- Review cybersecurity policies and processes to ensure that all security controls are implemented and managed to keep company assets safe .
- Ensure the compliance with SAMA's cybersecurity framework to reach the required security maturity level.
- Performing cybersecurity reviews periodically to ensure prevention of unauthorized access to the company's assets.
- Anticipate any new threats and work to prevent them from happening.
- Conducting vulnerability assessment periodically against organization’s assets in order to implement the needed security controls.
- Identify and manage cybersecurity risks to address them and reduce the likelihood of their occurrence
- Work with other executives across different departments to ensure that security procedures are implemented within the organization’s systems.
- Apply cybersecurity policies to the company's technical systems to protect them
- Conducting cybersecurity awareness campaigns to increase the employee’s knowledge and alertness in various cybersecurity risks
- Performing any other tasks requested by the CISO
- Ensure that implementation of secure and restricted logical access to information and technology assets
- Use the SIEM tool / dashboard and reports along with other monitoring / admin tools to continuously monitor the security status of the system and compliance with certification requirements.
- Perform system and network forensics analysis of suspected or potential security incidents
- Manage Vendor’s Services
- Support preventing critical applications, data and systems from unauthorized access, by supervising the implementation by the related departments.
- Support in processing all approval requests related to PAM
Prepare the design and documentation of IAM integration solutions for an optimized IAM environment
- Design IAM controls in support of the Governance and Compliance team to mitigate future threats unauthorized access
- Create and maintain new relevant documentation to include, but not limited to, Standard Operating Procedures, project change control methodologies, and architectural diagrams for IAM solutions
- Manage security solutions such as DLP, EDR, AV, ICT, NAC, Patch management.
- Ensure that implementation of secure and restricted logical access to information and technology assets