More jobs:
Manager, IT Support & Services
Job in
Jeddah, Saudi Arabia
Listed on 2026-01-01
Listing for:
Catrion
Full Time
position Listed on 2026-01-01
Job specializations:
-
IT/Tech
Cybersecurity, IT Consultant
Job Description & How to Apply Below
Job Purpose Statement:
Provide support to end users based on their requirements by capitalization on innovation and latest technology and automation. In addition to the implementation of the ITIL framework Digitize and automate business and IT processes.
Roles & Responsibility:- Maintain the ITIL framework (Incident, Problem, Service request, Change, Release and business continuity)
- Part of IT Service Desk as applicable
- Liaise and coordinate with business leaders to identify potential digital and automation processes
- Monitors and report IT Opex/Capex expenditure
- Issue and maintain report IT performance and KPIs
- Interact with program Leadership, reporting progress activity status
- Interact with the other Stream Leads, ensuring cross-functional alignment
- Interact with Communication Dep. to align about the communication plan and content
- Quality check report
- Monitors and report IT Risk, Audit and Cybersecurity
- Monitors and report the execution of the IT strategy and roadmap
- Managing and supporting end point devices
- Ensure all end point devices are up to date with all OS/applications patches
- Automate end point provisioning and maintaining up to date OS image customized for SACC functional requirements
- Perform other job-related duties as assigned.
- Perform other duties related to the job and/or the operation of the company, in accordance with the regulations of the Saudi Labor of Law. Adherence to Cybersecurity policies and procedures.
- Adherence to Cybersecurity policies and procedures.
- Dealing with data and information according to their level of classification.
- Avoid violating the rights of any person or company protected by copyrights, patents, or any other intellectual property, or similar laws or regulations.
- Compliance with Cybersecurity requirements related to the protection of user devices, Internet, software, systems, and Email requirements.
- Adhere to the acceptable use policy and Using SACC information and technical assets only for business purposes.
- Obtaining the required permit from the security department or the owner of the authority in SACC before hosting visitors in the company's specific sensitive sites.
- Reporting Cybersecurity incidents.
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×