Job Search and Career Advice Platform

Enable job alerts via email!

Cybersecurity Risk Specialist

Saudi Air Navigation Services

Jeddah

On-site

SAR 150,000 - 200,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading air navigation management company in Saudi Arabia is seeking a Cybersecurity professional with over 6 years of experience. Candidates must hold a Bachelor’s degree in Computer Science or related fields and be skilled in risk management and compliance. Responsibilities include developing security risk profiles, directing risk control monitoring, and ensuring effective remediation of Cybersecurity risks. The role offers a chance to work in critical infrastructure management and aligns with best practices in Cybersecurity.

Qualifications

  • Minimum of 6 years of experience in Cybersecurity or Information Security.
  • Previous engagements in organizations managing critical infrastructure are preferred.

Responsibilities

  • Develop security risk profiles of computer systems by assessing threats and vulnerabilities.
  • Develop and direct risk control monitoring programs to ensure cyber risks are managed.
  • Ensure Cybersecurity risks are identified and managed through organizational risk governance.

Skills

Cybersecurity expertise
Risk management
Compliance knowledge

Education

Bachelor’s degree in Computer Science or related field
ISO27005 Risk Management certification
Relevant Cybersecurity GRC certifications
Job description
QUALIFICATIONS / REQUIREMENTS
Knowledge and Experience
  • Minimum of 6 years of experience in Cybersecurity or Information Security.
  • Previous engagements in organizations managing critical infrastructure is preferred.
Education and Certifications
  • A Bachelor’s degree in Computer Science, Computer Engineering, IT, Systems Engineering or equivalent is required.
  • ISO27005 Risk Management certification is preferred.
  • Relevant Cybersecurity GRC certifications is preferred
Key activities

Develop security risk profiles of computer systems by assessing threats to, and vulnerabilities of, those systems.

  • Develop security risk mitigation strategies to effectively manage risk in accordance with organizational risk appetite.
  • Develop statements of preliminary or residual Cybersecurity risks for system operation.
  • Ensure that decisions relating to Cybersecurity are based on sound risk management principles.
  • Ensure Cybersecurity risks are identified and managed appropriately through the organization's risk governance process.
  • Act as the Cybersecurity risk management liaison with IT and OT departments and others.
  • Report to SANS GRC Manager management with regard to risks and other security exposures.
  • Manage oversight and monitoring of risk mitigation and coordination of policy and controls with GRC manager, to ensure that risk owners are taking effective remediation steps
  • Develop and direct risks control monitoring programs to ensure cyber risks are managed to the appropriate level of acceptable residual risk
  • Follow up on risks raised and communicated to the business, to ensure that appropriate remediation measures have been taken.
  • Develop and provide initial approval of the Cybersecurity risk management policy
  • Define the Cybersecurity risk management methodology
  • Develop risk assessment reports
  • Follow up on Cybersecurity risk actions
  • Ensure that Cybersecurity risk management training and awareness is conducted
  • Ensure alignment with the enterprise risk management methodology
  • Apply and implement the Cybersecurity risk management process
  • Perform risk assessments, and follow-up on risk status and actions taken in coordination with the risk owners
  • Develop and maintain the Cybersecurity risk register
  • Perform necessary corrective measures in order to align with the enterprise risk management methodology
  • Develop risk assessment reports and sends it to the risk management head for approval
  • Assign risk ownerships in coordination with the business owners
  • Analyze business impact and potential exposure based on emerging security threats, vulnerabilities and risks, and recommend mitigating actions.
Policies, Processes and Procedures
  • Conduct day-to-day activities while ensuring compliance to policies and procedures
  • Contribute to the identification of opportunities for continuous improvement of systems, processes taking into account leading practices, changes in business environment, cost reduction and productivity improvement
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.