Lead Specialist - InfoSec Ops Management

Date: 10 Jun 2025

Location: Riyadh, Al Riyadh, SA, 123456

Company: G Forty Two General Trading LLC

Job Purpose

“Lead Specialist – InfoSec Ops Management” plays a vital role in protecting information assets and maintaining a secure environment.

Organizational Security and Compliance: Lead Specialist leads the internal team and client engagements to ensure the security and compliance of the organization’s information systems. Responsible for assessing risks, implementing security controls, and monitoring for vulnerabilities to safeguard sensitive data.

Cybersecurity Technology Management, Security Incident and Vulnerability Remediation Management: Lead Specialist plays a crucial role in managing the cybersecurity products for the internal and external clients, remediation of security incidents and security vulnerabilities in the client infrastructures. Responsible for collaborating with the stakeholders and teams to enhance security practices and maintain a robust security posture.

 

Job Responsibilities

PRIMARY RESPONSIBILITIES

  • Lead the cybersecurity technology operations management practice, providing guidance, mentorship, and support to junior resources as and when required.
  • Lead the client operations and client services deliverables and manage the team provisioning services to the respective clients.
  • Lead the cross-functional team collaborations related to InfoSec Ops and Cybersecurity technology operations management practice.
  • Manage day-to-day Information Security operations, ensuring the efficient and effective delivery of security services to the internal organization and the clients.
  • Work with Technical teams and Business Units across the organization as a reference point for overall Cybersecurity technology operations and Cloud Security operations management, offering advice, support, and guidance on the wide range of security issues pertaining to various cybersecurity projects.
  • Carry out Vulnerability Assessment on the deployed Cloud Infrastructure (and IT infrastructure, as required), report the vulnerabilities based on the Vulnerability and Risk Management framework, and track through resolution and revalidation.
  • Conduct Security Testing and Vulnerability Assessments over Cloud infrastructure and applications to identify existing vulnerabilities, prepare a report with remediation plans, and follow up with the relevant team until the closure and revalidation of identified vulnerabilities.
  • Carry out security assessments to identify the current state of security and compliance posture in the deployed on-prem and cloud technologies, help respective teams remediate the identified gaps, and track till closure.
  • Carry out security configuration reviews and compliance reviews for the IT technologies to identify any security misconfigurations against the security baselines and best practices.
  • Develop security baselines and security hardening guidelines for network devices, system infrastructure, applications, endpoints, and security infrastructure devices, review and update on daily basis.
  • Provide day-to-day operational support, including responding to security incidents, service requests, and tasks related to cloud platforms and deployed cloud technologies internally and for client as per the business requirements.
  • Responsible for Information Security Incident Remediation Management for internal and external client environment as per the business requirements.
  • Monitoring and management of overall information security incidents, analysis, containment, response, remediation, and post-incident analysis reporting to the management.
  • Serve as a primary responder for Security incidents or vulnerabilities in the on-prem and cloud infrastructure, take ownership of the security misconfiguration issues and tracking through resolution.
  • Assess and analyze data, logs, and forensics information to detect vulnerabilities or security incidents and provide remediation steps to prevent the recurrence.
  • Carry out digital analysis and investigation on the cloud platforms to identify the incident or root cause, prepare reports and advice on remediation.
  • Monitor security logs and liaise with the teams monitoring the security logs for the entire on-prem and cloud infrastructure to identify potential threats, vulnerabilities, indicators of compromise, and report anomalies to the management.
  • Daily monitoring and administration of deployed security infrastructure and cybersecurity technologies, based on the business requirement. Take full ownership of cybersecurity technologies and work with the team for optimization of technologies for security posture enhancement.
  • Help teams in designing, deploying and maintaining Disaster Recovery setup and practices for the deployed cybersecurity technologies, and implementing the Disaster Recovery operations over Cloud platforms.
  • Day-to-day operations management and continual improvement of cybersecurity technologies, such as but not limited to DAM, IAM, PAM, CASB, Cryptography Suite, (on-prem or cloud deployment), Cloud Security technologies in M365, Azure and GCP, among other prominent leading cybersecurity technologies.
  • Provide security inputs to the technical design and architecture of cybersecurity technologies andIT technologies during the design stage and ensure they meet the security standards and best practices, and validate the incorporation of all the security requirements before deployment of solution/technology.
  • Provide security inputs during the designing / development / configuration of application in the cloud infrastructure, and validate the incorporation of all the security requirements before application deployment.
  • Review, update and maintain Technical High-Level and Low-Level Designs and documentation related to Cybersecurity technologies and Cloud Security infrastructure.
  • Provide assurance of secure configuration, administration, and operations of Access Management, Data Discovery, Data Classification, Information Rights Management, Asset Management, Disaster Recovery, and Application Security over the on-prem and Cloud platforms.
  • Provide inputs and guidance to IT teams and other Business Units on the Cloud Security and Compliance roadmaps, architecture design, security baselining, security hardening, configuration and compliance reviews, identity and access governance for Cloud infrastructure.
  • Ensure that Cloud infrastructure is deployed and managed in-line with the organization's information security policies, defined security baseline controls, cloud security best practices, international standards, and local regulations.
  • Formulate and implement security processes, procedures, standards and guidelines for all the cybersecurity technologies deployed over on-prem and cloud infrastructures.
  • Reporting weekly and monthly reports for the clients and infrastructure under area of responsibility.
  • Conducting technical security awareness sessions for the IT and other technical teams as required.
  • Assist Information Security Managers with periodic audits and compliance activities and oversee the implementation of required remediation activities.
  • Maintain knowledge of new and emerging cybersecurity technologies, threats and ensure the entire infrastructure is secured from the evolving threat landscape.
  • Apply technical knowledge and insights to create a modernization roadmap for entire Cloud Infrastructure and Services.
  • Conduct presentation of Cloud Solutions to key stakeholders including peers, leadership team, non-technical team and clients.
  • Conduct and lead technical workshops with the peers and clients, if required.
  • Perform comparative analysis of proposals in response of RFP/RFI.
  • Comprehends RFPs and develop cost effective solution in RFP response.
  • Manage and prioritize multiple assigned tasks to meet established deadlines.
  • Liaise with IT teams and vendors for the security incident and problem resolution.
  • Ensure compliance with all approved policies and processes.
  • Ensure an approved change request is followed during all the cybersecurity technology changes.
  • Take ownership of all the assigned projects and tasks and follow the agreed timelines.
  • Upgrade knowledge and skills in the cybersecurity domain continuously.

 

Background:

  • Knowledge and experience in wide range of cybersecurity technologies, both on-prem and cloud security technologies.
  • Extensive knowledge on Cloud Security technologies in M365, Azure and GCP cloud infrastructures.
  • Knowledge and confidence in approaching network technologies in Public and Private Cloud environments.
  • Knowledge of cybersecurity tools such as, PAM, SIEM, UEBA, IAM Systems, MDM, Endpoint Security, WAF, Patch Management Tools, Malware Heuristics, Database Firewall, SSL Encryption, Email Security, etc.
  • Knowledge of Data Security Technologies management (both on-prem or cloud deployment) such as Data Loss Prevention, Data Classification, Information Rights Management, Web Filtering, UEM security, etc.  Experience with ForcePoint DLP, ForcePoint CASB, Boldon James Data Classification, M365 AIP, M365 CASB, M365 DLP, IRM tools, Web Proxy tools will be an added advantage to conduct the daily operations.
  • Delinea / Thycotic PAM experience would be an added advantage. EntraID IAM and Microfocus IAM experience would be an added advantage.
  • Experience in identifying, handling, reporting and remediating data security incidents on day-to-day basis.
  • Experience in Disaster Recovery Setup for cybersecurity technologies, data security technologies and InfoSec Governance technologies.
  • Knowledge and willingness to contribute towards management and governance of Disaster Recovery and Cyber Resilience.
  • Deep understanding of cloud service architecture with emphasis on security in the cloud
  • Strong understanding of Private cloud, Public Clouds and Hybrid clouds (GCP, Azure, M365)
  • Solid understanding of modern information security methodologies and standards, especially in cloud environment
  • Cloud security and Information Security certifications are desired
  • Professional experience working with networks and security architecture in cloud environments is an added advantage
  • Knowledge of Linux and Windows Operating Systems.
  • Experience of integrating cybersecurity and cloud security technologies with SIEM solutions.
  • Practice with modern DevSecOps with automation (nice to have), and ability to automate repetitive tasks (scripting skills in Bash/PowerShell/ Python)
  • Shift flexibility, including the ability to provide after-hours support when needed as per the business requirements
  • Experience working with internal and client Service Management platforms and Knowledge Management systems for Security Incident, Problem and Change tracking as well as procedures.
  • Experience or know-how of implementing and migrating from traditional environments to Hybrid Cloud services (On-Premise Private and public CSPs) in a variety of distributed computing environments.
  • Experience or know-how of administration and securing Active Directory Services and Active Directory Federation Services (ADFS).
  • Experience contributing to common compliance frameworks as well as mapping between different compliance requirements.
  • Ability to review technical reports and provide risk mitigation solutions from activities such as Penetration Testing, Vulnerability Management and/or web-based application assessments.
  • Demonstrated breadth of security expertise in various sub domains such as encryption, identity, incident response, etc.
  • Experience with risk assessment methodologies and risk reporting.
  • Proven background in clearly writing complex technical documents that can be presented across a varied enterprise corporate audience.
  • Excellent knowledge of cyber-security incident response protocols (e.g., identification, impact assessment, containment, remediation, evidence handling, technical reporting, etc.) and safeguarding information.
  • Hands-on experience with security tools such as Metasploit, Wireshark, Nessus, Burpsuite, Acunetix, Appscan, Nexpose, Checkmarx, Fortify, Veracode, Kali Linux and developing exploits will be an added advantage.
  • Good understanding of the following network and security domains (not limited to):
    • Secure SDLC
    • Network automation tools, protocol analyzers, packet filtering, web proxy, and network operating systems
    • Attacks and countermeasures (such as DHCP starvation, DNS spoofing, Email spoofing, Phishing, DDOS, ARP Poisoning, XSS, CSRF, SQL injection, etc.)
    • Switches, routers, wireless controllers, access points, load balancers, Next-Generation Firewalls, IDS/IPS, threat management solutions, and vulnerability scanners
    • Cryptography and PKI
    • TCP/IP layer security, Computer networking, routing, switching, etc.
    • Firewall, IDS/IPS, Routers, Switches
    • Windows, UNIX, and Linux operating systems
    • Secure coding practices
    • Threat Modelling
    • Security monitoring tools
    • ISO 27001, ISO 22301, NIST, SOC, and SOX compliance assessments

 

 

Job Specifications

Education

  • Bachelors in Computer Science, Computer Engineering, Information Technology, Information Systems or equivalent
  • Additional education in the field of Information Security / Cyber Security is a definite advantage

Minimum Work Experience

  • Overall 12 to 15 years of experience in Information Security and Cloud Management Services Domains. (concessions on years of work experience available based on relevant domain certifications, masters and doctorate degrees)

Skills/Certifications (Technical & Non-Technical)

Preferred Certifications/Training (Important):

  • Certified Cloud Security Professional (CCSP)
  • Certified Information Systems Security Professional (CISSP)
  • Certificate of Cloud Security Knowledge (CCSK)
  • CompTIA Net+ and CompTIA Sec+
  • Certified Information Security Manager (CISM)
  • Certified Incident Handler (ECIH)
  • Google Cloud Certified - Professional Cloud Security Engineer
  • Google Cloud Certified - Professional Cloud Architect
  • Tool Administration Certifications (PAM, IAM, DAM, CASB, DLP, Data Classification, IRM, Web Proxy, Email Security Gateway)
  • ITIL v3 Foundation or higher
  • Microsoft Azure Security Engineer
  • Microsoft Azure Solutions Architect Expert
  • Microsoft Certifications (SC-200, SC-400, AZ-500 or alike)
  • Certified Kubernetes Security Specialist (CKS)

 

Preferred Certifications/Training (Good to Have):

  • Delinea Secret Server Certified Engineer
  • Delinea Privilege Manager Certified Engineer
  • Delinea Server PAM Certified Engineer
  • Tenable.sc Specialist or Expert Certification
  • Certified Ethical Hacker (CEH)
  •  
  • Offensive Security Certified Professional (OSCP)
  • Certified Security Analyst (ECSA)
  • EC-Council Disaster Recovery Professional (EDRP)
  • Project Management Professional (PMP)
  • CCNA or CCNP (Routing and Switching, or Security)
  • ITIL v3 Foundation or higher

 

Soft Skills:

  • Excellent verbal and written communication
  • Presentation
  • Detailed documentation and proof-reading
  • Reporting
  • Self-motivated
  • Teamwork
  • Flexibility and adaptability
  • Decision making
  • Emotional intelligence
  • Attention to details
  • Problem-solving
  • Analytical thinking
  • Accountability and responsibility
  • Ability to travel to customer sites as needed

 

Resource Management:

  • As per the role's requirements and responsibilities delegated from time to time.

 

Nature of Interaction:

  • Internal and External