اخصائي الامن السيبراني وظف دوت كوم

- Review cybersecurity policies and processes to ensure that all
security controls are implemented and managed to keep company
assets safe .
- Ensure the compliance with SAMA's
cybersecurity framework to reach the required security maturity
level.
- Performing cybersecurity reviews periodically to
ensure prevention of unauthorized access to the company's
assets.
- Anticipate any new threats and work to prevent
them from happening.
- Conducting vulnerability assessment
periodically against organization’s assets in order to
implement the needed security controls.
- Identify and
manage cybersecurity risks to address them and reduce the
likelihood of their occurrence
- Work with other executives
across different departments to ensure that security procedures
are implemented within the organization’s systems.
- Apply
cybersecurity policies to the company's technical systems to
protect them
- Conducting cybersecurity awareness campaigns
to increase the employee’s knowledge and alertness in various
cybersecurity risks
- Performing any other tasks requested
by the CISO
- Ensure that implementation of secure and
restricted logical access to information and technology
assets
- Use the SIEM tool / dashboard and reports along
with other monitoring / admin tools to continuously monitor the
security status of the system and compliance with certification
requirements.
- Perform system and network forensics
analysis of suspected or potential security incidents
-
Manage Vendor’s Services
- Support preventing critical
applications, data and systems from unauthorized access, by
supervising the implementation by the related departments.
-
Support in processing all approval requests related to
PAM
Prepare the design and documentation of IAM integration
solutions for an optimized IAM environment
- Design IAM
controls in support of the Governance and Compliance team to
mitigate future threats unauthorized access
- Create and
maintain new relevant documentation to include, but not limited
to, Standard Operating Procedures, project change control
methodologies, and architectural diagrams for IAM
solutions
- Manage security solutions such as DLP, EDR, AV,
ICT, NAC, Patch management.
- Ensure that implementation of
secure and restricted logical access to information and
technology assets
Bachelors degree in Cyber Security or
IT
(preference) GWAPT, CEH, CPTE
Thinking and logical
analysis skills
Problem Solving Skills
Strong Knowledge in
Cyber Security
مستوى مبتدئ (خبرة اقل من
سنة إلى 3 سنوات)
"لا تنسَ أن السيرة الذاتية الاحترافية هي مفتاح نجاحك في البحث عن العمل، ابدأ الآن في تصميم سيرة ذاتية متميزة تبرز مهاراتك وخبراتك! استخدم تطبيق سيرة لإنشاء سيرتك الذاتية بسهولة."

التفاصيل :

الناشر: تمويل الاولى الراتب : يحدد لاحقا القسم: تقنية المعلومات - الشبكات مكان العمل: الخبر , السعودية نوع العمل : دوام كامل مستوى الخبرة : ١-٣ سنوات
تاريخ الاعلان : 2025-05-08 تاريخ الانتهاء : 2025-06-07 التعليم : بكالوريوس

اضف للمفضلة

ملحوظة هامة:
وظف دوت كوم ليست شركة توظيف وانما موقع للاعلان عن الوظائف الخالية المتاحة يوميا فى الاف الشركات بالشرق الاوسط ,ونرجو عند طلب اي مبالغ مالية من قبل المعلنين مراسلتنا فورا و عدم التعامل مع مثل هذه الشركات الوهمية .

التخصصات