More jobs:
Technology Operation Support Engineers
Job in
Riyadh, Riyadh Region, Saudi Arabia
Listed on 2026-01-17
Listing for:
TAWANTECH
Full Time
position Listed on 2026-01-17
Job specializations:
-
IT/Tech
IT Support, Cybersecurity
Job Description & How to Apply Below
- Create, log, and track CRs and SRs.
- Coordinate with internal teams and vendors for execution.
- Monitor progress and ensure timely delivery.
- Provide regular updates and elevate issues as needed.
- Ensure proper closure and documentation of requests.
- Ensure following the process and not exceeding the SLA among teams.
- Provide periodic reports.
- Communicate with internal and external parties for any planned or unplanned activity.
- Certified in PMP and ITIL.
- Should have the right to audit and assess the provided solution at any time.
- The solution should be on premises.
- All employees working on the solution shall be on site; no remote working is allowed.
- System should have data encryption at rest, display, and in motion.
- Integration with SIEM, and the system must have a logging capability (audit logging, security logging).
- System must produce logs to be stored on file on the server level or streamed to SIEM.
- System must generate audit trails of all activities done by the admin/user/customer such as creating meetings, meeting reminders, etc.
- System must generate security logs of each activity to cover login, logout, password reset, password change, change of permissions, change of roles, etc.
- System must store logs for at least 30 days and then archive them for one year with a sharing process for restoring archives during security incidents.
- System must generate event logs when logs are tampered with or changed.
- System must have protected logs from tampering or deleting.
- System must generate logs when configuration is changed by admin/user.
- System must generate logs when files or folders are changed.
- Databases are tables to store data and won’t be accepted as logs.
- System must provide enriched data on the event log where it shows source IP, destination IP, event type, time, user, actioned user, details of action, and any additional information that might support cybersecurity cases.
- Middleware systems that transfer logs are not accepted as log sources.
- System must generate logs on all attempts including successful or failed attempts.
- System must generate logs when starting, stopping, restarting system processes and events.
- Integration with AD/LDAP.
- Role‑based access control (RBAC) access control.
- Multi‑factor authentication.
- If the system supports multiple user rules, the permission should be defined.
- Implement a strong password policy.
- A secure session management system that includes authentication, session locking, and session expiration.
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×