Get new jobs by email
- ...Description We are hiring an experienced SOC Lead to manage and strengthen cybersecurity operations for a leading organization. Location: Saudi Arabia Interview Mode: Online Salary: Competitive (Based on experience) Requirements: Bachelor’s in Computer Science...
- ...Associate Cybersecurity Analyst Nationality : Saudi Technical Requirements • Basic knowledge of cybersecurity frameworks and standards • Understanding of network security protocols and devices (e.g., firewalls, intrusion detection systems) • Proficiency in operating...
- ...A leading organization in Saudi Arabia is seeking a Cybersecurity Compliance Officer to join their GRC team. The role focuses on developing and maintaining security governance frameworks, policies, and procedures to ensure alignment with regulatory requirements. The candidate...
- 1. Cybersecurity Analyst – Security Operations Center Leader "We are seeking a highly experienced Cybersecurity Security Operations Center (SOC) Lead to join our team. The SOC Lead will be responsible for leading and managing the day-to-day operations and ensuring the...
- ...Were Hiring: Network & Cybersecurity Engineer We are looking for a highly skilled Network & Cybersecurity Engineer with 4–5+ years of hands-on experience to join our IT team. This role is ideal for a professional who can independently manage our network infrastructure...
- ...authority, autonomy, and collaboration. Ethical Excellence - We perform within the highest ethical standard. Job Summary As a Cybersecurity Intern, you will support the security team in protecting organizational systems, networks, and data from cyber threats....
- #Hiring Cybersecurity Penetration Testing for Digital Banking project in Riyadh, KSA. #Required : Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field. Experience in penetration testing, ethical hacking, or cybersecurity...
- ...Job Summary Skills IT Governance Cybersecurity Business Continuity Planning Level of Education Bachelor's Degree Seniority... ...Functions Information Technology The Senior Cybersecurity Analyst will assist the Head of Information Technology in day-to-day activities...
- ...embracing a dynamic approach to innovation and sustainable performance. About the Role We are seeking a highly experienced Senior Cybersecurity Engineer to support a strategic client in delivering advanced cybersecurity services across IT and OT environments, including...
- ...of c. €8 billion, operating in 61 countries under two brands — Atos for services and Eviden for products. European number one in cybersecurity, cloud and high performance computing, Atos Group is committed to a secure and decarbonized future and provides tailored AI-...
- To monitor and maintain the computer systems and networks. Install and configure computer systems, diagnose hardware/software faults and solve technical and applications problems. Key Responsibilities/Duties: installing and configuring computer hardware operating systems...
- ...About the Role We are seeking a high-performing, bilingual Sales Specialist to drive enterprise software/ cybersecurity/Microsoft License sales across Saudi Arabia and the wider GCC region. This role is aligned with the Kingdom’s Vision 2030 digital transformation agenda...
- Job Summary Sort / mid / long term goods requirments planning and materials planning across the business category network - with strong linkage into plants to ensure conformance at schedule and driver labor / capacity plans and into areas to secure customer services...
- ...coming from all walks of life. Company Name: test6121 Job Description We are seeking a detail-oriented and analytical Data Analyst to join our team. In this role, you will work closely with data across various stages of the data lifecycle—from collection and...
- ...Job summary Responsible for designing, implementing, and maintaining the organization’s cybersecurity infrastructure and controls to protect information assets, systems, and networks from cyber threats. This role delivers proactive threat detection, incident response...
- ...Responsible for monitoring multiple security technologies. Develop professional working relationship with fellow analysts. Analyze cybersecurity alerts and data for false positive/true positive outcomes. Independently follow established procedures to investigate...
- ...The Business Analyst will focus on analyzing software applications to support AI-driven test generation and manual learning input, ensuring optimal outcomes in application validation and structured knowledge transfer. The role will collaborate closely with the Learning...
- ...coming from all walks of life. Company Name: kanz Job Description We are seeking a detail-oriented and analytical Data Analyst to join our team. In this role, you will be responsible for transforming raw data into actionable insights that drive strategic...
- ...prioritize individuals coming from all walks of life. Company Name: kanz Job Description The key objective of a data analyst role is to collect, process, and interpret data to help an organization make informed decisions. The core skills required are extracting...
- ...Job Summary We are seeking a Cybersecurity Engineer to design, implement, and maintain security controls that protect the company’s systems, applications, and data. The successful candidate will work closely with Engineering, IT, Product, and Security teams to secure...
- Business Analyst Ecommerce Project Communications and Media Studies E-Commerce Services communication Region: Riyadh (riyadh) Job Description (JD) to Post-Sales Business Analyst (Product) Role Summary We are looking for a Post-Sales Business Analyst with strong experience...
- ...as well as amongst the top five global companies by market capitalization. Overview We are seeking a Downstream Transformation Analyst to join our DS Transformation & Business Excellence Department. The Downstream Transformation and Business Excellence program...
- ...the top five global companies by market capitalization. Job Purpose We are seeking an experienced Transition Minerals Strategy Analyst to lead our efforts in securing, managing, and optimizing the sustainable use of transition minerals critical to the global energy...
- ...Measure the effectiveness of security controls as prescribed by IS's IS Policy and Standards, regulatory compliance (e.g. ECC Cybersecurity Assessment Tool), the CIS Critical Security Controls, and ISACA's COBIT. Coordinate across IS teams a cohesive approach in assessing...
- ...world, as well as amongst the top five global companies by market capitalization. Overview We are seeking a Business Systems Analyst to join our Upstream Professional Development Center Division (UPDC). The UPDC is a corporate university that develops and delivers...
- ...Job Summary The Business System Analysts primary role is to implement proper information security controls to safeguard the organization... ...and processes. The division is also responsible to oversee cybersecurity implementation in the department. Duties & Responsibilities...
- ...Job description: - We are looking for a Sales Analyst to join our Sales Operations team in Yanbu. The role supports sales performance through data analysis, reporting, and cross‑functional coordination Requirements: Bachelor’s degree in Business, Marketing...
- ...prioritize individuals coming from all walks of life. Company Name: Gggg Job Description We are seeking a skilled Credit Analyst to join our team, focusing on credit assessment and risk evaluation. This role is critical in analyzing financial data and client...
- Job Summary As the successful candidate you will hold a bachelor’s degree in criminal justice, homeland security, political science, international studies, or related subjects. An advanced degree in business, national security, criminal justice, or other field related...
- Job Summary Develop, implement, and maintain slotting and replenishment tools; define items profiling scheme. Define and implement a reslotting schedule to either move small sets of items or reslot the entire warehouse. Analyze order patterns to correlate items...