12 Threat Intelligence jobs in Riyadh
Cyber Threat Intelligence Analyst
Posted 22 days ago
Job Viewed
Job Description
Help Ag is looking for a Cyber Threat Intelligence Analyst (TIA) who will be a part of the Cyber Defense team, responsible to help collect, analyze, and disseminate cyber intelligence impacting the company or its customers. The ideal candidate will be a professional with experience in cyber intelligence/cyber risk, delivering equivalent services to organizations, with drive and creativity. This is a fantastic opportunity for a passionate professional that wants to evolve in the Cyber Intelligence world. The position will involve essential duties and responsibilities that must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work.
Responsibilities
Identify, collect, and perform analysis of raw, primary, and secondary data derived from various sources.
Create and update General Intelligence Requirements (GIR)s, Priority Intelligence Requirements (PIR)s, and Organization Specific Intelligence Requirements (OSIR)s for customers.
Create threat profiles and threat landscapes for companies and or customers.
Create diamond models around customers and threat adversaries.
Improve the creation and delivery of intelligence information to customers and partners, via different reports and tools, linking the dots and adding value to the service delivered.
Perform investigations on the internet and dark web on different topics, from broad investigations to specific searches.
Identify, assess, and track tactics, techniques, and procedures of cyber threat actors.
Provide threat review and validation to customers on their exposure to cyber security risks, threats, and potential impact.
Provide actionable strategic, technical, and tactical cyber intelligence to company & its subsidiaries through weekly, monthly, and ad hoc reports, briefings, and presentations.
Conduct Internet searches, in English and Arabic, to profile customers’ online presence and optimize data feeds into back end cyber threat harvesting and analysis solutions.
Apply advanced search techniques (e.g., Boolean terms) in Google/Bing search engines, social sites, domain databases, darknet, etc. to reduce false positives.
Support customers in take down efforts to remove fraudulent, offensive, and suspicious online content.
Be up to date on knowledge of attacker tools/techniques, country and regional cyber threats, business, and political landscapes to reflect their context into detected/created threats to reduce false positives to help improve generated reports.
Provide feedback and recommendations to Backend Cyber defense teams such as the MDR Team to enhance detection's (e.g., false positives, generic data, fine-tuning, updated info, etc.) and improve portal performance and/or experience.
Understand customer industries to generate Arabic keywords to support searches of online Arabic content.
Identify new information sources (English and Arabic), search keywords (English and Arabic) and best practices to achieve more accurate and customer related threat detection.
When customers request ad-hoc investigations, assist in defining the investigation scope, delivery date and present the findings to the customer (report).
Understand and perform analysis of competing hypotheses (ACH) for use in threat hunting and advisory production.
Manage the life cycle of threat intelligence.
Maintain a high degree of awareness of the current threat landscape.
Assist in providing threat and vulnerability analysis as well as security advisory services.
Participate in knowledge sharing with other Analysts and writing technical articles for Internal Knowledge Bases.
Perform tasks independently with some oversight.
Deliver Cyber Intelligence services.
Research and craft analytic papers and deliver intelligence briefings under short deadlines on various geographical and functional topics.
Use knowledge, creativity, and analytic tradecraft best practices to obtain solutions to complex problems.
Qualifications & Skills:
A Degree in Computer Science, Information Systems, Electronics Engineering, or a closely related degree.
1 - 4 years’ experience as a TIA or related position.
An active, demonstrable interest in cyber threat detection, and cyber threat intelligence.
A thorough understanding of IT systems and network security concepts, network protocols.
Thorough understanding of cyber threats and warfare such as Internet services attacks, User attacks, APTs, malicious mobile apps, online fraud, dark-net, hackers’ tools/techniques, hacktivist, etc.
Knowledge of latest global cyber-attacks, prominent ransomware, APT groups.
Demonstrable knowledge around GIR creations and threat profiling/landscaping.
Demonstrable knowledge of cyber threat intelligence, threat actors, malware, tactics, techniques, and procedures (TTPs), intelligence analysis, use of diamond models and various security methodologies and processes.
Demonstrable knowledge analysis of competing hypotheses (ACH) for evaluating multiple competing hypotheses for observed data.
Deep knowledge of IT security best practices, common attack types, and detection/prevention methods.
Demonstrable knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cybercrime.
Demonstrable knowledge on deep and dark web.
Good understanding of the cyber kill chain or attack vectors.
Excellent verbal and written communication skills including the ability to clearly articulate technical and strategic level cyber matters to a variety of audiences.
Ability to multitask, prioritize, and manage time effectively.
Strong attention to detail.
Excellent interpersonal skills and professional demeanor.
Excellent customer service skills.
Formal Intelligence Analysis training & certifications like GCTI, GOSI, C|TIA, Security+, RCIA, CTIP, CPTIA, CRTIA, CTIS-I and or CTIS-II.
Benefits:
Health insurance with one of the leading global providers for medical insurance.
Career progression and growth through challenging projects and work.
Employee engagement activities throughout the year.
Tailored training & development program.
About Us:
Help AG is the cyber security arm of e& enterprise and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Present in the Middle East since 2004, Help AG was strategically acquired by Etisalat group in Feb 2020, hence creating a cyber security and digital transformation powerhouse in the region.
Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and cyber security focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.
#J-18808-LjbffrInformation Security Specialist
Posted 22 days ago
Job Viewed
Job Description
” The Job Description”
- Design, implement, and maintain information security solutions and policies.
- Monitor and protect networks, systems, and applications from cyber threats.
- Manage and maintain F5 Load Balancers, including configuration, troubleshooting, and optimization.
- Administer Privileged Access Management (PAM) and Identity & Access Management (IAM) tools to ensure secure access control.
- Implement and manage Network Access Control (NAC) solutions, particularly Cisco ISE.
- Oversee Mobile Device Management (MDM) policies to secure mobile endpoints.
- Deploy and monitor Endpoint Detection and Response (EDR) tools for threat detection and incident response.
- Ensure compliance with NCA cybersecurity regulations and requirements.
- Conduct regular security assessments, audits, and risk evaluations.
- Collaborate with IT and business teams to respond to security incidents and develop mitigation strategies.
- Maintain up-to-date documentation of security processes, systems, and incident reports.
Requirements:
- Bachelor’s degree in Information Security, Computer Science, Cybersecurity, or a related field.
- 3+ years of experience in an information security role.
- Strong knowledge of network security principles and practices.
- Hands-on experience with:
– F5 Load Balancers.
– PAM/IAM solutions (e.g., CyberArk, Azure AD, Okta).
– NAC (Cisco ISE) systems.
– MDM platforms (e.g., Intune, MobileIron).
– EDR tools (e.g., CrowdStrike, SentinelOne, Microsoft Defender).
– Familiarity with NCA (National Cybersecurity Authority) guidelines and compliance requirements. - Saudi national (this role is open to Saudi citizens only).
GRC Specialist - Information Security
Posted 1 day ago
Job Viewed
Job Description
GRC Specialist's job is to participate in information security Governance, Risk Management, and Compliance Engagements within Jafeer and for Jafeer Customers.
Responsibilities- Participate in various IT Risk Management & Business continuity initiatives.
- Ensuring that requirements in IT Audit, Standard, Policy, Compliance and Risk controls are met.
- Ensure external auditors have the access and information they need to complete their audit successfully.
- Conduct interviews and process walkthroughs with select personnel and document and assess business processes and information systems to determine the adequacy of the control environment.
- Demonstrate well IT auditing based on industry best practices and regulations.
Head of Information Security
Posted 8 days ago
Job Viewed
Job Description
What we are looking for : the Head of Information Security will be responsible for leading Nayla’s information security strategy, ensuring compliance with regulatory requirements (SAMA, NCA, ISO), and protecting our platforms, infrastructure, and customer data from threats. This role is critical in enabling secure growth and building a resilient fintech environment. Only Saudi Nationality
Responsibilities:
- Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program.
- Work directly with the business units to facilitate risk assessment and risk management processes
- Develop and enhance an information security management framework
- Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services
- Provide leadership to the enterprise's information security organization
- Partner with business stakeholders across the company to raise awareness of risk management concerns
- Assist with the overall business technology planning, providing a current knowledge and future vision of technology and systems
- Lead the development and implementation of the system-wide risk management function of the information security program to ensure information security risks are identified and monitored.
- Internally assess, evaluate and make recommendations to management regarding the adequacy of the security controls for the Nayla information and technology systems. Lead the system-wide information security compliance program, ensuring IT activities, processes, and procedures meet defined requirements, policies and regulations.
- Develop and implement effective and reasonable policies and practices to secure protected and sensitive data and ensure information security and compliance with relevant legislation and regulation are met (SAMA, NCA).
- Achieve L3 Maturity in SAMA CSF Framework and maintain that level at a minimum all times.
Qualifications :
1.Minimum Qualifications :
- Information Security, Computer science/engineering, management information systems (MIS), or a related technical degree
- Minimum of 5 years of experience in related information security fields.
3.Job-Specific Skills
• Extensive knowledge or risk management concepts
• Deep technical understanding of security threats, vulnerabilities and controls.
• Experience in conducting risk-based information security audits
• In-depth knowledge of information security management, practice, and understanding of privacy and security regulations, i.e., COBIT, NIST, NERC, ISA 99, IEC 61850, SAMA, NCA and ISO.
• In-depth knowledge of information security GRC (governance, risk, compliance) methodologies, tools, and enablers.
• Advanced experience with Governance, Risk and Compliance platforms.
• knowledge of ISO 27001:2013
• Certification such as CISSP, CISM, CISA, CRISK, and SABSA.
Seniority level- Seniority level Director
- Employment type Full-time
- Job function Information Technology
Referrals increase your chances of interviewing at NAYLA نايلة by 2x
Sign in to set job alerts for “Head of Information Security” roles. Director Of Cybersecurity Monitoring & Response Head of Information Technology Operations Threat Detection and Response Lead, P-3 - based in Rome, ItalyWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrSenior Information Security Analyst
Posted today
Job Viewed
Job Description
**Essential Responsibilities and Duties**:
1. Support in implementing Cyber security methodologies, procedures and tools of Information Security Management Division.
2. Assist in drafting of information security policies across Organization’s in accordance with the set laws and regulations of the kingdom of Saudi Arabia.
3. Assist in Build and maintain a catalog of available security services aligned with security policy and in compliance with industry standards such as ISO 27001.
4. Supports periodic assessment to determine how well security services are aligned with and meet business objectives whether some services should be decommissioned or new services added.
5. Issue NC Aand CVE bulletins to stakeholders and provide advice and guidance to the remediation team.
6. Implements security improvements by assessing current situation; evaluating trends; anticipating requirements.
7. responsible for keeping the Organization’s security systems up to date and creating documentation and planning for all security-related information, including incident response and disaster recovery plans.
8. Conducts regularly scheduled reviews of security services quality.
9. Participate in the planning, execution and reporting of security audits and network vulnerability assessments with mínimal supervision.
**Education**:
Master’s,or Bachelor’s Degree in Information Security, Computer Science, Information Technology, or other related discipline is required.
**Experience Required**:
Three (3) years of related experience with Master’s, or five (5) years with Bachelor’s Degree is required.
**Other Requirements(Certificates)**:
Saudi National Only.
CISSP or CISM Certifications preferred
Senior Information Security Presales Engineer
Posted 14 days ago
Job Viewed
Job Description
Get AI-powered advice on this job and more exclusive features.
Job Summary
We are looking for a highly skilled Senior Information Security Presales Engineer to join our team. This role requires a strong technical background with hands-on experience in cybersecurity and IT infrastructure. The ideal candidate will play a key role in engaging with clients, designing solutions, and supporting the sales process with technical expertise. The role is 70% technical (solution design, POC, implementation) and 30% presales (client meetings, proposal support, presentations).
- Design and architect cybersecurity solutions tailored to client requirements.
- Lead technical workshops, solution demos, and proof-of-concepts (PoCs).
- Evaluate and recommend appropriate technologies based on client needs.
- Collaborate with delivery and engineering teams to ensure solution feasibility and smooth handover.
- Deep knowledge and hands-on implementation experience with SIEM, SOAR, XDR/EDR, NDR, Threat Intelligence Platforms, PAM, IAM, Database encryption, SAST/DAST, Vulnerability management, DRM, and GRC.
- Stay up to date on emerging cybersecurity technologies, threats, and compliance frameworks.
- Create detailed technical documentation, solution designs, and both high-level and low-level designs.
- Support sales team in meetings with technical presentations and product walkthroughs.
- Respond to RFPs, RFQs, and technical questionnaires.
- Prepare solution proposals in collaboration with account managers and technical teams.
- Build and maintain relationships with clients and vendors.
- Present solutions to stakeholders, including technical and non-technical audiences.
- Bachelor’s degree in computer science, Information Security, or a related field.
- Minimum 5–7 years of experience in cybersecurity and network engineering.
- Strong hands-on expertise in SIEM, SOAR, XDR/EDR, NDR, TIP, PAM, IAM, DRM, Database Encryption, SAST/DAST, Vulnerability management, and GRC tools.
- Excellent communication and presentation skills.
- Relevant certifications such as CISSP, CISM, CISA, CEH, CCSP, GIAC are preferred.
- Seniority level: Mid-Senior level
- Employment type: Full-time
- Job function: Analyst
- Industries: IT Services and IT Consulting
Chief Information Security Officer (CISO)
Posted 22 days ago
Job Viewed
Job Description
Get AI-powered advice on this job and more exclusive features.
We are seeking a seasoned and strategic Chief Information Security Officer (CISO) to lead our cybersecurity vision, strategy, and execution. This executive role is central to driving enterprise-wide security initiatives and safeguarding both internal and client-facing environments. The successful candidate must be a Saudi national with deep expertise in regulatory compliance, enterprise risk management, and operational cybersecurity, particularly in alignment with national frameworks such as SAMA , NCA , and CITC .
Key Responsibilities
- Develop and lead the organization's overall information security strategy
- Ensure full adherence to local cybersecurity regulations, including SAMA, NCA ECC/CCC, and CITC guidelines
- Oversee the planning, execution, and continuous improvement of incident response and threat detection capabilities
- Establish and maintain cybersecurity governance, risk policies, and awareness programs
- Provide strategic cybersecurity guidance to executive leadership and the board, including risk posture assessments and security investment planning
- Saudi nationality is mandatory, in line with national employment regulations
- Bachelor's degree in Cybersecurity, Information Technology, or a related field (Master's degree preferred)
- Minimum of 10 years' experience in cybersecurity, with at least 5 years in a senior leadership capacity
- Industry-recognized certifications such as CISSP, CISM, CISA, or equivalent
- In-depth understanding of both local regulatory requirements and global standards (e.g., ISO 27001, NIST)
- Proven background in regulated industries such as finance, government, telecommunications, or critical infrastructure
- Strong leadership and team-building capabilities, with a track record of leading high-performing security teams
- Bilingual fluency in Arabic and English, with excellent communication and presentation skills
- Competitive salary and performance-based bonuses
- Professional development opportunities and certifications
- Flexible work schedule and semi-remote work options
- Collaborative and innovative work environment
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Other
- Industries IT Services and IT Consulting
Referrals increase your chances of interviewing at Obrela by 2x
Sign in to set job alerts for “Chief Information Security Officer” roles. Virtual Chief Information Security Officer (vCISO) / Compliance Officer Chief Security Officer (Indian Subcontinent)We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrBe The First To Know
About the latest Threat intelligence Jobs in Riyadh !
Information Security Specialist (Resident Engineer)
Posted today
Job Viewed
Job Description
- Involved in the daily cybersecurity operations
- Managing the cybersecurity awareness program
- Delivering cybersecurity awareness sessions
**Qualifications**:
- 2-3 years of Information Technology/Security related experience.
- Master of Science in Information Systems Management or Information Security.
- Have strong experience in deployment of security solutions.
- Excellent Communication Skills.
- Ability to conduct cybersecurity awareness trainings/sessions
- Have relevant security certifications such as CISSP, CISA, CISM, CRISC, C|CISO, CEH, CHFI, ISO 27001 Lead Auditor and Lead Implementer.
- Have experience in Technical Assessment such as vulnerability assessment, and penetration testing.
**Benefits**:
- Health insurance with one of the leading global providers for medical insurance
- Career progression and growth through challenging projects and work
- Employee engagement and wellness campaigns activities throughout the year
- Excellent learning and development opportunities
- Annual Flights Tickets
- Inclusive and diverse working environment
- Flexible/Hybrid working environment
- Open Door Policy
**About Us**
Help AG is the cybersecurity arm of e& enterprise (formerly Etisalat Digital) and provides leading enterprise businesses and governments across the Middle East with strategic consultancy combined with tailored information security services and solutions that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Present in the Middle East since 2004, Help AG was strategically acquired by e& (formerly Etisalat Group) in Feb 2020, hence creating a cybersecurity and digital transformation powerhouse in the region.
Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and cybersecurity focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the-art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defences and safeguarding their business.
Senior Information Security Engineer | Riyadh, SA
Posted 26 days ago
Job Viewed
Job Description
Saudi National - Senior Information Security Engineer (Level 3 SOC)
Saudi National - Senior Information Security Engineer (Level 3 SOC)
Department: InfoSec Monitoring
Employment Type: Full Time
Location: KSA
Reporting To: Weam Munshi
Description
We're looking for an experienced and proactive Senior Information Security Engineer to serve as a senior member of our cybersecurity operations team. You'll lead complex investigations, shape our detection capabilities, and provide strategic input into incident response and threat management. As a technical authority in the SOC, you'll mentor junior analysts, collaborate across teams, and help drive continuous improvement in our security posture.
Key Responsibilities
Advanced Threat Detection & Monitoring
- Lead the analysis and triage of high-fidelity alerts and complex event correlations across firewalls, IDS/IPS, endpoints, servers, and cloud platforms.
- Identify and investigate sophisticated threats, advanced persistent threats (APTs), and anomalous behavior patterns.
- Continuously refine detection logic, SIEM rules, and alerting thresholds to optimize SOC effectiveness.
- Design and maintain operational dashboards and KPIs to track security trends and SOC performance.
Incident Response & Forensics
- Act as the primary incident commander for major security incidents, coordinating technical response and stakeholder communication.
- Conduct root cause analysis, full-scope investigations, and forensic analysis using endpoint and network-based artifacts.
- Drive post-incident reviews and deliver actionable recommendations to reduce future risk.
- Oversee incident documentation quality and ensure consistency in reporting and knowledge transfer.
Detection Engineering & Threat Intelligence
- Research and operationalize threat intelligence into custom detection rules, threat hunting queries, and playbooks.
- Develop and tune detection use cases aligned with MITRE ATT&CK and evolving threat actor techniques.
- Contribute to the development and enhancement of SOAR workflows and automation to improve SOC efficiency.
Vulnerability & Risk Management
- Collaborate with infrastructure and DevOps teams to assess and prioritize vulnerabilities in context with threat intelligence.
- Support patch validation and track remediation efforts for critical exposures.
- Guide vulnerability lifecycle processes, ensuring risks are addressed in a timely and measurable way.
Collaboration & Mentorship
- Serve as a technical mentor and escalation point for Tier 1 and Tier 2 SOC analysts.
- Lead training initiatives and tabletop exercises to strengthen SOC readiness and maturity.
- Work closely with IT, Engineering, Compliance, and Risk teams to ensure alignment during investigations and threat mitigation efforts.
- Communicate clearly and effectively with stakeholders, including drafting concise executive summaries during major incidents.
Skills, Knowledge and Expertise
- 3-5+ years of hands-on experience in a SOC or cybersecurity operations role, including incident handling and threat detection.
- Deep understanding of security operations, threat hunting, attack vectors, and cyber kill chains.
- Proven expertise in log analysis, endpoint telemetry, and cloud-native security tools (e.g., AWS CloudTrail, Azure Sentinel).
- Strong scripting experience (e.g., Python, PowerShell) for automation and detection engineering.
- Experience with SIEMs (e.g., Splunk, Elastic, Sentinel), SOAR platforms, EDR/XDR tools, and Threat Intelligence platforms.
- Familiarity with DevSecOps, APIs, microservices, and modern application architectures.
- Security certifications such as GCIA, GCIH, CySA+, or equivalent (preferred).
- Clear and confident communicator with the ability to lead during high-pressure situations and present findings to technical and non-technical audiences.
Boost your career Find thousands of job opportunities by signing up to eFinancialCareers today.
#J-18808-LjbffrVirtual Chief Information Security Officer (vCISO) / Compliance Officer
Posted 8 days ago
Job Viewed
Job Description
Work Week: Sunday - Thursday
Work Timings: 9 AM - 6 PM (Saudi Arabian Time Zone)
About Us:
Soum is on a mission to revolutionize e-commerce in the MENA region and beyond by building the most convenient and trustworthy re-commerce marketplace in the region. We're reshaping how C2C marketplaces operate, making buying and selling second-hand products seamless and reliable. Since our launch in July 2021, Soum has become one of the fastest-growing startups in the region, achieving rapid expansion in both our team and product offerings. In recognition of our impact and growth, we were proudly named one of the Top 10 LinkedIn Startups in Saudi Arabia for 2024.
Job Summary:
We are looking for a virtual cybersecurity or compliance expert to guide our security posture, particularly as we move into regulated spaces like auto-financing. The role is ideal for someone with extensive regulatory familiarity and previous experience operating in a strategic advisory capacity.
Key Responsibilities
- Lead compliance audits aligned with KSA regulations, especially SAMA frameworks
- Review and implement data security strategies across departments
- Support regulatory submissions and responses for fintech operations
- Oversee documentation and data protection practices
- Coordinate with product and legal teams to maintain standards
- Saudi national 6+ years experience
- Deep understanding of SAMA regulatory requirements and KSA cybersecurity law
- Prior role as vCISO or senior security/compliance consultant
- Experience operating through or with an agency setup (ideal)
- Familiarity with ISO 27001, NIST, SOC 2 compliance standards
- Ability to lead cross-functional audit and compliance efforts across departments
- Seniority level Not Applicable
- Employment type Full-time
- Job function Information Technology
- Industries Transportation, Logistics, Supply Chain and Storage
Referrals increase your chances of interviewing at Soum by 2x
Sign in to set job alerts for “Chief Information Security Officer” roles.We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr