ibhate
ibhate
This post is old, you can browse Saudi Arabia new jobs

Security Operations Manager

Join over 1k people and receive free job offers in your inbox

Summary

Lead the establishment of a security operations function with ENOWA.

Key Accountabilities And Activities

The successful candidate will:

  • Operationalize a number of security solutions in support of ENOWA’s infrastructure across IT/OT/IoT whether it is on-prem or on the cloud.
  • Manage the development efforts of ENOWA’s security operations center from the design phase to the delivery and operation of the SOC.
  • Lead security operations team across Incident Response, Threat Intelligence, Threat Hunting, Vulnerability Management, Network Security Management, Security Application Management, Endpoint Security Management.
  • Manage service levels across areas of responsibility and serve as the main point of contact for security managed services and outsourced technical capabilities.
  • Ensure development, maintenance, and adherence to operations runbooks.
  • Manage high level investigations, escalate to major incident processes as required.
  • Lead teams to determine root cause of security incidents and recommend remediation actions.
  • Serve as escalation for ENOWA stakeholders to resolve issues and problems with advanced cyber security tools.
  • Manage creation, updates, and review of cyber security reports/metrics.
  • Identify and track improvement opportunities (ex: use cases, problem management, incident/trouble ticket analysis).
  • Manage processes of the Threat Intelligence, VM, I&AM, monitoring processes. Interaction with partners and stakeholders.
  • Ensures the processes under Security Operations are correctly managed.
  • Takes corrective actions when a defined operations process is not yielding desired results.
  • Takes an active role in leading level 1 security incident resolution, including their identification, triage, analysis, processing, escalation to their final resolution and lessons learnt.
  • Reports on operational results.

Experience

Knowledge, Skills and Experience

  • 10+ years experience leading information security of information technology operations teams.
  • 6+ years experience with cyber security tools such as SIEM, IDS/LPS, firewalls, and endpoint protection.
  • 3+ years experience as sysadmin of enterprise systems with demonstrated ability to review system logs for troubleshooting or security purposes.
  • Solid understanding of threat intelligence practices and threat hunting.
  • Ability to communicate complex technical messages in writing, presentation or directly in meetings.
  • Good technical and security operations skills.
  • Thorough understanding of the assessment processes, the results that can be obtained and their reliability.
  • Able to classify and prioritize risks and identify remediation options.
  • Stakeholder and expectation management experience.

Skills

  • Excellent analytical, planning, organizational and technical skills.
  • Adaptability and willingness to learn new skills, technologies, and frameworks.
  • Ability to communicate security-related concepts to a broad range of technical and non-technical staff in an intelligent, articulate, and persuasive manner.
  • Demonstrated ability to breakdown and communicate complex technical problems/solutions to various stakeholders verbally and in writing.
  • Strong technical, leadership, facilitative, and collaboration skills, organizational and time management skills, communication (verbal and written) and interpersonal skills.
  • Excellent written and verbal communication skills.
  • Flexibility to work in a relatively unstructured environment of a start-up, both individually and as part of a team.
  • Strong inter-personal and communication skills.

Qualifications

  • Bachelor’s degree in Computer Science or related field.
  • Master’s degree in cybersecurity, or related field is a plus.
  • Holds certifications such as: CISSP, GCFA, EnCE, CISM, CRISC, CISA, GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Handler (GCIH), Certified Ethical Hacker (CEH).
  • Knowledge of Saudi Arabia's NCA, NDMO and HCIS requirements and their implementation.
  • Up to date on current cybersecurity trends, threat landscape and security solutions.

geo

in Saudi Arabia , Tabuk city

number of positions

1 Jobs available, apply now

job type

FULL TIME

experience years

undefined






×
×
why ?

register on website    

join us

are you ?

   
   

what is your full name ?

what is your email ?

set a password

repeat the password


account created

log in
sent