Cyber Security Analyst L2 and L3 for Saudi Nationals only.<br> location is Riyadh
Skills :
Looking for Risk Advisory . Expert knowledge of all cybersecurity standards and frameworks specifically – ISO 27001, NCA – ECC, CSCC, CCC, NIST SP 800 53/800 161/CSF, SABSA etc.<br>
Skills :
Information Security Specialist is responsible for information security operations including firewall administration, security policy implementation, administration of vulnerability management system, endpoint security and penetration testing
Skills :
Ability to utilise threat modelling techniques to identify potential areas of compromise.<br>
Skills :
Minimum of 5 years of customer facing experience, in IT Network & security domain.
Skills :
Threat Intel (Saudi Nationals only)
Skills :
Minimum of 15 years of security experience is mandatory of which at least 10 must be on network security with a deep and primary technical focus.<br>
Skills :
A strong interest and a good background of the Cyber Defence field
Skills :
• PMP is preferred
Skills :
software, Hardware
Skills :
Looking for Onsite Resident Engineer with extensive experience in installing and implementing Dell servers.
Skills :
Build out, maintain, and troubleshoot our rapidly expanding infrastructure. Demonstrate technical competency, delivering mission critical infrastructure and ensuring the highest levels of availability, performance and security.
Skills :
Incident Response or Security Operations Center (SOC) teams<br>
Skills :
Arcsight consultant resident in Saudi Arabia and have transferred iqama.<br> • Use cases development <br> • Flex connector development <br> • ESM and Smart connector management <br> • SIEM integration<br> • Splunk Long Mgmt including all operation and administration
Skills :
We are hiring Technical QA (Automation & Performance) - MNC Slovika/Romonia/Eurpoe
Skills :
Position Title: Business Process Architect/Analyst<br> Employment Type: Full Time <br> Salary: up to 35,000 SAR all-inclusive depending on experience and qualifications<br> Job Location: Riyadh, Saudi Arabia<br>
Skills :
Job Description : * Bachelor's degree in computer engineering or equivalent education. * At least 7 years in Cyber Security Forensics. * Certified in GIAC Certified Forensic Examiner (GCFE) / GIAC Certified Forensic Analyst (GCFA) / GIAC Net
Job Description : * Responsible to ensure constant review to understand the evolving and emerging compliance requirements and incorporate them in the division compliance program. * Responsible to assist the section and the department manager in
Job Description : Job Description & Role: Plan, research, and design security architectures. Create an integrated security architecture to assure compliance with all applicable standards. Review current system security measures, recommend and implem
Job Description : The Senior Security Consultant role duties involve Presales activities & Technical activities on a high technical and outstanding quality level. Presales Activities cover solution presentation and proof of concept. Technical Activi
Skills :
6+ years of Systems Architecture experience.4+ years of experience of overall architecture of hardware for products and solutions.
Skills :
Job Description : Job Description & Role: Identify potential incidents, network intrusions and malware events, etc. to ensure confidentiality, integrity, and availability. Review and analyze log files to report any unusual or suspect activities. Fol
Skills :
Job Description : * Bachelor's degree in computer engineering or equivalent education * CGEIT, CRISC, CISA, or CISM is a must * Familiar with international standards including ISO27K, COBIT, NIST cyber security framework and risk management
Job Description : * Develop the enterprise cyber security architecture. * Develop enterprise cyber security architecture guidelines and recommendations. * Align the business requirements with technical cyber security solutions. * Deve
Job Description : * Bachelor's degree in computer engineering or equivalent education * 10+ years of technical industry experience in cyber security including implementation experience with security vendors. * Experience of cyber security pr