Cybersecurity Specialist - Hiring Immediately

icon building Company : Psdsarc
icon briefcase Job Type : Full Time

Number of Applicants

 : 

000+

Click to reveal the number of candidates who applied for this job.
icon loader
icon loader

This job is no longer accepting applications.

Scroll down below to view similar jobs .

Job Description - Cybersecurity Specialist - Hiring Immediately

We are looking to hire an expert Cybersecurity Specialist to join our stellar team at Psdsarc in Riyadh Riyadh Province
Growing your career as a Full Time Cybersecurity Specialist is an incredible opportunity to develop relevant skills.
If you are strong in creativity, communication and have the right drive for the job, then apply for the position of Cybersecurity Specialist at Psdsarc today!


  • Identifies, analyzes, monitors, mitigates and manages threats and vulnerabilities to IT systems and networks.

  • Uses defensive measures and multi-source information to report events and respond to incidents.

  • Uses data collected from cyber defense tools to analyze events that occur within their organization to detect and mitigate cyber threats.

  • Performs vulnerability assessments of systems and networks. Identifies where they deviate from acceptable configurations or applicable policies. Measures effectiveness of
    defense-in-depth architecture against known vulnerabilities.

  • Conducts authorized attempts to penetrate computer systems or networks and physical premises, using realistic threat techniques, to evaluate their security and detect
    potential vulnerabilities.

  • Investigates, analyzes and responds to cybersecurity incidents.

  • Collects and analyzes digital evidence, investigates cybersecurity incidents to derive useful information to mitigate system and network vulnerabilities.

  • Identifies, collects, examines and preserves evidence using controlled and documented analytical and investigative techniques.

  • Analyzes (by disassembling and/or decompiling) malicious software, understands how it works, its impact and intent and recommends mitigation techniques and incident
    response actions.

  • Collects and analyzes multi-source information about cybersecurity threats to develop deep understanding and awareness of cyber threats and actors’ Tactics, Techniques and

  • Procedures (TTPs), to derive and report indicators that help organizations detect and predict cyber incidents and protect systems and networks from cyber threats.

  • Proactively searches for undetected threats in networks and systems, identifies their Indicators of Compromise (IOCs) and recommends mitigation plans.

Skills


  • Knowledge of network components, their operation and appropriate network security controls and methods.

  • Knowledge of the principles of cybersecurity and privacy.

  • Knowledge of cybersecurity related threats and vulnerabilities.

  • Knowledge of the likely operational impact on an organization of cybersecurity breaches

  • Knowledge of cybersecurity authentication, authorization and access control methods.
    Knowledge of vulnerabilities in applications and their likely impact.

  • Knowledge of cybersecurity defense and vulnerability assessment tools and their capabilities

  • Knowledge of computer algorithms.

  • Knowledge of cryptography and cryptographic key management concepts.

  • Knowledge of appropriate data backup and recovery methods and solutions, including testing

  • Knowledge of cybersecurity considerations for database systems

  • Knowledge of host and network access control mechanisms.

  • Knowledge of sources of information relating to the identification and effective treatment of vulnerabilities.

  • Knowledge of best practices for incident response and incident management.

  • Knowledge of cybersecurity and privacy principles and organizational requirements.

  • Knowledge of IT security principles and methods.

  • Knowledge of best practice network traffic analysis methods.

  • Knowledge of operating systems.

  • Knowledge of programming language structures and logic.

  • Knowledge of key security management concepts.

  • Knowledge of industry standard systems diagnostic tools and fault identification techniques.

  • Knowledge of Virtual Private Network (VPN) security

  • Knowledge of network tools

  • Knowledge of the national cybersecurity regulations and requirements relevant to the organization

  • Knowledge of cybersecurity policies, procedures and regulations.

  • Knowledge of Windows and Unix ports and services.

  • Knowledge of data backup and restoration concepts.

  • Knowledge of system administration concepts for operating systems used by the organization.

  • Knowledge of how to use network analysis tools to identify vulnerabilities.

  • Knowledge of networking and internet communications fundamentals.

  • Know how to analyze infrastructure build sheets, configuration management databases, vulnerability scans, access control lists and vendor documentation to understand software behaviors and interactions.
    Skills

  • Skill of identifying, capturing, containing and reporting malware.

  • Skill in using intrusion detection technologies to detect host and network-based intrusions.

  • Skill in determining the normal operational state for security systems and how that state is affected by change

  • Skill in evaluating the adequacy of security designs.

  • Skill in using virtual machines.

  • Skill in configuring and utilizing computer protection tools.

  • Skill in securing network communications.

  • Skill in effectively recognizing and categorizing types of vulnerabilities and associated attacks.

  • Skill in configuring and utilizing network protection components.

  • Skill in conducting cybersecurity audits or reviews of technical systems.

  • Skill in system, network and OS hardening techniques

  • Skill in recognizing vulnerabilities in security systems.

  • Skill in using risk scoring to inform performance-based and cost-effective approaches to help an organization manage its cybersecurity risk

  • Skill in collecting data from a variety of cybersecurity resources.

  • Skill in conducting trend analysis.

#J-18808-Ljbffr

Benefits of working as a Cybersecurity Specialist in Riyadh Riyadh Province:


● Company offers great benefits
● Opportunities to grow
● Advantageous package
Original job Cybersecurity Specialist - Hiring Immediately posted on GrabJobs ©. To flag any issues with this job please use the Report Job button on GrabJobs.

This job is no longer accepting applications.

Scroll down below to view similar jobs .

icon no cv required No CV Required icon fast interview Fast Interview via Chat

Share this job with your friends

icon get direction How to get there?

icon geo-alt Riyadh Riyadh Province

icon get direction How to get there?
View similar Media & Communications jobs below

Similar Jobs in Saudi Arabia

Share this job with your friends

💰

Browse the Top Paying Jobs Media & Communications Salaries

GrabJobs is the no1 job portal in Saudi Arabia, connecting you to thousands of jobs fast! Find the best jobs in Saudi Arabia, apply in 1 click and get a job today!

Mobile Apps

Copyright © 2024 Grabjobs Pte.Ltd. All Rights Reserved.