drjobs Technologist العربية

Technologist

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Jobs by Experience drjobs

Not Mentionedyears

Job Location drjobs

Jeddah - Saudi Arabia

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Nationality

Any Nationality

Gender

N/A

Vacancy

1 Vacancy

Job Description

Roles and responsibilities

As a cybersecurity professional, you will play a vital role in designing secure systems, implementing security protocols, and providing technical support for cybersecurity incidents. Your responsibilities will span several key areas, including vulnerability scanning, security operations support, and the implementation of security measures.

Vulnerability Scanning and Assessment

One of your primary duties will involve conducting vulnerability scans across various systems and assets to identify potential security risks. You will assist in authorized penetration testing under supervision, contributing to a comprehensive assessment of the organization’s security posture. Supporting the analysis of vulnerability data is essential, as you will help identify critical cybersecurity issues that need addressing.

Security Operations Support

In this role, you will monitor system performance and integrity to detect potential security threats and vulnerabilities proactively. Your support for security operations will include basic incident response tasks, where you will assist in managing and mitigating security incidents. Additionally, you will gather audit evidence and documentation to ensure compliance with regulatory requirements. Documenting configurations, policies, and processes is crucial for maintaining knowledge transfer within the security team, fostering a collaborative and informed environment.

Implementation of Security Measures

You will assist in the development of security plans designed to protect the organization’s information assets. Supporting the implementation of security measures and controls as directed by senior team members will be a key aspect of your responsibilities. This collaborative approach will help enhance the overall security framework of the organization.


Desired candidate profile

Requirements for the Role

Technical Expertise

You should possess proficiency in conducting vulnerability scans using established tools and techniques. Knowledge and experience in supporting penetration testing activities under supervision are also essential. Familiarity with intrusion detection technologies and security monitoring tools will aid your support of security operations. Furthermore, the ability to document and report on security vulnerabilities and risks is critical for effective communication within the team.

Cybersecurity Knowledge

A foundational understanding of basic cybersecurity principles, common attack vectors, and threat actors is necessary. Knowledge of risk assessment and mitigation methods, along with basic familiarity with vulnerability management processes and tools, will enhance your effectiveness in this role.

Analytical Skills

Strong problem-solving abilities will enable you to assist in analyzing vulnerability data and identifying security issues. Attention to detail is vital when conducting scans and documenting findings, ensuring that no risks are overlooked.

Communication Skills

You must be able to communicate your findings clearly and concisely to both technical and non-technical audiences. Effective teamwork is essential, as you will need to collaborate closely with senior team members and follow their guidance.

Education and Experience

A diploma or bachelor’s degree in a relevant field, such as Cybersecurity or Information Technology, is preferred. Relevant industry certifications, such as CompTIA Security+ or CEH, are advantageous. The role requires a minimum of 3-4 years of experience, including at least 1-2 years of hands-on experience in vulnerability management or a related cybersecurity discipline. Proficiency in vulnerability scanning tools and basic scripting or coding abilities will further enhance your qualifications.

Employment Type

Full-time

Department / Functional Area

IT Project Management

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.