Bachelor's Degree in IT, Cyber Security, or a related field. English & Arabic Language Excellence Communication Skills 1 Year Experience As part of your role, you will stay up-to-date with
• Bachelor's Degree in IT, Cyber Security, or a related field. • English ... up-to-date with emerging cyber threats, technologies, and industry best ...
client is seeking a motivated Cyber Security Senior Leader to lead the ... advisory unit.Client DetailsA leading Cyber Security company based in Saudi Arabia ...
deep understanding of network protocols, security frameworks, and the latest ... will be responsible for implementing security measures, monitoring network traffic, ...
implement and maintain security solutions, ensuring compliance with security policies and regulations ... Saudi Arabia.DescriptionThe Senior Information Security Architect will...
Key Skills:Extensive knowledge and expertise with Network security solution such as (Cisco firewall, palo alto firewall, F5 WAF, F5 LTM, Cisco ISE, Proxy, VPN, DDoS, …etc.).Experience in designing,
Major daily activities of endpoint security, meeting SLA and KPIHandling critical ... analysis)· Troubleshooting and resolution of Security incidentImplement the approved change...
Job Description: --Proficient in local regulations such as hashtag#SAMA and hashtag#NCA frameworks and Standards-Experience in development and execution of complex Cyber Security programs.-In-depth
robust defence against cyber threats and compliance with security standards. Key Accountabilities ... with best practices and organizational security requirements.Monitor and...
have a solid foundation in security monitoring and incident response, along ... advanced threat analysis and proactive security measures. Proficiency in SIEM tools ...
Responsibilities Network Administration and Security Manage protection of information systems ... response to detected threats and cyber-attacks. Safeguards information system ...
role is important for Infobip Cyber Security Specialist is crucial for managing ... with cybersecurity regulations, and handling security incidents. The role also ...
, verification, and validation of system security requirements. Design, configure, and maintain ... Standards related to ICS-OT Security Solutions. Technical Support and Communication...