More jobs:
Job Description & How to Apply Below
Muscat, Sultanate of Oman | Posted on 02/08/2026
- Work Experience Minimum of 2 years of experience in IT security, information security, or a related role.
- City Muscat
- Country Sultanate of Oman
The IT Security Specialist is responsible for protecting the organization’s information systems, networks, and data from cyber threats. The role involves implementing security controls, monitoring security events, supporting incident response activities, and ensuring compliance with established security policies and standards. The ideal candidate will have at least two years of hands‑on experience in IT security or a related field.
Key Responsibilities- Monitor and analyze security events using security tools such as SIEM, firewalls, and endpoint protection systems.
- Implement and maintain security controls to protect networks, servers, applications, and endpoints.
- Assist in identifying, assessing, and mitigating security vulnerabilities.
- Support incident response activities, including investigation, containment, and recovery.
- Manage and monitor access controls in accordance with least‑privilege principles.
- Ensure systems comply with security policies, procedures, and industry standards.
- Participate in security audits, risk assessments, and compliance activities.
Required Qualifications:
- Bachelor’s degree in Information Technology, Computer Science, Cybersecurity, or a related field.
- Minimum of 2 years of experience in IT security, information security, or a related role.
- Basic knowledge of network security concepts (firewalls, VPNs, IDS/IPS).
- Experience with security monitoring, vulnerability management, or endpoint security tools.
Preferred Skills &
Certifications:
- Certifications such as CompTIA Security+, CND, or equivalent.
- Familiarity with security frameworks and standards (ISO 27001, NIST, CIS).
- Good analytical and problem‑solving skills.
- Strong communication and teamwork abilities.
- Familiarity with operating systems security (Windows, Linux).
- Understanding of common cyber threats, vulnerabilities, and attack techniques.
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×