Loading
Loading...
Loading...
Loading...
Loading...

عربي

Job Posting Status is Expired Please note that the job is not published for job seekers and you will not receive any applicants due to the job status.

Upload

Cybersecurity Monitoring Sr. Specialist

Riyadh, Saudi Arabia Posted 2021/03/25 12:45:15 Expires 2021-04-01 Ref: JB1100008511

Job Description

JOB PURPOSE

To manage the development, implementation, and monitoring of security controls set to protect LCGPA’s computer networks, systems, data and information against potential cyber-attacks.

 

KEY ACCOUNTABILITIES

DESCRIPTION

Cybersecurity Monitoring

·         Provide overall cybersecurity support for the Authority’s networks and systems by managing the security posture, system accreditations, vulnerability profile, continuous security monitoring and system scanning.

·         Supervise the Conduct of real-time security monitoring through the collection, correlation and analysis of all security events through available Security Information and Event Management (SIEM) solution.

·         Support in Managing the planning, scheduling, and execution of vulnerability assessment operations to identify existing weaknesses and assess the effectiveness of set controls; recommend improvements and remedial actions as needed.

·         Conduct day-to-day review of LCGPA’s cybersecurity performance; escalate issues and provide reports to relevant stakeholders as required.

·         Raise and handle day-to-day cybersecurity incidents as applicable, including follow-ups with the relevant teams when required to close incidents.

·         Examines and performs comprehensive technical analysis of cyber forensics evidence during an incident.

·         Use strong TCP/IP networking skills to perform network analysis to isolate and diagnose potential threats and anomalous network behavior.

·         Develop IDS/IPS/Yara rules to detect threat patterns

·         Identify potential malicious activity from memory dumps, logs and packet captures and document lessons learned from the outcome of events or exercises.

·         Perform incident response tasks to support deployable incident response teams including forensic collection, intrusion correlation, tracking, threat analysis and system remediation.

·         Capture and analyze network traffic associated with malicious activities using network-monitoring tools.

·         Own and drive threat model and threat prediction.

·         Contribute to the Threat Reports

·         Perform attribution of the IOCs provided by various sources.

·         Perform analysis on the attack surface and exploit possibilities.

·         Perform Deep / Dark / Open web crawling for threat intelligence against possible targeted attacks.

·         Collate and Provide Risk & Confidence rating for all IOCs or Threat Information received by teams.

·        Conduct periodic Vulnerability Assessments and Penetration Tests of IT Infrastructure.

Policies, Systems, Processes, Procedures, Standards and Reports

§  Follow all relevant functional policies, processes, standard operating procedures and instructions to ensure that work is carried out in a controlled and consistent manner.

§  Assist in the preparation of timely and accurate reports and functional deliverables to meet the functional requirements in order to achieve the desired efficiency and performance excellence.

Related Tasks

§  Perform any other related tasks and duties as directed.

 

 

Technical Competencies

TECHNICAL COMPETENCIES

§  Information Security – Proficient

§  Incident Management and Response – Proficient

§  Events Monitor and Threats Hunting – Proficient

§  Vulnerability Assessment and Penetration Testing – Proficient

§  Security Architecture and Design – Proficient

§  IS Project Management – Proficient

§  IS Compliance – Proficient

§  Relationship Management – Proficient

§  Vendor Management – Proficient

§  Risk Assessment & Management –Proficient

§  Reporting – Proficient

§  Data Collection and Analysis – Proficient

Education

IT, Computer Science or any other related fields. CIAC preferred

Job Details

Job Location Riyadh, Saudi Arabia
Job Role Information Technology
Employment Status Full time
Employment Type Employee
Number of Vacancies 1
Job Sector Cybersecurity
Cybersecurity Monitoring

Preferred Candidate

Career Level Mid Career
Years of Experience Min: 4 Max: 6
Residence Location Saudi Arabia
Nationality Saudi Arabia
Degree Bachelor's degree

Similar Jobs

Loading ...