Enable job alerts via email!

VAPT Analyst- KSA

Diyar United Company

Simira'

On-site

SAR 80,000 - 100,000

Full time

Today
Be an early applicant

Job summary

A leading cybersecurity firm in Saudi Arabia is seeking a skilled cybersecurity professional to conduct vulnerability assessments and manage a cyber defense toolkit. The ideal candidate will have experience in network security, pension testing, and preparing detailed audit reports. This role is critical in protecting against cyber threats and ensuring the integrity of systems and applications.

Qualifications

  • Experience in conducting vulnerability assessments of technology and applications.
  • Ability to prepare comprehensive audit reports with findings and recommendations.
  • Experience with network security audits and penetration testing.

Responsibilities

  • Identify critical flaws in applications and systems.
  • Conduct vulnerability assessments and prepare reports.
  • Maintain a deployable cyber defense audit toolkit.

Skills

Vulnerability assessments
Network security audits
Penetration testing
Cyber defense toolkit management
Job description
Overview

Identify critical flaws in applications and systems that cyber actors could exploit.

Responsibilities
  • Conduct vulnerability assessments of relevant technology (e.g., computing environment, network and supporting infrastructure, and applications).
  • Prepare and present comprehensive vulnerability assessments.
  • Conduct network security audits and scanning.
  • Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense operations.
  • Prepare audit reports that identify technical and procedural findings, and make recommendations on corrective strategies and solutions.
  • Conduct and/or support authorized penetration testing on organization networks and systems.
  • Define and review requirements for information security solutions.
Skills
  • Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense operations.
  • Prepare audit reports that identify technical and procedural findings, and make recommendations on corrective strategies and solutions.
  • Conduct and/or support authorized penetration testing on organization networks and systems.
  • Define and review requirements for information security solutions.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.