Discover how we’ve helped businesses grow transform and succeed through strategic consulting solutions Explore our portfolio of the impactful projects each tailored to solve unique business challenges From startups to established enterprises our projects demonstrate real-world results and measurable growth Were turn strategies into success See how our work drives innovation, growth, and sustainable change Every project tells a story of transformation dive into the journeys of our clients and the results we delivered.
“Projects how we’ve helped businesses grow transform and succeed through strategic consulting solutions. Explore our portfolio of impactful projects each tailored to solve unique business challenges From startups to established enterprises our projects demonstrate real-world measurable growth success”
succeed how we’ve helped businesses grow transform and succeed through strategic consulting solutions. Explore our portfolio of impactful projects each tailored to solve unique business challenges. From startups to established enterprises our projects demonstrate real-world results and measurable growth We turn strategies into success. See how our work drives innovation, growth, and sustainable change Every project tells a story of transformation dive into the journeys of our clients and the results we delivered.
Find answers to our question about our consulting coverage options.
We’re here to help you!
Launching a startup begins with more than just an idea it starts with creating a product that solves a real problem.
Securing the right investment is essential for fueling growth and scaling a business. Our fundraising approach is designed
Startup consulting helps entrepreneurs turn ideas into thriving businesses. By combining market insights, strategy, and execution
Financial planning is the foundation of long-term stability and growth. It helps businesses and individuals make informed
Job Highlights
• Master’s or Bachelor’s degree in Computer Science, Information Systems Engineering, or a related field from an accredited institution.
• Proven banking domain experience
• Preference will be given to local candidates currently based in KSA
10+ years of experience in the banking sector , preferably from Saudi banks.
• Hands-on experience of working on Enterprise Level Next-Gen Firewalls (NGFW), IDS/IPS, NAC, WAFs, DDoS Protection and leading cybersecurity solutions.
• Experience of working on Building practical Zero Trust Frameworks that move beyond the perimeter, implementing Zero Trust Network Access (ZTNA), SASE, Micro-segmentation , and Passwordless Authentication.
• Experience to Design and Architect the cyber defense by optimizing SOC technologies, specifically SIEM, SOAR, and XDR (e.g., Microsoft Sentinel, Splunk)
• Experience of working on the EDR/XDR Strategy to ensure every endpoint functions as a self-defending node, utilizing platforms like CrowdStrike, Sentinel One, Trellix or Microsoft Defender etc.
• Experience of working on enterprise class vulnerability management tools (Tenable, Qualys, or Rapid7) to transform scan data into prioritized business actions.
• Experience of working on Identity Governance, managing PAM and identity management for large-scale enterprise environments to eliminate administrative credential abuse.
• Familiar with designing Data Privacy Controls to ensure compliance with KSA PDPL and SAMA, utilizing DLP tools, Automated Data Discovery, and Hardware Security Modules
• Experience with PKI Solutions and automated certificate management to handle large-scale SSL/TLS deployments and robust encryption standards (AES-256, RSA, ECC).
• Familiarity with cloud security architectures
• Knowledge of securing emerging technologies like AI and defenses for LLMs and AI workloads.
• Familiar with security regulator’s requirements ( NCA, SAMA, PCI-DSS )
• Deep hands-on experience with enterprise vendors including Palo Alto, Fortinet, Cisco, Sailpoint, Symantec, IBM, Redhat, VMware, EMC, Recorded Future, Group IB, DigiCert, and Trellix etc.
• Expertise in designing based on emerging threats, with a focus on Identity Threat Detection and Response (ITDR) and hybrid-cloud connectivity.
• Build and maintain robust WAF (Web Application Firewall) policies to protect critical web applications from Layer 7 attacks and zero-day exploits
Broad experience on designing defense in depth and defense in breath in larger scale enterprise environment keeping in protection form Layer 1 to Layer 7 and zero days attacks and respective controls.