Submitting more applications increases your chances of landing a job.
Here’s how busy the average job seeker was last month:
Opportunities viewed
Applications submitted
Keep exploring and applying to maximize your chances!
Looking for employers with a proven track record of hiring women?
Click here to explore opportunities now!You are invited to participate in a survey designed to help researchers understand how best to match workers to the types of jobs they are searching for
Would You Be Likely to Participate?
If selected, we will contact you via email with further instructions and details about your participation.
You will receive a $7 payout for answering the survey.
What you will do:
- Manage and deliver OT/ICS cybersecurity projects across the full lifecycle — scoping, assessment, architecture design, implementation, and close-out.
- Act as the primary point of contact for client project teams, building strong working relationships with OT managers, control system engineers, and IT security leads.
- Conduct and oversee OT risk and vulnerability assessments, ICS network reviews, and compliance gap analyses against IEC 62443 and NCA OT-CCC standards.
- Design and document OT security architectures — including network segmentation, DMZ designs, secure remote access, and asset inventory frameworks.
- Lead teams of analysts and consultants on engagements, providing technical direction, quality assurance, and mentorship.
- Contribute to proposals and business development efforts — supporting senior leadership in shaping solutions, writing bid content, and presenting to clients.
- Stay current on OT threat intelligence, emerging vulnerabilities, and regulatory developments in KSA and the wider GCC.
You'll no longer be considered for this role and your application will be removed from the employer's inbox.