Average salary: SAR12,000 /monthly
More statsGet new jobs by email
- ...Job Summary We are seeking a Cybersecurity Engineer to design, implement, and maintain security controls that protect the company’s systems, applications, and data. The successful candidate will work closely with Engineering, IT, Product, and Security teams to secure...
- ...We are seeking a skilled and proactive Cybersecurity Analyst to join our team in Dammam, Saudi Arabia. The ideal candidate will be responsible for monitoring, analyzing, and responding to cybersecurity incidents while ensuring the confidentiality, integrity, and availability...
- ...performance. Candidates should have a relevant degree and expertise in IAM practices. The position offers opportunities for innovation and continuous improvement in cybersecurity measures while collaborating with stakeholders to drive strategic initiatives. #J-18808-Ljbffr...
- ...Your Own Device (BYOD) policies, access rights, and user account systems and processes. The role ensures strict enforcement of cybersecurity standards and compliance while safeguarding data protection and managing privileged access. Position Accountability Description...
- A cybersecurity solutions company is seeking a dynamic Sales Representative in Dammam, Saudi Arabia. This role involves engaging prospective clients, maintaining strong relationships, and developing tailored proposals. The company offers flexible working options to enhance...
- A leading safety and cybersecurity consultancy in Dammam is seeking a Senior Functional Safety and Cyber Security Consultant. The role involves leading safety workshops, developing specifications, and conducting training. Candidates should have a CFSE/P certification and...
- A leading cybersecurity services firm in Saudi Arabia seeks a Senior Sales Manager to drive the company's growth in KSA. This role involves leading sales strategies, closing enterprise deals, and managing client relationships. The ideal candidate has extensive experience...
- A prominent cybersecurity company is seeking a Regional Sales Manager to lead engagements and drive sales strategy. This role involves creating account plans for enterprise deployments, managing complex sales cycles, and engaging with customers to understand their needs...
- ...Job Summary We are seeking a Cyber GRC Specialist to support and advance the company’s cybersecurity governance, risk management, and compliance (GRC) initiatives. The successful candidate will collaborate with Security, IT, Legal, Privacy, Compliance, and business...
- ...repeatable, auditable practices. Required Qualifications - Skills & Experience ~ Bachelor’s degree in Information Security, Cybersecurity, IT, Risk Management, or a related field, or equivalent practical experience. ~5+ years of hands-on experience in cyber...
- ...Required Qualifications - Skills & Experience ~ Bachelor’s degree in Information Technology, Computer Science, Accounting, Cybersecurity, or a related field, or equivalent practical experience. ~5+ years of experience performing IT audits, IT risk assessments, or...
- ...architecture or technical leadership role . Deep expertise in data protection, backup & recovery, disaster recovery (DR), and cybersecurity . Hands‑on experience with containers (Docker, Kubernetes) and container security in enterprise environments. Strong...
- ...documents & database backups Coordination with clients, vendors & internal teams for approvals & execution Knowledge of OT Cybersecurity (AD, WSUS, Antivirus, Backup, NMS) Mandatory Requirements: Strong experience in SAS Design & Engineering (NOT only...
- ...involves designing and implementing technical solutions for customers and requires strong expertise in data backup, recovery, and cybersecurity. Responsibilities include conducting technical assessments, creating detailed architectures, and collaborating with various...
- ...in your role while contributing to the company’s growth. Requirements Identify and engage prospective clients to promote cybersecurity solutions. Build and maintain strong client relationships. Develop tailored proposals and presentations to meet client...
- ...At Edversity , we are transforming education by empowering individuals with cutting-edge skills in blockchain, AI, cybersecurity, and more. Recognized as Pakistan’s #1 edtech platform, we have trained over 12,000 students, achieving a 70% job placement rate in global...
- ...Governance, Risk, and Compliance (GRC) to join our team in Dammam, Saudi Arabia. The ideal candidate will have a solid foundation in cybersecurity principles and a strong understanding of regional compliance requirements, including SAMA, NCA, and CCC. This role demands a...
- ...About the Role We are looking for a Senior Sales Manager to lead and scale our cybersecurity services business in Saudi Arabia. This is a high-impact, revenue-driven role for someone with deep market knowledge, strong enterprise relationships, and a proven track...
- ...product you can believe in. Immersive Labs is the leader in people‑centric cyber resilience . We have an exciting vision for cybersecurity – one that puts people at the center of cyber. Our cyber resilience SaaS platform is an agile, hands‑on solution that helps...
- ...product you can believe in. Immersive Labs is the leader in people-centric cyber resilience . We have an exciting vision for cybersecurity - one that puts people at the center of cyber. Our cyber resilience SaaS platform is an agile, hands-on solution that helps...
- ...experience in Customer Success, Account Management, or a similar customer-facing role in SaaS or tech ~3+ years of experience in the cybersecurity sector, especially threat intelligence ~ Fluent in Arabic and English ~ Based in Saudi Arabia with experience supporting...
- ...maintained in accordance with vendor guidelines and security best practices, while also ensuring compliance with NCA, NIC, and SEC Cybersecurity regulations. Operations Management Install, configure, manage, operate, and maintain Windows Server systems and Windows...
- ...Certifications in MDM or Informatica is highly preferred. ~ Experience in Information Technology / Data Solutions / Networking / Cybersecurity preferred ~ Proven experience as a Business Analyst, specifically in Master Data Management (MDM). ~ Strong understanding of...
- A global cybersecurity company in Saudi Arabia is looking for a Senior Customer Platform Architect. You will guide customers in deploying their on-premise infrastructure and ensure its reliability for threat management operations. The ideal candidate should have expertise...
- ...Comfortable working in a remote, async-first environment, with strong autonomy and ownership. Bonus: Previous experience in the cybersecurity industry. Communication skills to explain complex technical concepts to various audiences (customers, internal teams, both...
- ...and undertake Alarm Rationalisation projects when required; Provide training on exida software tools; Participate/lead in Cybersecurity lifecycle services and/or projects; Promote and/or demonstrate exSILentia tools for safety and cyber; Lead and/or facilitate...
- ...security scanning , track remediation SLAs, and collaborate with engineering teams. Qualifications ~7–12 years of experience in cybersecurity, including 3+ years securing public cloud environments (GCP or OCI preferred). ~ Mandatory experience in fintech, banking, or...
- ...operations manuals Knowledge of user/group account management , policies, and security controls Understanding of NCA, NIC, and cybersecurity regulations Capability to raise and manage vendor tickets with Microsoft / Red Hat (logs, meetings, RCA, issue reproduction...
- A cybersecurity firm in Dammam is looking for a Cyber Security Engineer to specialize in Governance, Risk, and Compliance (GRC). The role requires a strong foundation in cybersecurity principles and knowledge of regional compliance requirements. Responsibilities include...
- ...in accordance with vendor recommendations and security best practices, while also maintaining compliance with NCA, NIC, and SEC Cybersecurity regulations. Contribute to the management of the operating system lifecycle, including planning for version upgrades and decommissioning...
