<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     >
    <channel>
        <title>Talent Arabia - Feed</title>
        <atom:link href="https://talentarabia.com/?feed=job_feed&#038;skill_in=cloud-security-application-security-and-endpoint-security+" rel="self" type="application/rss+xml" />
        <link>https://talentarabia.com</link>
        <description>We Make It Happen</description>
        <lastBuildDate>Thu, 30 Apr 2026 05:20:43 +0000</lastBuildDate>
        <language></language>
        <sy:updatePeriod>hourly</sy:updatePeriod>
        <sy:updateFrequency>1</sy:updateFrequency>
        <generator>https://wordpress.org/?v=6.8.5</generator>
                        <item>
                    <RecuiterJobNumber><![CDATA[2197]]></RecuiterJobNumber>
                    <title><![CDATA[Technology Leader]]></title>
                    <link><![CDATA[https://talentarabia.com/job/technology-leader/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=technology-leader]]></link>
                    <PostDate>Sun, 05 Oct 2025 12:24:11 +0000</PostDate>
                    <expiryDate>Fri, 05 Oct 2035 12:24:24 +0000</expiryDate>
                                        <featured><![CDATA[no]]></featured>
                                            <salary><![CDATA[]]></salary>
                                            <employer><![CDATA[Talent Arabia]]></employer>
                    <employerImg><![CDATA[https://talentarabia.com/wp-content/uploads/jobsearch-user-files/profile-img-150x150.png]]></employerImg>
                                            <location><![CDATA[Muscat, Oman]]></location>
                                                <sector><![CDATA[IT]]></sector>
                                                <type><![CDATA[Full time]]></type>
                                            <excerpt><![CDATA[<p>A visionary and execution-focused Technology Leader responsible for leading strategic digital transformation initiatives, driving technology adoption, and delivering enterprise-scale solutions that align with client objectives and support organizational growth. Define and lead the organization’s Technology division aligned with corporate and client transformation goals Translate market trends and client needs into strategic and innovative service offerings...</p>
<p>The post <a href="https://talentarabia.com/job/technology-leader/">Technology Leader</a> first appeared on <a href="https://talentarabia.com">Talent Arabia</a>.</p>]]></excerpt>
                    <description><![CDATA[<p><span style="font-weight: 400">A visionary and execution-focused Technology Leader responsible for leading strategic digital transformation initiatives, driving technology adoption, and delivering enterprise-scale solutions that align with client objectives and support organizational growth.</span></p>
<ul>
<li><span style="font-weight: 400">Define and lead the organization’s Technology division aligned with corporate and client transformation goals</span></li>
<li>Translate market trends and client needs into strategic and innovative service offerings</li>
<li>Oversee design, delivery, and governance of secure, scalable technology architectures (cloud, AI, cybersecurity, etc.)</li>
<li>Drive adoption of advanced platforms and solutions from leading technology partners</li>
<li>Champion digital transformation programs across diverse industries</li>
<li>Establish digital operating models to improve ROI and time-to-value</li>
<li>Lead, mentor, and grow cross-functional technology teams</li>
<li>Foster a high-performance, customer-centric culture</li>
<li>Build executive relationships with customers, vendors, and partners</li>
<li>Represent the organization in strategic alliances, forums, and advisory boards</li>
<li>Provide executive oversight for key technology engagements and ensure delivery excellence</li>
<li>Define and monitor KPIs across delivery teams</li>
<li>Manage financial targets and optimize resource allocation</li>
<li>Drive operational efficiency through automation and lean management</li>
<li>Identify new revenue streams and co-develop value propositions with alliance partners</li>
<li>Collaborate with sales, marketing, and business units to enable growth</li>
<li><span style="font-weight: 400">Expertise in Cloud &amp; Hybrid Infrastructure, Cybersecurity, Data Platforms, AI &amp; Automation, or Networking</span></li>
<li><span style="font-weight: 400">Strong relationships with partners like IBM, Cisco, Microsoft, AWS, or major cybersecurity providers</span></li>
<li><span style="font-weight: 400">Ability to scale high-performing technology teams across regions or units</span></li>
<li><span style="font-weight: 400">Proficiency in technology strategy, leadership, stakeholder engagement, and innovation management</span></li>
<li><span style="font-weight: 400">Strong capabilities in infrastructure management, compliance, budget management, and project oversight</span></li>
</ul>
]]></description>
                                                        </item>
                                <item>
                    <RecuiterJobNumber><![CDATA[2134]]></RecuiterJobNumber>
                    <title><![CDATA[Information security officer]]></title>
                    <link><![CDATA[https://talentarabia.com/job/information-security-officer/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=information-security-officer]]></link>
                    <PostDate>Thu, 02 Oct 2025 05:11:36 +0000</PostDate>
                    <expiryDate>Tue, 02 Oct 2035 05:11:45 +0000</expiryDate>
                                        <featured><![CDATA[no]]></featured>
                                            <salary><![CDATA[]]></salary>
                                            <employer><![CDATA[Talent Arabia]]></employer>
                    <employerImg><![CDATA[https://talentarabia.com/wp-content/uploads/jobsearch-user-files/profile-img-150x150.png]]></employerImg>
                                            <location><![CDATA[Muscat, Oman]]></location>
                                                <sector><![CDATA[IT]]></sector>
                                                <type><![CDATA[Full time]]></type>
                                            <excerpt><![CDATA[<p>Job Purpose The Information Security Officer (ISO) will be responsible for establishing and maintaining an enterprise-wide information security program to ensure that information assets are adequately protected. The ISO will oversee and direct the organization&#8217;s security strategy, implementation, and compliance efforts, safeguarding against both internal and external security risks  Key Tasks and Duties Develop and...</p>
<p>The post <a href="https://talentarabia.com/job/information-security-officer/">Information security officer</a> first appeared on <a href="https://talentarabia.com">Talent Arabia</a>.</p>]]></excerpt>
                    <description><![CDATA[<h1><b>Job Purpose</b></h1>
<h1></h1>
<p><span style="font-weight: 400">The Information Security Officer (ISO) will be responsible for establishing and maintaining an enterprise-wide information security program to ensure that information assets are adequately protected. The ISO will oversee and direct the organization&#8217;s security strategy, implementation, and compliance efforts, safeguarding against both internal and external security risks</span></p>
<h1></h1>
<h2><b> Key Tasks and Duties</b></h2>
<h1></h1>
<h3><span style="font-weight: 400">Develop and Implement Security Policies: </span></h3>
<ul>
<li style="font-weight: 400"><span style="font-weight: 400">Design and maintain security policies, procedures, and practices in alignment with </span></li>
<li style="font-weight: 400"><span style="font-weight: 400">regulatory requirements and organizational goals. </span></li>
<li style="font-weight: 400"><span style="font-weight: 400">o Ensure policies are reviewed and updated regularly based on emerging threats.</span></li>
</ul>
<h1></h1>
<h3><span style="font-weight: 400">Risk Management: </span></h3>
<ul>
<li style="font-weight: 400"><span style="font-weight: 400">Conduct regular risk assessments to identify vulnerabilities and assess the potential </span></li>
<li style="font-weight: 400"><span style="font-weight: 400">impact of threats. </span></li>
<li style="font-weight: 400"><span style="font-weight: 400">Develop, implement, and monitor a comprehensive risk management strategy. </span></li>
<li style="font-weight: 400"><span style="font-weight: 400">Ensure risks are mitigated through appropriate controls and action plans.</span></li>
</ul>
<p><span style="font-weight: 400"> </span></p>
<h3><span style="font-weight: 400">Incident</span> <span style="font-weight: 400">Response</span> <span style="font-weight: 400">and</span> <span style="font-weight: 400">Management</span><span style="font-weight: 400">: </span></h3>
<ul>
<li style="font-weight: 400"><span style="font-weight: 400">Develop, implement, and manage incident response plans to address security </span></li>
<li style="font-weight: 400"><span style="font-weight: 400">breaches, including containment, eradication, and recovery. </span></li>
<li style="font-weight: 400"><span style="font-weight: 400">Lead investigations of security incidents and coordinate with relevant stakeholders to resolve issues.</span></li>
</ul>
<p><span style="font-weight: 400"> </span></p>
<h3><span style="font-weight: 400">Security</span> <span style="font-weight: 400">Awareness</span> <span style="font-weight: 400">and</span> <span style="font-weight: 400">Training</span><span style="font-weight: 400">:</span></h3>
<ul>
<li style="font-weight: 400"><span style="font-weight: 400">Implement and manage security training and awareness programs for employees. </span></li>
<li style="font-weight: 400"><span style="font-weight: 400">Foster a culture of security awareness throughout the organization</span></li>
</ul>
<p><span style="font-weight: 400"> </span></p>
<h2><b> Qualification</b></h2>
<p><span style="font-weight: 400">∙ Education: Bachelor’s degree in Computer Science, Information Technology, Cyber security, or a related field. A master’s degree is a plus. </span></p>
<p><span style="font-weight: 400">∙ Certifications: CISSP, CISM, CISA, or equivalent certifications..</span></p>
]]></description>
                                                        </item>
                    </channel>
</rss>