Vulnerability Research Jobs in Saudi Arabia
-
City
-
Job Type
-
Posting Date
5 Jobs Found | Sort By : Relevance | Posted Date
Less results matching your search!
Try removing some of the filters to get more results
No results matching your search!
Try removing some of the filters to get more results
Senior Ux Researcher
Delivery Hero
About the RoleWere looking for a UX Researcher whos equal parts analytical empathetic and bold someone who thrives in uncovering user insights through both structured analysis and real-world fieldwork. This role is central to ensuring that every HungerStation product decision is backed by deep user...
Cyber Security L2 - Vulnerability Management
Intertec Softwares
RESPONSIBILITIES (INCLUDES ALL TASKS):Manage Day to Day Security Operations of Security Solutions.Experienced in Vulnerability Management Malware Protection Data Security Web Application Security and Network Security.Strive to achieve KPIs.Coordinate to Achieve SLA requirements.Security Incident Man...
Fellow- Senior Researcher
European Institute Of Policy Research And Human Rights Sia
The European Institute of Policy Research and Human Rights is a prestigious institution that offers cutting-edge online programs designed to educate future leaders in policy research human rights and related disciplines. Our mission is to deliver world-class skill enhancing programs to candidates gl...
Researcher-senior
European Institute Of Policy Research And Human Rights Sia
The European Institute of Policy Research and Human Rights is a prestigious institution that offers cutting-edge online programs designed to educate future leaders in policy research human rights and related disciplines. Our mission is to deliver world-class skill enhancing programs to candidates gl...
Principal Security Engineer, Threat And Vulnerabil...
Oracle
DescriptionInformation Security Engineer - Threat and Vulnerability ManagementOracle Cloud InfrastructureThe Oracle Threat and Vulnerability Management (TVM) team proactively identifies assesses prioritizes and relentlessly drives the remediation of security weaknesses and vulnerabilities at scale a...