Skill Inventory Matrix
Enabler for Internal Mobility Program
Records
| ID | Sector | Division | Department | Unit | Technical Skills |
|---|---|---|---|---|---|
| 1068 | Risk Management | Cybersecurity | Knowledge of cybersecurity governance frameworks, including NCA, SAMA, ISO 27001, and global best practices. | ||
| 1069 | Risk Management | Cybersecurity | Knowledge of cybersecurity risk assessments, third-party risk management practices, and contractual security requirements. | ||
| 1070 | Risk Management | Cybersecurity | Knowledge of Governance, Risk, and Compliance (GRC) tools for tracking policy adherence, compliance obligations, and third-party risks. | ||
| 1071 | Risk Management | Cybersecurity | Ability to design cybersecurity metrics and reporting dashboards that support continuous improvement of governance frameworks. | ||
| 1072 | Risk Management | Cybersecurity | Ability to develop, implement, and monitor cybersecurity policies. | ||
| 1073 | Risk Management | Cybersecurity | Ability to apply data classification standards, implement access controls, and generate data leakage prevention (DLP) reports. | ||
| 1074 | Risk Management | Cybersecurity | Cybersecurity GRC | Knowledge of cybersecurity governance strategy in line with NCA, SAMA, ISO 27001, and organizational objectives. | |
| 1075 | Risk Management | Cybersecurity | Cybersecurity GRC | Knowledge of data classification protocols, access control implementation, and data leakage prevention monitoring. | |
| 1076 | Risk Management | Cybersecurity | Cybersecurity GRC | Knowledge of project governance principles, including planning, tracking, resource allocation, and risk-based prioritization. | |
| 1077 | Risk Management | Cybersecurity | Cybersecurity GRC | Knowledge of incident response governance integration. | |
| 1078 | Risk Management | Cybersecurity | Cybersecurity GRC | Ability to design cybersecurity awareness and training programs. | |
| 1079 | Risk Management | Cybersecurity | Cybersecurity GRC | Ability to lead regulatory engagement and ensure timely reporting and compliance with SAMA, NCA, and global cybersecurity standards. | |
| 1080 | Risk Management | Cybersecurity | Cybersecurity GRC | Ability to conduct cybersecurity risk assessments and manage audit readiness. | |
| 1081 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Governance | Knowledge of cybersecurity governance strategy in line with NCA, SAMA, ISO 27001, and organizational objectives. |
| 1082 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Governance | Knowledge of data classification protocols, access control implementation, and data leakage prevention monitoring. |
| 1083 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Governance | Knowledge of project governance principles, including planning, tracking, resource allocation, and risk-based prioritization. |
| 1084 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Governance | Knowledge of incident response governance integration. |
| 1085 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Governance | Ability to design cybersecurity awareness and training programs. |
| 1086 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Governance | Ability to lead regulatory engagement and ensure timely reporting and compliance with SAMA, NCA, and global cybersecurity standards. |
| 1087 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Governance | Ability to conduct cybersecurity risk assessments and manage audit readiness. |
| 1088 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Compliance | Knowledge of cybersecurity governance strategy in line with NCA, SAMA, ISO 27001, and organizational objectives. |
| 1089 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Compliance | Knowledge of data classification protocols, access control implementation, and data leakage prevention monitoring. |
| 1090 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Compliance | Knowledge of project governance principles, including planning, tracking, resource allocation, and risk-based prioritization. |
| 1091 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Compliance | Knowledge of incident response governance integration. |
| 1092 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Compliance | Ability to design cybersecurity awareness and training programs. |
| 1093 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Compliance | Ability to lead regulatory engagement and ensure timely reporting and compliance with SAMA, NCA, and global cybersecurity standards. |
| 1094 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Compliance | Ability to conduct cybersecurity risk assessments and manage audit readiness. |
| 1095 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Risk | Knowledge of cybersecurity governance strategy in line with NCA, SAMA, ISO 27001, and organizational objectives. |
| 1096 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Risk | Knowledge of data classification protocols, access control implementation, and data leakage prevention monitoring. |
| 1097 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Risk | Knowledge of project governance principles, including planning, tracking, resource allocation, and risk-based prioritization. |
| 1098 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Risk | Knowledge of incident response governance integration. |
| 1099 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Risk | Ability to design cybersecurity awareness and training programs. |
| 1100 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Risk | Ability to lead regulatory engagement and ensure timely reporting and compliance with SAMA, NCA, and global cybersecurity standards. |
| 1101 | Risk Management | Cybersecurity | Cybersecurity GRC | Cybersecurity Risk | Ability to conduct cybersecurity risk assessments and manage audit readiness. |
| 1102 | Risk Management | Cybersecurity | Cybersecurity Architecture | Knowledge of security architecture design principles across infrastructure, applications, and cloud environments. | |
| 1103 | Risk Management | Cybersecurity | Cybersecurity Architecture | Knowledge of cybersecurity frameworks and standards, including NCA ECC, SAMA, ISO 27001, NIST, PCI-DSS, and SWIFT CSCF. | |
| 1104 | Risk Management | Cybersecurity | Cybersecurity Architecture | Knowledge of cloud security architectures and controls within AWS, Azure, and GCP platforms, including Zero Trust security models. | |
| 1105 | Risk Management | Cybersecurity | Cybersecurity Architecture | Ability to apply secure development practices using SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) tools. | |
| 1106 | Risk Management | Cybersecurity | Cybersecurity Architecture | Ability to integrate and configure security technologies such as firewalls, IDS/IPS, SIEM, DLP, CASB, endpoint protection, and encryption solutions. | |
| 1107 | Risk Management | Cybersecurity | Cybersecurity Architecture | Change Advisory and Assessment | Knowledge of security architecture design principles across infrastructure, applications, and cloud environments. |
| 1108 | Risk Management | Cybersecurity | Cybersecurity Architecture | Change Advisory and Assessment | Knowledge of cybersecurity frameworks and standards, including NCA ECC, SAMA, ISO 27001, NIST, PCI-DSS, and SWIFT CSCF. |
| 1109 | Risk Management | Cybersecurity | Cybersecurity Architecture | Change Advisory and Assessment | Knowledge of cloud security architectures and controls within AWS, Azure, and GCP platforms, including Zero Trust security models. |
| 1110 | Risk Management | Cybersecurity | Cybersecurity Architecture | Change Advisory and Assessment | Ability to apply secure development practices using SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) tools. |
| 1111 | Risk Management | Cybersecurity | Cybersecurity Architecture | Change Advisory and Assessment | Ability to integrate and configure security technologies such as firewalls, IDS/IPS, SIEM, DLP, CASB, endpoint protection, and encryption solutions. |
| 1112 | Risk Management | Cybersecurity | Cybersecurity Architecture | Design and Architecture | Knowledge of security architecture design principles across infrastructure, applications, and cloud environments. |
| 1113 | Risk Management | Cybersecurity | Cybersecurity Architecture | Design and Architecture | Knowledge of cybersecurity frameworks and standards, including NCA ECC, SAMA, ISO 27001, NIST, PCI-DSS, and SWIFT CSCF. |
| 1114 | Risk Management | Cybersecurity | Cybersecurity Architecture | Design and Architecture | Knowledge of cloud security architectures and controls within AWS, Azure, and GCP platforms, including Zero Trust security models. |
| 1115 | Risk Management | Cybersecurity | Cybersecurity Architecture | Design and Architecture | Ability to apply secure development practices using SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) tools. |
| 1116 | Risk Management | Cybersecurity | Cybersecurity Architecture | Design and Architecture | Ability to integrate and configure security technologies such as firewalls, IDS/IPS, SIEM, DLP, CASB, endpoint protection, and encryption solutions. |
| 1117 | Risk Management | Cybersecurity | Cybersecurity Architecture | Application Cybersecurity | Knowledge of security architecture design principles across infrastructure, applications, and cloud environments. |
| 1118 | Risk Management | Cybersecurity | Cybersecurity Architecture | Application Cybersecurity | Knowledge of cybersecurity frameworks and standards, including NCA ECC, SAMA, ISO 27001, NIST, PCI-DSS, and SWIFT CSCF. |
| 1119 | Risk Management | Cybersecurity | Cybersecurity Architecture | Application Cybersecurity | Knowledge of cloud security architectures and controls within AWS, Azure, and GCP platforms, including Zero Trust security models. |
| 1120 | Risk Management | Cybersecurity | Cybersecurity Architecture | Application Cybersecurity | Ability to apply secure development practices using SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) tools. |
| 1121 | Risk Management | Cybersecurity | Cybersecurity Architecture | Application Cybersecurity | Ability to integrate and configure security technologies such as firewalls, IDS/IPS, SIEM, DLP, CASB, endpoint protection, and encryption solutions. |
| 1122 | Risk Management | Cybersecurity | Identity and Access Management | Knowledge of Identity and Access Management (IAM) systems. | |
| 1123 | Risk Management | Cybersecurity | Identity and Access Management | Knowledge of regulatory requirements and best practices for IAM compliance and audit readiness. | |
| 1124 | Risk Management | Cybersecurity | Identity and Access Management | Knowledge of authentication and authorization technologies including multi-factor authentication (MFA), single sign-on (SSO), and federated identity management. | |
| 1125 | Risk Management | Cybersecurity | Identity and Access Management | Ability to manage user lifecycle processes such as provisioning, deprovisioning, and periodic access certification. | |
| 1126 | Risk Management | Cybersecurity | Identity and Access Management | Ability to design and manage automated IAM workflows for access requests, approvals, and role assignments. | |
| 1127 | Risk Management | Cybersecurity | Identity and Access Management | Ability to apply IAM frameworks and standards such as least privilege, role-based access control (RBAC), and zero trust models. | |
| 1128 | Risk Management | Cybersecurity | Identity and Access Management | Access Control Operation | Knowledge of Identity and Access Management (IAM) systems. |
| 1129 | Risk Management | Cybersecurity | Identity and Access Management | Access Control Operation | Knowledge of regulatory requirements and best practices for IAM compliance and audit readiness. |
| 1130 | Risk Management | Cybersecurity | Identity and Access Management | Access Control Operation | Knowledge of authentication and authorization technologies including multi-factor authentication (MFA), single sign-on (SSO), and federated identity management. |
| 1131 | Risk Management | Cybersecurity | Identity and Access Management | Access Control Operation | Ability to manage user lifecycle processes such as provisioning, deprovisioning, and periodic access certification. |
| 1132 | Risk Management | Cybersecurity | Identity and Access Management | Access Control Operation | Ability to design and manage automated IAM workflows for access requests, approvals, and role assignments. |
| 1133 | Risk Management | Cybersecurity | Identity and Access Management | Access Control Operation | Ability to apply IAM frameworks and standards such as least privilege, role-based access control (RBAC), and zero trust models. |
| 1134 | Risk Management | Cybersecurity | Identity and Access Management | Access Review and Audit | Knowledge of Identity and Access Management (IAM) systems. |
| 1135 | Risk Management | Cybersecurity | Identity and Access Management | Access Review and Audit | Knowledge of regulatory requirements and best practices for IAM compliance and audit readiness. |
| 1136 | Risk Management | Cybersecurity | Identity and Access Management | Access Review and Audit | Knowledge of authentication and authorization technologies including multi-factor authentication (MFA), single sign-on (SSO), and federated identity management. |
| 1137 | Risk Management | Cybersecurity | Identity and Access Management | Access Review and Audit | Ability to manage user lifecycle processes such as provisioning, deprovisioning, and periodic access certification. |
| 1138 | Risk Management | Cybersecurity | Identity and Access Management | Access Review and Audit | Ability to design and manage automated IAM workflows for access requests, approvals, and role assignments. |
| 1139 | Risk Management | Cybersecurity | Identity and Access Management | Access Review and Audit | Ability to apply IAM frameworks and standards such as least privilege, role-based access control (RBAC), and zero trust models. |
| 1140 | Risk Management | Cybersecurity | Identity and Access Management | Third Party Access Management | Knowledge of Identity and Access Management (IAM) systems. |
| 1141 | Risk Management | Cybersecurity | Identity and Access Management | Third Party Access Management | Knowledge of regulatory requirements and best practices for IAM compliance and audit readiness. |
| 1142 | Risk Management | Cybersecurity | Identity and Access Management | Third Party Access Management | Knowledge of authentication and authorization technologies including multi-factor authentication (MFA), single sign-on (SSO), and federated identity management. |
| 1143 | Risk Management | Cybersecurity | Identity and Access Management | Third Party Access Management | Ability to manage user lifecycle processes such as provisioning, deprovisioning, and periodic access certification. |
| 1144 | Risk Management | Cybersecurity | Identity and Access Management | Third Party Access Management | Ability to design and manage automated IAM workflows for access requests, approvals, and role assignments. |
| 1145 | Risk Management | Cybersecurity | Identity and Access Management | Third Party Access Management | Ability to apply IAM frameworks and standards such as least privilege, role-based access control (RBAC), and zero trust models. |
| 1146 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Knowledge of threat intelligence frameworks including MITRE ATT&CK, STIX/TAXII, Diamond Model, and Cyber Kill Chain. | |
| 1147 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Knowledge of Threat Intelligence Platforms (TIPs) and their application. | |
| 1148 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Knowledge of scripting languages such as Python to automate threat data enrichment. | |
| 1149 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Knowledge of open-source intelligence (OSINT) tools. | |
| 1150 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Ability to assess advanced persistent threat (APT) behaviors and global cybersecurity trends. | |
| 1151 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Ability to develop and deliver executive-level threat briefings, tactical reports, and strategic threat assessments. | |
| 1152 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Ability to integrate threat intelligence feeds and indicators of compromise (IOCs) into SIEM and SOC workflows. | |
| 1153 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Security Operation Center | Knowledge of threat intelligence frameworks including MITRE ATT&CK, STIX/TAXII, Diamond Model, and Cyber Kill Chain. |
| 1154 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Security Operation Center | Knowledge of Threat Intelligence Platforms (TIPs) and their application. |
| 1155 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Security Operation Center | Knowledge of scripting languages such as Python to automate threat data enrichment. |
| 1156 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Security Operation Center | Knowledge of open-source intelligence (OSINT) tools. |
| 1157 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Security Operation Center | Ability to assess advanced persistent threat (APT) behaviors and global cybersecurity trends. |
| 1158 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Security Operation Center | Ability to develop and deliver executive-level threat briefings, tactical reports, and strategic threat assessments. |
| 1159 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Security Operation Center | Ability to integrate threat intelligence feeds and indicators of compromise (IOCs) into SIEM and SOC workflows. |
| 1160 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Cyber Threat Intelligence | Knowledge of threat intelligence frameworks including MITRE ATT&CK, STIX/TAXII, Diamond Model, and Cyber Kill Chain. |
| 1161 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Cyber Threat Intelligence | Knowledge of Threat Intelligence Platforms (TIPs) and their application. |
| 1162 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Cyber Threat Intelligence | Knowledge of scripting languages such as Python to automate threat data enrichment. |
| 1163 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Cyber Threat Intelligence | Knowledge of open-source intelligence (OSINT) tools. |
| 1164 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Cyber Threat Intelligence | Ability to assess advanced persistent threat (APT) behaviors and global cybersecurity trends. |
| 1165 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Cyber Threat Intelligence | Ability to develop and deliver executive-level threat briefings, tactical reports, and strategic threat assessments. |
| 1166 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Cyber Threat Intelligence | Ability to integrate threat intelligence feeds and indicators of compromise (IOCs) into SIEM and SOC workflows. |
| 1167 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Cyber Fraud | Knowledge of threat intelligence frameworks including MITRE ATT&CK, STIX/TAXII, Diamond Model, and Cyber Kill Chain. |
| 1168 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Cyber Fraud | Knowledge of Threat Intelligence Platforms (TIPs) and their application. |
| 1169 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Cyber Fraud | Knowledge of scripting languages such as Python to automate threat data enrichment. |
| 1170 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Cyber Fraud | Knowledge of open-source intelligence (OSINT) tools. |
| 1171 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Cyber Fraud | Ability to assess advanced persistent threat (APT) behaviors and global cybersecurity trends. |
| 1172 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Cyber Fraud | Ability to develop and deliver executive-level threat briefings, tactical reports, and strategic threat assessments. |
| 1173 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Cyber Fraud | Ability to integrate threat intelligence feeds and indicators of compromise (IOCs) into SIEM and SOC workflows. |
| 1174 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Security Control Management | Knowledge of threat intelligence frameworks including MITRE ATT&CK, STIX/TAXII, Diamond Model, and Cyber Kill Chain. |
| 1175 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Security Control Management | Knowledge of Threat Intelligence Platforms (TIPs) and their application. |
| 1176 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Security Control Management | Knowledge of scripting languages such as Python to automate threat data enrichment. |
| 1177 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Security Control Management | Knowledge of open-source intelligence (OSINT) tools. |
| 1178 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Security Control Management | Ability to assess advanced persistent threat (APT) behaviors and global cybersecurity trends. |
| 1179 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Security Control Management | Ability to develop and deliver executive-level threat briefings, tactical reports, and strategic threat assessments. |
| 1180 | Risk Management | Cybersecurity | Cybersecurity Intelligence Center | Security Control Management | Ability to integrate threat intelligence feeds and indicators of compromise (IOCs) into SIEM and SOC workflows. |
| 1189 | Risk Management | Data Management Office | Data Sharing | Knowledge of data privacy risks and mitigation strategies, including cybersecurity controls and compliance with data protection laws. |