Job Search and Career Advice Platform

Enable job alerts via email!

Cyber Security Engineer

Lean Technologies

Riyadh

On-site

SAR 224,000 - 319,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading technology firm in Saudi Arabia is seeking a Cyber Security Engineer to protect its cloud infrastructure and data. This hands-on role entails working closely with engineering and DevOps teams to implement and monitor security controls aligning with regulatory requirements. Candidates should possess a Bachelor’s degree in Cybersecurity and at least 5 years of relevant experience in cloud security, SOC operations, and vulnerability management. Competitive benefits and a dynamic working environment are offered.

Qualifications

  • 5 years of hands‑on experience in cybersecurity or cloud security.
  • Experience in SOC operations and vulnerability management.
  • Solid understanding of network security and incident response.

Responsibilities

  • Secure cloud environments and implement best practices.
  • Monitor and investigate security alerts from tools.
  • Conduct cloud security posture reviews and support compliance.
  • Participate in incident response activities.
  • Conduct regular vulnerability scans and assess findings.

Skills

Cybersecurity
Cloud security
SOC operations
Vulnerability assessment
Penetration testing
Risk analysis
Network security

Education

Bachelor’s degree in Cybersecurity or related field

Tools

SIEM
EDR
Vulnerability scanning tools
Job description

We are seeking a Cyber Security Engineer to join our security team and help protect our cloud infrastructure, applications, and data. This role is hands‑on and technical, with a strong focus on cloud security, SOC operations, vulnerability assessment, and penetration testing.

You will work closely with engineering, DevOps, and compliance teams to ensure security controls are effectively implemented and aligned with regulatory requirements.

The Moment

Lean has tripled in size over the past twelve months. We’re on track to triple again next year.

What started as the region’s pioneering Open Finance platform is now becoming something bigger: a multi-product infrastructure company powering payments, data, and lending across MENA. We’re expanding into new markets, opening offices, acquiring businesses, and building capabilities that didn’t exist here before.

We’ve processed billions of dollars in transactions. We’re trusted by 300+ clients - from Binance and Careem to Etisalat - and backed by General Catalyst, Sequoia, and Shorooq. Our $67.5M Series B was just the beginning.

What you’ll Own
  • Secure cloud environments by implementing best practices for IAM, network security, logging, monitoring, and encryption.
  • Configure and manage cloud‑native security services such as security groups, WAF, SIEM integrations, and key management solutions.
  • Conduct cloud security posture reviews in alignment with relevant regulatory requirements and cybersecurity frameworks, such as SAMA CSF, NCA ECC, and other applicable local and international standards.
  • Support secure architecture design and threat modeling for cloud‑based services.
  • SOC Operations & Monitoring
  • Monitor and investigate security alerts from SIEM, EDR, and cloud security tools.
  • Perform triage, analysis, and escalation of security incidents in line with defined SLAs.
  • Participate in incident response activities, including containment, root cause analysis, and post‑incident reporting.
  • Maintain and improve detection rules, playbooks, and SOC procedures.
  • Vulnerability Assessment & Penetration Testing
  • Conduct regular vulnerability scans on cloud infrastructure, applications, and networks.
  • Analyze findings, assess risk, and work with engineering teams on remediation.
  • Support internal and external penetration testing exercises and track remediation of findings.
  • Validate remediation actions and continuously improve vulnerability management processes.
  • Identity, Access & Data Protection
  • Implement and manage IAM controls, least‑privilege access, and MFA across environments.
  • Support encryption, key management, and secure data handling in line with KSA PDPL requirements.
  • Regulatory & Compliance Support
  • Support security controls and technical evidence required for SAMA CSF, NCA ECC, PDPL, and related KSA regulatory requirements.
  • Collaborate with compliance and audit teams during assessments, audits, and regulatory reviews.
  • Ensure technical security controls align with ISO 27001 and SOC 2 requirements.
  • Stay up to date on emerging threats, vulnerabilities, and cloud security trends.
  • Contribute to security documentation, runbooks, and technical standards.
  • Support security awareness initiatives and promote secure engineering practices.
What we’re looking for
  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field.
  • 5 years of hands‑on experience in cybersecurity, cloud security, SOC, or vulnerability management roles.
  • Experience working with SIEM, EDR, vulnerability scanning, and security monitoring tools.
  • Solid understanding of network security, cloud security, and incident response fundamentals.
Preferred Qualifications
  • Experience in fintech, banking, or other highly regulated environments.
  • Familiarity with SAMA Cybersecurity Framework, NCA ECC, and PDPL.
  • Hands‑on experience with vulnerability scanning and penetration testing tools.
  • Hands‑on experience with SIEM, EDR, IAM and PAM.
  • Exposure to DevSecOps and CI/CD security practices.
  • Security certifications such as Security+, CEH, CCSP or equivalent.
  • Collaboration & Teamwork: Works effectively with cloud, DevOps, SOC, and compliance teams.
  • Analytical Thinking: Strong ability to analyze alerts, vulnerabilities, and incidents.
  • Communication: Able to clearly explain technical security issues and remediation steps.
  • Ownership & Accountability: Takes responsibility for assigned security tasks and follows through.
  • Attention to Detail: Ensures accuracy in monitoring, testing, and security configurations.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.