Cyber Threat Intelligence Analyst

Riyadh, Riyadh Help AG

Posted 22 days ago

Job Viewed

Tap Again To Close

Job Description

Help Ag is looking for a Cyber Threat Intelligence Analyst (TIA) who will be a part of the Cyber Defense team, responsible to help collect, analyze, and disseminate cyber intelligence impacting the company or its customers. The ideal candidate will be a professional with experience in cyber intelligence/cyber risk, delivering equivalent services to organizations, with drive and creativity. This is a fantastic opportunity for a passionate professional that wants to evolve in the Cyber Intelligence world. The position will involve essential duties and responsibilities that must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work.


Responsibilities

  • Identify, collect, and perform analysis of raw, primary, and secondary data derived from various sources.

  • Create and update General Intelligence Requirements (GIR)s, Priority Intelligence Requirements (PIR)s, and Organization Specific Intelligence Requirements (OSIR)s for customers.

  • Create threat profiles and threat landscapes for companies and or customers.

  • Create diamond models around customers and threat adversaries.

  • Improve the creation and delivery of intelligence information to customers and partners, via different reports and tools, linking the dots and adding value to the service delivered.

  • Perform investigations on the internet and dark web on different topics, from broad investigations to specific searches.

  • Identify, assess, and track tactics, techniques, and procedures of cyber threat actors.

  • Provide threat review and validation to customers on their exposure to cyber security risks, threats, and potential impact.

  • Provide actionable strategic, technical, and tactical cyber intelligence to company & its subsidiaries through weekly, monthly, and ad hoc reports, briefings, and presentations.

  • Conduct Internet searches, in English and Arabic, to profile customers’ online presence and optimize data feeds into back end cyber threat harvesting and analysis solutions.

  • Apply advanced search techniques (e.g., Boolean terms) in Google/Bing search engines, social sites, domain databases, darknet, etc. to reduce false positives.

  • Support customers in take down efforts to remove fraudulent, offensive, and suspicious online content.

  • Be up to date on knowledge of attacker tools/techniques, country and regional cyber threats, business, and political landscapes to reflect their context into detected/created threats to reduce false positives to help improve generated reports.

  • Provide feedback and recommendations to Backend Cyber defense teams such as the MDR Team to enhance detection's (e.g., false positives, generic data, fine-tuning, updated info, etc.) and improve portal performance and/or experience.

  • Understand customer industries to generate Arabic keywords to support searches of online Arabic content.

  • Identify new information sources (English and Arabic), search keywords (English and Arabic) and best practices to achieve more accurate and customer related threat detection.

  • When customers request ad-hoc investigations, assist in defining the investigation scope, delivery date and present the findings to the customer (report).

  • Understand and perform analysis of competing hypotheses (ACH) for use in threat hunting and advisory production.

  • Manage the life cycle of threat intelligence.

  • Maintain a high degree of awareness of the current threat landscape.

  • Assist in providing threat and vulnerability analysis as well as security advisory services.

  • Participate in knowledge sharing with other Analysts and writing technical articles for Internal Knowledge Bases.

  • Perform tasks independently with some oversight.

  • Deliver Cyber Intelligence services.

  • Research and craft analytic papers and deliver intelligence briefings under short deadlines on various geographical and functional topics.

  • Use knowledge, creativity, and analytic tradecraft best practices to obtain solutions to complex problems.

Qualifications & Skills:

  • A Degree in Computer Science, Information Systems, Electronics Engineering, or a closely related degree.

  • 1 - 4 years’ experience as a TIA or related position.

  • An active, demonstrable interest in cyber threat detection, and cyber threat intelligence.

  • A thorough understanding of IT systems and network security concepts, network protocols.

  • Thorough understanding of cyber threats and warfare such as Internet services attacks, User attacks, APTs, malicious mobile apps, online fraud, dark-net, hackers’ tools/techniques, hacktivist, etc.

  • Knowledge of latest global cyber-attacks, prominent ransomware, APT groups.

  • Demonstrable knowledge around GIR creations and threat profiling/landscaping.

  • Demonstrable knowledge of cyber threat intelligence, threat actors, malware, tactics, techniques, and procedures (TTPs), intelligence analysis, use of diamond models and various security methodologies and processes.

  • Demonstrable knowledge analysis of competing hypotheses (ACH) for evaluating multiple competing hypotheses for observed data.

  • Deep knowledge of IT security best practices, common attack types, and detection/prevention methods.

  • Demonstrable knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cybercrime.

  • Demonstrable knowledge on deep and dark web.

  • Good understanding of the cyber kill chain or attack vectors.

  • Excellent verbal and written communication skills including the ability to clearly articulate technical and strategic level cyber matters to a variety of audiences.

  • Ability to multitask, prioritize, and manage time effectively.

  • Strong attention to detail.

  • Excellent interpersonal skills and professional demeanor.

  • Excellent customer service skills.

  • Formal Intelligence Analysis training & certifications like GCTI, GOSI, C|TIA, Security+, RCIA, CTIP, CPTIA, CRTIA, CTIS-I and or CTIS-II.

Benefits:

  • Health insurance with one of the leading global providers for medical insurance.

  • Career progression and growth through challenging projects and work.

  • Employee engagement activities throughout the year.

  • Tailored training & development program.

About Us:

Help AG is the cyber security arm of e& enterprise and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.

Present in the Middle East since 2004, Help AG was strategically acquired by Etisalat group in Feb 2020, hence creating a cyber security and digital transformation powerhouse in the region.

Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and cyber security focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Specialist

Riyadh, Riyadh Total-TECH Co.

Posted 22 days ago

Job Viewed

Tap Again To Close

Job Description

” The Job Description”

  1. Design, implement, and maintain information security solutions and policies.
  2. Monitor and protect networks, systems, and applications from cyber threats.
  3. Manage and maintain F5 Load Balancers, including configuration, troubleshooting, and optimization.
  4. Administer Privileged Access Management (PAM) and Identity & Access Management (IAM) tools to ensure secure access control.
  5. Implement and manage Network Access Control (NAC) solutions, particularly Cisco ISE.
  6. Oversee Mobile Device Management (MDM) policies to secure mobile endpoints.
  7. Deploy and monitor Endpoint Detection and Response (EDR) tools for threat detection and incident response.
  8. Ensure compliance with NCA cybersecurity regulations and requirements.
  9. Conduct regular security assessments, audits, and risk evaluations.
  10. Collaborate with IT and business teams to respond to security incidents and develop mitigation strategies.
  11. Maintain up-to-date documentation of security processes, systems, and incident reports.
    Requirements:
  • Bachelor’s degree in Information Security, Computer Science, Cybersecurity, or a related field.
  • 3+ years of experience in an information security role.
  • Strong knowledge of network security principles and practices.
  • Hands-on experience with:
    F5 Load Balancers.
    PAM/IAM solutions (e.g., CyberArk, Azure AD, Okta).
    NAC (Cisco ISE) systems.
    MDM platforms (e.g., Intune, MobileIron).
    EDR tools (e.g., CrowdStrike, SentinelOne, Microsoft Defender).
    Familiarity with NCA (National Cybersecurity Authority) guidelines and compliance requirements.
  • Saudi national (this role is open to Saudi citizens only).

Tagged as: EDR , F5 , IAM , ISE , MDM , NAC , NCA , PAM

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

GRC Specialist - Information Security

Riyadh, Riyadh Giza Systems KSA

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

GRC Specialist's job is to participate in information security Governance, Risk Management, and Compliance Engagements within Jafeer and for Jafeer Customers.


Responsibilities

  • Participate in various IT Risk Management & Business continuity initiatives.

  • Ensuring that requirements in IT Audit, Standard, Policy, Compliance and Risk controls are met.

  • Ensure external auditors have the access and information they need to complete their audit successfully.

  • Conduct interviews and process walkthroughs with select personnel and document and assess business processes and information systems to determine the adequacy of the control environment.

  • Demonstrate well IT auditing based on industry best practices and regulations.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Head of Information Security

Riyadh, Riyadh NAYLA نايلة

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

What we are looking for : the Head of Information Security will be responsible for leading Nayla’s information security strategy, ensuring compliance with regulatory requirements (SAMA, NCA, ISO), and protecting our platforms, infrastructure, and customer data from threats. This role is critical in enabling secure growth and building a resilient fintech environment. Only Saudi Nationality

Responsibilities:

  • Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program.
  • Work directly with the business units to facilitate risk assessment and risk management processes
  • Develop and enhance an information security management framework
  • Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services
  • Provide leadership to the enterprise's information security organization
  • Partner with business stakeholders across the company to raise awareness of risk management concerns
  • Assist with the overall business technology planning, providing a current knowledge and future vision of technology and systems
  • Lead the development and implementation of the system-wide risk management function of the information security program to ensure information security risks are identified and monitored.
  • Internally assess, evaluate and make recommendations to management regarding the adequacy of the security controls for the Nayla information and technology systems. Lead the system-wide information security compliance program, ensuring IT activities, processes, and procedures meet defined requirements, policies and regulations.
  • Develop and implement effective and reasonable policies and practices to secure protected and sensitive data and ensure information security and compliance with relevant legislation and regulation are met (SAMA, NCA).
  • Achieve L3 Maturity in SAMA CSF Framework and maintain that level at a minimum all times.

Qualifications :

1.Minimum Qualifications :

  • Information Security, Computer science/engineering, management information systems (MIS), or a related technical degree
  • Minimum of 5 years of experience in related information security fields.

3.Job-Specific Skills

• Extensive knowledge or risk management concepts

• Deep technical understanding of security threats, vulnerabilities and controls.

• Experience in conducting risk-based information security audits

• In-depth knowledge of information security management, practice, and understanding of privacy and security regulations, i.e., COBIT, NIST, NERC, ISA 99, IEC 61850, SAMA, NCA and ISO.

• In-depth knowledge of information security GRC (governance, risk, compliance) methodologies, tools, and enablers.

• Advanced experience with Governance, Risk and Compliance platforms.

• knowledge of ISO 27001:2013

• Certification such as CISSP, CISM, CISA, CRISK, and SABSA.

Seniority level
  • Seniority level Director
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology

Referrals increase your chances of interviewing at NAYLA نايلة by 2x

Sign in to set job alerts for “Head of Information Security” roles. Director Of Cybersecurity Monitoring & Response Head of Information Technology Operations Threat Detection and Response Lead, P-3 - based in Rome, Italy

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Analyst

Riyadh, Riyadh King Faisal Specialist Hospital and Research Centre

Posted today

Job Viewed

Tap Again To Close

Job Description

Responsible for executing and maintaining the operational components of the Organization security strategy that create a secure efficient and effective technology environment. This will ensure a secure information environment that protects all Organization data.

**Essential Responsibilities and Duties**:
1. Support in implementing Cyber security methodologies, procedures and tools of Information Security Management Division.

2. Assist in drafting of information security policies across Organization’s in accordance with the set laws and regulations of the kingdom of Saudi Arabia.

3. Assist in Build and maintain a catalog of available security services aligned with security policy and in compliance with industry standards such as ISO 27001.

4. Supports periodic assessment to determine how well security services are aligned with and meet business objectives whether some services should be decommissioned or new services added.

5. Issue NC Aand CVE bulletins to stakeholders and provide advice and guidance to the remediation team.

6. Implements security improvements by assessing current situation; evaluating trends; anticipating requirements.

7. responsible for keeping the Organization’s security systems up to date and creating documentation and planning for all security-related information, including incident response and disaster recovery plans.

8. Conducts regularly scheduled reviews of security services quality.

9. Participate in the planning, execution and reporting of security audits and network vulnerability assessments with mínimal supervision.

**Education**:
Master’s,or Bachelor’s Degree in Information Security, Computer Science, Information Technology, or other related discipline is required.

**Experience Required**:
Three (3) years of related experience with Master’s, or five (5) years with Bachelor’s Degree is required.

**Other Requirements(Certificates)**:
Saudi National Only.

CISSP or CISM Certifications preferred
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Presales Engineer

Riyadh, Riyadh Inovasys

Posted 14 days ago

Job Viewed

Tap Again To Close

Job Description

Senior Information Security Presales Engineer

Get AI-powered advice on this job and more exclusive features.

Job Summary
We are looking for a highly skilled Senior Information Security Presales Engineer to join our team. This role requires a strong technical background with hands-on experience in cybersecurity and IT infrastructure. The ideal candidate will play a key role in engaging with clients, designing solutions, and supporting the sales process with technical expertise. The role is 70% technical (solution design, POC, implementation) and 30% presales (client meetings, proposal support, presentations).

Technical Responsibilities
  • Design and architect cybersecurity solutions tailored to client requirements.
  • Lead technical workshops, solution demos, and proof-of-concepts (PoCs).
  • Evaluate and recommend appropriate technologies based on client needs.
  • Collaborate with delivery and engineering teams to ensure solution feasibility and smooth handover.
  • Deep knowledge and hands-on implementation experience with SIEM, SOAR, XDR/EDR, NDR, Threat Intelligence Platforms, PAM, IAM, Database encryption, SAST/DAST, Vulnerability management, DRM, and GRC.
  • Stay up to date on emerging cybersecurity technologies, threats, and compliance frameworks.
  • Create detailed technical documentation, solution designs, and both high-level and low-level designs.
Presales Responsibilities
  • Support sales team in meetings with technical presentations and product walkthroughs.
  • Respond to RFPs, RFQs, and technical questionnaires.
  • Prepare solution proposals in collaboration with account managers and technical teams.
  • Build and maintain relationships with clients and vendors.
  • Present solutions to stakeholders, including technical and non-technical audiences.
Qualifications
  • Bachelor’s degree in computer science, Information Security, or a related field.
  • Minimum 5–7 years of experience in cybersecurity and network engineering.
  • Strong hands-on expertise in SIEM, SOAR, XDR/EDR, NDR, TIP, PAM, IAM, DRM, Database Encryption, SAST/DAST, Vulnerability management, and GRC tools.
  • Excellent communication and presentation skills.
  • Relevant certifications such as CISSP, CISM, CISA, CEH, CCSP, GIAC are preferred.
Additional Details
  • Seniority level: Mid-Senior level
  • Employment type: Full-time
  • Job function: Analyst
  • Industries: IT Services and IT Consulting
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Chief Information Security Officer (CISO)

Riyadh, Riyadh Obrela Security Industries

Posted 22 days ago

Job Viewed

Tap Again To Close

Job Description

Chief Information Security Officer (CISO) Chief Information Security Officer (CISO)

Get AI-powered advice on this job and more exclusive features.

We are seeking a seasoned and strategic Chief Information Security Officer (CISO) to lead our cybersecurity vision, strategy, and execution. This executive role is central to driving enterprise-wide security initiatives and safeguarding both internal and client-facing environments. The successful candidate must be a Saudi national with deep expertise in regulatory compliance, enterprise risk management, and operational cybersecurity, particularly in alignment with national frameworks such as SAMA , NCA , and CITC .

Key Responsibilities

  • Develop and lead the organization's overall information security strategy
  • Ensure full adherence to local cybersecurity regulations, including SAMA, NCA ECC/CCC, and CITC guidelines
  • Oversee the planning, execution, and continuous improvement of incident response and threat detection capabilities
  • Establish and maintain cybersecurity governance, risk policies, and awareness programs
  • Provide strategic cybersecurity guidance to executive leadership and the board, including risk posture assessments and security investment planning

Required Qualifications

  • Saudi nationality is mandatory, in line with national employment regulations
  • Bachelor's degree in Cybersecurity, Information Technology, or a related field (Master's degree preferred)
  • Minimum of 10 years' experience in cybersecurity, with at least 5 years in a senior leadership capacity
  • Industry-recognized certifications such as CISSP, CISM, CISA, or equivalent
  • In-depth understanding of both local regulatory requirements and global standards (e.g., ISO 27001, NIST)
  • Proven background in regulated industries such as finance, government, telecommunications, or critical infrastructure
  • Strong leadership and team-building capabilities, with a track record of leading high-performing security teams
  • Bilingual fluency in Arabic and English, with excellent communication and presentation skills

Benefits

  • Competitive salary and performance-based bonuses
  • Professional development opportunities and certifications
  • Flexible work schedule and semi-remote work options
  • Collaborative and innovative work environment

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Other
  • Industries IT Services and IT Consulting

Referrals increase your chances of interviewing at Obrela by 2x

Sign in to set job alerts for “Chief Information Security Officer” roles. Virtual Chief Information Security Officer (vCISO) / Compliance Officer Chief Security Officer (Indian Subcontinent)

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Threat intelligence Jobs in Riyadh !

Information Security Specialist (Resident Engineer)

Riyadh, Riyadh Help AG

Posted today

Job Viewed

Tap Again To Close

Job Description

**Responsibilities**:

- Involved in the daily cybersecurity operations
- Managing the cybersecurity awareness program
- Delivering cybersecurity awareness sessions

**Qualifications**:

- 2-3 years of Information Technology/Security related experience.
- Master of Science in Information Systems Management or Information Security.
- Have strong experience in deployment of security solutions.
- Excellent Communication Skills.
- Ability to conduct cybersecurity awareness trainings/sessions
- Have relevant security certifications such as CISSP, CISA, CISM, CRISC, C|CISO, CEH, CHFI, ISO 27001 Lead Auditor and Lead Implementer.
- Have experience in Technical Assessment such as vulnerability assessment, and penetration testing.

**Benefits**:

- Health insurance with one of the leading global providers for medical insurance
- Career progression and growth through challenging projects and work
- Employee engagement and wellness campaigns activities throughout the year
- Excellent learning and development opportunities
- Annual Flights Tickets
- Inclusive and diverse working environment
- Flexible/Hybrid working environment
- Open Door Policy

**About Us**

Help AG is the cybersecurity arm of e& enterprise (formerly Etisalat Digital) and provides leading enterprise businesses and governments across the Middle East with strategic consultancy combined with tailored information security services and solutions that address their diverse requirements, enabling them to evolve securely with a competitive edge.

Present in the Middle East since 2004, Help AG was strategically acquired by e& (formerly Etisalat Group) in Feb 2020, hence creating a cybersecurity and digital transformation powerhouse in the region.

Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and cybersecurity focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the-art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defences and safeguarding their business.
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Engineer | Riyadh, SA

Riyadh, Riyadh Tabby

Posted 26 days ago

Job Viewed

Tap Again To Close

Job Description

Saudi National - Senior Information Security Engineer (Level 3 SOC)

Saudi National - Senior Information Security Engineer (Level 3 SOC) Tabby Riyadh, Saudi Arabia Apply now Posted 16 days ago Permanent Competitive

Saudi National - Senior Information Security Engineer (Level 3 SOC)

Saudi National - Senior Information Security Engineer (Level 3 SOC)

Department: InfoSec Monitoring

Employment Type: Full Time

Location: KSA

Reporting To: Weam Munshi

Description

We're looking for an experienced and proactive Senior Information Security Engineer to serve as a senior member of our cybersecurity operations team. You'll lead complex investigations, shape our detection capabilities, and provide strategic input into incident response and threat management. As a technical authority in the SOC, you'll mentor junior analysts, collaborate across teams, and help drive continuous improvement in our security posture.

Key Responsibilities

Advanced Threat Detection & Monitoring

  • Lead the analysis and triage of high-fidelity alerts and complex event correlations across firewalls, IDS/IPS, endpoints, servers, and cloud platforms.
  • Identify and investigate sophisticated threats, advanced persistent threats (APTs), and anomalous behavior patterns.
  • Continuously refine detection logic, SIEM rules, and alerting thresholds to optimize SOC effectiveness.
  • Design and maintain operational dashboards and KPIs to track security trends and SOC performance.

Incident Response & Forensics

  • Act as the primary incident commander for major security incidents, coordinating technical response and stakeholder communication.
  • Conduct root cause analysis, full-scope investigations, and forensic analysis using endpoint and network-based artifacts.
  • Drive post-incident reviews and deliver actionable recommendations to reduce future risk.
  • Oversee incident documentation quality and ensure consistency in reporting and knowledge transfer.

Detection Engineering & Threat Intelligence

  • Research and operationalize threat intelligence into custom detection rules, threat hunting queries, and playbooks.
  • Develop and tune detection use cases aligned with MITRE ATT&CK and evolving threat actor techniques.
  • Contribute to the development and enhancement of SOAR workflows and automation to improve SOC efficiency.

Vulnerability & Risk Management

  • Collaborate with infrastructure and DevOps teams to assess and prioritize vulnerabilities in context with threat intelligence.
  • Support patch validation and track remediation efforts for critical exposures.
  • Guide vulnerability lifecycle processes, ensuring risks are addressed in a timely and measurable way.

Collaboration & Mentorship

  • Serve as a technical mentor and escalation point for Tier 1 and Tier 2 SOC analysts.
  • Lead training initiatives and tabletop exercises to strengthen SOC readiness and maturity.
  • Work closely with IT, Engineering, Compliance, and Risk teams to ensure alignment during investigations and threat mitigation efforts.
  • Communicate clearly and effectively with stakeholders, including drafting concise executive summaries during major incidents.

Skills, Knowledge and Expertise
  • 3-5+ years of hands-on experience in a SOC or cybersecurity operations role, including incident handling and threat detection.
  • Deep understanding of security operations, threat hunting, attack vectors, and cyber kill chains.
  • Proven expertise in log analysis, endpoint telemetry, and cloud-native security tools (e.g., AWS CloudTrail, Azure Sentinel).
  • Strong scripting experience (e.g., Python, PowerShell) for automation and detection engineering.
  • Experience with SIEMs (e.g., Splunk, Elastic, Sentinel), SOAR platforms, EDR/XDR tools, and Threat Intelligence platforms.
  • Familiarity with DevSecOps, APIs, microservices, and modern application architectures.
  • Security certifications such as GCIA, GCIH, CySA+, or equivalent (preferred).
  • Clear and confident communicator with the ability to lead during high-pressure situations and present findings to technical and non-technical audiences.

Job ID baf130db-b600-47d3-ac87-6ab21cfac9f8

Boost your career Find thousands of job opportunities by signing up to eFinancialCareers today.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Virtual Chief Information Security Officer (vCISO) / Compliance Officer

Riyadh, Riyadh Soum

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

Virtual Chief Information Security Officer (vCISO) / Compliance Officer Virtual Chief Information Security Officer (vCISO) / Compliance Officer

Work Week: Sunday - Thursday

Work Timings: 9 AM - 6 PM (Saudi Arabian Time Zone)

About Us:
Soum is on a mission to revolutionize e-commerce in the MENA region and beyond by building the most convenient and trustworthy re-commerce marketplace in the region. We're reshaping how C2C marketplaces operate, making buying and selling second-hand products seamless and reliable. Since our launch in July 2021, Soum has become one of the fastest-growing startups in the region, achieving rapid expansion in both our team and product offerings. In recognition of our impact and growth, we were proudly named one of the Top 10 LinkedIn Startups in Saudi Arabia for 2024.

Job Summary:
We are looking for a virtual cybersecurity or compliance expert to guide our security posture, particularly as we move into regulated spaces like auto-financing. The role is ideal for someone with extensive regulatory familiarity and previous experience operating in a strategic advisory capacity.

Key Responsibilities

  • Lead compliance audits aligned with KSA regulations, especially SAMA frameworks
  • Review and implement data security strategies across departments
  • Support regulatory submissions and responses for fintech operations
  • Oversee documentation and data protection practices
  • Coordinate with product and legal teams to maintain standards




Ideal Profile

  • Saudi national 6+ years experience
  • Deep understanding of SAMA regulatory requirements and KSA cybersecurity law
  • Prior role as vCISO or senior security/compliance consultant
  • Experience operating through or with an agency setup (ideal)
  • Familiarity with ISO 27001, NIST, SOC 2 compliance standards
  • Ability to lead cross-functional audit and compliance efforts across departments



Seniority level
  • Seniority level Not Applicable
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Transportation, Logistics, Supply Chain and Storage

Referrals increase your chances of interviewing at Soum by 2x

Sign in to set job alerts for “Chief Information Security Officer” roles.

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Threat Intelligence Jobs View All Jobs in Riyadh