Enable job alerts via email!

Cyber Security Specialist

KUN Sports

Jeddah, Makkah Al Mukarramah

On-site

USD 90,000 - 130,000

Full time

15 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Start fresh or import an existing resume

Job summary

A leading company is seeking an IT & Cyber Security Manager to oversee all aspects of cybersecurity, ensuring compliance and managing risk within the organization. With responsibilities ranging from technology evaluations to training personnel, this role is pivotal in protecting the organization's information assets. Successful candidates will have a robust background in cybersecurity and possess certifications like CISSP, IAM, and CISM.

Qualifications

  • 8-10 years’ experience in IT & Cyber Security.
  • Certifications required: CISSP, IAM, CISM.
  • Full understanding of NCA, NIS, ISO27001.

Responsibilities

  • Oversee information Cyber security function and vulnerability assessments.
  • Evaluate Cybersecurity budget and technology architecture.
  • Implement NCA, NIS, ISO upgrades.

Skills

Intrusion detection methodologies
Network security architecture
CISSP
IAM
CISM

Education

Bachelor’s degree in IT or computer engineering

Job description

Role purpose

Information & Cyber Security Management, IT Security Physical & Logical Security Management, Security & Vulnerability planning, IT Security Awareness & Policy Development

KEY ACCOUNTABILITIES & ACTIVITIES

  • Oversee information Cyber security function
  • Evaluate Cybersecurity budget and costs associated with all Initiatives and Operations
  • Assess current Cybersecurity technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement
  • Implement and oversee NCA, NIS, ISO technological upgrades, improvements and major changes to the information security environment
  • Serve as a focal point of contact for the IT Cyber Security team
  • Manage and configure physical security, disaster recovery and data backup systems
  • Monitoring of all security operations including SIEM platform, AV, Firewalls, Identity Management Platform, access request processing, digital loss prevention
  • Evaluate and recommend information security technologies and practices
  • Advise on and monitor compliance with information security mandates
  • Interpret security policies, regulations, standards, and other mandates into security control requirements and assess environments against those requirements
  • Communicate the value of IT Cyber Security throughout all levels of the organization stakeholders.
  • Provide information security awareness training to organization personnel
  • Ensure that cybersecurity inspections, tests, and reviews are coordinated for the network environment.
  • Oversee the information security training and awareness program.
  • Participate in an information security risk assessment during the Security Assessment and Authorization process.
  • Provide system-related input on cybersecurity requirements to be included in statements of work and other appropriate procurement documents.
  • Recommend resource allocations required to securely operate and maintain an organization's cybersecurity requirements.
  • Track Cybersecurity audit findings and recommendations to ensure that appropriate mitigation actions are taken.
  • Perform analysis of network security, based upon the DCID 6/3, DITSCAP, DIACAP, and NISPOM Chapter 8 certification and accreditation process

REQUIREMENTS FOR ROLE

Experience & qualifications

  • 8-10 years’ experience in IT & Cyber Security
  • Bachelor’s degree in IT or computer engineering
  • Certifications - CISSP, IAM, CISM

Knowledge & skills

  • Full understanding of NCA, NIS, ISO27001
  • Understanding of Global Security Criteria such as Cybersecurity, Knowledge Assurance
  • Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions
  • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
  • Knowledge of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures.
  • Knowledge of current and emerging threats/threat vectors.
  • Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities.
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.