Purpose of the Position
Are you passionate about safeguarding critical IT, IS, and OT systems against evolving cyber threats? Join our Cybersecurity team and play a key role in protecting one of the most advanced energy projects in the region.
What You’ll Do (Objectives)
- Implement and Maintain Security Tools: Oversee the implementation, maintenance, and licensing of security tools (e.g., vulnerability assessment tools, SIEM, secure configuration tools) and ensure their effective operation.
- Enhance Security Monitoring and SIEM Operations: Integrate IT, IS, and OT systems with SIEM, develop use cases for alert generation, and utilize threat intelligence feeds to improve security monitoring.
- Coordinate Cybersecurity Solutions Deployment: Collaborate with CDC, IT, and OT teams to implement, maintain, and ensure compliance of cybersecurity solutions such as antivirus, firewalls, DLP, and PAM.
- Manage Vulnerability Assessments and Remediation: Ensure regular vulnerability assessments and penetration tests are conducted, and coordinate with IT and OT teams to remediate identified vulnerabilities.
- Strengthen Incident Response Capabilities: Prepare for and participate in incident response activities, including conducting drills, assisting in incident management, and drafting reports.
- Integrate Cybersecurity into Operational Processes: Collaborate with IT, IS, and OT teams to embed cybersecurity best practices and evaluate the security capabilities of systems during procurement and deployment.
- Monitor Cybersecurity Effectiveness: Track cybersecurity tickets, ensure timely closure, and develop KPI reports to assess compliance and effectiveness of controls.
- Mentor and Stay Updated: Mentor junior team members in cybersecurity operations skills and stay informed on the latest cyber threats, technologies, and trends.
What We’re Looking For
- ✅ Bachelor’s degree in Cybersecurity, Information Security, Computer Science, or equivalent
- ✅ 5–6 years of experience in IT/Cybersecurity operations
- ✅ Strong knowledge of KSA regulations (HCIS, NCA)
- ✅ Relevant certifications (CISSP, CISM, CEH, ISO27001, etc.)
- ✅ Excellent problem‑solving, communication, and teamwork skills
Relevant Certifications
- Governance, Risk, and Compliance (GRC) Specific:
- Certified Information Systems Auditor (CISA)
- Certified in Risk and Information Systems Control (CRISC)
- Certified Information Security Manager (CISM)
- General Cybersecurity:
- Certified Information Systems Security Professional (CISSP)
- Security+
- Systems Security Certified Practitioner (SSCP)
- Technical and Specialized Cybersecurity:
- Certified Ethical Hacker (CEH)
- Global Information Assurance Certification (GIAC)
- Framework‑Specific Certifications:
- ISO27001 Lead Implementer/Lead Auditor
- ITIL Certification
- NIST Cybersecurity Framework Certification
Skills
- Knowledge of latest IT/OT Operations cybersecurity trends and techniques – Aware
- Ability to identify cybersecurity related threats, vulnerabilities, and risks – Proficient
- Knowledge of KSA specific regulations such as HCIS and NCA – Proficient
- Written and verbal communication skills – Proficient
- Interpersonal and teamwork skills – Advanced