Skip to main content
English
عربي
28 Mar 2024
Search
Home
GaStat
About GaStat
AboutUs
A Historical Glimpse
Statistical Sector
Annual Report
Our Partners
Statistical Development
National Strategy for Statistical Development
Development Plans
National Strategic Transformation
Policies and Strategies
Budget and Expenses
Tenders and Procurement
E-Participation
Regulation of the General Authority for Statistics
Organizational Structure
Board of Directors
Organizational Structure
Career and Training
Career
Cooperative training
News and Events
News
Event
Sustainable Development
Contact Us
Branches
Data
e-services
Request for economic statistical information
Request for social statistical information
Request for spatial and resources statistical information
Business Center
Statistics Development Center
Services
Statistical services
Statistical training services
Communicate with Statistics Development Center
Statistical Applications
Dashboards
Interactive maps
Open Data
Contact us
Manuals and Classifications
Saudi Standard Classification of Occupations
The National Classification for the Economic Activities (ISIC4)
National Code of Countries and Nationalities
Manual of Statistical Definitions, Concepts and Terms
Glossary of Statistical Terms
Media Center
Home
News
Events
video
Announcements
Photo Album
Infographic
Survey Awareness
Side Menu
Job details
252916 - Threat Hunter
Proactively searches for undetected threats in networks and systems, identifies their Indicators of Compromise (IOCs) and recommends mitigation plans
Main Tasks:
Carry out proactive system and network scans to discover undetected threats or intrusions.
Collect and analyze data from various sources to reveal undiscovered vulnerabilities
Monitor systems and networks to detect any suspicious activities that indicate the presence of attackers who have successfully penetrated these systems and networks
Assess the cybersecurity posture of systems and networks and provide recommendations for improvements
Identify and evaluate the critical capabilities of threats and attackers and the magnitude of the cyber risks resulting from them
Educational Level:
Bachelor degree
Educational Field:
Database and network design and administration
Software and applications development and analysis
Skills:
Problem Solving
Analytical Thinking
Self Development
Effective communication with individuals and leaders
Working with Teams
Technical skills:
Skill in recognizing denial and deception techniques when used by attackers or cybercriminals.
Knowledge of Advanced Persistent Threat (APT) methods and techniques, and the skill in detecting them.
Knowledge of the activities of groups that are sources of cyber threats and the methods used by them.
Skill in using cyber defense and network management tools to collect data and analyze data traffic patterns across networks.
Knowledge of cybersecurity related threats and vulnerabilities.
التقييم الصفحات
Are you satisfied with the page content?
*
Completely satisfied
Satisfied
Somewhat satisfied
Somewhat unsatisfied
not satisfied
Not satisfied completely
نوعاً ما غير راضي (السبب)
*
غير راضي (السبب)
*
غير راضي تماماً (السبب)
*
CAPTCHA
Submit