Enable job alerts via email!

Cyber Security Specialist

technologytrack

Riyadh

On-site

SAR 100,000 - 150,000

Full time

6 days ago
Be an early applicant

Job summary

A leading ICT services company in the Riyadh Region is seeking a Cyber Security professional to protect telecommunications infrastructure from threats. The ideal candidate must have at least 5 years of experience and a strong grasp of security protocols and risk management. Responsibilities include monitoring network traffic, conducting security audits, and collaborating with IT teams. Certifications like CISSP or CISM are preferred for this role that emphasizes continuous improvement and proactive security measures.

Qualifications

  • At least 5 years of experience in Cyber Security.
  • Deep understanding of security protocols and risk management.
  • Ability to analyze complex security issues and develop solutions.

Responsibilities

  • Design and enforce security policies for telecommunications.
  • Continuously monitor network traffic to detect threats.
  • Conduct security audits and vulnerability assessments.
  • Collaborate with IT and engineering on secure network architectures.
  • Educate staff on cyber security awareness and best practices.

Skills

Security frameworks and best practices
Using security tools (SIEM, firewalls, antivirus)
Network security protocols and encryption methods
Incident response and forensic investigation
Cloud security and data protection technologies
Conducting risk assessments
Compliance and regulatory standards
Project management and organizational skills

Education

Relevant certifications in cyber security (CISSP, CISM)
Job description

As a Cyber Security professional at TechTrack, one of the fastest-growing ICT services companies in the Middle East, you will play a pivotal role in protecting our telecommunications infrastructure from cyber threats. With at least 5 years of experience required, this position demands a deep understanding of security protocols, risk management, and incident response strategies. You will be responsible for ensuring the confidentiality, integrity, and availability of sensitive data while collaborating with cross-functional teams to enhance our security posture.

Responsibilities
  1. Design and enforce security policies tailored to the telecommunications environment.
  2. Continuously monitor and analyze network traffic to detect and respond to potential threats.
  3. Conduct comprehensive security audits and vulnerability assessments to identify and mitigate risks.
  4. Work closely with IT and engineering teams to implement secure network architectures.
  5. Develop and deliver training programs to educate staff on cyber security awareness and best practices.
  6. Investigate security incidents, documenting findings and recommending remediation actions.
  7. Stay abreast of emerging cyber threats and trends to proactively adjust security measures.
  8. Ensure compliance with relevant regulations and industry standards for data protection.
  9. Prepare detailed reports on security incidents and present them to senior management.
  10. Contribute to the development of incident response plans and disaster recovery strategies.
Preferred Candidate
  1. Demonstrated ability to analyze complex security issues and develop effective solutions.
  2. Strong communication skills to convey technical information to non-technical stakeholders.
  3. Proactive mindset with a focus on continuous improvement in security practices.
  4. Ability to thrive in a fast-paced, dynamic work environment.
  5. Exceptional attention to detail and organizational capabilities.
  6. Experience in the telecommunications sector is highly advantageous.
  7. Relevant certifications in cyber security (e.g., CISSP, CISM) are preferred.
  8. A collaborative approach with the ability to work effectively in teams.
  9. Willingness to adapt to new technologies and evolving threats.
  10. Commitment to ongoing professional development and learning opportunities.
Skills
  • Expertise in security frameworks and best practices (e.g., NIST, ISO 27001).
  • Proficient in using security tools such as SIEM, firewalls, and antivirus software.
  • Strong knowledge of network security protocols and encryption methods.
  • Experience with incident response and forensic investigation techniques.
  • Familiarity with cloud security and data protection technologies.
  • Ability to conduct risk assessments and implement mitigation strategies.
  • Solid understanding of compliance requirements and regulatory standards.
  • Strong project management and organizational skills.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.