Browse
···
Log in / Register

Head of Cybersecurity (KSA National)

Specialized Technical Services – STS

Riyadh Saudi Arabia

Favourites
Share

Description

Our Culture: At Zaintech we are proud of our culture and how it drives everything we do. We are looking for individuals who share our values and want to be part of a unique and engaging culture that revolves around collaboration and innovation. If you are looking for a role where you can drive engagement and excellence across teams through commitment and collaboration, and are someone who is customer-centric and appreciates an organization with uncompromised integrity that focuses on employee engagement then read on to learn more about how you can become part of the Zaintech family. Our Code of Conduct: At Zaintech we strictly adhere to our code of conduct, which is there to serve as a moral compass, offering a framework for responsible behaviours and enabling ethical choices that cultivate positive relationships and a better future. It also outlines policies, standards, and procedures for our global operations, promoting integrity and ethical excellence across the countries we engage with. Every year, all employees are required to review, comprehend, confirm, and adhere to the code of conduct. Additionally, all newly hired employees are subject to the same as part of their onboarding process. Role Summary Head of Cybersecurity Function: Directs cybersecurity work within an organization, establishes vision and direction for its cybersecurity and related strategies, resources and activities and advises the leadership on the effective management of the organization’s cyber risks Duties and Responsibilities: Effectively communicate financial aspects of cybersecurity related activities to senior management. Collaborate with stakeholders to ensure business continuity and disaster recovery programs meet organizational requirements. Effectively manage vulnerability remediation Supervise and effectively assign work to staff working on cybersecurity related tasks. Allocate resources to cybersecurity roles. Promote awareness of cyber policy and strategy as appropriate among the organization's management. Work with stakeholders to develop cybersecurity policies and associated documentation in alignment with the organization's cybersecurity strategy. Align the organization's cybersecurity strategy with its business strategy Carry out a cybersecurity risk assessment Work with others on policies, processes and procedures relating to cybersecurity and privacy. Ensure that appropriate controls are in place to effectively mitigate risk and address privacy concerns during a risk assessment process. Work with others to implement and maintain a cybersecurity risk management program Ensure sound principles are reflected in the organization's mission, vision and goals Obtain resources to develop and implement effective processes to meet strategic cybersecurity goals. Understand and communicate an organization's cybersecurity status during legal and regulatory scrutiny. Promote and demonstrate the value of cybersecurity to stakeholders within an organization. Communicate effectively with third parties in the event of a cybersecurity incident. Review the effectiveness of the organization's cybersecurity controls against its strategic goals. Manage the regular review and maintenance of the organization's cybersecurity policy and associated documentation. Ensure that appropriate actions are taken to mitigate the risk in the event of a cybersecurity incident. Advocate cybersecurity related topics with senior management, to ensure the organization's strategic goals include cybersecurity. Ensure that organizational cybersecurity strategy is effectively addressed by cybersecurity policies and related documents. Ensure cybersecurity requirements of all information technology systems are determined. Develop and maintain appropriate cybersecurity policies and related documentation to ensure the organization's critical infrastructure is appropriately protected. Collaborate with stakeholders in the organization and with third parties when identifying future cybersecurity strategy requirements. Identify and recruit appropriately skilled resources to address cybersecurity activities within the organization. Attend and present at international cybersecurity events. Obtain relevant resource to implement and maintain the cybersecurity aspects of an effective business continuity plan. Develop and maintain a cybersecurity strategy that aligns to the organization's business strategy. Ensure that cybersecurity requirements for IT are aligned with the organization’s cybersecurity strategy. Manage financial aspects of cybersecurity, including budgeting and resourcing. Ensure the effective communication of cybersecurity threats and mitigations to interested third parties Knowledge:         Knowledge of network components, their operation and appropriate network security controls and methods. Knowledge and understanding of risk assessment, mitigation and management methods. Knowledge of relevant cybersecurity aspects of legislative and regulatory requirements, relating to ethics and privacy. Knowledge of the principles of cybersecurity and privacy. Knowledge of cybersecurity related threats and vulnerabilities. Knowledge of the likely operational impact on an organization of cybersecurity breaches. Knowledge of vulnerabilities in applications and their likely impact. Knowledge of cybersecurity aspects of business continuity and disaster recovery planning and including testing. Knowledge of system and application security threats and vulnerabilities. Knowledge of security system design tools, methods and techniques. Knowledge of the components of a network attack and their relationship to threats and vulnerabilities. Knowledge of best practices for supply chain risk management. Knowledge of the national cybersecurity regulations and requirements relevant to the organization. Knowledge of cybersecurity threats, risks and issues posed by new technologies and malicious actors. Knowledge of the organization's risk management processes. Knowledge of cybersecurity best practices for IT supply chain management. Knowledge of critical information systems that were designed with limited technical cybersecurity controls. Knowledge of potential vulnerabilities in all network equipment and how it is used Knowledge of cybersecurity vulnerabilities across a range of industry standard technologies. Knowledge of penetration testing and red teaming principles, tools and techniques Knowledge of public sources detailing common application security risks and mitigations. Knowledge of how capture the flag and other cybersecurity related exercises and competitions can assist in improving practical skills. Knowledge of national and organizational document and information classification and marking standards, policies and procedures Skills:     Skill in determining the normal operational state for security systems and how that state is affected by change. Skill in effectively communicating with all levels of staff. Skill in identifying new cybersecurity threats in a timely manner. Skill in developing policies which reflect the organization's business and cybersecurity strategic objectives. Skill in evaluating the viability and legitimacy of suppliers and products. Skill in continually identifying new technologies and their potential impact on cybersecurity requirements. Skill in using critical thinking to recognize organizational challenges and relationships. Skill in negotiating vendor agreements. Abilities:              Ability to develop strategy, policy and related documentation to support business strategy and maintain compliance with legislative, regulatory and contractual obligations. Ability to demonstrate critical comprehension of documentation. Ability to use experience to understand poorly written policies. Ability to understand and relate legislative, regulatory and contractual requirements to the cybersecurity objectives of the organization. Ability to communicate technical and planning information at the same level as a stakeholder's understanding. Ability to apply critical thinking. Ability to effectively and efficiently prioritize cybersecurity resources. Ability to align business and security strategies for the benefit of the organization.  Ability to recognize organizational challenges from a business, management and technological perspective. Ability to relate basic cybersecurity concepts to the impact they may have on an organization. Ability to apply the organization's chosen framework for describing, analyzing and documenting its IT architecture. Ability to employ best practice when implementing cybersecurity controls within a system     Requirements Education: Bachelor’s in Computer Science, Information Security or related field (Master’s preferred).   Benefits .


Location
Riyadh Saudi Arabia
Show Map

Workable
2,033listings

You may also like

SWATX
Senior Database Administrator
Riyadh Saudi Arabia
As a Senior Database Administrator at SWATX, you will be responsible for the design, implementation, and maintenance of our database management systems with a focus on performance, security, and high availability. This role requires deep technical expertise in database technologies, strong problem-solving skills, and the ability to collaborate effectively with other IT professionals and business stakeholders. Your primary responsibilities will include optimizing database performance through advanced tuning techniques, managing database backups and recovery processes, and enforcing data security protocols. You will also lead projects related to database upgrades and migrations, work on troubleshooting complex database issues, and mentor junior database staff. Requirements Bachelor’s degree in Computer Science, Information Technology, or a related field. Minimum of 5-7 years of experience in database administration, with a strong focus on Oracle, MySQL, and SQL Server. Extensive experience in performance tuning, backup and recovery strategies, and disaster recovery planning. Proficient in SQL and PL/SQL development. Solid understanding of database security concepts and best practices. Strong analytical and troubleshooting skills, with the ability to work both independently and collaboratively. Excellent communication skills to effectively interact with technical and non-technical stakeholders. Relevant certifications such as Oracle Certified Professional (OCP) or Microsoft Certified Database Administrator are a plus.
Negotiable Salary
Müller`s Solutions
Emerging Technologies Support Specialist(Saudi National Only)
Riyadh Saudi Arabia
Müller's Solutions is on the lookout for an Emerging Technologies Support Specialist who will play a vital role in providing technical support and guidance for our innovative technology solutions. In this position, you will interact with clients and internal teams to resolve issues related to emerging technologies and ensure that our solutions are effectively implemented and utilized. As an Emerging Technologies Support Specialist, you will leverage your technical knowledge to assist clients in understanding and optimizing technology applications, and provide support for cutting-edge tools and platforms.   Key Responsibilities:   Provide technical support to clients using emerging technologies, including AI, IoT, and blockchain solutions. Assist in troubleshooting issues and resolving technical problems efficiently. Collaborate with internal teams to identify and document common issues and resolutions. Conduct training sessions and webinars for clients to enhance their understanding of emerging technologies. Stay updated on the latest advancements in emerging technologies to provide informed support. Assist in the development of user guides, FAQs, and documentation for technology solutions. UI/UX testing Requirements Requirements: Bachelor’s degree in Computer Science, Information Technology, or a related field. 2-4 years of experience in technical support or a similar role, preferably in emerging technologies. Familiarity with technologies such as artificial intelligence, IoT, and blockchain. Strong problem-solving skills with the ability to diagnose and resolve technical issues. Excellent communication skills, both written and verbal, to effectively engage with clients and stakeholders. Ability to work independently and as part of a collaborative team. Preferred Qualifications: Experience working with technology support tools and platforms. Basic knowledge of programming or scripting languages. Certifications in any relevant emerging technologies. Benefits Why Join Us: Opportunity to work with a talented and passionate team. Competitive salary and benefits package. Exciting projects and innovative work environment.
Negotiable Salary
Cookie
Cookie Settings
© 2025 Servanan International Pte. Ltd.