Security Operations:
§Administer and
optimize company security platforms including SIEM, EDR/XDR, NDR, DLP, and other
related cybersecurity solutions.
§Implement and
maintain security controls aligned with business, regulatory requirements and
international standards.
§Maintain secure
configuration baselines, system hardening standards, and perform periodic
configuration reviews ensuring timely remediation of vulnerabilities.
§Collaborate with
infrastructure, network, and digitalization teams to embed security into company
platforms.
§Maintain effective
logging, monitoring coverage, and detection architecture across on-prem and
cloud environments.
§Ensure endpoint and
data protection controls remain enforced, updated, and operating effectively.
§Ensure identity and
access security controls are enforced including least-privilege, Zero Trust,
MFA, and privileged access management.
§Conduct security
validation following system deployments, upgrades, major changes, and DR/BCP
testing.
§Support compliance,
audit, risk assessment, and regulatory security requirements.
§Maintain security
documentation, asset monitoring inventories, and produce operational and
management security reports.
Security Monitoring & Incident Response:
§Monitor and analyse
security alerts across SIEM, endpoint, network, firewall, and cloud security
platforms.
§Coordinate
incident handling activities including containment, eradication, and recovery
with internal teams and managed SOC providers.
§Track
incident lifecycle, ensure SLA adherence, and drive timely resolution.
§Maintain and
improve incident response procedures, escalation paths, and playbooks.
§Review SOC
reports, dashboards, and metrics; prepare executive incident summaries and
trend analysis.
§Integrate
threat intelligence feeds and prioritize threats based on risk and impact.
§Conduct
incident response simulations and readiness exercises.
§Ensure proper
incident documentation, secure evidence handling, and chain-of-custody where
required.
§Perform
structured post-incident reviews and ensure lessons learned improve detection
and resilience.
Threat Detection & Vulnerability Management:
§Coordinate
vulnerability assessments, penetration testing, and security scanning across
on-premises, cloud, and hybrid environments, ensuring security reviews are
completed in the different stages.
§Monitor threat
intelligence, vendor advisories, CVEs, and emerging attack campaigns to
identify potential exposure to company systems.
§Assess and
prioritize vulnerabilities based on exploitability, business impact, threat
context, and system exposure.
§Manage the
vulnerability lifecycle including identification, validation, remediation
tracking, exception handling, and closure in line with defined SLAs.
§Recommend
compensating controls where remediation is delayed or technically complex.
§Maintain
vulnerability tracking, reporting, and documentation through approved risk and
ticketing systems to support audit and compliance requirements.
§Collaborate with
Technology and IGRC teams to ensure vulnerabilities are remediated and aligned
with company risk management.
Cybersecurity Awareness &
Continuous Improvement :
§Participate
in and support a cybersecurity awareness program, phishing simulations, and
end-user education initiatives.
§Perform
post-incident lessons learned reviews and update policies, playbooks, and
monitoring rules accordingly.
§Maintain and update
security SOPs, governance documents, and awareness materials in line with ISMS
requirements.
§Participate in tracking
and reporting awareness effectiveness, participation metrics, and identifying
opportunities to improve security maturity and culture.
§Perform other
security-related duties as assigned by the line manager.
Vendor Management & Change
Management:
§Interact with
vendors for specific requirements to understand the functionality and recommend
the best solutions in line with business requirements.
§Invloved in
vendor selection, contracting, performance monitoring, and lifecycle management
to ensure alignment with technical, security, compliance, and organizational
requirements.
§Manage vendor
risk, and service delivery through compliance assurance, deliverable
validation, and stakeholder coordination.
RequirementsMinimum Qualification
§A bachelor’s degree in information technology, Cybersecurity, Computer
Science, or related fields
§Professional certification or trainings in Cybersecurity is highly preferred.
Minimum Experience & Knowledge & Skills
§Three year of experience in Cybersecurity Operations, Security
Engineering, or IT Security roles
§Hands-on experience with incident response and security monitoring tools.
§Proven track record of managing and maintaining security systems such as Network
firewalls, Web Applications Firewall, EDR, NDR, etc.
§Experience in conducting security assessments, penetration tests, and
managing security incidents.
§Experience in managing security awareness systems.
§Proven ability to write effective system and process documentation
–including business and system requirements, process diagrams, and data flow
charts
§Detailed oriented, responsible, able to multi-task with good time
management skill
§Strong analytical and problem-solving skills.
Fluency in Arabic and English both oral and written.