Want to hear how I work? Hit play.Find roles with Kablio AI to help build and power the world.Kablio AI helps you secure roles in construction, clean energy, facilities management, engineering, architecture, sustainability, environment and other physical world sectors.
Get hired, get rewarded!
Land a job through Kablio and earn a 5% salary bonus.
Operates and manages large-scale freshwater storage, transmission, dispatch and planning systems.
Develop and manage OT cybersecurity operations, monitoring, incident response, and risk mitigation.
10d ago
Intermediate (4-7 years)
Full Time
Riyadh, Saudi Arabia
Onsite
Company Size
2,200 Employees
Service Specialisms
Engineering
Project Management
Consulting
Technical Services
Sector Specialisms
Water
Utilities
Infrastructure
Government
Role
What you would be doing
vulnerability management
forensic analysis
ids/ips approval
ai anomaly
disaster recovery
soc strategy
The job holder is responsible for the development of cybersecurity operations activities by monitoring, testing, identifying and dealing with cybersecurity threats and incidents to protect WTCO from any cyber-attacks or threats.
Coordinate OT security requirements in large-scale maintenance turnarounds to embed safeguards.
Review exceptions to security policies to manage residual risk.
Validate IAM/PAM audit trails for plant control systems to ensure no privilege creep.
Direct forensic deep dives into compromised PLC/SCADA devices to prevent repeat incidents.
Escalate problems to ensure case/issue is closed efficiently and in a timely manner.
Ensures compliance with all applicable laws, rules, regulations, and standards within WTCO and related functions such as but not limited to (HC, HSSE, Risk and Cybersecurity, etc..).
Supervise plant-wide vulnerability management and patch coordination to reduce exploitable exposure.
Oversee OT SOC detection strategy to align with evolving threats to industrial environments.
Ensure work is performed based on approved policies, processes, procedures and instructions.
Approve IDS/IPS architecture changes to sustain real-time threat coverage.
Monitor compliance with ISA/IEC 62443, NERC CIP, or sector-specific standards to ensure audit readiness.
Integrate AI anomaly detection to enhance predictive monitoring for process deviations.
Identify opportunities for continuous improvement of the systems, practices, cost optimization, and productivity & efficiency improvement.
Oversee disaster recovery simulations for plant floor systems to validate operational continuity.
Lead OT cyber risk briefings to inform senior executives and plant directors.
Approve control network zoning diagrams and firewall policy updates to protect critical process systems.
What you bring
6 years
bachelor’s
computer science
information technology
A minimum of 6 years of relevant experience.
Bachelor’s Degree in Computer Science, Information Technology, or a relevant field.
Hey there! Before you dive into all the good stuff on our site, let’s talk cookies—the digital kind. We use these little helpers to give you the best experience we can, remember your preferences, and even suggest things you might love. But don’t worry, we only use them with your permission and handle them with care.