Get new jobs by email
- ...than 50 countries around the world and employs about 30,000 people of over 130 nationalities . Purpose of the position As Cybersecurity Officer you will be part of the Security within Cybersecurity Department . You will support Cybersecurity Activates ....
- ...excellence both on and off the field. As we continue to expand our digital infrastructure, we are dedicated to maintaining a robust cybersecurity posture to protect our assets and ensure compliance with local and international regulations. Join our team and help secure the...
- ...OT Cybersecurity Lead Consultant - Saudi Trending Job Info Job Identification 21985 Job Category Professional Services Posting Date 01/29/2026, 09:04 AM Job Schedule Full time Job Description Role & Mission As an OT Cybersecurity Lead Consultant...
- A prominent cybersecurity company is seeking a Regional Sales Manager to lead engagements and drive sales strategy. This role involves creating account plans for enterprise deployments, managing complex sales cycles, and engaging with customers to understand their needs...
- A global cybersecurity company is seeking an OT Cybersecurity Lead Consultant in Al Khobar, Saudi Arabia. This role demands extensive experience in OT/ICS environments and cybersecurity consulting. Key responsibilities include leading cybersecurity engagements, performing...
- A global cybersecurity firm is seeking an OT Cybersecurity Lead Consultant in Al Khobar, Saudi Arabia. This role involves leading OT cybersecurity assessments and designing security architectures. Candidates should have over 10 years of experience in OT/ICS environments...
$12000 per hour
...JOB ROLE:Cybersecurity Architect Location:Dhahran, Saudi Arabia Education: Bachelor’s in Business Management (or equivalent). Master’s preferred. Job description Translate business strategy, operating models, and processes into business architecture artifacts...- ...architecture or technical leadership role . Deep expertise in data protection, backup & recovery, disaster recovery (DR), and cybersecurity . Hands‑on experience with containers (Docker, Kubernetes) and container security in enterprise environments. Strong...
- ...troubleshooting procedures Assist in planning and implementing new IT systems and upgrades Ensure compliance with club policies, cybersecurity standards, and best practices Requirements Qualifications: ~ Bachelor’s degree in Information Technology, Computer...
- ...At Edversity , we are transforming education by empowering individuals with cutting-edge skills in blockchain, AI, cybersecurity, and more. Recognized as Pakistan’s #1 edtech platform, we have trained over 12,000 students, achieving a 70% job placement rate in global...
- ...~ Demonstrated proficiency in oral and written English ~ Experience in Information Technology /DataSolutions / Networking / Cybersecurity preferred ~ Proficiency in data analysis tools and software (SQL, Excel, etc.). ~ Excellent analytical and problem-solving skills...
- ...shape a better future for our planet through supporting the energy transition, (bio)technology, artificial intelligence, industrial cybersecurity, etc. We are committed to the United Nations sustainable development goals by utilizing our ability to measure and connect.**...
- ...shape a better future for our planet through supporting the energy transition, (bio)technology, artificial intelligence, industrial cybersecurity, etc. We are committed to the United Nations sustainable development goals by utilizing our ability to measure and connect.**...
- ...involves designing and implementing technical solutions for customers and requires strong expertise in data backup, recovery, and cybersecurity. Responsibilities include conducting technical assessments, creating detailed architectures, and collaborating with various...
- .... Stay updated on KSAdataprotection laws, regulations, and industry best practices to ensure compliance. Utilize enhanced cybersecurity measures to protectdataand incorporate this seamlessly into protective measures againstdatatheft, breaches, or loss. ~ Bachelor...
- ...meet customers and partners across the region. Qualifications ~5+ years of enterprise technology sales experience (AI, SaaS, Cybersecurity, Risk, Analytics preferred). ~ Proven success closing complex enterprise deals directly. ~ Experience managing and...
- ...influence IT decision making including CISOs. Engage in strategic workshops and conversations with clients to evaluate their current cybersecurity posture, uncover areas for improvement, and deliver High level designs. Presentation & Proposal Creation: Develop clear,...
- ...industry standards.* Understands the frameworks and recommends applicable controls specific to the environment and systems* Perform cybersecurity criticality assessment of the OT systems* Perform vulnerability assessments of the OT systems* Categorize the risks* Perform the...
- ...Experience working on projects with utilities such as SEC, Aramco, or international utility standards (preferred). Familiarity with cybersecurity guidelines for electrical systems is a plus. Strong documentation, analytical, and problem‑solving skills. Arabic language...
- ...shape a better future for our planet through supporting the energy transition, (bio)technology, artificial intelligence, industrial cybersecurity, etc. We are committed to the United Nations sustainable development goals by utilizing our ability to measure and connect.**...
- ...product you can believe in. Immersive Labs is the leader in people-centric cyber resilience . We have an exciting vision for cybersecurity - one that puts people at the center of cyber. Our cyber resilience SaaS platform is an agile, hands-on solution that helps...
- ...product you can believe in. Immersive Labs is the leader in people‑centric cyber resilience . We have an exciting vision for cybersecurity – one that puts people at the center of cyber. Our cyber resilience SaaS platform is an agile, hands‑on solution that helps...
- ...Certified Data Privacy Solutions Engineer (CDPSE) preferred ~ Experience in Information Technology / Data Solutions / Networking / Cybersecurity preferred ~ Proven experience as a Business Analyst, specifically in Master Data Management (MDM). ~ Strong understanding of...
- ...services across the whole life cycle of an asset including consulting, advisory & environmental services, intelligent networks & cybersecurity, design & engineering, procurement, project & construction management, operations & maintenance, decommissioning and capital....
- ...CDPSE) preferred ~5 years experience in the same Field ~ Experience in Information Technology / Data Solutions / Networking / Cybersecurity preferred ~ Experience with MDM tools and platforms like Informatica, SAP, or Oracle. ~ Strong analytical skills with the...
- ...operations manuals Knowledge of user/group account management , policies, and security controls Understanding of NCA, NIC, and cybersecurity regulations Capability to raise and manage vendor tickets with Microsoft / Red Hat (logs, meetings, RCA, issue reproduction...
- ...value. Our Trust Charter is our Code of Conduct and demonstrates our commitment to ethics, safety, sustainability, quality and cybersecurity, underpinning every aspect of our business and our willingness to behave and respond respectfully and in good faith to all our stakeholders...
- A fast-growing cybersecurity startup in Riyadh is seeking a Growth Marketing Lead to enhance customer acquisition. This role focuses on demand generation, optimizing advertising strategies across multiple channels, and collaborating with experts to drive cybersecurity innovation...
- A dynamic cybersecurity startup based in Riyadh is seeking a Growth Marketing Lead to drive customer acquisition efforts. In this role, you will create and implement demand generation strategies while managing the advertising budget across multiple platforms. The ideal...
- ...in accordance with vendor recommendations and security best practices, while also maintaining compliance with NCA, NIC, and SEC Cybersecurity regulations. Contribute to the management of the operating system lifecycle, including planning for version upgrades and decommissioning...
