Cyber Threat Intelligence Analyst

Riyadh, Riyadh Help AG

Posted 12 days ago

Job Viewed

Tap Again To Close

Job Description

Help Ag is looking for a Cyber Threat Intelligence Analyst (TIA) who will be a part of the Cyber Defense team, responsible to help collect, analyze, and disseminate cyber intelligence impacting the company or its customers. The ideal candidate will be a professional with experience in cyber intelligence/cyber risk, delivering equivalent services to organizations, with drive and creativity. This is a fantastic opportunity for a passionate professional that wants to evolve in the Cyber Intelligence world. The position will involve essential duties and responsibilities that must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work.


Responsibilities

  • Identify, collect, and perform analysis of raw, primary, and secondary data derived from various sources.

  • Create and update General Intelligence Requirements (GIR)s, Priority Intelligence Requirements (PIR)s, and Organization Specific Intelligence Requirements (OSIR)s for customers.

  • Create threat profiles and threat landscapes for companies and or customers.

  • Create diamond models around customers and threat adversaries.

  • Improve the creation and delivery of intelligence information to customers and partners, via different reports and tools, linking the dots and adding value to the service delivered.

  • Perform investigations on the internet and dark web on different topics, from broad investigations to specific searches.

  • Identify, assess, and track tactics, techniques, and procedures of cyber threat actors.

  • Provide threat review and validation to customers on their exposure to cyber security risks, threats, and potential impact.

  • Provide actionable strategic, technical, and tactical cyber intelligence to company & its subsidiaries through weekly, monthly, and ad hoc reports, briefings, and presentations.

  • Conduct Internet searches, in English and Arabic, to profile customers’ online presence and optimize data feeds into back end cyber threat harvesting and analysis solutions.

  • Apply advanced search techniques (e.g., Boolean terms) in Google/Bing search engines, social sites, domain databases, darknet, etc. to reduce false positives.

  • Support customers in take down efforts to remove fraudulent, offensive, and suspicious online content.

  • Be up to date on knowledge of attacker tools/techniques, country and regional cyber threats, business, and political landscapes to reflect their context into detected/created threats to reduce false positives to help improve generated reports.

  • Provide feedback and recommendations to Backend Cyber defense teams such as the MDR Team to enhance detection's (e.g., false positives, generic data, fine-tuning, updated info, etc.) and improve portal performance and/or experience.

  • Understand customer industries to generate Arabic keywords to support searches of online Arabic content.

  • Identify new information sources (English and Arabic), search keywords (English and Arabic) and best practices to achieve more accurate and customer related threat detection.

  • When customers request ad-hoc investigations, assist in defining the investigation scope, delivery date and present the findings to the customer (report).

  • Understand and perform analysis of competing hypotheses (ACH) for use in threat hunting and advisory production.

  • Manage the life cycle of threat intelligence.

  • Maintain a high degree of awareness of the current threat landscape.

  • Assist in providing threat and vulnerability analysis as well as security advisory services.

  • Participate in knowledge sharing with other Analysts and writing technical articles for Internal Knowledge Bases.

  • Perform tasks independently with some oversight.

  • Deliver Cyber Intelligence services.

  • Research and craft analytic papers and deliver intelligence briefings under short deadlines on various geographical and functional topics.

  • Use knowledge, creativity, and analytic tradecraft best practices to obtain solutions to complex problems.

Qualifications & Skills:

  • A Degree in Computer Science, Information Systems, Electronics Engineering, or a closely related degree.

  • 1 - 4 years’ experience as a TIA or related position.

  • An active, demonstrable interest in cyber threat detection, and cyber threat intelligence.

  • A thorough understanding of IT systems and network security concepts, network protocols.

  • Thorough understanding of cyber threats and warfare such as Internet services attacks, User attacks, APTs, malicious mobile apps, online fraud, dark-net, hackers’ tools/techniques, hacktivist, etc.

  • Knowledge of latest global cyber-attacks, prominent ransomware, APT groups.

  • Demonstrable knowledge around GIR creations and threat profiling/landscaping.

  • Demonstrable knowledge of cyber threat intelligence, threat actors, malware, tactics, techniques, and procedures (TTPs), intelligence analysis, use of diamond models and various security methodologies and processes.

  • Demonstrable knowledge analysis of competing hypotheses (ACH) for evaluating multiple competing hypotheses for observed data.

  • Deep knowledge of IT security best practices, common attack types, and detection/prevention methods.

  • Demonstrable knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cybercrime.

  • Demonstrable knowledge on deep and dark web.

  • Good understanding of the cyber kill chain or attack vectors.

  • Excellent verbal and written communication skills including the ability to clearly articulate technical and strategic level cyber matters to a variety of audiences.

  • Ability to multitask, prioritize, and manage time effectively.

  • Strong attention to detail.

  • Excellent interpersonal skills and professional demeanor.

  • Excellent customer service skills.

  • Formal Intelligence Analysis training & certifications like GCTI, GOSI, C|TIA, Security+, RCIA, CTIP, CPTIA, CRTIA, CTIS-I and or CTIS-II.

Benefits:

  • Health insurance with one of the leading global providers for medical insurance.

  • Career progression and growth through challenging projects and work.

  • Employee engagement activities throughout the year.

  • Tailored training & development program.

About Us:

Help AG is the cyber security arm of e& enterprise and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.

Present in the Middle East since 2004, Help AG was strategically acquired by Etisalat group in Feb 2020, hence creating a cyber security and digital transformation powerhouse in the region.

Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and cyber security focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Threat Intelligence Analyst

Riyadh, Riyadh Help AG

Posted today

Job Viewed

Tap Again To Close

Job Description

Help Ag is looking for a Cyber Threat Intelligence Analyst (TIA) who will be a part of the Cyber Defense team, responsible to help collect, analyze, and disseminate cyber intelligence impacting the company or its customers. The ideal candidate will be a professional with experience in cyber intelligence/cyber risk, delivering equivalent services to organizations, with drive and creativity. This is a fantastic opportunity for a passionate professional that wants to evolve in the Cyber Intelligence world. The position will involve essential duties and responsibilities that must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work.

Responsibilities

  • Identify, collect, and perform analysis of raw, primary, and secondary data derived from various sources.

  • Create and update General Intelligence Requirements (GIR)s, Priority Intelligence Requirements (PIR)s, and Organization Specific Intelligence Requirements (OSIR)s for customers.

  • Create threat profiles and threat landscapes for companies and or customers.

  • Create diamond models around customers and threat adversaries.

  • Improve the creation and delivery of intelligence information to customers and partners, via different reports and tools, linking the dots and adding value to the service delivered.

  • Perform investigations on the internet and dark web on different topics, from broad investigations to specific searches.

  • Identify, assess, and track tactics, techniques, and procedures of cyber threat actors.

  • Provide threat review and validation to customers on their exposure to cyber security risks, threats, and potential impact.

  • Provide actionable strategic, technical, and tactical cyber intelligence to company & its subsidiaries through weekly, monthly, and ad hoc reports, briefings, and presentations.

  • Conduct Internet searches, in English and Arabic, to profile customers’ online presence and optimize data feeds into back end cyber threat harvesting and analysis solutions.

  • Apply advanced search techniques (e.g., Boolean terms) in Google/Bing search engines, social sites, domain databases, darknet, etc. to reduce false positives.

  • Support customers in take down efforts to remove fraudulent, offensive, and suspicious online content.

  • Be up to date on knowledge of attacker tools/techniques, country and regional cyber threats, business, and political landscapes to reflect their context into detected/created threats to reduce false positives to help improve generated reports.

  • Provide feedback and recommendations to Backend Cyber defense teams such as the MDR Team to enhance detection's (e.g., false positives, generic data, fine-tuning, updated info, etc.) and improve portal performance and/or experience.

  • Understand customer industries to generate Arabic keywords to support searches of online Arabic content.

  • Identify new information sources (English and Arabic), search keywords (English and Arabic) and best practices to achieve more accurate and customer related threat detection.

  • When customers request ad-hoc investigations, assist in defining the investigation scope, delivery date and present the findings to the customer (report).

  • Understand and perform analysis of competing hypotheses (ACH) for use in threat hunting and advisory production.

  • Manage the life cycle of threat intelligence.

  • Maintain a high degree of awareness of the current threat landscape.

  • Assist in providing threat and vulnerability analysis as well as security advisory services.

  • Participate in knowledge sharing with other Analysts and writing technical articles for Internal Knowledge Bases.

  • Perform tasks independently with some oversight.

  • Deliver Cyber Intelligence services.

  • Research and craft analytic papers and deliver intelligence briefings under short deadlines on various geographical and functional topics.

  • Use knowledge, creativity, and analytic tradecraft best practices to obtain solutions to complex problems.

Qualifications & Skills:

  • A Degree in Computer Science, Information Systems, Electronics Engineering, or a closely related degree.

  • 1 - 4 years’ experience as a TIA or related position.

  • An active, demonstrable interest in cyber threat detection, and cyber threat intelligence.

  • A thorough understanding of IT systems and network security concepts, network protocols.

  • Thorough understanding of cyber threats and warfare such as Internet services attacks, User attacks, APTs, malicious mobile apps, online fraud, dark-net, hackers’ tools/techniques, hacktivist, etc.

  • Knowledge of latest global cyber-attacks, prominent ransomware, APT groups.

  • Demonstrable knowledge around GIR creations and threat profiling/landscaping.

  • Demonstrable knowledge of cyber threat intelligence, threat actors, malware, tactics, techniques, and procedures (TTPs), intelligence analysis, use of diamond models and various security methodologies and processes.

  • Demonstrable knowledge analysis of competing hypotheses (ACH) for evaluating multiple competing hypotheses for observed data.

  • Deep knowledge of IT security best practices, common attack types, and detection/prevention methods.

  • Demonstrable knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cybercrime.

  • Demonstrable knowledge on deep and dark web.

  • Good understanding of the cyber kill chain or attack vectors.

  • Excellent verbal and written communication skills including the ability to clearly articulate technical and strategic level cyber matters to a variety of audiences.

  • Ability to multitask, prioritize, and manage time effectively.

  • Strong attention to detail.

  • Excellent interpersonal skills and professional demeanor.

  • Excellent customer service skills.

  • Formal Intelligence Analysis training & certifications like GCTI, GOSI, C|TIA, Security+, RCIA, CTIP, CPTIA, CRTIA, CTIS-I and or CTIS-II.

Benefits:

  • Health insurance with one of the leading global providers for medical insurance.

  • Career progression and growth through challenging projects and work.

  • Employee engagement activities throughout the year.

  • Tailored training & development program.

About Us:

Help AG is the cyber security arm of e& enterprise and provides leading enterprise businesses across the Middle East with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements, enabling them to evolve securely with a competitive edge.

Present in the Middle East since 2004, Help AG was strategically acquired by Etisalat group in Feb 2020, hence creating a cyber security and digital transformation powerhouse in the region.

Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and cyber security focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Specialist

Riyadh, Riyadh Saudi Networkers Services

Posted today

Job Viewed

Tap Again To Close

Job Description

Employment: Full Time

  • End Point Protection Management
  • Firewall Management
  • DMZ Management
  • Network Access Control Management
  • VPN Management
  • Intrusion Prevention System (IPS) Management
  • Mail Gateway Management
  • Web Proxy Gateways Management
  • Mobile Device Management (MDM)
  • Data Loss Prevention Management
  • Data Classification Management
  • Identity and Access Management
Requirements:
  • Bachelor degree in Informaton Technology / Cyber Security or any other relevant discpline.
  • Minimum 3-5 years of experience in IT Security / Cyber Security.
  • Industry stadard certifications in Cyber Security is desired.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Specialist

Riyadh, Riyadh Total-TECH Co.

Posted 17 days ago

Job Viewed

Tap Again To Close

Job Description

” The Job Description”

  1. Design, implement, and maintain information security solutions and policies.
  2. Monitor and protect networks, systems, and applications from cyber threats.
  3. Manage and maintain F5 Load Balancers, including configuration, troubleshooting, and optimization.
  4. Administer Privileged Access Management (PAM) and Identity & Access Management (IAM) tools to ensure secure access control.
  5. Implement and manage Network Access Control (NAC) solutions, particularly Cisco ISE.
  6. Oversee Mobile Device Management (MDM) policies to secure mobile endpoints.
  7. Deploy and monitor Endpoint Detection and Response (EDR) tools for threat detection and incident response.
  8. Ensure compliance with NCA cybersecurity regulations and requirements.
  9. Conduct regular security assessments, audits, and risk evaluations.
  10. Collaborate with IT and business teams to respond to security incidents and develop mitigation strategies.
  11. Maintain up-to-date documentation of security processes, systems, and incident reports.
    Requirements:
  • Bachelor’s degree in Information Security, Computer Science, Cybersecurity, or a related field.
  • 3+ years of experience in an information security role.
  • Strong knowledge of network security principles and practices.
  • Hands-on experience with:
    F5 Load Balancers.
    PAM/IAM solutions (e.g., CyberArk, Azure AD, Okta).
    NAC (Cisco ISE) systems.
    MDM platforms (e.g., Intune, MobileIron).
    EDR tools (e.g., CrowdStrike, SentinelOne, Microsoft Defender).
    Familiarity with NCA (National Cybersecurity Authority) guidelines and compliance requirements.
  • Saudi national (this role is open to Saudi citizens only).

Tagged as: EDR , F5 , IAM , ISE , MDM , NAC , NCA , PAM

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Specialist

Riyadh, Riyadh Tweeq

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

Senior Information Security Specialist at Tweeq. Reporting directly to the Head of Information Security, you will play a pivotal role in safeguarding Tweeq's information assets, managing risks, and driving the implementation of robust security frameworks in compliance with SAMA's guidelines.

Description

Department: InfoSec GRC

Location: KSA

Responsibilities

Key Responsibilities

  • Compliance and Governance:
    • Ensure adherence to SAMA requirements and standards.
    • Develop, implement, and maintain information security policies, procedures, and guidelines.
    • Monitor compliance with internal security policies and external regulatory requirements.
  • Risk Management:
    • Conduct risk assessments and vulnerability analyses to identify and mitigate security threats.
    • Develop and implement risk management strategies and controls.
    • Monitor and report on the effectiveness of security measures.
  • Security Operations:
    • Oversee the implementation and management of security tools and technologies.
    • Coordinate with IT and other departments to ensure robust security measures are in place.
    • Manage incident response and investigation processes.
  • Training and Awareness:
    • Develop and deliver security awareness training programs.
    • Promote a culture of security awareness within the organization.
  • Project Involvement:
    • Participate in projects, including the onboarding and implementation of new systems, such as GRC tools.
    • Attend workshops and contribute to the integration of security requirements into new projects.
  • Reporting and Documentation:
    • Prepare regular reports on the status of information security programs.
    • Maintain documentation related to security policies, procedures, and incidents.
Skills, Knowledge & Expertise
  • Proven experience in information security.
  • Strong knowledge of SAMA requirements and standards.
  • Experience with governance, risk management, and compliance (GRC) tools such as Archer and Cyber Arrow is preferred.
  • Strong analytical and problem-solving skills.
  • Excellent communication and interpersonal skills.
  • Ability to work in a fast-paced, dynamic environment.
  • Passionate about learning and career development.
Seniority level
  • Mid-Senior level
Employment type
  • Full-time
Job function
  • Information Technology

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

GRC Specialist - Information Security

Riyadh, Riyadh Jafeer Technologies

Posted 17 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

GRC Specialist's job is to participate in information security Governance, Risk Management, and Compliance Engagements within Jafeer and for Jafeer Customers.

Responsibilities
  • Participate in various IT Risk Management & Business continuity initiatives.
  • Ensuring that requirements in IT Audit, Standard, Policy, Compliance and Risk controls are met.
  • Ensure external auditors have the access and information they need to complete their audit successfully.
  • Conduct interviews and process walkthroughs with select personnel and document and assess business processes and information systems to determine the adequacy of the control environment.
  • Demonstrate well IT auditing based on industry best practices and regulations.
Skills
  • Demonstrates a high level of independence, integrity, and confidentiality, with the ability to independently develop and deliver presentations, as well as respond to inquiries.
  • Shows an understanding and application of fundamental project management methodologies.
  • Capable of documenting and articulating technical details clearly and succinctly. Exceptionally organized, with the ability to multitask, handle simultaneous deadlines, and effectively contribute to and lead teams.
  • Skilled at engaging with clients, both internal and external.
  • Possesses outstanding communication abilities.
  • This job might require frequent traveling within Saudi Arabia and sometimes outside of Saudi Arabia

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Specialist

Riyadh, Riyadh Tabby

Posted 21 days ago

Job Viewed

Tap Again To Close

Job Description

Reporting directly to the Head of Information Security, you will play a pivotal role in safeguarding Tweeq's information assets, managing risks, and driving the implementation of robust security frameworks in compliance with SAMA's guidelines.

Department
InfoSec GRC
Employment Type
Full Time
Location
KSA
Workplace type
Onsite
Reporting To
Weam Munshi
Key Responsibilities

Compliance and Governance:

  • Ensure adherence to SAMA requirements and standards.
  • Develop, implement, and maintain information security policies, procedures, and guidelines.
  • Monitor compliance with internal security policies and external regulatory requirements.

Risk Management:

  • Conduct risk assessments and vulnerability analyses to identify and mitigate security threats.
  • Develop and implement risk management strategies and controls.
  • Monitor and report on the effectiveness of security measures.

Security Operations:

  • Oversee the implementation and management of security tools and technologies.
  • Coordinate with IT and other departments to ensure robust security measures are in place.
  • Manage incident response and investigation processes.

Training and Awareness:

  • Develop and deliver security awareness training programs.
  • Promote a culture of security awareness within the organization.

Project Involvement:

  • Participate in projects, including the onboarding and implementation of new systems, such as GRC tools.
  • Attend workshops and contribute to the integration of security requirements into new projects.

Reporting and Documentation:

  • Prepare regular reports on the status of information security programs.
  • Maintain documentation related to security policies, procedures, and incidents.

Skills, Knowledge & Expertise

  • Proven experience in information security.
  • Strong knowledge of SAMA requirements and standards.
  • Experience with governance, risk management, and compliance (GRC) tools such as Archer and Cyber Arrow is preferred.
  • Strong analytical and problem-solving skills.
  • Excellent communication and interpersonal skills.
  • Ability to work in a fast-paced, dynamic environment.
  • Passionate about learning and career development.

About Tweeq

Tweeq is a Saudi fintech on a mission to reshape how people manage their money. Now part of Tabby, the largest BNPL provider in the Middle East, we’re building the next generation of financial products for the Kingdom. From payments to everyday money management, our goal is to make financial services faster, smarter and more accessible for everyone in Saudi Arabia.

Apply Now

Our Hiring Process

Stage 2:

Review

Stage 3:

Interview

Stage 4:

Interview

Stage 5:

Hired

Stage 1:

Applied

Stage 2:

Review

Stage 3:

Interview

Stage 4:

Interview

Stage 5:

Hired

Stage 1:

Applied

Stage 2:

Review

Stage 3:

Interview

Stage 4:

Interview

Stage 5:

Hired

Not quite right? Register your interest to be notified of any roles that come along that meet your criteria.

Register Your Interest

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Threat intelligence Jobs in Riyadh !

Senior Information Security Engineer

Riyadh, Riyadh Tabby

Posted 21 days ago

Job Viewed

Tap Again To Close

Job Description


We’re looking for an experienced and proactive Senior Information Security Engineer to serve as a senior member of our cybersecurity operations team. You’ll lead complex investigations, shape our detection capabilities, and provide strategic input into incident response and threat management. As a technical authority in the SOC, you’ll mentor junior analysts, collaborate across teams, and help drive continuous improvement in our security posture.

Department
InfoSec Monitoring
Employment Type
Full Time
Location
KSA
Workplace type
Onsite
Reporting To
Weam Munshi
Key Responsibilities




Advanced Threat Detection & Monitoring

  • Lead the analysis and triage of high-fidelity alerts and complex event correlations across firewalls, IDS/IPS, endpoints, servers, and cloud platforms.

  • Identify and investigate sophisticated threats, advanced persistent threats (APTs), and anomalous behavior patterns.

  • Continuously refine detection logic, SIEM rules, and alerting thresholds to optimize SOC effectiveness.

  • Design and maintain operational dashboards and KPIs to track security trends and SOC performance.


Incident Response & Forensics

  • Act as the primary incident commander for major security incidents, coordinating technical response and stakeholder communication.


  • Conduct root cause analysis, full-scope investigations, and forensic analysis using endpoint and network-based artifacts.

  • Drive post-incident reviews and deliver actionable recommendations to reduce future risk.

  • Oversee incident documentation quality and ensure consistency in reporting and knowledge transfer.


Detection Engineering & Threat Intelligence

  • Research and operationalize threat intelligence into custom detection rules, threat hunting queries, and playbooks.

  • Develop and tune detection use cases aligned with MITRE ATT&CK and evolving threat actor techniques.

  • Contribute to the development and enhancement of SOAR workflows and automation to improve SOC efficiency.


Vulnerability & Risk Management

  • Collaborate with infrastructure and DevOps teams to assess and prioritize vulnerabilities in context with threat intelligence.

  • Support patch validation and track remediation efforts for critical exposures.

  • Guide vulnerability lifecycle processes, ensuring risks are addressed in a timely and measurable way.


Collaboration & Mentorship

  • Serve as a technical mentor and escalation point for Tier 1 and Tier 2 SOC analysts.

  • Lead training initiatives and tabletop exercises to strengthen SOC readiness and maturity.

  • Work closely with IT, Engineering, Compliance, and Risk teams to ensure alignment during investigations and threat mitigation efforts.

  • Communicate clearly and effectively with stakeholders, including drafting concise executive summaries during major incidents.

Skills, Knowledge and Expertise

  • 3–5+ years of hands-on experience in a SOC or cybersecurity operations role, including incident handling and threat detection.

  • Deep understanding of security operations, threat hunting, attack vectors, and cyber kill chains.

  • Proven expertise in log analysis, endpoint telemetry, and cloud-native security tools (e.g., AWS CloudTrail, Azure Sentinel).

  • Strong scripting experience (e.g., Python, PowerShell) for automation and detection engineering.

  • Experience with SIEMs (e.g., Splunk, Elastic, Sentinel), SOAR platforms, EDR/XDR tools, and Threat Intelligence platforms.

  • Familiarity with DevSecOps, APIs, microservices, and modern application architectures.

  • Security certifications such as GCIA, GCIH, CySA+, or equivalent (preferred).

  • Clear and confident communicator with the ability to lead during high-pressure situations and present findings to technical and non-technical audiences.

About Tabby

Tabby creates financial freedom in the way people shop, earn and save, by reshaping their relationship with money.

The company’s flagship offering allows shoppers to split their payments online and in-store with no interest or fees. Over 32,000 global brands and small businesses, including Amazon, Noon, IKEA and Shein use Tabby to accelerate growth and gain loyal customers by offering easy and flexible payments online and in stores.

Tabby has generated over $7 billion in transaction volume for its partner brands and has the highest rated, most reviewed, largest and fastest growing app of any fintech in the GCC region.

Tabby launched operations in 2020 and has raised +$1 billion in equity and debt funding from global and regional investors.

Apply Now

Our Hiring Process

Stage 2:

Review

Stage 3:

HR call @Tabby

Stage 4:

Final interview @Tabby

Stage 5:

Hired

Stage 1:

Applied

Stage 2:

Review

Stage 3:

HR call @Tabby

Stage 4:

Final interview @Tabby

Stage 5:

Hired

Stage 1:

Applied

Stage 2:

Review

Stage 3:

HR call @Tabby

Stage 4:

Final interview @Tabby

Stage 5:

Hired

Not quite right? Register your interest to be notified of any roles that come along that meet your criteria.

Register Your Interest

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

GRC Specialist - Information Security

Riyadh, Riyadh Giza Systems KSA

Posted 24 days ago

Job Viewed

Tap Again To Close

Job Description

GRC Specialist's job is to participate in information security Governance, Risk Management, and Compliance Engagements within Jafeer and for Jafeer Customers.


Responsibilities

  • Participate in various IT Risk Management & Business continuity initiatives.

  • Ensuring that requirements in IT Audit, Standard, Policy, Compliance and Risk controls are met.

  • Ensure external auditors have the access and information they need to complete their audit successfully.

  • Conduct interviews and process walkthroughs with select personnel and document and assess business processes and information systems to determine the adequacy of the control environment.

  • Demonstrate well IT auditing based on industry best practices and regulations.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security GRC Specialist

Riyadh, Riyadh NTT DATA, Inc.

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

As a Security Managed Services Engineer (L2) at NTT DATA, your role is to ensure that our clients' security infrastructures and systems remain operational. With a proactive approach, you'll monitor, identify, investigate, and resolve technical incidents and problems, restoring service efficiently. Your primary objective is to handle client requests or tickets with technical expertise, ensuring they are resolved within the agreed service level agreement (SLA).

Responsibilities
  1. Actively manage work queues, perform operational tasks, and update tickets with resolution actions.
  2. Identify issues and errors early, log incidents promptly, and provide second-level support; communicate with other teams and clients to extend support when needed.
  3. Execute changes responsibly, flag risks and mitigation plans, and ensure all changes have proper approvals.
  4. Collaborate with automation teams to optimize efforts and automate routine tasks; ensure seamless handovers during shift changes.
  5. Audit incident and request tickets for quality, contribute to trend analysis, and identify opportunities for automation.
  6. Assist L1 Security Engineers with triage and troubleshooting; support project work when required.
  7. Contribute to change management with thorough documentation and effective planning and execution of maintenance activities, in compliance with standard procedures.
Qualifications
  • Experience with managed services handling security infrastructure and working knowledge of ticketing tools, preferably ServiceNow.
  • Proficiency in active listening with techniques like paraphrasing and probing for more information.
  • Excellent planning skills; able to anticipate and adapt to changing circumstances.
  • Strong ability to communicate and engage across different cultures and social groups.
  • Adaptability and flexibility in approach.
  • Client-focused mindset; prioritizing their needs and experience.
  • Positive attitude and ability to work well under pressure.
  • Willingness to work longer hours when necessary.
  • Bachelor's degree or equivalent qualification in IT/Computing, or relevant work experience.
Workplace type

On-site

About NTT DATA

NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.

Equal Opportunity Employer

NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.

Seniority level
  • Entry level
Employment type
  • Full-time
Job function
  • Information Technology
Industries
  • IT Services and IT Consulting
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Threat Intelligence Jobs View All Jobs in Riyadh