46 Vulnerability Assessments jobs in Saudi Arabia
Cyber Security Analyst
Posted today
Job Viewed
Job Description
- Assessment & Management of IT security and IT risk (e.g., data systems, network and/or web) across the enterprise
- Address questions from internal and external audits and examinations
- Develop & Review policies, procedures and standards that meet existing and newly developed policy and regulatory
- Able to conduct risk assessment for IT division
- Facilitate IT security/risk training curriculum
- Ability to work with SIEM solutions and retrieve/read LOG reports
- Serve as project manager/lead within IT security projects.
- Promote awareness of applicable regulatory standards, upstream risks and industry best practices across the organization
- Reports on findings and recommendations for corrective action
- Performs vulnerability assessments & penetration testing as assigned utilizing IT security tools and methodologies
- Identifies opportunities to reduce risk and documents remediation options regarding acceptance or mitigation of risk scenario
**Qualifications**:
- Masters/Bachelors in Computer Science/Information Systems / Information Security or related field
- Security Certifications (CISM/CISSP/CISA/ISO 270001/CEH)
- IT Governance, Risk Management & Compliance related Certifications ITIL, COBIT, PRINCE 2, PMP.
Cyber Security Analyst
Posted today
Job Viewed
Job Description
**_ Role Purpose_**
VAPT - VULNERABILITY ASSESSMENT AND PENETRATION TESTING (L2)
Application Security Code Review - SAC (L2), QualysGuard (L2)- Web services-
- ** Key Responsibilities**:
- Develop clear and concise security tests reports and its executive summaries.- Maintain working knowledge of advanced threat actor tactics, techniques and procedures, and emulate these to assess vulnerability and risk.-
- ** Job Requirements**:
- A Bachelor of Science degree in Computer Science, Computer Engineering, Electrical Engineering, or a related technical field; or equivalent professional experience.Experience with various security tools and products (Fortify, AppScan, etc?).- Experience with scripting languages such as python, ruby, POSIX shell- Good understanding of the components of a secure DLC/SDLC.- Strong time management skills, self-directed, with the ability to meet verbal and written deadlines.- Good English communication skills and able to collaborate with techno-functional stakeholders.
Cyber Security Analyst
Posted today
Job Viewed
Job Description
- Tech Hiring
- 3061159
**Job Description**:
**_Role Purpose_**
- The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information_
**_
Do_**
- **_
Ensuring customer centricity by providing apt cybersecurity_**
- _ Monitoring and safeguarding the log sources and security access_
- _ Planning for disaster recovery in the event of any security breaches_
- _ Monitor for attacks, intrusions and unusual, unauthorized or illegal activity_
- _ Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems_
- _ Conduct security assessments, risk analysis and root cause analysis of security incidents_
- _ Handling incidents escalated by the L1 team in 24x7 rotational shifts_
- _ Use advanced analytics tools to determine emerging threat patterns and vulnerabilities_
- _ Completing all tactical security operations tasks associated with this engagement._
- _ Analyses all the attacks and come up with remedial attack analysis_
- _ Conduct detailed analysis of incidents and create reports and dashboards_
- ** SailPoint**:
**Description**:
- Lead the deployment and configuration of SailPoint IdentityIQ, including user provisioning, access request and approval, Certification and role management.
- Customizing the SailPoint IdentityIQ platform according to the organization’s requirements.
- User Lifecycle Management: Manage user provisioning and de-provisioning processes, ensuring that user access is granted and revoked appropriately based on predefined rules and policies.
- Troubleshooting and issue resolution.
Documentation
- **_
Stakeholder coordination & audit assistance_**
- _ Liaise with stakeholders in relation to cyber security issues and provide future recommendations_
- _ Maintain an information security risk register and assist with internal and external audits relating to information security_
- _ Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues_
**_
Stakeholder Interaction_**
**_
Stakeholder Type_**
**_ Stakeholder Identification_**
**_ Purpose of Interaction_**
**_ Internal_**
- Technical Lead/ Project Lead_
- Regular reporting & updates_
- Security Intelligence (Practice)_
- Coordination for security reasons_
**_ External_**
- Customer_
- To coordinate for all security breaches & resolutions_
**_
Display_**
- Lists the competencies required to perform this role effectively:_
- **_ Functional Competencies/ Skill_**
- Leveraging Technology - Knowledge of current and upcoming technology (automation, tools and systems) to build efficiencies and effectiveness in own function/ Client organization - **_Expert_**:
- Process Excellence - Ability to follow the standards and norms to produce consistent results, provide effective control and reduction of risk - **_Expert_**:
- Competency Levels_
- Foundation_
- Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with mínimal support and guidance._
- Competent_
- Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well._
- Expert_
- Applies the competency in all situations and is serves as a guide to others as well._
- Master_
- Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization._
- **_
Behavioral Competencies_**
- _ Effective Communication_
- _ Collaborative Working_
- _ Execution Excellence_
- _ Problem Solving & Analytical Skills_
**_
Deliver_**
**_
No._**
**_ Performance Parameter_**
**_ Measure_**
- 1._
- Customer centricity_
- Timely security breach solutioning to end users, Internal stakeholders & external customers experience_
- 2._
- Process Adherence_
- Adherence to SLA’s (90-95%), response time and resolution time TAT_
SailPoint Identity Mgmt and Governance
We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, caste, creed, religion, gender, marital status, age, ethnic and national origin, gender identity, gender expression, sexual orientation, political orientation, disability status, protected veteran status, or any other characteristic protected by law.
L1 Cyber Security Analyst
Posted today
Job Viewed
Job Description
The Cyber Analyst performs real-time event and incident management processes within the SOC, including internal security incident evaluation and response, following established guidelines and policies.
Responsibilities- Monitor and analyze logs in real-time using leading SIEM technology.
- Identify security incidents and conduct first-level investigations.
- Escalate incidents to Level 2 Analysts for further response.
- Bachelor's degree in Computer Science or a related field.
- Master's degree in Information Security is preferred.
- Ability to work on a flexible, rotational 24x7x365 schedule.
- Strong adherence to processes, procedures, and task prioritization.
- Knowledge of attack techniques and current threat landscape is desirable.
- Understanding of TCP/IP, Linux, Windows infrastructures, and basic network security concepts.
- Excellent communication skills in English.
- Analytical and troubleshooting skills for quick resolution.
- Prior experience with SIEM/Log Analysis is a plus but not required.
L1 Cyber Security Analyst
Posted 1 day ago
Job Viewed
Job Description
The Cyber Analyst performs real time event and incident management processes of SOC, as well as internal security incidents evaluation and response following the event management guidelines and policies of SOC.
- Real-Time Event & Log monitoring and analysis using leading SIEM Technology
- Security Incidents identification and 1st-level investigation
- Escalation to Level 2 Analysts for incident response
- Bachelor's degree in Computer Science or relevant field
- Master's degree in Information Security is desired
- Ability to work on a flexible, rotational 24x7x365 schedule
- Ability to follow processes and procedures and prioritize tasks
- Knowledge and understanding of standard & modern attack techniques and strong awareness of the current threat landscape is desired
- Knowledge of TCP/IP, Linux and Windows infrastructures and basic network security architecture concepts
- Excellent verbal and written communication skills in English
- Analytical and troubleshooting skills on short timeframes
- No prior working experience with SIEM/Log Analysis is required, but it will be considered a plus
- Dynamic and respectful environment - our people are the core of our business, we value each and every individual and support initiatives, promoting agility and work/life balance
- Continuous coaching - work with passionate people and receive both theoretical as well as hands-on training
- Career development. Expand your career internationally and work alongside knowledgeable people from diverse cultures and backgrounds
- A competitive compensation package dependent upon your experience and qualifications. We're focused on rewarding effοrts. Our salaries and benefits package will keep you motivated throughout your career
- Seniority level Entry level
- Employment type Contract
- Job function Information Technology
- Industries IT Services and IT Consulting
Referrals increase your chances of interviewing at Obrela by 2x
Get notified about new Cyber Security Analyst jobs in Riyadh, Riyadh, Saudi Arabia .
IT Security Implementation Lead EngineerRiyadh, Riyadh, Saudi Arabia 21 hours ago
Identity & Access Management (IAM) EngineerRiyadh, Riyadh, Saudi Arabia 10 minutes ago
Penetration Testing Engineer I Ethical HackerRiyadh, Riyadh, Saudi Arabia 22 hours ago
Privileged Access Management (PAM) EngineerRiyadh, Riyadh, Saudi Arabia 21 minutes ago
Application Security Engineer (Onsite, Riyadh) Senior Information Security Presales Engineer Digital Forensic and Incident Response Specialist Cybersecurity Governance, Risk and Compliance ManagerWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrL1 Cyber Security Analyst
Posted today
Job Viewed
Job Description
The Cyber Analyst performs real-time event and incident management processes within the SOC, including internal security incident evaluation and response, following established guidelines and policies.
Responsibilities- Monitor and analyze logs in real-time using leading SIEM technology.
- Identify security incidents and conduct first-level investigations.
- Escalate incidents to Level 2 Analysts for further response.
- Bachelor's degree in Computer Science or a related field.
- Master's degree in Information Security is preferred.
- Ability to work on a flexible, rotational 24x7x365 schedule.
- Strong adherence to processes, procedures, and task prioritization.
- Knowledge of attack techniques and current threat landscape is desirable.
- Understanding of TCP/IP, Linux, Windows infrastructures, and basic network security concepts.
- Excellent communication skills in English.
- Analytical and troubleshooting skills for quick resolution.
- Prior experience with SIEM/Log Analysis is a plus but not required.
Cyber Security Analyst | Riyadh, SA
Posted today
Job Viewed
Job Description
Job Description
- Robust knowledge of Cybersecurity regulations, standards, and controls.
- Fluent in Cyber Incident Detection, Response, and Management.
- Strong understanding of ICT, including Hardware, Software, and Networks.
- Expertise in preparing and analyzing Cybersecurity reports.
- Experience in ICT / Cybersecurity Audit / Compliance / Regulatory discussions. Professional Certifications: Security+, CCNA, CCNP, or NSE4A.
- Collaborative team player who fosters a culture of continuous improvement and empowers team members to achieve their best.
- An individual committed to quality, accountability, and ethical practices in project and change management.
- Passionate about mentoring and developing talent within the information and cybersecurity management functions.
- Fluent in Arabic and English languages.
Requirements
- Bachelor's degree in Computer Science, Information Security, or a related field.
- At least 3 years of experience in incident handling and reporting.
- Professional certifications related to incident response are preferred.
- Strong analytical and problem-solving skills.
- Knowledge of network security zones, firewall configurations, and IDS policies.
- Knowledge of systems communications from Layer 1 to 7.
- Experience with Systems Administration, Middleware, and Application Administration.
- Experience with Network and Security tools administration.
- Proficiency with log search tools and regular expressions.
- Knowledge of packet capture and analysis.
- Experience with Security Assessment tools (NMAP, Nessus, Metasploit, Netcat).
- Ability to create and execute containment strategies.
Be The First To Know
About the latest Vulnerability assessments Jobs in Saudi Arabia !
L3 Senior Security Analyst (Saudi National only)
Posted today
Job Viewed
Job Description
Our Culture :
At Hulool Zaintech for Information Technology, we pride ourselves on our culture, which drives everything we do. We seek individuals who share our values and wish to be part of a unique, engaging environment centered around collaboration and innovation. If you desire a role where you can foster engagement and excellence across teams through commitment and teamwork, and are customer-centric with a strong sense of integrity focused on employee engagement, then explore how you can join the Hulool Zaintech family.
Our Code of Conduct
We strictly adhere to our code of conduct, serving as a moral compass and framework for responsible behavior, fostering ethical choices, positive relationships, and a better future. It outlines policies, standards, and procedures for our global operations, promoting integrity and ethical excellence worldwide.
All employees review, understand, confirm, and adhere to this code annually. Newly hired employees undergo the same review process as part of onboarding.
Duties and Responsibilities :
- Manage, configure, test, and integrate SIEM systems, focusing on content development such as reports, dashboards, real-time rules, filters, and channels.
- Develop and deploy new SIEM content (use-cases) aligned with business or emergency threat requirements, with support from the engineering team.
- Conduct multi-step breach analysis and investigations to trace activities related to advanced threats.
- Investigate and escalate complex or high-severity security threats or incidents.
- Serve as an escalation resource and mentor for other analysts.
- Collaborate with SIEM engineering and security teams to develop and refine correlation rules.
- Maintain expertise on advanced persistent threats, TTPs, forensics, and incident response practices.
- Engage in threat hunting to identify emerging threats across internal and external sources.
- Coordinate evidence/data collection, documentation, and review security incident reports.
- Assist in defining and driving strategic security initiatives.
- Create and improve SOC processes and procedures in collaboration with Level 1 and Level 2 analysts.
- Recommend improvements to security policies, procedures, and architecture based on operational insights.
- Develop operational and executive reports.
- Analyze security events to verify incidents and assess their impact and risk.
- Prepare incident analysis reports and coordinate responses with relevant teams.
- Support log integration activities and reduce false positives.
- Assist during incident containment, investigation, eradication, and recovery phases.
- Contribute data for SOC reports and metrics.
- Monitor and address false positives, coordinating with engineering teams.
- Analyze recurring incidents and system performance, implementing corrective actions.
- Document and update playbooks and procedures.
Requirements
- Minimum 5 years’ experience in SOC operations, monitoring, and event analysis.
- Expertise in security monitoring platforms, analysis tools, and related technologies.
- Strong analytical and problem-solving skills.
- Advanced knowledge of SIEM/ SOAR technologies for event investigation.
- Understanding of incident handling and response techniques.
- Extensive experience in incident response, handling, and security operations.
L3 Senior Security Analyst (Saudi National only)
Posted 9 days ago
Job Viewed
Job Description
Our Culture:
At Hulool Zaintech for Information Technology, we are proud of our culture and how it drives everything we do. We seek individuals who share our values and want to be part of a unique, engaging culture centered around collaboration and innovation. If you are looking for a role where you can enhance engagement and excellence across teams through commitment and collaboration, and are customer-centric with a focus on integrity and employee engagement, then read on to learn how you can join the Hulool Zaintech family.
Our Code of Conduct:
We strictly adhere to our code of conduct, which serves as a moral compass, providing a framework for responsible behavior and ethical decision-making. It outlines policies, standards, and procedures for our global operations, promoting integrity and ethical excellence across all countries we operate in. All employees review, understand, and adhere to this code annually, including new hires during onboarding.
Duties and Responsibilities:
- Manage, configure, test, and integrate the SIEM system, focusing on content development such as reports, dashboards, real-time rules, filters, and channels.
- Develop and deploy new content (use-cases) on SIEM solutions based on business or threat requirements, with the engineering team's support.
- Conduct breach and investigative analysis to trace activities related to advanced threats.
- Investigate and escalate complex or high-severity security threats or incidents.
- Serve as an escalation resource and mentor for other analysts.
- Collaborate with SIEM engineering and security partners to develop and refine correlation rules.
- Maintain expertise in advanced persistent threats, forensics, and incident response practices.
- Perform threat hunting to identify emerging threat activities across internal and external sources.
- Coordinate evidence gathering, documentation, and review security incident reports.
- Assist in defining and driving strategic security initiatives.
- Create and develop SOC processes and procedures in collaboration with Level 1 and Level 2 analysts.
- Recommend improvements to security policies, procedures, and architecture based on operational insights.
- Develop operational and executive reports.
- Analyze security events to verify incidents, assessing their impact and risk to clients.
- Prepare incident analysis reports and coordinate responses with relevant teams.
- Support log integration activities and reduce false positives.
- Assist during incident containment, investigation, eradication, and recovery phases.
- Provide data support for SOC reports and metrics.
- Monitor for false positives and work with engineering to address them.
- Analyze recurring incidents and system performance, implementing corrective actions.
- Document and update playbooks and procedures.
Minimum Requirements:
- 5+ years of experience in SOC operations, monitoring, and event analysis.
- Expertise in security monitoring and analysis platforms and related technologies.
- Excellent analytical and problem-solving skills.
- Advanced knowledge of SIEM/ SOAR technologies for event investigation.
- Strong understanding of incident handling and response techniques.
- Extensive experience in incident response, handling, and security operations.
L3 Senior Security Analyst (Saudi National only)
Posted today
Job Viewed
Job Description
Our Culture:
At Hulool Zaintech for Information Technology, we pride ourselves on our culture, which drives everything we do. We seek individuals who share our values and wish to be part of a collaborative and innovative environment. If you are committed to driving engagement and excellence through teamwork, customer-centricity, and integrity, consider joining the Hulool Zaintech family.
Our Code of Conduct:
We adhere strictly to our code of conduct, serving as a moral compass to guide responsible behavior and ethical decision-making. It outlines policies and standards for our global operations, fostering integrity and ethical excellence. All employees review and adhere to this code annually, with new hires doing so during onboarding.
Duties and Responsibilities:
- Manage, configure, test, and integrate SIEM systems, focusing on content development such as reports, dashboards, rules, filters, and channels.
- Develop and deploy new SIEM content (use-cases) based on business needs or threat requirements, in collaboration with the engineering team.
- Conduct breach analysis and investigative activities to trace advanced threats.
- Investigate and escalate complex or high-severity security incidents.
- Serve as an escalation resource and mentor for other analysts.
- Collaborate with SIEM engineering and security teams to develop and refine correlation rules.
- Maintain expertise in advanced persistent threats, forensics, and incident response practices.
- Engage in threat hunting to identify emerging threats across internal and external sources.
- Coordinate evidence collection, documentation, and review security incident reports.
- Assist in defining and driving strategic security initiatives.
- Create and update SOC processes and procedures in collaboration with Level 1 and Level 2 analysts.
- Recommend improvements to security policies, procedures, and architecture based on operational insights.
- Generate operational and executive security reports.
- Analyze security events to verify incidents, assessing their impact and risk.
- Prepare incident analysis reports and coordinate response efforts.
- Support log integration activities and reduce false positives.
- Assist during incident containment, investigation, eradication, and recovery phases.
- Contribute data for SOC reports and metrics.
- Monitor for false positives and work with engineering to address them.
- Analyze recurring incidents and system performance, implementing corrective actions.
- Document and update playbooks and procedures.
Minimum Requirements:
- 5+ years of experience in SOC operations, monitoring, and event analysis.
- Expertise in security monitoring platforms and related technologies.
- Strong analytical and problem-solving skills.
- Advanced knowledge of SIEM/SOAR tools for event investigation.
- Understanding of incident handling and response techniques.
- Extensive experience in incident response, handling, and security operations.