Company Overview:
Advanced technology and cybersecurity company (sirar) established by stc, the region's ICT and digital services provider, sirar by stc is a cutting-edge cybersecurity provider that empowers organization to take control of their cyber capabilities and digital environments.
As experts in business security and privacy.
We offer a comprehensive range of solutions that help you to operate online safely, securely, and efficiently. The tools we provide help organizations detect and prevent cybersecurity attacks, safeguard their digital future, and provide protection and security from that point forward.
Key Responsibilities:
- Supports in using security testing and code scanning tools to conduct code reviews.
- Carries out vulnerability scanning on systems and assets.
- Conducts required reviews, including reviews of defensive measures, according to the organization's policies.
- Conducts or support authorized penetration testing of infrastructure and assets.
- Maintains knowledge of applicable cybersecurity defense policies, regulations, and compliance documents as they pertain to cybersecurity defense auditing.
- Conduct or support authorized penetration testing of web and mobile application.
- Correlate incident data to identify vulnerabilities.
- Analyzes organization's cybersecurity defense policies and configurations to evaluate compliance with regulations and organizational directives.
- Tests for vulnerabilities in web applications, client applications and standard applications.
- Conducts physical security assessments of servers, systems, and network devices.
- Explains business impact of vulnerabilities identified through testing to make case for addressing them.
- Presents test findings, risks, and conclusions to technical and non-technical audiences.
Qualifications:
Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related discipline.
Years of Experience:
- 1-3 years in relevant experience.
Skills:
- Intermediate proficiency in conducting vulnerability scans and determine vulnerabilities from the results.
- Basic proficiency in conducting penetration testing in line with the organization's policies and best practice.
- Basic proficiency in developing insights about an organization's threat environment.
- Intermediate proficiency in analyzing vulnerability and configuration data to identify cybersecurity issues
- Intermediate proficiency in mimicking threat behaviors.