Get new jobs by email
- ...the kind of precision that drives great outcomes. Job Description Your Career Your Career As a Principal Consultant for SOC Transformation & XSIAM Deployment, you will be a seasoned leader at the forefront of our most strategic customer engagements. You...
- ...security initiatives. Qualifications ~ Bachelor’s degree in IT, Engineering ~2+ years of experience in IT/Security operations or SOC role. ~ Network+, CCNA R&S, Security +, Linux security , windows security or forensics training is plus. ~ Professional Security...
- ...The L1 SOC Analyst serves as the first line of defense within the Security Operations Center, responsible for monitoring, triaging, and escalating security alerts in accordance with defined procedures and SLAs. The role focuses on initial alert investigation, incident...
- The role holder is responsible for overseeing governance and control across all network elements and services, ensuring alignment with stc’s strategic vision of being the Digital and Telco Leader. This includes managing end-to-end change processes, configuration oversight...
- ...Job Description of SOC Resident Engineers L2 & L3 We are looking for SOC Resident Engineers (L2 & L3) to join our growing cybersecurity team. In this role, you will serve as a frontline defender, ensuring that security threats are identified, analyzed, and addressed...
- A leading technology firm in Riyadh seeks an L1 SOC Analyst to serve as the first line of defense within the Security Operations Center. The analyst will monitor and triage security alerts, ensuring timely escalation to higher-tier analysts when necessary. Responsibilities...
- A leading telecommunications provider in Riyadh is seeking a Governance and Control Manager to oversee change management, configuration, and incident performance across network services. The candidate should have a minimum of 8 years of relevant experience in the telecommunications...
- ...coordinating investigations, mentoring team members, and enhancing security operations. The ideal candidate has over 5 years of experience in a SOC environment, holds relevant certifications, and possesses strong leadership and technical skills across various cybersecurity domains...
- A leading cybersecurity firm in Saudi Arabia is seeking a Senior Threat Detection Engineer to design high-impact detection strategies and build powerful automation. You will mentor junior engineers and collaborate with teams on cybersecurity initiatives. Ideal candidates...
- ...tools and secure development practices, with understanding of security standards relevant to financial and insurance systems (ISO 27001, SOC 2) Knowledge of insurance regulatory requirements, data privacy compliance (GDPR, FCA regulations), and understanding of Lloyd's...
- ...Ability to articulate high-level technical differentiation from the competition across Network Security, SASE, AI Security, Cloud and SOC transformation Possesses the ability to bridge the gap between deep technical content and information that a C-level executive can...
- ...are looking for a Senior Cyber Defense Lead to serve as a Subject Matter Expert (SME) within our 24x7 Security Operations Centre (SOC) . This role is the frontline of defense, focused on advanced threat detection, incident response, and continuous improvement of our...
- ...Incident Response & Operations Support Provide expert input during security incidents and investigations. Collaborate with SOC, Threat Intelligence, and Incident Response teams to enhance detection and response capabilities. Activate and coordinate incident...
- ...support the operation of our GRC department. This role requires a strong background in international certification frameworks (ISO 27001, SOC 2), comprehensive Risk Management experience, and specific expertise in Identity and Access Management (IAM) governance. You will be...
- ...extensive experience in securing enterprise IT environments, conducting security audits, penetration testing, vulnerability management, and SOC operations. The ideal candidate will have deep knowledge of ISO 27001, compliance frameworks, and risk analysis, along with proven...
- ...or server environments Good communication skills, ideally public speaking experience IoT / Embedded experience – from board and SoC, BMCs, bootloaders and firmware to OS, through apps and services Some experience with Docker/OCI containers/K8s What we offer...
- ...Carl’s Jr, Sbarro Pizza, are powered by the platform. Restroworks is certified with ISO 27001, ISO 27017, ISO 27701, SOC1 Type 2, SOC 2 Type 2, and GDPR compliant. The company is a Great Place to Work-Certified™ organization, placing it among one of the top employers...
- ...availability & disaster recovery (HA/DR) strategies. Ensure compliance with data privacy laws and industry standards (GDPR, ISO, SOC, etc.). Manage cloud identity authentication (SAP IAS, SSO, MFA). Utilize Cloud ALM and monitoring tools for system health checks...
- ...extremely good storyteller and help sales team to sell better and effectively* Understand emerging ecosystem of cyber security partners like SOC services partner, CSP (cloud service partners), MSSP etc.* Leveraging channel partners by upscaling and training for customer...
- ...committees and ensure cyber risk reporting accuracy. Support daily monitoring of security alerts, logs, and anomalies through the SOC. Coordinate incident response and forensic investigations when required. Ensure timely containment, eradication, & recovery for...
- ...Experience with multi-cloud or hybrid cloud environments. Familiarity with cost management tools and billing in cloud platforms. Experience in regulated industries (e.g., healthcare, finance) with compliance frameworks (e.g., HIPAA, PCI, SOC 2). #J-18808-Ljbffr...
- ...or a related field, or equivalent practical experience. Experience: Minimum 3 years of experience in cybersecurity operations or SOC analysis. Skills: Hands-on experience with SIEM, EDR, and NDR platforms. Strong understanding of malware analysis and cyber threat...
- ...policies, network protection, and vulnerability response. Ensure compliance with data protection and industry standards (e.g., ISO, SOC, GDPR where applicable). Conduct regular security audits and drive improvements proactively. Site Reliability Engineering (SRE...
- ...implementing advanced incident management tools and training specific for SSEA Collaborate closely with the Service Operations Center (SOC) for real-time visibility and management of services, sharing a unified operational dashboard. Define and track specific key...
- ...Developand maintain the Incident Response Plan (IRP) and coordinate post-incidentreviews. Collaboratewith internal IT and third-party SOCs for continuous threat management. 4. Vulnerability Management & Risk Assessment Performregular vulnerability scans, penetration...
- ...Engineer — Expertise: Splunk Enterprise Security (ES) Certified Admin or Splunk Core Certified Power User, with minimum 5+ years in SOC use case development. Responsibilities Dedicated full-time to Use Case Lifecycle Management (Development, Tuning, Optimization)...
- ...techniques. Act as a technical point of contact for incident response analysts, providing guidance, and mentorship. Collaborate with SOC, threat intelligence, vulnerability management, and IT/OT teams to improve detection and response capabilities. Qualifications ~...
- ...ensure compliance with the ECC-2018 framework. Assist in the establishment and ongoing operation of the Security Operations Center (SOC), ensuring incident response readiness. Manage installation, testing, and upgrades of security appliances and network...
- ...to the code of conduct. Additionally, all newly hired employees are subject to the same as part of their onboarding process. The SOC L1 team plays a critical role in maintaining the security posture of an organization and protecting it from cyber threats. Duties...
- ...permissions, and policies; conduct security audits, vulnerability assessments, and ensure compliance with standards like GDPR, HIPAA, or SOC 2. Troubleshooting and Optimization: Diagnose and resolve incidents related to authentication failures, token issues, or...
