Job Posting Status is Expired Please note that the job is not published for job seekers and you will not receive any applicants due to the job status.
Upload
Jeddah , Saudi Arabia
Posted 2021/03/23 07:27:36
Expires 2021-05-22
Ref: JB4314116
Job Description
Manage the vulnerability scans and the mitigation and provide the health posture reports, support the implementation of cybersecurity technology and its operation, and make sure the fulfillment of the regulations on overall cybersecurity function technology configurations.
- Correlate incident data to identify vulnerabilities.
- Use continuous monitoring tools to assess risk on an ongoing basis.
- Link all the discovered vulnerabilities to the organization cybersecurity risk classification criteria.
- Maintain knowledge of applicable cybersecurity defense policies, regulations and compliance documents as they pertain to cybersecurity defense auditing.
- Conduct or support authorized penetration testing of infrastructure and assets.
- Conduct required reviews, including reviews of defensive measures, according to the organization’s policies.
- Recommend cost-effective security controls to mitigate risks identified through testing and review.
- Carry out vulnerability scanning on systems and assets.
- Use security testing and code scanning tools to conduct code reviews.
- Monitor external data sources to keep understanding of currency of cybersecurity threats up to date and determine which security issues may have an impact on the organization.
- Work with stakeholders to resolve cybersecurity incidents and vulnerability compliance issues.
- Performs vulnerability assessments of systems and networks. Identifies where they deviate from acceptable configurations or applicable policies. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.
- Collects and analyzes multi-source information about cybersecurity threats to develop deep understanding and awareness of cyber threats and actors’ Tactics, Techniques and Procedures (TTPs), to derive and report indicators that help organizations detect and predict cyber incidents and protect systems and networks from cyber threats.
- Proactively searches for undetected threats in networks and systems, identifies their Indicators of Compromise (IOCs) and recommends mitigation plans.
Skills
- Preferred certified CISP, CISM, CISO, ISO27k1, CCNA, MCSE or any related.
- Project management capabilities.
- Critical Thinking skills.
Job Details
Job Location
Jeddah , Saudi Arabia
Job Role
Legal
Preferred Candidate
Career Level / Band
Entry Level
Years of Experience
Min: 3