<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     >
    <channel>
        <title>Talent Arabia - Feed</title>
        <atom:link href="https://talentarabia.com/?feed=job_feed&#038;skill_in=security-technologies-firewalls-encryption-ids-ips" rel="self" type="application/rss+xml" />
        <link>https://talentarabia.com</link>
        <description>We Make It Happen</description>
        <lastBuildDate>Thu, 30 Apr 2026 05:20:43 +0000</lastBuildDate>
        <language></language>
        <sy:updatePeriod>hourly</sy:updatePeriod>
        <sy:updateFrequency>1</sy:updateFrequency>
        <generator>https://wordpress.org/?v=6.8.5</generator>
                        <item>
                    <RecuiterJobNumber><![CDATA[2134]]></RecuiterJobNumber>
                    <title><![CDATA[Information security officer]]></title>
                    <link><![CDATA[https://talentarabia.com/job/information-security-officer/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=information-security-officer]]></link>
                    <PostDate>Thu, 02 Oct 2025 05:11:36 +0000</PostDate>
                    <expiryDate>Tue, 02 Oct 2035 05:11:45 +0000</expiryDate>
                                        <featured><![CDATA[no]]></featured>
                                            <salary><![CDATA[]]></salary>
                                            <employer><![CDATA[Talent Arabia]]></employer>
                    <employerImg><![CDATA[https://talentarabia.com/wp-content/uploads/jobsearch-user-files/profile-img-150x150.png]]></employerImg>
                                            <location><![CDATA[Muscat, Oman]]></location>
                                                <sector><![CDATA[IT]]></sector>
                                                <type><![CDATA[Full time]]></type>
                                            <excerpt><![CDATA[<p>Job Purpose The Information Security Officer (ISO) will be responsible for establishing and maintaining an enterprise-wide information security program to ensure that information assets are adequately protected. The ISO will oversee and direct the organization&#8217;s security strategy, implementation, and compliance efforts, safeguarding against both internal and external security risks  Key Tasks and Duties Develop and...</p>
<p>The post <a href="https://talentarabia.com/job/information-security-officer/">Information security officer</a> first appeared on <a href="https://talentarabia.com">Talent Arabia</a>.</p>]]></excerpt>
                    <description><![CDATA[<h1><b>Job Purpose</b></h1>
<h1></h1>
<p><span style="font-weight: 400">The Information Security Officer (ISO) will be responsible for establishing and maintaining an enterprise-wide information security program to ensure that information assets are adequately protected. The ISO will oversee and direct the organization&#8217;s security strategy, implementation, and compliance efforts, safeguarding against both internal and external security risks</span></p>
<h1></h1>
<h2><b> Key Tasks and Duties</b></h2>
<h1></h1>
<h3><span style="font-weight: 400">Develop and Implement Security Policies: </span></h3>
<ul>
<li style="font-weight: 400"><span style="font-weight: 400">Design and maintain security policies, procedures, and practices in alignment with </span></li>
<li style="font-weight: 400"><span style="font-weight: 400">regulatory requirements and organizational goals. </span></li>
<li style="font-weight: 400"><span style="font-weight: 400">o Ensure policies are reviewed and updated regularly based on emerging threats.</span></li>
</ul>
<h1></h1>
<h3><span style="font-weight: 400">Risk Management: </span></h3>
<ul>
<li style="font-weight: 400"><span style="font-weight: 400">Conduct regular risk assessments to identify vulnerabilities and assess the potential </span></li>
<li style="font-weight: 400"><span style="font-weight: 400">impact of threats. </span></li>
<li style="font-weight: 400"><span style="font-weight: 400">Develop, implement, and monitor a comprehensive risk management strategy. </span></li>
<li style="font-weight: 400"><span style="font-weight: 400">Ensure risks are mitigated through appropriate controls and action plans.</span></li>
</ul>
<p><span style="font-weight: 400"> </span></p>
<h3><span style="font-weight: 400">Incident</span> <span style="font-weight: 400">Response</span> <span style="font-weight: 400">and</span> <span style="font-weight: 400">Management</span><span style="font-weight: 400">: </span></h3>
<ul>
<li style="font-weight: 400"><span style="font-weight: 400">Develop, implement, and manage incident response plans to address security </span></li>
<li style="font-weight: 400"><span style="font-weight: 400">breaches, including containment, eradication, and recovery. </span></li>
<li style="font-weight: 400"><span style="font-weight: 400">Lead investigations of security incidents and coordinate with relevant stakeholders to resolve issues.</span></li>
</ul>
<p><span style="font-weight: 400"> </span></p>
<h3><span style="font-weight: 400">Security</span> <span style="font-weight: 400">Awareness</span> <span style="font-weight: 400">and</span> <span style="font-weight: 400">Training</span><span style="font-weight: 400">:</span></h3>
<ul>
<li style="font-weight: 400"><span style="font-weight: 400">Implement and manage security training and awareness programs for employees. </span></li>
<li style="font-weight: 400"><span style="font-weight: 400">Foster a culture of security awareness throughout the organization</span></li>
</ul>
<p><span style="font-weight: 400"> </span></p>
<h2><b> Qualification</b></h2>
<p><span style="font-weight: 400">∙ Education: Bachelor’s degree in Computer Science, Information Technology, Cyber security, or a related field. A master’s degree is a plus. </span></p>
<p><span style="font-weight: 400">∙ Certifications: CISSP, CISM, CISA, or equivalent certifications..</span></p>
]]></description>
                                                        </item>
                    </channel>
</rss>