Browse
···
Log in / Register

Data Scientist

Negotiable Salary

SWATX

Riyadh Saudi Arabia

Favourites
Share

Description

Job Summary: The Data Scientist will focus on analyzing data to derive actionable insights that drive business decisions. This role involves working with large datasets and applying advanced analytical techniques to develop predictive models and support the data science roadmap. Key Responsibilities: Analyze telecom data to identify trends, patterns, and anomalies using data stores such as SQL Server and Cloudera over Hive. Develop and implement predictive models to improve customer experience and network performance. Design, build, and maintain scalable data science pipelines. Collaborate with cross-functional teams to understand business needs and deliver data-driven solutions. May participate in optimizing data pipelines, queries, and processes to improve performance and efficiency. Ensure data quality and integrity throughout the data lifecycle. Knowledge API exposure and consumption over Dataiku/Python is preferred if possible. Stay updated with the latest developments in data science technologies and best practices. Qualifications: Bachelor’s degree in Data Science, Statistics, Mathematics, or a related field. 3+ years of experience in data analysis or data science in the telecommunications industry. Knowledge of CRISP-DM methodology. Skills: Proficiency in SQL, Python is a must while cloudera and MLOps frameworks is a plus. Strong statistical analysis and modeling skills. Experience with big data technologies (Hadoop, Cloudera, Spark). Knowledge in Geospatial and GIS data analysis and visualization and dealing with GIS files (KQL/KML). Familiarity of REST API development which is preferred to be done on Dataiku RAG/LLM knowledge NLP and Classical Machine Learning Knowledge Preferred Qualifications: Proficiency or Certification in Dataiku. Local GCC experience, preferably Saudi projects. Experience in the telecommunications industry.


Location
Riyadh Saudi Arabia
Show Map

Workable
2,033listings

You may also like

Tamkeen Technologies
Sr. Cybersecurity Engineer
Riyadh Saudi Arabia
Key Responsibilities: Administer and maintain Identity and Access Management (IAM) and Privileged Access Management (PAM) platforms to ensure high availability, performance, and reliability. Design and enforce identity lifecycle processes including onboarding, offboarding, and role-based access modifications. Manage access provisioning, de-provisioning, and conduct regular access reviews for users, applications, and systems. Monitor and govern privileged account activities, applying best practices for privilege escalation, session monitoring, and credential management. Ensure compliance with internal access policies and support external and internal audit requirements. Optimize detection rules, policies, and automation workflows to enhance operational efficiency. Troubleshoot and resolve access-related incidents in collaboration with IT and application support teams. Maintain up-to-date documentation for IAM/PAM architectures, configurations, policies, and operational procedures. Support the integration of IAM/PAM systems across hybrid environments including on-premise and cloud platforms. Collaborate with security architects and GRC (Governance, Risk, and Compliance) teams to improve the overall security posture. Work alongside other cybersecurity teams (e.g., Threat Intelligence, Incident Response, Red Team) to strengthen detection and response mechanisms. Requirements: Bachelor’s degree in Information Security, Computer Science, or a related technical field. 3–5 years of hands-on experience in IAM and/or PAM-focused roles. Strong expertise in IAM platforms such as SailPoint. Practical experience with PAM tools like BeyondTrust. Knowledge of SSO, MFA, RBAC, Zero Trust, and access governance frameworks. Familiarity with compliance standards such as ISO 27001, NIST, NCA ECC, and GDPR. Strong skills in analysis, troubleshooting, and documentation. Professional certifications in SailPoint or BeyondTrust are highly desirable.
Specialized Technical Services – STS
Cybersecurity Auditor (KSA National)
Riyadh Saudi Arabia
Our Culture: At Zaintech we are proud of our culture and how it drives everything we do. We are looking for individuals who share our values and want to be part of a unique and engaging culture that revolves around collaboration and innovation. If you are looking for a role where you can drive engagement and excellence across teams through commitment and collaboration, and are someone who is customer-centric and appreciates an organization with uncompromised integrity that focuses on employee engagement then read on to learn more about how you can become part of the Zaintech family. Our Code of Conduct: At Zaintech we strictly adhere to our code of conduct, which is there to serve as a moral compass, offering a framework for responsible behaviours and enabling ethical choices that cultivate positive relationships and a better future. It also outlines policies, standards, and procedures for our global operations, promoting integrity and ethical excellence across the countries we engage with. Every year, all employees are required to review, comprehend, confirm, and adhere to the code of conduct. Additionally, all newly hired employees are subject to the same as part of their onboarding process. Role Summary: Designs, performs and manages cybersecurity audits to assess an organization’s compliance with applicable requirements, policies, standards and controls. Prepares audit reports and communicates them to authorized parties. Duties and Responsibilities: Maintain a deployable cyber defense audit toolkit based on industry best practice to support cyber defense audits. · Perform system administration on specialized cybersecurity applications and systems. Perform risk analysis whenever an application or system undergoes a major change. · Prepare cybersecurity assessment and audit reports that identify technical and procedural findings, and include recommended remediation strategies and solutions. Track audit findings and recommendations to ensure that appropriate mitigation actions are taken. · Effectively manage vulnerability remediation. · Ensure an audit log of evidence of security measures is maintained. · Review, conduct, or participate in audits of cyber programs and projects. Maintain knowledge of applicable cybersecurity defense policies, regulations and compliance documents as they pertain to cybersecurity defense auditing. Carry out an audit of application software/network/system security against documented cybersecurity policies and provide recommendations for remediation where gaps appear. Develop cybersecurity compliance processes and audits for services provided by third parties. Regularly review and ensure that cybersecurity policies and related documentation are aligned with the organization's stated business objectives and strategy. Ensure that security design and cybersecurity development activities are appropriately documented. Ensure that cybersecurity audits test all relevant aspects of the organization's infrastructure and policy compliance. Develop processes with any external auditors on information sharing in a secure manner. Requirements Skills Skill in applying core cybersecurity principles. Skill in determining the normal operational state for security systems and how that state is affected by change. Skill in effectively recognizing and categorizing types of vulnerabilities and associated attacks. Skill in conducting cybersecurity audits or reviews of technical systems. Skill in designing appropriate cybersecurity test plans. Skill in assessing security controls based on cybersecurity principles and tenets. Skill in using security event correlation tools effectively. Skill in using code analysis tools effectively. Skill in effectively performing root cause analysis for cybersecurity issues. Skill in effectively preparing and presenting briefings in a clear and concise manner. Skill in utilizing feedback to improve cybersecurity processes, products and services. Skill in determining the security control requirements of information systems and networks. Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance as necessary. Skill in applying appropriate cybersecurity controls. Skill in identifying test and evaluation infrastructure requirements. Skill in communicating with customers. Skill in managing test assets and resources to ensure effective completion of test events. Skill in preparing test and evaluation reports. · Skill in reviewing logs to identify evidence of intrusions and other suspicious behavior. Skill in troubleshooting and diagnosing cybersecurity defense infrastructure anomalies and determining the root cause. Skill in using HR IT systems. Skill in conducting cybersecurity reviews of systems. Skill in understanding network systems management principles, models, methods and tools. Needed Knowledge: Knowledge of network components, their operation and appropriate network security controls and methods. Knowledge and understanding of risk assessment, mitigation and management methods. Knowledge of relevant cybersecurity aspects of legislative and regulatory requirements, relating to ethics and privacy. · Knowledge of the principles of cybersecurity and privacy Knowledge of cybersecurity related threats and vulnerabilities. Knowledge of the likely operational impact on an organization of cybersecurity breaches. Knowledge of cybersecurity authentication, authorization and access control methods. Knowledge of business practices within organizations. Knowledge of cybersecurity defense and vulnerability assessment tools and their capabilities. Knowledge of cybersecurity aspects of business continuity and disaster recovery planning and including testing. Knowledge of the organization's enterprise cybersecurity architecture. Knowledge of cybersecurity assessment and authorization processes. Knowledge of cybersecurity and privacy principles and organizational requirements. Knowledge of IT security principles and methods. Knowledge of all aspects of system lifecycle management. Knowledge of the national cybersecurity regulations and requirements relevant to the organization. Knowledge of the organization's core business processes and how cybersecurity affects them. Knowledge of organizational process improvement concepts and process maturity models. Knowledge of an organization's cybersecurity data classification requirement. Knowledge of the principal methods, procedures and techniques for gathering, producing, reporting and sharing cybersecurity information. · Knowledge of the organization's evaluation and validation requirements in relation to cybersecurity risk management. Knowledge of the organization's local and wide area network connections and the risks they pose to its cybersecurity. Knowledge of best practices for reviewing and determining the suitability of technology solutions to meet cybersecurity requirements. Knowledge of all-source reporting and appropriate dissemination procedures. Knowledge of best practice auditing and logging procedures. Knowledge of formats and best practice for issuing cybersecurity compliance reports to external partners. Knowledge of the organization's formats for management and compliance reporting relating to cybersecurity risks, readiness and progress against plans. Knowledge of national and organizational document and information classification and marking standards, policies and procedures.
Squadio
Media Buyer
Riyadh Saudi Arabia
Description Squadio is a Global Remote-first IT service provider headquartered in Riyadh KSA with Delivery Centers in Egypt and KSA. Our distributed teams are located in Tunisia, Egypt, KSA, Palestine, Nigeria & India. We were founded in 2011 in Riyadh, KSA, as an app development company (previously Ibtikar technologies) successfully pivoted our model to support the growing need of startups and companies seeking to hire and manage their own engineering team remotely with engineers vetted by Squadio's talent community. About the Role: We are seeking for an exceptional a Media Buyer is an advertising professional responsible for leading the advertising efforts, negotiating and purchasing ad space and time to effectively reach target audiences. They analyze target demographics, develop media buying strategies, negotiate rates with media outlets, and optimize budgets to maximize ad exposure. Responsibilities: Help identify target audiences and plan media campaigns Create and manage paid ads Analyze data and reports Monitor budget and manage costs Provide a weekly performance report for each campaign across all platforms Optimize plans and budgets according to the best media mix Experiment with new platforms and channels Monitor costs and return on investment (ROI) Requirements Requirements and skills Proven not less than 3 years of experience as Media Buyer or similar role; experience in digital media is preferred Familiarity with the Saudi advertising market with media-buying, planning and research. Interest in following advertising and media trends Working knowledge of media analytics software (e.g. comScore) Excellent communication and negotiation skills Organizational and multitasking abilities Attention to detail Critical thinking skills
SWATX
Organisational Applications Manager
Riyadh Saudi Arabia
SWATX is looking for an experienced Organisational Applications Manager to lead our applications management team. In this critical role, you will oversee the planning, implementation, and management of enterprise applications that support the organization's operational needs. You will work closely with cross-functional teams to identify requirements, optimize application functionality, and ensure seamless integration across systems. Your strategic vision and leadership will be essential in driving the adoption of technology solutions that enhance productivity and improve business processes. This position requires a blend of technical expertise, managerial skills, and a commitment to delivering high-quality application services. Requirements Bachelor's degree in Information Technology, Computer Science, Business Administration, or a related field; Master's degree preferred. 5+ years of experience in applications management, with a focus on enterprise solutions. Strong understanding of business processes and the ability to align applications with organizational goals. Proven experience in leading and managing teams, with excellent leadership and interpersonal skills. Experience with enterprise application architecture and management tools. Familiarity with Agile methodologies and project management best practices. Strong analytical and problem-solving skills, with a strategic mindset. Excellent communication skills, with the ability to present technical concepts to non-technical stakeholders. Knowledge of industry trends and emerging technologies, particularly in applications management.
Cookie
Cookie Settings
© 2025 Servanan International Pte. Ltd.