics Market Intelligence Associate - Field Communicator Senior Data Analyst - Commercial Reporting & Insights (CDU4) - 20004811 Data Analysis and Visualization Facilitator (Consultant) Associate Director - Health & Safety Data Analytics (SPA147)We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrData Center Technician (Saudi National Only), Data Center Operations

Posted 6 days ago
Job Viewed
Job Description
AWS Infrastructure Services owns the design, planning, delivery, and operation of all AWS global infrastructure. In other words, we're the people who keep the cloud running. We support all AWS data centers and all of the servers, storage, networking, power, and cooling equipment that ensure our customers have continual access to the innovation they rely on. We work on the most challenging problems, with thousands of variables impacting the supply chain - and we're looking for talented people who want to help.
You'll join a diverse team of software, hardware, and network engineers, supply chain specialists, security experts, operations managers, and other vital roles. You'll collaborate with people across AWS to help us deliver the highest standards for safety and security while providing seemingly infinite capacity at the lowest possible cost for our customers. And you'll experience an inclusive culture that welcomes bold ideas and empowers you to own them to completion
TWe are looking for Data Center Technicians to join our expanding Infrastructure Operations team. Data Center Technicians are the primary resolver and troubleshoot and solve a range of datacenter infrastructure issues including, but not limited to: hardware, fiber, networking, and related problems. You will be part of the Data Center Operations (DCO) team, overseeing the operation and maintenance of the IT infrastructure and hardware for data centers in AWS Cloud regions. You will become the primary resolver for your support team, and gain troubleshooting skills on different hardware and software cases.
You will be able to troubleshoot and solve most infrastructure issues and engage other appropriate solutions groups on more complex problems to drive solutions.
Key job responsibilities
SAFETY
- Follow and maintain the highest safety standards and diligently encourage a world-class safety culture. Own the safety initiatives and projects to foster a strong safety culture.
DATA CENTER OPERATIONS (DCO)
This position involves:
- Diagnosing hardware and network problems followed by physical repairs
- Troubleshooting events within internal Service Level Agreements (SLAs)
- Performing root cause analysis of equipment failures
- Manual handling and lifting of equipment may be required (weight limits in accordance with regulations)
About the team
Diverse Experiences
AWS values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn't followed a traditional path, or includes alternative experiences, don't let it stop you from applying.
Why AWS?
Amazon Web Services (AWS) is the world's most comprehensive and broadly adopted cloud platform. We pioneered cloud computing and never stopped innovating - that's why customers from the most successful startups to Global 500 companies trust our robust suite of products and services to power their businesses.
Inclusive Team Culture
Here at AWS, it's in our nature to learn and be curious. Our employee-led affinity groups foster a culture of inclusion that empower us to be proud of our differences. Ongoing events and learning experiences, including our Conversations on Race and Ethnicity (CORE) and AmazeCon (gender diversity) conferences, inspire us to never stop embracing our uniqueness.
Mentorship & Career Growth
We're continuously raising our performance bar as we strive to become Earth's Best Employer. That's why you'll find endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional.
Work/Life Balance
We value work-life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why we strive for flexibility as part of our working culture. When we feel supported in the workplace and at home, there's nothing we can't achieve in the cloud.
Basic Qualifications
- Experience with computer hardware troubleshooting and repair
- Bachelor's degree in information technology or computer science
- Must have Saudi Arabian citizenship
Preferred Qualifications
- Experience dealing effectively with customers during problem resolution and operating efficiently under pressure
Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit for more information. If the country/region you're applying in isn't listed, please contact your Recruiting Partner.
Cybersecurity Auditor (KSA National)
Posted today
Job Viewed
Job Description
Our Culture:
At Zaintech, we pride ourselves on our culture, which drives everything we do. We seek individuals who share our values and wish to be part of a collaborative and innovative environment. If you are committed to driving engagement and excellence through teamwork, customer-centricity, and integrity, consider joining the Zaintech family.
Our Code of Conduct:
We strictly adhere to our code of conduct, serving as a moral compass that guides responsible behavior and ethical decision-making. It outlines policies, standards, and procedures across our global operations, fostering integrity and ethical excellence. All employees review and confirm their understanding of this code annually, including new hires during onboarding.
Role Summary:
This role involves designing, performing, and managing cybersecurity audits to evaluate organizational compliance with relevant policies, standards, and controls. The auditor prepares reports and communicates findings to authorized parties.
Duties and Responsibilities:
- Maintain a deployable cyber defense audit toolkit aligned with industry best practices.
- Perform system administration on specialized cybersecurity applications and systems.
- Conduct risk analyses following major system changes.
- Prepare cybersecurity assessment and audit reports, including findings and remediation recommendations.
- Track audit findings and ensure mitigation actions are implemented.
- Manage vulnerability remediation processes.
- Maintain audit logs evidencing security measures.
- Participate in audits of cyber programs and projects.
- Stay informed on cybersecurity policies, regulations, and compliance requirements.
- Audit application software, networks, and systems for security gaps, providing remediation suggestions.
- Develop cybersecurity compliance processes for third-party services.
- Review and align cybersecurity policies with organizational objectives.
- Document security design and development activities.
- Ensure comprehensive cybersecurity testing across infrastructure and policies.
- Collaborate with external auditors on secure information sharing.
Skills:
- Core cybersecurity principles application.
- Understanding of security system operations and change impacts.
- Vulnerability recognition and categorization.
- Conducting cybersecurity audits and reviews.
- Designing cybersecurity test plans.
- Assessing security controls and using security tools effectively.
- Root cause analysis for cybersecurity issues.
- Clear communication and briefing skills.
- Feedback utilization for process improvement.
- Determining security control requirements.
- Performance measurement and improvement actions.
- Applying cybersecurity controls appropriately.
- Test infrastructure evaluation.
- Effective customer communication.
- Test asset management.
- Preparing reports and log review for intrusions.
- Troubleshooting cybersecurity infrastructure anomalies.
- Proficiency with HR IT systems and system reviews.
Needed Knowledge:
- Network components, operations, and security controls.
- Risk assessment, mitigation, and management.
- Legislative and regulatory cybersecurity requirements.
- Cybersecurity threats, vulnerabilities, and operational impacts.
- Authentication, authorization, and access control methods.
- Business practices and cybersecurity tools.
- Business continuity, disaster recovery, and organizational cybersecurity architecture.
- Assessment and authorization processes.
- Cybersecurity and privacy principles.
- IT security principles and lifecycle management.
- National cybersecurity regulations.
- Core business processes and cybersecurity impacts.
- Process improvement and maturity models.
- Data classification and information sharing standards.
Be The First To Know
About the latest National cybersecurity center Jobs in Saudi Arabia !
Cybersecurity Auditor (KSA National)
Posted 15 days ago
Job Viewed
Job Description
Designs, performs and manages cybersecurity audits to assess an organization s compliance with applicable requirements, policies, standards and controls. Prepares audit reports and communicates them to authorized parties.
Duties and Responsibilities:
- Maintain a deployable cyber defense audit toolkit based on industry best practice to support cyber defense audits. Perform system administration on specialized cybersecurity applications and systems.
- Perform risk analysis whenever an application or system undergoes a major change. Prepare cybersecurity assessment and audit reports that identify technical and procedural findings, and include recommended remediation strategies and solutions.
- Track audit findings and recommendations to ensure that appropriate mitigation actions are taken. Effectively manage vulnerability remediation. Ensure an audit log of evidence of security measures is maintained. Review, conduct, or participate in audits of cyber programs and projects.
- Maintain knowledge of applicable cybersecurity defense policies, regulations and compliance documents as they pertain to cybersecurity defense auditing.
- Carry out an audit of application software/network/system security against documented cybersecurity policies and provide recommendations for remediation where gaps appear.
- Develop cybersecurity compliance processes and audits for services provided by third parties.
- Regularly review and ensure that cybersecurity policies and related documentation are aligned with the organization's stated business objectives and strategy.
- Ensure that security design and cybersecurity development activities are appropriately documented.
- Ensure that cybersecurity audits test all relevant aspects of the organization's infrastructure and policy compliance.
- Develop processes with any external auditors on information sharing in a secure manner.
Desired Candidate Profile
Skills
- Skill in applying core cybersecurity principles.
- Skill in determining the normal operational state for security systems and how that state is affected by change.
- Skill in effectively recognizing and categorizing types of vulnerabilities and associated attacks.
- Skill in conducting cybersecurity audits or reviews of technical systems.
- Skill in designing appropriate cybersecurity test plans.
- Skill in assessing security controls based on cybersecurity principles and tenets.
- Skill in using security event correlation tools effectively.
- Skill in using code analysis tools effectively.
- Skill in effectively performing root cause analysis for cybersecurity issues.
- Skill in effectively preparing and presenting briefings in a clear and concise manner.
- Skill in utilizing feedback to improve cybersecurity processes, products and services.
- Skill in determining the security control requirements of information systems and networks.
- Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance as necessary.
- Skill in applying appropriate cybersecurity controls.
- Skill in identifying test and evaluation infrastructure requirements.
- Skill in communicating with customers.
- Skill in managing test assets and resources to ensure effective completion of test events.
- Skill in preparing test and evaluation reports. Skill in reviewing logs to identify evidence of intrusions and other suspicious behavior.
- Skill in troubleshooting and diagnosing cybersecurity defense infrastructure anomalies and determining the root cause.
- Skill in using HR IT systems.
- Skill in conducting cybersecurity reviews of systems.
- Skill in understanding network systems management principles, models, methods and tools.
Needed Knowledge:
- Knowledge of network components, their operation and appropriate network security controls and methods.
- Knowledge and understanding of risk assessment, mitigation and management methods.
- Knowledge of relevant cybersecurity aspects of legislative and regulatory requirements, relating to ethics and privacy. Knowledge of the principles of cybersecurity and privacy
- Knowledge of cybersecurity related threats and vulnerabilities.
- Knowledge of the likely operational impact on an organization of cybersecurity breaches.
- Knowledge of cybersecurity authentication, authorization and access control methods.
- Knowledge of business practices within organizations.
- Knowledge of cybersecurity defense and vulnerability assessment tools and their capabilities.
- Knowledge of cybersecurity aspects of business continuity and disaster recovery planning and including testing.
- Knowledge of the organization's enterprise cybersecurity architecture.
- Knowledge of cybersecurity assessment and authorization processes.
- Knowledge of cybersecurity and privacy principles and organizational requirements.
- Knowledge of IT security principles and methods.
- Knowledge of all aspects of system lifecycle management.
- Knowledge of the national cybersecurity regulations and requirements relevant to the organization.
- Knowledge of the organization's core business processes and how cybersecurity affects them.
- Knowledge of organizational process improvement concepts and process maturity models.
- Knowledge of an organization's cybersecurity data classification requirement.
- Knowledge of the principal methods, procedures and techniques for gathering, producing, reporting and sharing cybersecurity information.
- Knowledge of the organization's evaluation and validation requirements in relation to cybersecurity risk management.
- Knowledge of the organization's local and wide area network connections and the risks they pose to its cybersecurity.
- Knowledge of best practices for reviewing and determining the suitability of technology solutions to meet cybersecurity requirements.
- Knowledge of all-source reporting and appropriate dissemination procedures.
- Knowledge of best practice auditing and logging procedures.
- Knowledge of formats and best practice for issuing cybersecurity compliance reports to external partners.
- Knowledge of the organization's formats for management and compliance reporting relating to cybersecurity risks, readiness and progress against plans.
- Knowledge of national and organizational document and information classification and marking standards, policies and procedures.
Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at
People Looking for Auditor Jobs also searched #J-18808-LjbffrCybersecurity Auditor (KSA National)
Posted today
Job Viewed
Job Description
Our Culture:
At Zaintech we are proud of our culture and how it drives everything we do. We are looking for individuals who share our values and want to be part of a unique and engaging culture that revolves around collaboration and innovation. If you are looking for a role where you can drive engagement and excellence across teams through commitment and collaboration, and are someone who is customer-centric and appreciates an organization with uncompromised integrity that focuses on employee engagement then read on to learn more about how you can become part of the Zaintech family.
Our Code of Conduct:
At Zaintech we strictly adhere to our code of conduct, which is there to serve as a moral compass, offering a framework for responsible behaviours and enabling ethical choices that cultivate positive relationships and a better future. It also outlines policies, standards, and procedures for our global operations, promoting integrity and ethical excellence across the countries we engage with.
Every year, all employees are required to review, comprehend, confirm, and adhere to the code of conduct. Additionally, all newly hired employees are subject to the same as part of their onboarding process.
Role Summary:
Designs, performs and manages cybersecurity audits to assess an organization’s compliance with applicable requirements, policies, standards and controls. Prepares audit reports and communicates them to authorized parties.
Duties and Responsibilities:
- Maintain a deployable cyber defense audit toolkit based on industry best practice to support cyber defense audits. · Perform system administration on specialized cybersecurity applications and systems.
- Perform risk analysis whenever an application or system undergoes a major change. · Prepare cybersecurity assessment and audit reports that identify technical and procedural findings, and include recommended remediation strategies and solutions.
- Track audit findings and recommendations to ensure that appropriate mitigation actions are taken. · Effectively manage vulnerability remediation. · Ensure an audit log of evidence of security measures is maintained. · Review, conduct, or participate in audits of cyber programs and projects.
- Maintain knowledge of applicable cybersecurity defense policies, regulations and compliance documents as they pertain to cybersecurity defense auditing.
- Carry out an audit of application software/network/system security against documented cybersecurity policies and provide recommendations for remediation where gaps appear.
- Develop cybersecurity compliance processes and audits for services provided by third parties.
- Regularly review and ensure that cybersecurity policies and related documentation are aligned with the organization's stated business objectives and strategy.
- Ensure that security design and cybersecurity development activities are appropriately documented.
- Ensure that cybersecurity audits test all relevant aspects of the organization's infrastructure and policy compliance.
- Develop processes with any external auditors on information sharing in a secure manner.
Skills
- Skill in applying core cybersecurity principles.
- Skill in determining the normal operational state for security systems and how that state is affected by change.
- Skill in effectively recognizing and categorizing types of vulnerabilities and associated attacks.
- Skill in conducting cybersecurity audits or reviews of technical systems.
- Skill in designing appropriate cybersecurity test plans.
- Skill in assessing security controls based on cybersecurity principles and tenets.
- Skill in using security event correlation tools effectively.
- Skill in using code analysis tools effectively.
- Skill in effectively performing root cause analysis for cybersecurity issues.
- Skill in effectively preparing and presenting briefings in a clear and concise manner.
- Skill in utilizing feedback to improve cybersecurity processes, products and services.
- Skill in determining the security control requirements of information systems and networks.
- Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance as necessary.
- Skill in applying appropriate cybersecurity controls.
- Skill in identifying test and evaluation infrastructure requirements.
- Skill in communicating with customers.
- Skill in managing test assets and resources to ensure effective completion of test events.
- Skill in preparing test and evaluation reports. · Skill in reviewing logs to identify evidence of intrusions and other suspicious behavior.
- Skill in troubleshooting and diagnosing cybersecurity defense infrastructure anomalies and determining the root cause.
- Skill in using HR IT systems.
- Skill in conducting cybersecurity reviews of systems.
- Skill in understanding network systems management principles, models, methods and tools.
Needed Knowledge:
- Knowledge of network components, their operation and appropriate network security controls and methods.
- Knowledge and understanding of risk assessment, mitigation and management methods.
- Knowledge of relevant cybersecurity aspects of legislative and regulatory requirements, relating to ethics and privacy. · Knowledge of the principles of cybersecurity and privacy
- Knowledge of cybersecurity related threats and vulnerabilities.
- Knowledge of the likely operational impact on an organization of cybersecurity breaches.
- Knowledge of cybersecurity authentication, authorization and access control methods.
- Knowledge of business practices within organizations.
- Knowledge of cybersecurity defense and vulnerability assessment tools and their capabilities.
- Knowledge of cybersecurity aspects of business continuity and disaster recovery planning and including testing.
- Knowledge of the organization's enterprise cybersecurity architecture.
- Knowledge of cybersecurity assessment and authorization processes.
- Knowledge of cybersecurity and privacy principles and organizational requirements.
- Knowledge of IT security principles and methods.
- Knowledge of all aspects of system lifecycle management.
- Knowledge of the national cybersecurity regulations and requirements relevant to the organization.
- Knowledge of the organization's core business processes and how cybersecurity affects them.
- Knowledge of organizational process improvement concepts and process maturity models.
- Knowledge of an organization's cybersecurity data classification requirement.
- Knowledge of the principal methods, procedures and techniques for gathering, producing, reporting and sharing cybersecurity information. ·
- Knowledge of the organization's evaluation and validation requirements in relation to cybersecurity risk management.
- Knowledge of the organization's local and wide area network connections and the risks they pose to its cybersecurity.
- Knowledge of best practices for reviewing and determining the suitability of technology solutions to meet cybersecurity requirements.
- Knowledge of all-source reporting and appropriate dissemination procedures.
- Knowledge of best practice auditing and logging procedures.
- Knowledge of formats and best practice for issuing cybersecurity compliance reports to external partners.
- Knowledge of the organization's formats for management and compliance reporting relating to cybersecurity risks, readiness and progress against plans.
- Knowledge of national and organizational document and information classification and marking standards, policies and procedures.
Cybersecurity Auditor (KSA National)
Posted today
Job Viewed
Job Description
Our Culture:
At Zaintech we are proud of our culture and how it drives everything we do. We are looking for individuals who share our values and want to be part of a unique and engaging culture that revolves around collaboration and innovation. If you are looking for a role where you can drive engagement and excellence across teams through commitment and collaboration, and are someone who is customer-centric and appreciates an organization with uncompromised integrity that focuses on employee engagement then read on to learn more about how you can become part of the Zaintech family.
Our Code of Conduct:
At Zaintech we strictly adhere to our code of conduct, which is there to serve as a moral compass, offering a framework for responsible behaviours and enabling ethical choices that cultivate positive relationships and a better future. It also outlines policies, standards, and procedures for our global operations, promoting integrity and ethical excellence across the countries we engage with.
Every year, all employees are required to review, comprehend, confirm, and adhere to the code of conduct. Additionally, all newly hired employees are subject to the same as part of their onboarding process.
Role Summary:
Designs, performs and manages cybersecurity audits to assess an organization’s compliance with applicable requirements, policies, standards and controls. Prepares audit reports and communicates them to authorized parties.
Duties and Responsibilities:
- Maintain a deployable cyber defense audit toolkit based on industry best practice to support cyber defense audits. · Perform system administration on specialized cybersecurity applications and systems.
- Perform risk analysis whenever an application or system undergoes a major change. · Prepare cybersecurity assessment and audit reports that identify technical and procedural findings, and include recommended remediation strategies and solutions.
- Track audit findings and recommendations to ensure that appropriate mitigation actions are taken. · Effectively manage vulnerability remediation. · Ensure an audit log of evidence of security measures is maintained. · Review, conduct, or participate in audits of cyber programs and projects.
- Maintain knowledge of applicable cybersecurity defense policies, regulations and compliance documents as they pertain to cybersecurity defense auditing.
- Carry out an audit of application software/network/system security against documented cybersecurity policies and provide recommendations for remediation where gaps appear.
- Develop cybersecurity compliance processes and audits for services provided by third parties.
- Regularly review and ensure that cybersecurity policies and related documentation are aligned with the organization's stated business objectives and strategy.
- Ensure that security design and cybersecurity development activities are appropriately documented.
- Ensure that cybersecurity audits test all relevant aspects of the organization's infrastructure and policy compliance.
- Develop processes with any external auditors on information sharing in a secure manner.
Skills
- Skill in applying core cybersecurity principles.
- Skill in determining the normal operational state for security systems and how that state is affected by change.
- Skill in effectively recognizing and categorizing types of vulnerabilities and associated attacks.
- Skill in conducting cybersecurity audits or reviews of technical systems.
- Skill in designing appropriate cybersecurity test plans.
- Skill in assessing security controls based on cybersecurity principles and tenets.
- Skill in using security event correlation tools effectively.
- Skill in using code analysis tools effectively.
- Skill in effectively performing root cause analysis for cybersecurity issues.
- Skill in effectively preparing and presenting briefings in a clear and concise manner.
- Skill in utilizing feedback to improve cybersecurity processes, products and services.
- Skill in determining the security control requirements of information systems and networks.
- Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance as necessary.
- Skill in applying appropriate cybersecurity controls.
- Skill in identifying test and evaluation infrastructure requirements.
- Skill in communicating with customers.
- Skill in managing test assets and resources to ensure effective completion of test events.
- Skill in preparing test and evaluation reports. · Skill in reviewing logs to identify evidence of intrusions and other suspicious behavior.
- Skill in troubleshooting and diagnosing cybersecurity defense infrastructure anomalies and determining the root cause.
- Skill in using HR IT systems.
- Skill in conducting cybersecurity reviews of systems.
- Skill in understanding network systems management principles, models, methods and tools.
Needed Knowledge:
- Knowledge of network components, their operation and appropriate network security controls and methods.
- Knowledge and understanding of risk assessment, mitigation and management methods.
- Knowledge of relevant cybersecurity aspects of legislative and regulatory requirements, relating to ethics and privacy. · Knowledge of the principles of cybersecurity and privacy
- Knowledge of cybersecurity related threats and vulnerabilities.
- Knowledge of the likely operational impact on an organization of cybersecurity breaches.
- Knowledge of cybersecurity authentication, authorization and access control methods.
- Knowledge of business practices within organizations.
- Knowledge of cybersecurity defense and vulnerability assessment tools and their capabilities.
- Knowledge of cybersecurity aspects of business continuity and disaster recovery planning and including testing.
- Knowledge of the organization's enterprise cybersecurity architecture.
- Knowledge of cybersecurity assessment and authorization processes.
- Knowledge of cybersecurity and privacy principles and organizational requirements.
- Knowledge of IT security principles and methods.
- Knowledge of all aspects of system lifecycle management.
- Knowledge of the national cybersecurity regulations and requirements relevant to the organization.
- Knowledge of the organization's core business processes and how cybersecurity affects them.
- Knowledge of organizational process improvement concepts and process maturity models.
- Knowledge of an organization's cybersecurity data classification requirement.
- Knowledge of the principal methods, procedures and techniques for gathering, producing, reporting and sharing cybersecurity information. ·
- Knowledge of the organization's evaluation and validation requirements in relation to cybersecurity risk management.
- Knowledge of the organization's local and wide area network connections and the risks they pose to its cybersecurity.
- Knowledge of best practices for reviewing and determining the suitability of technology solutions to meet cybersecurity requirements.
- Knowledge of all-source reporting and appropriate dissemination procedures.
- Knowledge of best practice auditing and logging procedures.
- Knowledge of formats and best practice for issuing cybersecurity compliance reports to external partners.
- Knowledge of the organization's formats for management and compliance reporting relating to cybersecurity risks, readiness and progress against plans.
- Knowledge of national and organizational document and information classification and marking standards, policies and procedures.