IT Security Engineer
Skills
About This Role
Overview
The Cybersecurity function sets security standards, monitors compliance, and reports to governance.
The Technology department owns and operates the infrastructure those standards apply to.
This role bridges the two — executing security controls on production and corporate infrastructure under the direction of Technology, with priorities aligned to security posture improvement and SAMA CSF requirements.
This is a hands-on technical role, not a policy or advisory position.
Vulnerability & Patch Remediation
- Own technical remediation of infrastructure vulnerabilities across Windows, Linux, and network platforms.
- Track Critical and High findings to closure within remediation SLAs.
- Coordinate patching windows with SRE, application, and business owners.
Infrastructure Security Operations
- Apply and maintain hardening baselines for servers, endpoints, network devices, and cloud workloads.
- Maintain EDR, MDM, and DLP coverage across all in-scope assets — identify and close gaps.
- Remediate security gaps across server, endpoint, network, and cloud surfaces.
SOC / MDR Case Remediation
- Investigate SOC and MDR cases that require action on infrastructure.
- Determine root cause on the affected asset (server, endpoint, network, cloud).
- Apply technical fixes and close remediation actions in coordination with the SOC / MDR partner.
PAM & Privileged Access Implementation
- Onboard privileged accounts into the enterprise PAM platform.
- Remediate privileged access gaps across infrastructure (shared accounts, standing access, weak credential handling).
- Support secure administrative access practices for SRE, DBAs, and infrastructure operators.
Cloud Security Operations
- Operate Oracle Cloud Infrastructure (OCI) security controls — IAM policy, network security lists, security zones.
- Review and remediate OCI Cloud Guard findings on a continuous basis.
- Support secure cloud configuration during build and change activities.
Backup & Restore Security
- Own technical security controls on backup and restore infrastructure — access control, encryption, immutability, and segmentation across backup and recovery paths.
- Validate hardening of backup repositories and restore targets, and verify restored systems return to baseline before release.
- Execute security validation during restore-testing exercises — verify backup integrity, detect tampering, and confirm recovered systems are safe to return to service.
- This role does not own BCP, DR strategy, RTO/RPO, or backup operations.
Assist Responsibilities
The following responsibilities have a primary owner outside Technology.
This role supports execution where infrastructure access or change is required — it does not own the governance, process, or business decision.
Change Management
- Raise security-related change requests in the ITSM system.
- Attach security impact assessments, test results, and rollback evidence.
- Support emergency changes when a security incident requires accelerated execution.
- Not the Change Manager.
User Access Reviews
- Extract access reports from infrastructure (AD, cloud, PAM, network devices).
- Implement approved access removals or modifications.
- Provide evidence of completion to the review owner.
- Not the owner of the review process or business sign-off.
- Segregation of Duties
- Implement approved technical remediation on infrastructure.
- Support investigation of suspected violations on infrastructure assets.
- Not the owner of SoD governance or policy.
MDM Compliance
- Identify non-compliant or unenrolled devices.
- Coordinate enrollment and remediation with IT Support (primary owner).
- Not the owner of endpoint support or device lifecycle.
Application Security Remediation
- Support remediation only when the fix requires infrastructure, IAM, network, cloud, or server changes.
- Not the owner of code remediation.
Your resume, rewritten
for this exact role.
Sign up free — Base Career tailors your CV to this job description in 60 seconds.
01 / 05
Resume Tailored to This Job

Your keywords, structure, and story — rewritten to match this exact role and pass ATS filters.
Free · No card · 60 seconds
02 / 05
Cover Letter for This Role, Done

Job-specific cover letters written in Gulf professional tone — ready in seconds, not hours.
Free · No card · 60 seconds
03 / 05
See How Well You Fit This Role

AI match score with clear reasons — know your fit before investing time in the application.
Free · No card · 60 seconds
04 / 05
Apply in One Click

Autofill any application form on Workday, LinkedIn, Bayt, Greenhouse — with your tailored content.
Free · No card · 60 seconds
05 / 05
Track It. Follow Up at the Right Time.

Visual pipeline for every application with AI-timed follow-up reminders so nothing slips.
Free · No card · 60 seconds
Similar Jobs
Senior Specialist - IT Security Operations
Qiddiya Investment Company · Riyadh
Oversee day-to-day IT security operations across organization Monitor the health and effectiveness of security controls and drive continuous improvements. Manage and oversee inc...
Skills
Yesterday
Apply Now↗Apply Now ↗Senior Specialist - IT Security Operations
Qiddiya | القدية · Riyadh
We are seeking a highly skilled Senior Specialist - IT Security Operations to oversee and ensure the effectiveness of security operations across enterprise and asset environments. This role plays a critical part in maint
Skills
2 days ago
Apply Now↗Apply Now ↗Senior Specialist - IT Security Operations
Qiddiya Investment Company · الرياض
We are seeking a highly skilled Senior Specialist – IT Security Operations to oversee and ensure the effectiveness of security operations across enterprise and asset environments. This role plays a critical part in maint
Skills
2 days ago
Apply Now↗Apply Now ↗IT Security Engineer
SiFi · Riyadh
About SiFi SiFi is a Saudi B2B fintech licensed by the Saudi Central Bank (SAMA), delivering wallet, disbursement, and payment services to enterprises across the Kingdom on Oracle Cloud Infrastructure. Our cybersecurity
Skills
4 days ago
Apply Now↗Apply Now ↗IT Security Operations Manager
Infinite PL · Riyadh
Lead IT security operations, ensuring protection of IT systems and infrastructure, managing incidents, and coordinating with teams while demonstrating strong leadership skills.
Skills
3 weeks ago
Apply Now↗Apply Now ↗Senior IT Security Specialist
Infinite PL · Riyadh
Support IT security operations by implementing controls, managing access, conducting reviews, and ensuring compliance across systems and applications.
Skills
3 weeks ago
Apply Now↗Apply Now ↗Senior IT Security Specialist
Infinite pl · الرياض
Infinite pl is a digital-led tech firm driven to become a digital logistics pioneer by harnessing the power of people, data, and platforms. We are enabled through in-house, external, network, and investment capabilities
Skills
3 weeks ago
Apply Now↗Apply Now ↗IT Security Operations Manager
Infinite pl · Riyadh
Infinite pl is a digital-led tech firm driven to become a digital logistics pioneer by harnessing the power of people, data, and platforms. We are enabled through in-house, external, network, and investment capabilities
Skills
3 weeks ago
Apply Now↗Apply Now ↗IT Security Operations Manager
Infinite pl · الرياض
Infinite pl is a digital-led tech firm driven to become a digital logistics pioneer by harnessing the power of people, data, and platforms. We are enabled through in-house, external, network, and investment capabilities
Skills
3 weeks ago
Apply Now↗Apply Now ↗2.2K+
Cover Letters & Follow-ups
1.8K+
Resumes Tailored
190.5K+
Jobs Tracked
Trusted by professionals at
Stop applying blindly.
Start getting hired.
Base Career automates the hardest parts of job searching — apply smarter, not harder.
AI Resume in 60s
Your resume rewritten for this exact role using the job description as the brief.
ATS-Optimized
Get past automated screening filters with the right keywords matched to each job.
Application Tracker
Track every job, follow-up, and interview in one visual kanban board.
Free plan · No credit card required