drjobs تكنولوجي English

تكنولوجي

صاحب العمل نشط

1 وظيفة شاغرة
drjobs

حالة تأهب وظيفة

سيتم تحديثك بأحدث تنبيهات الوظائف عبر البريد الإلكتروني
Valid email field required
أرسل الوظائف
drjobs
أرسل لي وظائف مشابهة
drjobs

حالة تأهب وظيفة

سيتم تحديثك بأحدث تنبيهات الوظائف عبر البريد الإلكتروني

Valid email field required
أرسل الوظائف
الخبرة drjobs

Not Mentionedسنوات

موقع الوظيفة drjobs

جدة - السعودية

الراتب drjobs

لم يكشف

drjobs

لم يتم الكشف عن الراتب

الجنسية

أي جنسية

الجنس

N/A

عدد الوظائف الشاغرة

1 وظيفة شاغرة

الوصف الوظيفي

Roles and responsibilities

As a cybersecurity professional, you will play a vital role in designing secure systems, implementing security protocols, and providing technical support for cybersecurity incidents. Your responsibilities will span several key areas, including vulnerability scanning, security operations support, and the implementation of security measures.

Vulnerability Scanning and Assessment

One of your primary duties will involve conducting vulnerability scans across various systems and assets to identify potential security risks. You will assist in authorized penetration testing under supervision, contributing to a comprehensive assessment of the organization’s security posture. Supporting the analysis of vulnerability data is essential, as you will help identify critical cybersecurity issues that need addressing.

Security Operations Support

In this role, you will monitor system performance and integrity to detect potential security threats and vulnerabilities proactively. Your support for security operations will include basic incident response tasks, where you will assist in managing and mitigating security incidents. Additionally, you will gather audit evidence and documentation to ensure compliance with regulatory requirements. Documenting configurations, policies, and processes is crucial for maintaining knowledge transfer within the security team, fostering a collaborative and informed environment.

Implementation of Security Measures

You will assist in the development of security plans designed to protect the organization’s information assets. Supporting the implementation of security measures and controls as directed by senior team members will be a key aspect of your responsibilities. This collaborative approach will help enhance the overall security framework of the organization.


Desired candidate profile

Requirements for the Role

Technical Expertise

You should possess proficiency in conducting vulnerability scans using established tools and techniques. Knowledge and experience in supporting penetration testing activities under supervision are also essential. Familiarity with intrusion detection technologies and security monitoring tools will aid your support of security operations. Furthermore, the ability to document and report on security vulnerabilities and risks is critical for effective communication within the team.

Cybersecurity Knowledge

A foundational understanding of basic cybersecurity principles, common attack vectors, and threat actors is necessary. Knowledge of risk assessment and mitigation methods, along with basic familiarity with vulnerability management processes and tools, will enhance your effectiveness in this role.

Analytical Skills

Strong problem-solving abilities will enable you to assist in analyzing vulnerability data and identifying security issues. Attention to detail is vital when conducting scans and documenting findings, ensuring that no risks are overlooked.

Communication Skills

You must be able to communicate your findings clearly and concisely to both technical and non-technical audiences. Effective teamwork is essential, as you will need to collaborate closely with senior team members and follow their guidance.

Education and Experience

A diploma or bachelor’s degree in a relevant field, such as Cybersecurity or Information Technology, is preferred. Relevant industry certifications, such as CompTIA Security+ or CEH, are advantageous. The role requires a minimum of 3-4 years of experience, including at least 1-2 years of hands-on experience in vulnerability management or a related cybersecurity discipline. Proficiency in vulnerability scanning tools and basic scripting or coding abilities will further enhance your qualifications.

نوع التوظيف

القسم / المجال المهني

إدارة مشاريع تكنولوجيا المعلومات

نبذة عن الشركة

الإبلاغ عن هذه الوظيفة
إخلاء المسؤولية: د.جوب هو مجرد منصة تربط بين الباحثين عن عمل وأصحاب العمل. ننصح المتقدمين بإجراء بحث مستقل خاص بهم في أوراق اعتماد صاحب العمل المحتمل. نحن نحرص على ألا يتم طلب أي مدفوعات مالية من قبل عملائنا، وبالتالي فإننا ننصح بعدم مشاركة أي معلومات شخصية أو متعلقة بالحسابات المصرفية مع أي طرف ثالث. إذا كنت تشك في وقوع أي احتيال أو سوء تصرف، فيرجى التواصل معنا من خلال تعبئة النموذج الموجود على الصفحة اتصل بنا