109 Threat Intelligence jobs in Saudi Arabia
Cyber threat intelligence Analyst
Posted 1 day ago
Job Viewed
Job Description
The Cyber Threat Intelligence Analyst will deliver and develop strategic and tactical Cyber Threat Intelligence capabilities within the cyber security operations team.
The role holder will maintain a clear understanding of the threat landscape, identify new sources of intelligence, and aggregate and analyze data to provide accurate and actionable recommendations. They will help manage the complete cyber threat intelligence lifecycle and ensure that this is appropriately integrated into relevant processes and tools.
The Cyber Threat Intelligence Analyst will be responsible for compiling, articulating and presenting cyber threat intelligence briefings for the Senior Cyber Threat Analyst as well as compiling clear and concise threat intelligence reports.
Job Responsibilities
- Help develop, configure and manage a suite of cyber threat intelligence sources
- Evaluate intelligence for accuracy, reliability, and relevance across multiple intelligence sources
- Help develop and maintain close links with cyber threat intelligence functions within partner organizations and government agencies
- Perform analysis across the estate, looking for threats to critical infrastructure, resources and services
- Help develop and produce threat intelligence reports, to provide key metrics into other internal cyber functions (Security Incident Response, Threat Hunting, etc.).
- Carry out research and discovery across the estate with a view to producing reports on CTI detections and trends (i.e. highlighted IOCs, Vulnerabilities, Malware).
- Manage the complete IoC lifecycle
- Provide analysis to feed into the overall security posture, assisting with supporting activities to further increase defenses, harden potential attack surfaces and implement better protection mechanisms.
- Act as CTI lead in the handling and remediation of security incidents.
- Maintain strong awareness with stakeholder groups of current threat landscape
- Review, analyze and contextualize complex threat intelligence data for wider consumption with business partners
What You'll Need
Qualification Requirements (Desirable)
- Certifications in security (i.e. GCTI, GREM, GCFA, GCIH) desirable but not essential
- Degree or equivalent (i.e. MBA) desirable but not essential
- Comprehensive knowledge about vulnerability and security policies such as ISO standards
Skills / Experience Requirements
- 5+ years operational experience as a threat intelligence analyst, with good working knowledge of security incident response and malware analysis.
- Experience in threat modeling and common frameworks such as the cyber kill chain and MITRE.
- Hands-on experience with Network Security, Digital Forensics and IPS/IDS systems.
- Hands-on experience with dark web analysis, including the associated tooling and adversarial slang.
- Solid understanding of supporting frameworks like MITRE ATT&CK, LM Cyber Kill Chain, IA Diamond Model, etc.
- Knowledge of supporting processes, like DFIR, Threat Hunting, Malware Analysis and red/purple team exercises.
- Knowledge of threat intelligence tooling, both commercial and open source.
- Understanding of Security Operations and supporting functions, technologies and methodologies.
- Ability to document findings into reports that can be understood across all levels of the organization.
- Strong presentation and communication skills, both verbal and written.
- Working knowledge of threat hunting
No of Positions: 1
Note: The candidate would be expected to work in diverse consulting engagements and is willing to travel to Middle East countries for project execution at least 50% of their time.
Preference to candidates who can join immediately or within 15 days at the max.
Employment Type: Full-time
#J-18808-LjbffrCyber Threat Intelligence Analyst
Posted 12 days ago
Job Viewed
Job Description
Help Ag is looking for a Cyber Threat Intelligence Analyst (TIA) who will be a part of the Cyber Defense team, responsible to help collect, analyze, and disseminate cyber intelligence impacting the company or its customers. The ideal candidate will be a professional with experience in cyber intelligence/cyber risk, delivering equivalent services to organizations, with drive and creativity. This is a fantastic opportunity for a passionate professional that wants to evolve in the Cyber Intelligence world. The position will involve essential duties and responsibilities that must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work.
Responsibilities
Identify, collect, and perform analysis of raw, primary, and secondary data derived from various sources.
Create and update General Intelligence Requirements (GIR)s, Priority Intelligence Requirements (PIR)s, and Organization Specific Intelligence Requirements (OSIR)s for customers.
Create threat profiles and threat landscapes for companies and or customers.
Create diamond models around customers and threat adversaries.
Improve the creation and delivery of intelligence information to customers and partners, via different reports and tools, linking the dots and adding value to the service delivered.
Perform investigations on the internet and dark web on different topics, from broad investigations to specific searches.
Identify, assess, and track tactics, techniques, and procedures of cyber threat actors.
Provide threat review and validation to customers on their exposure to cyber security risks, threats, and potential impact.
Provide actionable strategic, technical, and tactical cyber intelligence to company & its subsidiaries through weekly, monthly, and ad hoc reports, briefings, and presentations.
Conduct Internet searches, in English and Arabic, to profile customers’ online presence and optimize data feeds into back end cyber threat harvesting and analysis solutions.
Apply advanced search techniques (e.g., Boolean terms) in Google/Bing search engines, social sites, domain databases, darknet, etc. to reduce false positives.
Support customers in take down efforts to remove fraudulent, offensive, and suspicious online content.
Be up to date on knowledge of attacker tools/techniques, country and regional cyber threats, business, and political landscapes to reflect their context into detected/created threats to reduce false positives to help improve generated reports.
Provide feedback and recommendations to Backend Cyber defense teams such as the MDR Team to enhance detection's (e.g., false positives, generic data, fine-tuning, updated info, etc.) and improve portal performance and/or experience.
Understand customer industries to generate Arabic keywords to support searches of online Arabic content.
Identify new information sources (English and Arabic), search keywords (English and Arabic) and best practices to achieve more accurate and customer related threat detection.
When customers request ad-hoc investigations, assist in defining the investigation scope, delivery date and present the findings to the customer (report).
Understand and perform analysis of competing hypotheses (ACH) for use in threat hunting and advisory production.
Manage the life cycle of threat intelligence.
Maintain a high degree of awareness of the current threat landscape.
Assist in providing threat and vulnerability analysis as well as security advisory services.
Participate in knowledge sharing with other Analysts and writing technical articles for Internal Knowledge Bases.
Perform tasks independently with some oversight.
Deliver Cyber Intelligence services.
Research and craft analytic papers and deliver intelligence briefings under short deadlines on various geographical and functional topics.
Use knowledge, creativity, and analytic tradecraft best practices to obtain solutions to complex problems.
Qualifications & Skills:
A Degree in Computer Science, Information Systems, Electronics Engineering, or a closely related degree.
1 - 4 years’ experience as a TIA or related position.
An active, demonstrable interest in cyber threat detection, and cyber threat intelligence.
A thorough understanding of IT systems and network security concepts, network protocols.
Thorough understanding of cyber threats and warfare such as Internet services attacks, User attacks, APTs, malicious mobile apps, online fraud, dark-net, hackers’ tools/techniques, hacktivist, etc.
Knowledge of latest global cyber-attacks, prominent ransomware, APT groups.
Demonstrable knowledge around GIR creations and threat profiling/landscaping.
Demonstrable knowledge of cyber threat intelligence, threat actors, malware, tactics, techniques, and procedures (TTPs), intelligence analysis, use of diamond models and various security methodologies and processes.
Demonstrable knowledge analysis of competing hypotheses (ACH) for evaluating multiple competing hypotheses for observed data.
Deep knowledge of IT security best practices, common attack types, and detection/prevention methods.
Demonstrable knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cybercrime.
Demonstrable knowledge on deep and dark web.
Good understanding of the cyber kill chain or attack vectors.
Excellent verbal and written communication skills including the ability to clearly articulate technical and strategic level cyber matters to a variety of audiences.
Ability to multitask, prioritize, and manage time effectively.
Strong attention to detail.
Excellent interpersonal skills and professional demeanor.
Excellent customer service skills.
Formal Intelligence Analysis training & certifications like GCTI, GOSI, C|TIA, Security+, RCIA, CTIP, CPTIA, CRTIA, CTIS-I and or CTIS-II.
Benefits:
Health insurance with one of the leading global providers for medical insurance.
Career progression and growth through challenging projects and work.
Employee engagement activities throughout the year.
Tailored training & development program.
About Us:
Help AG is the cyber security arm of e& enterprise and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Present in the Middle East since 2004, Help AG was strategically acquired by Etisalat group in Feb 2020, hence creating a cyber security and digital transformation powerhouse in the region.
Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and cyber security focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.
#J-18808-LjbffrCyber Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Help Ag is looking for a Cyber Threat Intelligence Analyst (TIA) who will be a part of the Cyber Defense team, responsible to help collect, analyze, and disseminate cyber intelligence impacting the company or its customers. The ideal candidate will be a professional with experience in cyber intelligence/cyber risk, delivering equivalent services to organizations, with drive and creativity. This is a fantastic opportunity for a passionate professional that wants to evolve in the Cyber Intelligence world. The position will involve essential duties and responsibilities that must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work.
Responsibilities
Identify, collect, and perform analysis of raw, primary, and secondary data derived from various sources.
Create and update General Intelligence Requirements (GIR)s, Priority Intelligence Requirements (PIR)s, and Organization Specific Intelligence Requirements (OSIR)s for customers.
Create threat profiles and threat landscapes for companies and or customers.
Create diamond models around customers and threat adversaries.
Improve the creation and delivery of intelligence information to customers and partners, via different reports and tools, linking the dots and adding value to the service delivered.
Perform investigations on the internet and dark web on different topics, from broad investigations to specific searches.
Identify, assess, and track tactics, techniques, and procedures of cyber threat actors.
Provide threat review and validation to customers on their exposure to cyber security risks, threats, and potential impact.
Provide actionable strategic, technical, and tactical cyber intelligence to company & its subsidiaries through weekly, monthly, and ad hoc reports, briefings, and presentations.
Conduct Internet searches, in English and Arabic, to profile customers’ online presence and optimize data feeds into back end cyber threat harvesting and analysis solutions.
Apply advanced search techniques (e.g., Boolean terms) in Google/Bing search engines, social sites, domain databases, darknet, etc. to reduce false positives.
Support customers in take down efforts to remove fraudulent, offensive, and suspicious online content.
Be up to date on knowledge of attacker tools/techniques, country and regional cyber threats, business, and political landscapes to reflect their context into detected/created threats to reduce false positives to help improve generated reports.
Provide feedback and recommendations to Backend Cyber defense teams such as the MDR Team to enhance detection's (e.g., false positives, generic data, fine-tuning, updated info, etc.) and improve portal performance and/or experience.
Understand customer industries to generate Arabic keywords to support searches of online Arabic content.
Identify new information sources (English and Arabic), search keywords (English and Arabic) and best practices to achieve more accurate and customer related threat detection.
When customers request ad-hoc investigations, assist in defining the investigation scope, delivery date and present the findings to the customer (report).
Understand and perform analysis of competing hypotheses (ACH) for use in threat hunting and advisory production.
Manage the life cycle of threat intelligence.
Maintain a high degree of awareness of the current threat landscape.
Assist in providing threat and vulnerability analysis as well as security advisory services.
Participate in knowledge sharing with other Analysts and writing technical articles for Internal Knowledge Bases.
Perform tasks independently with some oversight.
Deliver Cyber Intelligence services.
Research and craft analytic papers and deliver intelligence briefings under short deadlines on various geographical and functional topics.
Use knowledge, creativity, and analytic tradecraft best practices to obtain solutions to complex problems.
Qualifications & Skills:
A Degree in Computer Science, Information Systems, Electronics Engineering, or a closely related degree.
1 - 4 years’ experience as a TIA or related position.
An active, demonstrable interest in cyber threat detection, and cyber threat intelligence.
A thorough understanding of IT systems and network security concepts, network protocols.
Thorough understanding of cyber threats and warfare such as Internet services attacks, User attacks, APTs, malicious mobile apps, online fraud, dark-net, hackers’ tools/techniques, hacktivist, etc.
Knowledge of latest global cyber-attacks, prominent ransomware, APT groups.
Demonstrable knowledge around GIR creations and threat profiling/landscaping.
Demonstrable knowledge of cyber threat intelligence, threat actors, malware, tactics, techniques, and procedures (TTPs), intelligence analysis, use of diamond models and various security methodologies and processes.
Demonstrable knowledge analysis of competing hypotheses (ACH) for evaluating multiple competing hypotheses for observed data.
Deep knowledge of IT security best practices, common attack types, and detection/prevention methods.
Demonstrable knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cybercrime.
Demonstrable knowledge on deep and dark web.
Good understanding of the cyber kill chain or attack vectors.
Excellent verbal and written communication skills including the ability to clearly articulate technical and strategic level cyber matters to a variety of audiences.
Ability to multitask, prioritize, and manage time effectively.
Strong attention to detail.
Excellent interpersonal skills and professional demeanor.
Excellent customer service skills.
Formal Intelligence Analysis training & certifications like GCTI, GOSI, C|TIA, Security+, RCIA, CTIP, CPTIA, CRTIA, CTIS-I and or CTIS-II.
Benefits:
Health insurance with one of the leading global providers for medical insurance.
Career progression and growth through challenging projects and work.
Employee engagement activities throughout the year.
Tailored training & development program.
About Us:
Help AG is the cyber security arm of e& enterprise and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Present in the Middle East since 2004, Help AG was strategically acquired by Etisalat group in Feb 2020, hence creating a cyber security and digital transformation powerhouse in the region.
Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and cyber security focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.
#J-18808-LjbffrCyber threat intelligence Analyst
Posted today
Job Viewed
Job Description
The Cyber Threat Intelligence Analyst will deliver and develop strategic and tactical Cyber Threat Intelligence capabilities within the cyber security operations team.
The role holder will maintain a clear understanding of the threat landscape, identify new sources of intelligence, and aggregate and analyze data to provide accurate and actionable recommendations. They will help manage the complete cyber threat intelligence lifecycle and ensure that this is appropriately integrated into relevant processes and tools.
The Cyber Threat Intelligence Analyst will be responsible for compiling, articulating and presenting cyber threat intelligence briefings for the Senior Cyber Threat Analyst as well as compiling clear and concise threat intelligence reports.
Job Responsibilities
- Help develop, configure and manage a suite of cyber threat intelligence sources
- Evaluate intelligence for accuracy, reliability, and relevance across multiple intelligence sources
- Help develop and maintain close links with cyber threat intelligence functions within partner organizations and government agencies
- Perform analysis across the estate, looking for threats to critical infrastructure, resources and services
- Help develop and produce threat intelligence reports, to provide key metrics into other internal cyber functions (Security Incident Response, Threat Hunting, etc.).
- Carry out research and discovery across the estate with a view to producing reports on CTI detections and trends (i.e. highlighted IOCs, Vulnerabilities, Malware).
- Manage the complete IoC lifecycle
- Provide analysis to feed into the overall security posture, assisting with supporting activities to further increase defenses, harden potential attack surfaces and implement better protection mechanisms.
- Act as CTI lead in the handling and remediation of security incidents.
- Maintain strong awareness with stakeholder groups of current threat landscape
- Review, analyze and contextualize complex threat intelligence data for wider consumption with business partners
What You'll Need
Qualification Requirements (Desirable)
- Certifications in security (i.e. GCTI, GREM, GCFA, GCIH) desirable but not essential
- Degree or equivalent (i.e. MBA) desirable but not essential
- Comprehensive knowledge about vulnerability and security policies such as ISO standards
Skills / Experience Requirements
- 5+ years operational experience as a threat intelligence analyst, with good working knowledge of security incident response and malware analysis.
- Experience in threat modeling and common frameworks such as the cyber kill chain and MITRE.
- Hands-on experience with Network Security, Digital Forensics and IPS/IDS systems.
- Hands-on experience with dark web analysis, including the associated tooling and adversarial slang.
- Solid understanding of supporting frameworks like MITRE ATT&CK, LM Cyber Kill Chain, IA Diamond Model, etc.
- Knowledge of supporting processes, like DFIR, Threat Hunting, Malware Analysis and red/purple team exercises.
- Knowledge of threat intelligence tooling, both commercial and open source.
- Understanding of Security Operations and supporting functions, technologies and methodologies.
- Ability to document findings into reports that can be understood across all levels of the organization.
- Strong presentation and communication skills, both verbal and written.
- Working knowledge of threat hunting
No of Positions: 1
Note: The candidate would be expected to work in diverse consulting engagements and is willing to travel to Middle East countries for project execution at least 50% of their time.
Preference to candidates who can join immediately or within 15 days at the max.
Employment Type: Full-time
#J-18808-LjbffrCyber threat intelligence Analyst
Posted today
Job Viewed
Job Description
The Cyber Threat Intelligence Analyst will deliver and develop strategic and tactical Cyber Threat Intelligence capabilities within the cyber security operations team.
The role holder will maintain a clear understanding of the threat landscape, identify new sources of intelligence, and aggregate and analyze data to provide accurate and actionable recommendations. They will help manage the complete cyber threat intelligence lifecycle and ensure that this is appropriately integrated into relevant processes and tools.
The Cyber Threat Intelligence Analyst will be responsible for compiling, articulating and presenting cyber threat intelligence briefings for the Senior Cyber Threat Analyst as well as compiling clear and concise threat intelligence reports.
Job Responsibilities
- Help develop, configure and manage a suite of cyber threat intelligence sources
- Evaluate intelligence for accuracy, reliability, and relevance across multiple intelligence sources
- Help develop and maintain close links with cyber threat intelligence functions within partner organizations and government agencies
- Perform analysis across the estate, looking for threats to critical infrastructure, resources and services
- Help develop and produce threat intelligence reports, to provide key metrics into other internal cyber functions (Security Incident Response, Threat Hunting, etc.).
- Carry out research and discovery across the estate with a view to producing reports on CTI detections and trends (i.e. highlighted IOCs, Vulnerabilities, Malware).
- Manage the complete IoC lifecycle
- Providing analysis to feed into the overall security posture, assisting with supporting activities to further increase defences, harden potential attack surfaces and implement better protection mechanisms.
- Act as CTI lead in the handling and remediation of security incidents.
- Maintain strong awareness with stakeholder groups of current threat landscape
- Review, analyse and contextualise complex threat intelligence data for wider consumption with business partners
What You'll Need
Qualification Requirements (Desirable)
- Certifications in security (i.e. GCTI, GREM, GCFA, GCIH) desirable but not essential
- Degree or equivalent (i.e. MBA) desirable but not essential
- Comprehensive knowledge about vulnerability and security policies such as ISO standards
Skills / Experience Requirements
- 5+ years operational experience as a threat intelligence analyst, with good working knowledge of security incident response and malware analysis.
- Experience in threat modeling and common frameworks such as the cyber kill chain and MITRE.
- Hands-on experience with Network Security, Digital Forensics and IPS/IDS systems.
- Hands-on experience with dark web analysis, including the associated tooling and adversarial slang.
- Solid understanding of supporting frameworks like MITRE ATT&CK, LM Cyber Kill Chain, IA Diamond Model, etc.
- Knowledge of supporting processes, like DFIR, Threat Hunting, Malware Analysis and red/purple team exercises.
- Knowledge of threat intelligence tooling, both commercial and open source.
- Understanding of Security Operations and supporting functions, technologies and methodologies.
- Ability to document findings into reports that can be understood across all levels of the organization.
- Strong presentation and communication skills, both verbal and written.
- Working knowledge of threat hunting
No of Positions: 1
Note: The candidate would be expected to work in diverse consulting engagements and are willing to travel to Middle East countries for project execution at least 50% of their time.
Preference to candidates who can join immediately or within 15 days at the max.
Employment Type : Full-time
Information Security Specialist
Posted today
Job Viewed
Job Description
Employment: Full Time
- End Point Protection Management
- Firewall Management
- DMZ Management
- Network Access Control Management
- VPN Management
- Intrusion Prevention System (IPS) Management
- Mail Gateway Management
- Web Proxy Gateways Management
- Mobile Device Management (MDM)
- Data Loss Prevention Management
- Data Classification Management
- Identity and Access Management
- Bachelor degree in Informaton Technology / Cyber Security or any other relevant discpline.
- Minimum 3-5 years of experience in IT Security / Cyber Security.
- Industry stadard certifications in Cyber Security is desired.
Information Security Analyst
Posted 3 days ago
Job Viewed
Job Description
Information Security Analyst vacancy in Ar Rass Saudi Arabia
Information Security Analyst (Indian Nationals)
Our company is seeking a skilled and experienced Indian national to join our team as an Information Security Analyst in Ar Rass, Saudi Arabia. As an English-speaking professional, you will play a crucial role in ensuring the security and integrity of our company's information systems and data.
Responsibilities- Conduct regular security audits and risk assessments to identify potential vulnerabilities and threats.
- Develop and implement security policies, procedures, and protocols to protect our systems from cyber attacks.
- Monitor network traffic for any suspicious activity and respond promptly to any security incidents.
- Stay up-to-date on the latest security trends, technologies, and best practices to ensure our systems are always protected.
- Collaborate with other IT teams to design and implement secure infrastructure solutions.
- Indian nationality with fluent English communication skills.
- Minimum of 3 years of experience as an Information Security Analyst or similar role.
- Strong knowledge of information security principles, protocols, tools, and technologies.
- Familiarity with industry standards such as ISO 27001, NIST, or CIS Controls.
- Ability to work in a fast-paced environment and handle multiple projects simultaneously.
- Excellent problem-solving skills with keen attention to detail.
This is a contract position with accommodation provided. If you are a highly motivated individual with a passion for information security, we would love to have you join our team! Please submit your application today.
#J-18808-LjbffrBe The First To Know
About the latest Threat intelligence Jobs in Saudi Arabia !
Information Security Analyst
Posted 3 days ago
Job Viewed
Job Description
Information Security Analyst vacancy in Ar Rass Saudi Arabia
Job Title: Information Security Analyst
The Information Security Analyst will be responsible for ensuring the security of our company's data and systems by implementing and maintaining security measures. This includes performing risk assessments, monitoring for vulnerabilities, and responding to security incidents. The ideal candidate will have experience in information technology and a strong understanding of security protocols and regulations. This position is open to Malayalees with strong English communication skills.
Responsibilities- Conduct risk assessments and vulnerability scans to identify potential security threats
- Monitor network traffic for suspicious activity and respond to any security incidents
- Implement and maintain security protocols, including firewalls, encryption methods, and access controls
- Stay up-to-date on industry trends and best practices in information security
- Train employees on proper data handling procedures to maintain compliance with regulations
- Collaborate with IT teams to ensure secure configuration of hardware and software systems
- Bachelor's degree in information technology or a related field
- Minimum of 2 years of experience in an information security role
- Strong understanding of network infrastructure, operating systems, and web applications
- Familiarity with security frameworks such as ISO 27001 or NIST Cybersecurity Framework
- Knowledge of data protection laws and regulations, such as GDPR or HIPAA
- Excellent communication skills in English
Salary: 900$ per month
City: Ar Rass
#J-18808-LjbffrInformation Security Analyst
Posted 8 days ago
Job Viewed
Job Description
Information Security Analyst - Ar Rass, Saudi Arabia
We are hiring an experienced Information Security Analyst to join our team in Ar Rass, Saudi Arabia. As an Indian national, you will be responsible for protecting our company's sensitive information and systems from cyber threats. Your primary focus will be on developing and implementing security protocols and procedures to ensure the confidentiality, integrity, and availability of our data.
Key Responsibilities:
- Conduct regular security assessments to identify potential vulnerabilities and risks
- Monitor networks and systems for suspicious activity and respond quickly to security incidents
- Develop and maintain information security policies, standards, and procedures
- Conduct training to educate employees on best practices for information security
- Collaborate with cross-functional teams to implement security solutions and ensure compliance with regulations
- Perform risk assessments and advise management on potential risks and mitigation strategies
- Stay updated on the latest industry trends, threats, and best practices in information security
Requirements:
- Minimum of 3 years of experience as an Information Security Analyst or similar role
- Bachelor's degree in Computer Science or a related field; professional certifications such as CISSP or CISM are a plus
- Strong knowledge of network and system security protocols (e.g. TCP/IP, firewalls)
- Experience with vulnerability assessment tools and techniques
- Familiarity with regulatory frameworks such as GDPR, ISO 27001, or NIST Cybersecurity Framework
- Excellent communication skills with the ability to explain technical concepts to non-technical stakeholders
Salary:
We offer a competitive salary of 1600$ per month along with accommodation.
If you are passionate about protecting sensitive data and have a strong understanding of information security principles, we would love to hear from you! Please apply with your updated resume.
This job has no reviews yet. You can be the first!
Information Security Analyst Jobs in Ar Rass:
The most in-demand professions in Ar Rass:
MEAT SLAUGHTERHOUSE WORKER | PACKERS, SORTERS | UKRAINE | without work experience
Users also frequently search in these cities:
More professions from the category IT sphere:
Subscribe to our telegram channel @layboard_in
#J-18808-LjbffrInformation Security Analyst
Posted 15 days ago
Job Viewed
Job Description
Information Security Analyst
Profession: Information Security Analyst
City: Ar Rass
Country: Saudi Arabia
We are seeking a highly skilled and experienced Information Security Analyst to join our team in Ar Rass, Saudi Arabia. As an Information Security Analyst, you will be responsible for protecting our organization's sensitive information and ensuring the security of our systems and data.
Key Responsibilities:
- Conducting regular vulnerability assessments and penetration testing to identify potential security risks
- Developing and implementing security policies, procedures, and standards
- Monitoring network activity for any suspicious behavior or security breaches
- Investigating security incidents and providing recommendations for remediation
- Collaborating with IT teams to identify and implement security solutions
- Providing training and awareness programs to educate employees on information security best practices
Requirements:
- Bachelor's degree in Computer Science, Information Technology, or a related field
- Minimum of 3 years of experience in information security analysis or related roles
- Strong knowledge of security frameworks such as ISO 27001 and NIST Cybersecurity Framework
- Experience with vulnerability assessment tools, network monitoring tools, and intrusion detection systems
- Excellent communication skills in English (Arabic is a plus)
- Ability to work independently and in a team environment
We offer competitive compensation packages including accommodation for non-local candidates. If you have a passion for protecting valuable information and ensuring the confidentiality, integrity, and availability of our systems, we would love to hear from you. Apply now!
This job has no reviews yet. You can be the first!
Information Security Analyst Jobs in Ar Rass:
The most in-demand professions in Ar Rass:
MEAT SLAUGHTERHOUSE WORKER | PACKERS, SORTERS | UKRAINE | without work experience
1200 $
We need workers in our home and office, kindly text me if you’re interested to joining
Users also frequently search in these cities:
More professions from the category IT sphere:
Subscribe to our telegram channel @layboard_in
#J-18808-Ljbffr