Sr. Specialist I, Cybersecurity Job
Work Location:
KSA > Riyadh
An exciting opportunity is available for Sr. Specialist I, Cybersecurity Reports to, Chief Information Security Officer located in Riyadh.
Job purpose:
An individual contributor that supports TASNEE chief information security officer to directs information work within TASNEE and its subsidiaries.
Role responsibilities:
- Monitor security alerts and events from SIEM, SOAR, EDR, IDS/IPS, firewalls, and other security tools
- Triage, analyze, and validate security incidents (true vs false positives)
- Investigate suspicious activities such as malware, phishing, ransomware, lateral movement, and data exfiltration
- Perform initial incident response actions (containment, isolation, user blocking) according to playbooks
- Escalate confirmed incidents based on severity, impact, and defined SLAs
- Collect and preserve evidence for forensic analysis and potential investigations
- Maintain accurate incident records and reporting in ticketing systems
- Execute threat hunting activities based on indicators of compromise (IOCs) and threat intelligence
- Analyze logs from servers, endpoints, applications, network devices, and cloud platforms
- Support vulnerability management by validating exploitation attempts and exposure
- Follow SOC runbooks, procedures, and regulatory requirements
- Collaborate with IT, OT, engineering, and incident response teams during investigations
- Contribute to continuous improvement of detection rules, playbooks, and use cases
Qualifications and Requirements:
- Bachelor Degree or Higher in Computer Engineering, Information and Computer science, cybersecurity.
- +5 years’ experience of experience in IT/OT with focus in cybersecurity.
- Determines normal operational state for security systems and how that state is affected by change.
- Communicating skill with all levels of staff.
- Identifying new cybersecurity threats in a timely manner.
- Developing policies which reflect the organization's business and cybersecurity strategic objectives.
- Evaluating the viability and legitimacy of suppliers and products.
- Continually identifying new technologies and their potential impact on information security requirements.
- Critical thinking to recognize organizational challenges and relationships.
Job Segment:
Information Security, Computer Science, Engineer, Technology, Engineering