123-456-7878
Email is protected
and incident management processes of SOC, as well as internal security incidents evaluation and response following the event...
Job Purpose Contributes to the execution of the 24x7 security event management procedures in SOC, and assists to the... intelligence and authoring of security advisory articles to prevent zero-day attacks or increase OBRELA’s customers awareness...
Company Description IT Security C&T is an innovative, fast-growing security consulting and training company.... Our management team combined with our consultants and engineers work together to deliver comprehensive security solutions...
Company Description IT Security C&T is an innovative, fast-growing security consulting and training company.... Our management team combined with our consultants and engineers work together to deliver comprehensive security solutions...
Security Manager Job Location : Riyadh Requirements : At least 5 years of experience in the same field Pre...
management is preferred. * CISSP, C|CISO, CISA, or CISM is a must. * 10+ years of experience in cyber security managem.... CISSP, C|CISO, CISA, or CISM is a must. 10+ years of experience in cyber security management, budgeting, leadership...
experience in cyber security including implementation experience with security vendors. * Experience of cyber security pr... Job Description : Bachelor's degree in computer engineering or equivalent education 10+ years of technical industry experience in cyber security...
, justification, implementation and operation of information security controls and management strategies to maintain the..., justification, implementation and operation of information security controls and management strategies to maintain the...
Security Forensics. * Certified in GIAC Certified Forensic Examiner (GCFE) / GIAC Certified Forensic Analyst (GCFA) / GIAC Net... Job Description : Bachelor's degree in computer engineering or equivalent education. At least 7 years in Cyber Security Forensics. Certified in...
Job Description : * Develop the enterprise cyber security architecture. * Develop enterprise cyber security... architecture guidelines and recommendations. * Align the business requirements with technical cyber security solutions...