deep understanding of network protocols, security frameworks, and the latest ... will be responsible for implementing security measures, monitoring network traffic, ...
implement and maintain security solutions, ensuring compliance with security policies and regulations ... Saudi Arabia.DescriptionThe Senior Information Security Architect will...
robust defence against cyber threats and compliance with security standards. Key Accountabilities ... with best practices and organizational security requirements.Monitor and...
have a solid foundation in security monitoring and incident response, along ... advanced threat analysis and proactive security measures. Proficiency in SIEM tools ...
role is important for Infobip Cyber Security Specialist is crucial for managing ... with cybersecurity regulations, and handling security incidents. The role also ...
, verification, and validation of system security requirements. Design, configure, and maintain ... Standards related to ICS-OT Security Solutions. Technical Support and Communication...
in Saudi Arabia from evolving cyber threats. We help organizations build ... cyber resilience, manage risk, and securely ... projects. You will: Support security assessments:...
in remediation of critical information security incidents. Handling tickets and large ... Monitor logs in/from multiple security technologies, such as SIEM, IDS ...
environments, guiding, leading other Security Analysts, and conducting forensic analysis ... threat landscape. Responsibilities Monitor multiple security technologies, such as IDS/IPS...
systems, ISMS, BCMS, QMS, Information Security and its technical aspects/products ... consultancy combined with tailored information security services and solutions that address ...
a large team of outstanding security experts. He/ She will be ... in IT networking or information security. Strong knowledge, experience and relationship ...
a large team of outstanding security experts. He/ She will be ... in IT networking or information security. Established relationships and networks within ...
to protect critical infrastructure, enhance security protocols, and ensure compliance ... organizational requirements. Implement and manage security technologies from vendors such as...
consultancy combined with tailored information security services and solutions that address ... the region's trusted IT security advisor by remaining vendor-agnostic ...