Average salary: SAR17,432 /monthly
More statsGet new jobs by email
- ...Associate Cybersecurity Analyst Nationality : Saudi Technical Requirements • Basic knowledge of cybersecurity frameworks and standards • Understanding of network security protocols and devices (e.g., firewalls, intrusion detection systems) • Proficiency in operating...
- ...Digital transformation. Naseej website: Job Summary: This role is responsible for identifying, analyzing, and evaluating cybersecurity risks that may impact systems and technologies. It includes proposing appropriate controls and mitigation measures to reduce these...
SAR 420000 - 450000 per year
...Drive cybersecurity strategy, compliance, and risk management aligned with National Cybersecurity Authority (NCA) guidelines while leading regional security initiatives. ? Key Responsibilities Define and execute cybersecurity strategy aligned with business and...- ...Digital transformation. Naseej website: Job Summary: This role is responsible for monitoring the organization’s compliance with cybersecurity requirements, internal policies, procedures, and approved regulatory controls. It ensures that all relevant security standards...
- ...Description We are hiring an experienced SOC Lead to manage and strengthen cybersecurity operations for a leading organization. Location: Saudi Arabia Interview Mode: Online Salary: Competitive (Based on experience) Requirements: Bachelor’s in Computer Science...
- ...Job summary Responsible for designing, implementing, and maintaining the organization’s cybersecurity infrastructure and controls to protect information assets, systems, and networks from cyber threats. This role delivers proactive threat detection, incident response...
- ...Job Summary We are seeking a Cybersecurity Engineer to design, implement, and maintain security controls that protect the company’s systems, applications, and data. The successful candidate will work closely with Engineering, IT, Product, and Security teams to secure...
- ...A leading organization in Saudi Arabia is seeking a Cybersecurity Compliance Officer to join their GRC team. The role focuses on developing and maintaining security governance frameworks, policies, and procedures to ensure alignment with regulatory requirements. The candidate...
- ...Our client is a large enterprise operating mission-critical systems and data platforms within a regulated environment. Cybersecurity and IT risk are board-level priorities for the organisation. The Role The Head of Cybersecurity & IT Risk will lead enterprise...
- 1. Cybersecurity Analyst – Security Operations Center Leader "We are seeking a highly experienced Cybersecurity Security Operations Center (SOC) Lead to join our team. The SOC Lead will be responsible for leading and managing the day-to-day operations and ensuring the...
- ...in the capital by reducing road congestion and enhancing connectivity across the city. Today, we are recruiting for a Junior Cybersecurity Engineer to join our team in Saudi Arabia. This is an excellent career opportunity for professionals looking to join a truly...
- A regional HR services provider is hiring for a data protection compliance role located in Al-Qassim Province, Saudi Arabia. The position entails serving as the local point of contact for compliance, maintaining data processing records, and supporting privacy impact assessments...
- ...~Work for a leading Cybersecurity company in Saudi Arabia ~Lead the development of in-house Cybersecurity products About Our Client Our client is a leading Cybersecurity/IT company in based in Riyadh, and known for its innovative approach and significant market...
- ...and overcoming industry challenges. What You’ll Lead and Deliver Lead the full sales cycle for Digital Solutions and OT Cybersecurity offerings , from prospecting and opportunity identification to deal closure and post-sales adoption. Strategically...
- ...data centers, data sites, and OT (Operational Technology) across multiple locations. ● Security & Compliance: Supports cybersecurity compliance and internal/external assessments. Implements technical controls to prevent policy violations. ● Risk Management...
- ...systems comply with relevant safety standards and company procedures. ~ Follow and promote best practices in automation safety and cybersecurity. ~ Maintain proper documentation for all systems and changes. REQUIREMENTS To Be Successful in This Role, You Must...
- ...remediate breaches involving privileged credentials Required Skills and Qualifications Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, Computer Engineering, or a related field Minimum 4-8 years of hands-on experience implementing or...
- ...& Training: Lead daily IT operations, resolve service tickets within SLAs, and provide comprehensive training to end-users. Cybersecurity & Risk: Implement security measures, monitor threats, and maintain risk registers to ensure 100% compliance with security standards...
- ...RELATIONSHIPS: Internal: • Operations Team: Daily coordination on infrastructure management and incident resolution • Cybersecurity Team: Ensuring compliance with security policies and standards • Development Teams: Collaboration on cloud-native application...
- ...business continuity objectives. Security & Compliance • Apply security hardening to servers based on company standards and cybersecurity requirements. • Support endpoint/server protection, access control, patch compliance, and privileged access practices. • Coordinate...
- ...LAN, WAN, wireless, VPN, branch connectivity, core/access switching, firewall coordination, and network segmentation aligned with cybersecurity and compliance requirements. Key Responsibilities Network Operations & Support • Administer and maintain the enterprise...
- ...We are looking for a strategic and experienced Chief Information Security Officer (CISO) to lead cybersecurity initiatives and ensure strong compliance with KSA regulatory frameworks , including NCA guidelines . Key Responsibilities: Develop and execute the...
$2700 - $4000 per month
...cycle sales, from lead generation and prospecting to closing deals, while gaining exposure to IT solutions, SaaS, hardware, and cybersecurity in a collaborative and healthy work environment. Key Responsibilities Own the entire sales pipeline, including: Lead...- ...Employee engagement activities throughout the year. ~ Tailored training & development program. About Us Help AG is the cybersecurity arm of e& enterprise (formerly Etisalat Digital) and provides leading enterprise businesses and governments across the Middle...
- ...Job Summary We are seeking a Cyber GRC Specialist to support and advance the company’s cybersecurity governance, risk management, and compliance (GRC) initiatives. The successful candidate will collaborate with Security, IT, Legal, Privacy, Compliance, and business...
- ...repeatable, auditable practices. Required Qualifications - Skills & Experience ~ Bachelor’s degree in Information Security, Cybersecurity, IT, Risk Management, or a related field, or equivalent practical experience. ~5+ years of hands-on experience in cyber...
- ...in maintaining IT documentation and inventory • Ensure data security and follow IT policies and procedures • Support basic cybersecurity practices and updates Requirements: • Bachelor’s degree in Information Technology, Computer Science, or related field • Fresh...
- ...authority, conflict of interest, misuse of resources, harassment, crimes against the person, anti-social behavior, unsafe acts, cybersecurity and data leakage. Key Responsibilities As the successful candidate, you will be required to perform the following:...
- ...Key Responsibilities: • Oversee IT infrastructure + Cabling Trunking and ensure Optimal Network + CCTV + NETWORK • Lead cybersecurity strategies and risk management initiatives • Manage daily IT operations and ensure business continuity • Align IT strategy with...
- ...Assist in organizing internal campaigns, announcements, and newsletters. Assist drafting urgent messages during IT and Cybersecurity crises, emergency or shutdowns. Support Corporate Management with timely and appropriate responses to public or internal queries...

