Correlate incident data to identify vulnerabilities.
Use cybersecurity products and security control technologies to reduce identified risk to an acceptable level.
Document and escalate incidents that may cause immediate or ongoing impact.
Analyse and report cyber defense trends.
Perform cybersecurity reviews and identify security gaps in security architecture to inform risk mitigation strategies.
Provide timely detection, identification and alerting of possible attacks, anomalous activities and misuse activities and distinguish them from benign activities.
Use cyber defense tools to monitor and analyse system activity continuously to identify malicious activity.
Analyse malicious activity to determine vulnerabilities exploited, exploitation methods and effects on system and information.
Recommend vulnerability corrections for the environment.
Identify indications and warnings through research, analysis, and correlation across multiple data sets.
Assess the adequacy of access controls against organizational policies.
Monitor external data sources to keep understanding of currency of cybersecurity threats up to date and determine which security issues may have an impact on the organization.
Assess and monitor the cybersecurity of the organization's system implementation and testing practices.
Make cybersecurity recommendations to leadership based on significant threats and vulnerabilities.
Work with stakeholders to resolve cybersecurity incidents and vulnerability compliance issues.
Characterize and analyse network traffic to identify anomalous activity and potential threats to network resources.
Coordinate with other cybersecurity staff to validate network alerts.
Provide summary reports of network events and other cybersecurity-relevant activities in line with organizational policies and requirements.
#J-18808-Ljbffr
Cybersecurity Manager • Jeddah, Saudi Arabia