The Saudi Tadawul Group was established in March 2021, following the transformation of the Saudi Stock Exchange (Tadawul) into a Holding Group structure. It is the parent company with a portfolio of four subsidiaries, which operate independently while benefitting from the integration and synergies between one another.
The subsidiaries include: The Saudi Exchange, a dedicated stock exchange business, the Securities Clearing Center Company (Muqassa), the Securities Depository Center Company (Edaa) and Wamid – a new innovative applied technology services business, focused on providing innovation and nascent technologies to the capital markets industry through pragmatic innovation.
The Group aims to advance the Saudi capital market’s infrastructure in line with global best practices, while reinforcing Saudi Arabia’s position as an emerging market leader, a technologically advanced and attractive global investment destination and the gateway to the MENA region.
It looks to support with the successful delivery of Saudi Arabia’s Financial Sector Development Program (FSDP) objectives, as part of Vision 2030, to boost economic growth and diversify the economy.
Job Purpose:
Identifies, analyzes, monitors, mitigates and manages threats and vulnerabilities to IT systems and networks. Uses defensive measures and multi-source information to report events and respond to incidents
Key Accountabilities
Daily Operations:
Follow daily operations relating to their own job to ensure work continuity
Contribute to preparing timely and accurate reports that concern the Department’s line of work to meet the requirements, objectives, and standards of the Exchange and the department
Ensure the satisfaction of both internal and external customers by addressing their needs in a courteous and timely manner
Cybersecurity Operations Key Accountabilities:
Ensure identity access management implementations follow organization's standards and policies
Review and process firewall access requests according to the organization’s policies and related documentation.
Analyze log files from multiple sources to identify possible threats to network security
Analyze network traffic to identify anomalous activity and potential threats to network resources
Manage the cybersecurity operations system .
Identify and review the security gaps.
Provide timely detection, identification and alerting of possible attacks, anomalous activities and misuse activities and distinguish them from benign activities
Monitor the cybersecurity operations systems and analyze system activity continuously to identify malicious activity.
Isolate and remove malware from infected assets.
Monitor cyber threat intelligence feeds and report significant network events and intrusions.
Manage the organization's cyber threat intelligence sources and feeds
Report suspected cyber incidents in line with the organization's cyber incident response plan
Work with stakeholders to resolve cybersecurity incidents.
Governance and Resilience:
Follow all relevant policies, procedures, and processes in order for the work to be carried out in a controlled and consistent manner
Contribute to the identification of opportunities for continuous improvement of processes and practices, work processes, cost effectiveness, and productivity enhancement
Promote to other employees within the organization the implementation and adherence to policies, procedures, processes, and instructions
Job Requirements:
Education:
A bachelor’s degree in Information Technology, Computer Science, or equivalent is required
Qualification:
Certified Information Systems Security Professional certificate or equivalent is preferred
Experience:
+ 3 years of experience in Information Security Monitoring is required