48 Security Analysis jobs in Saudi Arabia
Cybersecurity Analyst
Posted 12 days ago
Job Viewed
Job Description
We are seeking a skilled and proactive Cybersecurity Analyst to join our team in Dammam, Saudi Arabia. The ideal candidate will be responsible for monitoring, analyzing, and responding to cybersecurity incidents while ensuring the confidentiality, integrity, and availability of the organization’s systems and data.
Key Responsibilities:Monitor network and system activity for security breaches using SIEM tools and intrusion detection systems.
Conduct vulnerability assessments and penetration testing.
Analyze security alerts and determine appropriate response actions.
Investigate and document security incidents and breaches.
Collaborate with IT teams to implement security controls and best practices.
Assist in the development and enforcement of company-wide security policies and procedures.
Stay up to date with the latest security trends, threats, and technology solutions.
Support audits and compliance initiatives (e.g., ISO 27001, NCA, etc.).
Provide security awareness training to internal teams.
Requirements:Bachelor’s degree in Computer Science, Information Security, or related field.
Minimum 1 year of experience in cybersecurity or a related IT security role.
Strong understanding of network protocols, firewalls, VPNs, IDS/IPS, and endpoint protection.
Hands-on experience with security tools like SIEM, antivirus software, and vulnerability scanners.
Knowledge of cybersecurity frameworks (NIST, ISO, etc.).
Experience with incident response and digital forensics is a plus.
Industry certifications such as CEH, CompTIA Security+, CISSP (preferred but not mandatory).
Excellent problem-solving and analytical skills.
Strong communication and documentation abilities.
Location: Experience:1+ Years
Employment Type:Full-time
How to Apply:Interested candidates are invited to submit their resume to with the subject line “Cybersecurity Analyst Application”.
Apply for this positionLife at TeamYamama is more than just delivering exceptional work for our clients. We are a global community of passionate and skilled professionals who embrace challenges, celebrate achievements, foster diversity, and strive for continuous growth.
Full Name *
Email *
Phone *
Upload CV/Resume * Allowed Type(s): .pdf, .doc, .docx
#J-18808-LjbffrSENIOR CYBERSECURITY ANALYST.
Posted 12 days ago
Job Viewed
Job Description
Press Tab to Move to Skip to Content Link
Select how often (in days) to receive an alert:
The Senior Cybersecurity Analyst is responsible for implementing and maintaining the organization’s cybersecurity framework, utilizing their working knowledge in relevant technologies and processes to protect sensitive data and guard against malicious disruptions of business continuity at JHAH.
Strategic Roles & Responsibilities00
Operational Roles & Responsibilities100
- Implement, configure, maintain, support, and monitor the organization’s IT cybersecurity infrastructure, including firewalls, antivirus, encryption protocols, intrusion detection systems, access management systems, network monitoring solutions, security operations center systems, and other cybersecurity resources to ensure they are reliable, stable, scalable, secure, and perform optimally.
- Manage the organization’s cybersecurity governance, risk management, and compliance programs, enforcing adherence to controls, policies, procedures, standards, regulations, frameworks, and incident response plans through assessments, drills, training, and awareness campaigns.
- Detect and respond to cybersecurity incidents, intrusions, breaches, threats, and vulnerabilities in compliance with policies and procedures.
- Ensure cybersecurity infrastructure complies with best practices, regulatory requirements, enterprise architecture standards, governance programs, and cybersecurity policies.
- Manage engagements with contracted vendors for support, managed services, or professional services, ensuring service delivery meets scope, time, cost, and quality targets.
- Fulfill cybersecurity-related service requests in accordance with organizational policies and procedures.
- Evaluate and support the cybersecurity aspects of IT demand requests, ensuring compliance and following the IT project management framework.
Bachelor's Degree in Information Technology or a related field.
Professional Certifications RequiredPreferred certifications include: CISSP, Security+, CISM, GSEC, PMP, and ITIL.
Years of ExperienceMinimum 6 years of relevant experience.
LanguagesEnglish: Fully Proficient; Arabic: Not Required
- Audit Reporting
- Data Collection
- Integrity
- Accountability
- Cybersecurity
- Person-Centered Care
Please note this job description is not exhaustive and duties may change at any time with or without notice.
#J-18808-LjbffrCybersecurity GRC Analyst
Posted 1 day ago
Job Viewed
Job Description
To support the development, implementation, and maintenance of Governance, Risk, and Compliance (GRC) processes to ensure the Ejada adheres to inter(national) regulatory requirements, manages cybersecurity risks effectively, and aligns with industry standards & best practices.
Role and Responsibilities- Risk Assessment: Assist in identifying, analyzing, and documenting cybersecurity risks.
- Policy Development: Support the creation and maintenance of cybersecurity policies and procedures.
- Compliance Monitoring: Track and report on compliance with relevant inter(national) frameworks (e.g., ISO 27001, SAMA CSF, CST CRF, NCA Frameworks).
- Audit Support: Assist in preparing for internal and external cybersecurity audits.
- Vendor Risk Management: Conduct initial evaluations of third-party vendors for cybersecurity risks.
- Incident Reporting: Document and track cybersecurity incidents for risk analysis.
- Awareness Programs: Support the implementation of cybersecurity training and awareness initiatives.
- Documentation: Maintain and update records for risk assessments, compliance, and audit activities.
- Regulatory Research: Stay updated on emerging cybersecurity regulations and standards.
- Metrics Reporting: Generate and report GRC-related metrics for management review.
Bachelor’s Degree: A degree in Computer Science, Information Technology, Cybersecurity, or a related field is often preferred.Work Experience: 0-2 Years of experience in Cybersecurity
EducationComputer Science, Information Technology, Cybersecurity, or a related
Skills- TOOLS KNOWLEDGE: BASIC UNDERSTANDING OF GRC TOOLS (E.G., ARCHER, SERVICENOW GRC) AND MICROSOFT OFFICE SUITE.
- RISK ANALYSIS SKILLS: BASIC UNDERSTANDING OF RISK ASSESSMENT METHODOLOGIES.
- CONTINUOUS LEARNING: ENTRY-LEVEL CERTIFICATIONS LIKE COMPTIA SECURITY+, ISO 27001 FOUNDATION, …ETC
- COMMUNICATION SKILLS: STRONG WRITTEN AND VERBAL COMMUNICATION FOR DOCUMENTATION AND STAKEHOLDER ENGAGEMENT.
- ANALYTICAL SKILLS: GOOD ANALYTICAL AND PROBLEM-SOLVING SKILLS TO ASSESS GOVERNANCE, RISK, & COMPLIANCE AND RECOMMEND SOLUTIONS.
Cybersecurity Defense Analyst
Posted 12 days ago
Job Viewed
Job Description
Help AG is looking for a talented and enthusiastic Cybersecurity Defense Analyst to join our Cybersecurity Operations Center (CSOC) team as part of our Managed Security Services (MSS) business unit. If you have strong knowledge and interest in Cybersecurity, this position might be the right one for you. The Senior Cybersecurity Defense Analyst will be responsible for monitoring multiple client environments, guiding, leading other Security Analysts, and conducting forensic analysis and threat hunting to detect and identify Cybersecurity incidents/breaches. The candidate is also expected to be up to date with Cybersecurity intelligence and threat landscape.
Responsibilities
- Monitor multiple security technologies, such as IDS/IPS, Firewalls, Switches, VPNs, and other security threat data sources.
- Correlate and analyze events using SIEM tools to detect security incidents.
- Create, follow and present detailed operational process and procedures to appropriately analyze, escalate, and assist in remediation of critical information security incidents.
- Respond to inbound requests via phone and other electronic means for technical assistance with managed services.
- Respond in a timely manner (within documented SLA) to support, investigate, and other cases.
- Document actions in cases to effectively communicate information internally and to customers.
- Resolve problems independently and understand escalation procedure.
- Maintain a high degree of awareness of current threat landscape and cybersecurity intelligence.
- Spread the cybersecurity intelligence across the team of analysts and engage in threat hunting activities.
- Lead delivery, and support others in the delivery, of knowledge sharing with analysts and writing technical articles for Internal knowledge bases, blog posts and reports as requested.
- Perform other essential duties as assigned.
- Analysis of log files, includes forensic analysis of system resource access.
- Create, follow and present customer reports to ensure quality, accuracy, and value to clients.
- Creation of new content (Use Cases, Queries, Reports) within the SIEM platform.
- Education and training of other analysts in use and operation of SIEM platform.
- On-site work with clients as required.
- Engage with client Incident Response team as required.
- Generate cybersecurity Threat Intelligence reports.
- Saudi National will be preferrable.
- Bachelor’s or master’s degree in Cybersecurity, Computer Science, Information Systems, Electrical Engineering, or a closely related degree.
- An active interest and passion in cybersecurity, incident detection, network, and systems security.
- 1 - 5 years of experience in cybersecurity, in areas such as security operations, intrusion detection, incident analysis, incident handling, log analysis, threat intelligence/hunting or digital forensics.
- A sound knowledge of IT security best practices, common attack types and detection / prevention methods.
- Demonstrable experience of analyzing and interpreting system, security, and application logs. Knowledge of the type of events that both Firewalls, IDS/IPS and other security related devices produce.
- Experience in using Splunk as an analyst for Threat and Incident Detection is required.
- Experience with ArcSight, LogRhythm, QRadar, is preferable but not mandatory.
- Strong understanding of Cyber Kill Chain and MITRE ATT&CK frameworks and techniques.
- Solid understanding of TCP/IP and network concepts and principles.
- Possible attack activities, such as scans, man in the middle, sniffing, DoS, DDoS.
- Professional certificates are highly preferred (e.g., CCIE, OSCP, CISSP, GSEC, GCIA, GCIH, GMON, GREM, GDAT, GCFE, etc.).
- An experienced Analyst who aspires to be a leader and is committed to learning the principles of leadership and the role of a leader.
- Outstanding organizational skills.
- Exclusive focus and vast experience in IT.
- Very good communication skills.
- Strong analytical and problem-solving skills.
- A motivated, self-managed, individual who can demonstrate exceptional analytical skills and work professionally with peers and customers even under pressure.
- Strong written and verbal skills.
- Strong interpersonal skills with the ability to collaborate well with others.
- Ability to speak and write in English is required; Ability to speak and write in both English and Arabic is preferred.
- Well-versed in developing content for SIEM (creating, fine tuning) use cases and rules.
- Experience with automation tools (SOAR) is preferred.
- Experience in Malware Analysis / Reverse Engineering is preferred.
- Health insurance with one of the leading global providers for medical insurance.
- Career progression and growth through challenging projects and work.
- Employee engagement activities throughout the year.
- Tailored training & development program.
Help AG is the cyber security arm of e& enterprise and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Present in the Middle East since 2004, Help AG was strategically acquired by Etisalat group in Feb 2020, hence creating a cyber security and digital transformation powerhouse in the region.
Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendoragnostic, trustworthy, independent, and cyber security focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.
#J-18808-LjbffrCybersecurity Defense Analyst
Posted today
Job Viewed
Job Description
Help AG is looking for a talented and enthusiastic Cybersecurity Defense Analyst to join our Cybersecurity Operations Center (CSOC) team as part of our Managed Security Services (MSS) business unit. If you have strong knowledge and interest in Cybersecurity, this position might be the right one for you. The Senior Cybersecurity Defense Analyst will be responsible for monitoring multiple client environments, guiding, leading other Security Analysts, and conducting forensic analysis and threat hunting to detect and identify Cybersecurity incidents/breaches. The candidate is also expected to be up to date with Cybersecurity intelligence and threat landscape.
Responsibilities- Monitor multiple security technologies, such as IDS/IPS, Firewalls, Switches, VPNs, and other security threat data sources.
- Correlate and analyze events using SIEM tools to detect security incidents.
- Create, follow and present detailed operational process and procedures to appropriately analyze, escalate, and assist in remediation of critical information security incidents.
- Respond to inbound requests via phone and other electronic means for technical assistance with managed services.
- Respond in a timely manner (within documented SLA) to support, investigate, and other cases.
- Document actions in cases to effectively communicate information internally and to customers.
- Resolve problems independently and understand escalation procedure.
- Maintain a high degree of awareness of current threat landscape and cybersecurity intelligence.
- Spread the cybersecurity intelligence across the team of analysts and engage in threat hunting activities.
- Lead delivery, and support others in the delivery, of knowledge sharing with analysts and writing technical articles for Internal knowledge bases, blog posts and reports as requested.
- Perform other essential duties as assigned.
- Analysis of log files, includes forensic analysis of system resource access.
- Create, follow and present customer reports to ensure quality, accuracy, and value to clients.
- Creation of new content (Use Cases, Queries, Reports) within the SIEM platform.
- Education and training of other analysts in use and operation of SIEM platform.
- On-site work with clients as required.
- Engage with client Incident Response team as required.
- Generate cybersecurity Threat Intelligence reports.
- Saudi National will be preferrable.
- Bachelor’s or master’s degree in Cybersecurity, Computer Science, Information Systems, Electrical Engineering, or a closely related degree.
- An active interest and passion in cybersecurity, incident detection, network, and systems security.
- 1 - 5 years of experience in cybersecurity, in areas such as security operations, intrusion detection, incident analysis, incident handling, log analysis, threat intelligence/hunting or digital forensics.
- A sound knowledge of IT security best practices, common attack types and detection / prevention methods.
- Demonstrable experience of analyzing and interpreting system, security, and application logs. Knowledge of the type of events that both Firewalls, IDS/IPS and other security related devices produce.
- Experience in using Splunk as an analyst for Threat and Incident Detection is required.
- Experience with ArcSight, LogRhythm, QRadar, is preferable but not mandatory.
- Strong understanding of Cyber Kill Chain and MITRE ATT&CK frameworks and techniques.
- Solid understanding of TCP/IP and network concepts and principles.
- Possible attack activities, such as scans, man in the middle, sniffing, DoS, DDoS.
- Professional certificates are highly preferred (e.g., CCIE, OSCP, CISSP, GSEC, GCIA, GCIH, GMON, GREM, GDAT, GCFE, etc.).
- An experienced Analyst who aspires to be a leader and is committed to learning the principles of leadership and the role of a leader.
- Outstanding organizational skills.
- Exclusive focus and vast experience in IT.
- Very good communication skills.
- Strong analytical and problem-solving skills.
- A motivated, self-managed, individual who can demonstrate exceptional analytical skills and work professionally with peers and customers even under pressure.
- Strong written and verbal skills.
- Strong interpersonal skills with the ability to collaborate well with others.
- Ability to speak and write in English is required; Ability to speak and write in both English and Arabic is preferred.
- Well-versed in developing content for SIEM (creating, fine tuning) use cases and rules.
- Experience with automation tools (SOAR) is preferred.
- Experience in Malware Analysis / Reverse Engineering is preferred.
- Health insurance with one of the leading global providers for medical insurance.
- Career progression and growth through challenging projects and work.
- Employee engagement activities throughout the year.
- Tailored training & development program.
Help AG is the cyber security arm of e& enterprise and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Present in the Middle East since 2004, Help AG was strategically acquired by Etisalat group in Feb 2020, hence creating a cyber security and digital transformation powerhouse in the region.
Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendoragnostic, trustworthy, independent, and cyber security focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.
#J-18808-LjbffrCybersecurity GRC Analyst
Posted today
Job Viewed
Job Description
To support the development, implementation, and maintenance of Governance, Risk, and Compliance (GRC) processes to ensure the Ejada adheres to inter(national) regulatory requirements, manages cybersecurity risks effectively, and aligns with industry standards & best practices.
Role and Responsibilities- Risk Assessment: Assist in identifying, analyzing, and documenting cybersecurity risks.
- Policy Development: Support the creation and maintenance of cybersecurity policies and procedures.
- Compliance Monitoring: Track and report on compliance with relevant inter(national) frameworks (e.g., ISO 27001, SAMA CSF, CST CRF, NCA Frameworks).
- Audit Support: Assist in preparing for internal and external cybersecurity audits.
- Vendor Risk Management: Conduct initial evaluations of third-party vendors for cybersecurity risks.
- Incident Reporting: Document and track cybersecurity incidents for risk analysis.
- Awareness Programs: Support the implementation of cybersecurity training and awareness initiatives.
- Documentation: Maintain and update records for risk assessments, compliance, and audit activities.
- Regulatory Research: Stay updated on emerging cybersecurity regulations and standards.
- Metrics Reporting: Generate and report GRC-related metrics for management review.
Bachelor’s Degree: A degree in Computer Science, Information Technology, Cybersecurity, or a related field is often preferred.Work Experience: 0-2 Years of experience in Cybersecurity
EducationComputer Science, Information Technology, Cybersecurity, or a related
Skills- TOOLS KNOWLEDGE: BASIC UNDERSTANDING OF GRC TOOLS (E.G., ARCHER, SERVICENOW GRC) AND MICROSOFT OFFICE SUITE.
- RISK ANALYSIS SKILLS: BASIC UNDERSTANDING OF RISK ASSESSMENT METHODOLOGIES.
- CONTINUOUS LEARNING: ENTRY-LEVEL CERTIFICATIONS LIKE COMPTIA SECURITY+, ISO 27001 FOUNDATION, …ETC
- COMMUNICATION SKILLS: STRONG WRITTEN AND VERBAL COMMUNICATION FOR DOCUMENTATION AND STAKEHOLDER ENGAGEMENT.
- ANALYTICAL SKILLS: GOOD ANALYTICAL AND PROBLEM-SOLVING SKILLS TO ASSESS GOVERNANCE, RISK, & COMPLIANCE AND RECOMMEND SOLUTIONS.
Cybersecurity Operations Analyst Senior Specialist
Posted 12 days ago
Job Viewed
Job Description
Role Main Purpose:
The Cybersecurity Operations Analyst will support the day-to-day operations of the organization’s cybersecurity team with a strong focus on security monitoring, alert triage, and incident response support. This role will work with the Cybersecurity Manager to monitor systems using the organization’s SIEM and EDR solutions, investigate anomalies, and ensure threats are identified and escalated effectively along with reviewing the implementation of cybersecurity procedures.
Operational Responsibilities:
- Monitor security events and alerts using the organization’s SIEM (Security Information and Event Management) platform
- Review and triage alerts from the EDR (Endpoint Detection and Response) solution
- Perform initial investigation and classification of security events
- Conduct log analysis across Linux and Windows systems to identify potential threats
- Escalate confirmed or suspicious incidents to the Cybersecurity Manager
- Document and track findings and responses using the internal ticketing system
- Assist in threat hunting exercises and participate in simulated incident response drills
- Monitor and enforce endpoint health status and compliance
- Support the implementation of new security monitoring rules and detections
- Maintain awareness of current cyber threats and share intelligence with the team
- Participate in the review and continuous improvement of monitoring playbooks and workflows
- Pre-purchase audit.
- Help Develop Security Policies.
Education & Experience:
- Bachelor’s degree in Cybersecurity, Information Security, Computer Science, or related field (or equivalent experience)
- 3–5 years of experience in IT security or SOC operations
Practical Experiences with:
- SIEM platforms (e.g., Splunk, QRadar, Microsoft Sentinel)
- EDR solutions (e.g., SentinelOne, CrowdStrike, Sophos)
- Linux systems (navigation, log review, command line tools)
Strong Understanding of:
- Common attack techniques and MITRE ATT&CK framework
- Event log types (auth, syslog, web logs, etc.)
- Ability to read, analyze, and correlate security logs
- Good written and verbal communication skills in English and Arabic
Knowledge & Skills:
- Security certifications: CEH, eCTHP, GSEC, Blue Team Level 1 (BTL1), or similar
- Familiar with Cloud providers, AWS, Oracle etc…
Familiarity with:
- Incident response lifecycle
- Basic scripting (Bash, Python, PowerShell)
- Asset inventory or vulnerability management tools
- Previous experience in a Security Operations Center (SOC) or blue team environment
Be The First To Know
About the latest Security analysis Jobs in Saudi Arabia !
Cybersecurity Operations Analyst Senior Specialist
Posted today
Job Viewed
Job Description
Role Main Purpose:
The Cybersecurity Operations Analyst will support the day-to-day operations of the organization’s cybersecurity team with a strong focus on security monitoring, alert triage, and incident response support. This role will work with the Cybersecurity Manager to monitor systems using the organization’s SIEM and EDR solutions, investigate anomalies, and ensure threats are identified and escalated effectively along with reviewing the implementation of cybersecurity procedures.
Operational Responsibilities:
- Monitor security events and alerts using the organization’s SIEM (Security Information and Event Management) platform
- Review and triage alerts from the EDR (Endpoint Detection and Response) solution
- Perform initial investigation and classification of security events
- Conduct log analysis across Linux and Windows systems to identify potential threats
- Escalate confirmed or suspicious incidents to the Cybersecurity Manager
- Document and track findings and responses using the internal ticketing system
- Assist in threat hunting exercises and participate in simulated incident response drills
- Monitor and enforce endpoint health status and compliance
- Support the implementation of new security monitoring rules and detections
- Maintain awareness of current cyber threats and share intelligence with the team
- Participate in the review and continuous improvement of monitoring playbooks and workflows
- Pre-purchase audit.
- Help Develop Security Policies.
Education & Experience:
- Bachelor’s degree in Cybersecurity, Information Security, Computer Science, or related field (or equivalent experience)
- 3–5 years of experience in IT security or SOC operations
Practical Experiences with:
- SIEM platforms (e.g., Splunk, QRadar, Microsoft Sentinel)
- EDR solutions (e.g., SentinelOne, CrowdStrike, Sophos)
- Linux systems (navigation, log review, command line tools)
Strong Understanding of:
- Common attack techniques and MITRE ATT&CK framework
- Event log types (auth, syslog, web logs, etc.)
- Ability to read, analyze, and correlate security logs
- Good written and verbal communication skills in English and Arabic
Knowledge & Skills:
- Security certifications: CEH, eCTHP, GSEC, Blue Team Level 1 (BTL1), or similar
- Familiar with Cloud providers, AWS, Oracle etc…
Familiarity with:
- Incident response lifecycle
- Basic scripting (Bash, Python, PowerShell)
- Asset inventory or vulnerability management tools
- Previous experience in a Security Operations Center (SOC) or blue team environment
Security analyst
Posted 2 days ago
Job Viewed
Job Description
Security Analyst - Jeddah, Saudi Arabia
A leading security firm in Jeddah is seeking a skilled and experienced Security Analyst to join our team. As a Security Analyst, you will be responsible for monitoring, evaluating and improving the security systems and protocols of our company. Your primary role will be to identify potential security risks and vulnerabilities, conduct regular security audits, and develop effective strategies to mitigate any threats.
Requirements:
- Bachelor's degree in Computer Science, Information Security or related field
- Minimum of 3 years experience in information security or related field
- Strong knowledge of security protocols and systems
- Familiarity with risk assessment tools and techniques
- Excellent communication skills in English (knowledge of Nepali is a plus)
- Ability to work independently and in a team environment
- High level of attention to detail
- Saudi Arabian nationality preferred (but not required)
Responsibilities:
- Monitor security systems and networks for potential threats
- Conduct regular risk assessments to identify vulnerabilities within the company's systems
- Develop and implement effective strategies to mitigate potential risks and vulnerabilities
- Collaborate with other departments to ensure compliance with security protocols
- Stay up-to-date on the latest security trends and technologies
- Conduct regular audits of company's security infrastructure
- Respond promptly to any security incidents or breaches
- Provide training and guidance on best practices for information security
Salary:
We offer a competitive salary of $1300 per month, as well as opportunities for career growth within our company.
Location:
This position is located in Jeddah, Saudi Arabia. However, we welcome applicants from all nationalities who are able to work legally in the country.
Working Hours:
This is a full-time position with working hours from 9am to 5pm, Sunday through Thursday. Part-time options may also be available.
Accommodation:
Please note that this position does not include accommodation. Applicants must have their own housing arrangements in Jeddah.
If you are a highly motivated and skilled Security Analyst looking for a challenging role with a reputable company, we encourage you to apply for this position. Join our team and help us maintain the highest level of security for our clients and company.
This job has no reviews yet. You can be the first!
The most in-demand professions in Jeddah:
Users also frequently search in these cities:
More professions from the category Security - Security - Power structures:
Subscribe to our telegram channel @layboard_in
#J-18808-LjbffrSecurity Analyst
Posted 4 days ago
Job Viewed
Job Description
In this role, you will play a vital part in safeguarding sensitive data and systems through a combination of technical expertise and strategic thinking. Your responsibilities will include monitoring network security, responding to incidents, assessing vulnerabilities, and analyzing malware. Strong analytical skills and a keen eye for detail are essential to identify and address potential threats effectively. Problem-solving skills will also be crucial in devising and implementing innovative security solutions. The company culture values ownership, giving you the autonomy to make impactful decisions and take charge of security challenges. Overall, this role requires a proactive and vigilant approach to ensure the protection of valuable assets from cyber threats.
Skills
The candidate must have previous experience working in the role of a Security Analyst.Experience in network security protocols and tools to protect the organization's systems and data.
Proficiency in incident response procedures to effectively handle security breaches and incidents.
Knowledge of vulnerability assessment techniques to identify and address potential security risks.
Ability to conduct malware analysis to detect and mitigate threats.
Strong analytical thinking skills to evaluate security issues and develop effective solutions.
Attention to detail to accurately analyze security data and identify potential vulnerabilities.
Proven problem-solving abilities to address complex security challenges.
Demonstrated sense of ownership and accountability in handling security responsibilities. #J-18808-Ljbffr