About Company
Embark on a critical mission with Career.zycto, a leading innovator dedicated to fortifying digital infrastructures against evolving threats. We provide an unparalleled platform for IT Security Analysts to hone their expertise, delivering impactful security solutions in a collaborative and forward-thinking environment. If you’re passionate about safeguarding data and systems while growing your career in Al Zahya, you’ll discover a vibrant culture that values proactive defense and continuous learning. We champion innovation, ensuring our operations remain robust and resilient.
Advertisement
Job Description
As a dedicated IT Security Analyst at Career.zycto, you will be an indispensable member of our dynamic cybersecurity team, working from our Al Zahya office. Your primary mission will be to safeguard our extensive digital assets, critical infrastructure, and sensitive data against the relentlessly evolving landscape of cyber threats. We are actively seeking a vigilant, proactive, and technically adept professional who possesses a deep commitment to security excellence. In this pivotal role, you will be instrumental in monitoring our sophisticated security systems for any anomalies, detecting potential threats swiftly, analyzing intricate security incidents, and orchestrating rapid, effective responses to alerts. Your expertise will be absolutely vital in maintaining the integrity, confidentiality, and constant availability of our complex information systems. This position demands not only a keen eye for detail and a profound understanding of security principles but also the invaluable ability to operate effectively and calmly under pressure when critical situations arise. You will play a key role in the continuous development and meticulous implementation of robust security measures, conducting thorough vulnerability assessments, and diligently ensuring our compliance with stringent industry best practices and all relevant regulatory requirements. Our ideal candidate is not just passionate about cybersecurity but is also profoundly committed to continuous learning, always seeking to expand their knowledge. Furthermore, a strong analytical mindset to proactively identify potential risks before they can even materialize is paramount. Join us in Al Zahya and contribute significantly to building a resilient and secure foundation for Career.zycto’s innovative ventures in the digital realm.
Key Responsibilities
- Proactive Threat Monitoring & Incident Response: Continuously monitor security information and event management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), and other security tools for indicators of compromise and unusual activity. Lead the rapid response to security incidents, including investigation, containment, eradication, recovery, and post-incident analysis.
- Vulnerability Management & Penetration Testing: Systematically conduct vulnerability assessments and coordinate penetration testing activities to identify security weaknesses across networks, applications, and systems. Work closely with development and operations teams to prioritize and remediate identified vulnerabilities.
- Security Control Implementation & Management: Implement, configure, and manage a wide array of security controls, including firewalls, web application firewalls (WAF), endpoint detection and response (EDR) solutions, data loss prevention (DLP) systems, and identity and access management (IAM) platforms.
- Policy, Procedure & Compliance Enforcement: Develop, update, and rigorously enforce security policies, procedures, and guidelines that align with global industry standards (e.g., ISO 27001, NIST, GDPR) and local regulatory requirements, ensuring continuous compliance.
- Security Architecture Review & Consultation: Provide expert security consultation and review for new projects, system changes, and architectural designs, ensuring security-by-design principles are integrated from conception.
- Security Awareness & Training: Design and deliver engaging security awareness training programs for all employees, fostering a strong, security-conscious culture throughout the organization.
- Technology Evaluation & Recommendation: Research, evaluate, and recommend cutting-edge security technologies and solutions to continually enhance our overall security posture and adapt to emerging threats.
- Forensic Analysis & Reporting: Conduct detailed forensic investigations into security breaches, perform root cause analysis, and prepare comprehensive reports for management, outlining findings and recommended preventative measures.
- Collaboration & Documentation: Work collaboratively with cross-functional IT, development, and business teams. Maintain meticulous documentation of security configurations, incident response playbooks, and remediation efforts.
- Continuous Improvement: Stay abreast of the latest cybersecurity threats, trends, best practices, and technological advancements to continually evolve and strengthen our defense strategies against sophisticated attacks.
Required Skills
- Proficiency with SIEM platforms (e.g., Splunk, IBM QRadar, Microsoft Sentinel)
- Strong understanding of network security principles (TCP/IP, firewalls, IDS/IPS, VPNs)
- Experience with vulnerability management tools (e.g., Nessus, Qualys, OpenVAS)
- Demonstrated ability in incident response, containment, eradication, and recovery
- Familiarity with common security frameworks (e.g., ISO 27001, NIST CSF)
- Knowledge of operating system security (Windows, Linux) and cloud security concepts
- Scripting skills (e.g., Python, PowerShell) for automation and analysis
- Excellent analytical, problem-solving, and critical thinking abilities
- Strong verbal and written communication skills for technical and non-technical audiences
- Ability to work independently and as part of a collaborative team in a fast-paced environment
Preferred Qualifications
- Security certifications such as CompTIA Security+, CEH, CySA+, or CISSP
- Experience with endpoint detection and response (EDR) and data loss prevention (DLP) solutions
- Practical experience in conducting penetration testing or red team exercises
- Knowledge of cloud security platforms (e.g., AWS, Azure, GCP)
- Bachelor's or Master's degree in Computer Science, Information Technology, Cybersecurity, or a related field
- Experience with Security Orchestration, Automation, and Response (SOAR) tools
Perks & Benefits
- Competitive salary package
- Comprehensive health and wellness benefits
- Opportunities for professional development and continuous learning
- Generous paid time off and public holidays
- Modern and collaborative on-site work environment
- Contribution to cutting-edge cybersecurity projects
- Dynamic and supportive company culture
How to Apply
Interested candidates are encouraged to click on the application link below to submit their resume and cover letter directly. Please ensure your application highlights your relevant experience and why you are a great fit for Career.zycto’s cybersecurity team.
Advertisement
