Job Search and Career Advice Platform

Enable job alerts via email!

Information Security Specialist

2P Perfect Presentation

Riyadh

On-site

SAR 150,000 - 180,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity firm in Riyadh is seeking an Information Security Specialist to oversee security services and implement vulnerability management. Responsibilities include conducting assessments, analyzing threats, and supporting incident response initiatives. The ideal candidate should hold a Bachelor’s degree and have 5+ years of experience in related security fields. Proficiency in both Arabic and English is required. Competitive compensation and opportunities for professional development are offered.

Qualifications

  • 5+ years of experience in vulnerability assessment or related fields.
  • Strong troubleshooting and technical problem-solving skills.
  • Experience with security incident analysis and forensic investigations.

Responsibilities

  • Deliver and supervise the implementation of vulnerability management.
  • Conduct system and network assessments to identify security vulnerabilities.
  • Analyze vulnerability scan results and provide actionable recommendations.
  • Support SOC activities, including monitoring risks and detecting threats.

Skills

Vulnerability assessment
File integrity monitoring
Endpoint threat detection
Network threat detection
Incident response
Risk assessment
Troubleshooting
Cyber threat knowledge
Effective communication

Education

Bachelor’s degree in Computer Engineering or Computer Science

Tools

Qualys VM/WAS
Tripwire Enterprise
Palo Alto
CYSA+
CCNA CyberOps
CHFI
DFIR
Job description

The Information Security Specialist is responsible for delivering the required security services and overseeing the implementation of vulnerability management requirements, file integrity monitoring, endpoint and network threat detection systems, and incident response activities. This role involves providing operational and technical support to ensure the effectiveness of security controls and maintaining a resilient security posture across the organization.

Job Responsibilities:
  • Deliver and supervise the implementation of vulnerability management, file integrity monitoring, and endpoint and network threat detection systems.
  • Conduct system and network assessments to identify security vulnerabilities and weaknesses.
  • Analyze vulnerability scan results and determine risks in alignment with security policies, controls, and applicable standards.
  • Perform both technical and non-technical vulnerability assessments and evaluate their impact on the environment.
  • Provide actionable recommendations to mitigate known and newly discovered vulnerabilities.
  • Measure the effectiveness of existing defensive controls and ensure adequate protection of systems and networks.
  • Conduct security scanning for databases, systems, and networks to identify security gaps.
  • Troubleshoot and resolve security-related issues promptly.
  • Collect and analyze incident-related data to identify root causes and assess impacts.
  • Contribute to developing remediation recommendations and preventing recurrence of security incidents.
  • Support investigations related to security incidents and coordinate efforts with relevant teams.
  • Assist in security operations center (SOC) activities, including monitoring risks and detecting ongoing threats.
  • Maintain strong knowledge of security best practices, methodologies, and industry standards.
  • Effectively communicate with teams, stakeholders, and leadership.
  • Apply methodologies and tools for scanning and assessing systems and networks for vulnerabilities.
  • Maintain understanding of cyber threat landscapes and risks relevant to the organization.
  • Ensure compliance with national cybersecurity frameworks, regulations, and policies.
  • Demonstrate proficiency in both Arabic and English languages.
Qualifications:
  • Bachelor’s degree in Computer Engineering, Computer Science, or a related discipline from a recognized institution.
  • Minimum of 5 years of experience in vulnerability assessment, file integrity monitoring, endpoint and network threat detection, or related security systems.
  • Experience in vulnerability scanning of systems, networks, and databases.
  • Strong troubleshooting and technical problem-solving skills in security environments.
  • Experience in security incident analysis and contributing to forensic investigations.
  • Strong knowledge of risk assessment methodologies and mitigation strategies.
  • Familiarity with national cybersecurity regulations and organizational compliance requirements.Knowledge of security threats, vulnerability types, and assessment techniques.
  • Effective communication and coordination skills.
Preferred Certifications:
  • Specialized certification in vulnerability assessment and file monitoring tools such as:
  • Qualys VM/WAS, Qualys Certified Specialist, Tripwire Enterprise (FIM).
  • Cybersecurity and security analytics certifications such as:
  • CYSA+, CCNA CyberOps.
  • Digital forensics certifications such as:
  • CHFI, DFIR or equivalent.
  • Training or certification in firewall technologies such as Palo Alto.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.