<?xml version="1.0" encoding="UTF-8"?>
<rss
    version="2.0"
    xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link
            type="application/rss+xml"
            href="https://z2h.me/feed/jobs"
            rel="self"
        />
        <title><![CDATA[Jobs feed]]></title>
        <link><![CDATA[https://z2h.me/feed/jobs]]></link>
                <description><![CDATA[Latest posts from Z2H]]></description>
        <language>en-US</language>
        <pubDate>2025-08-13T16:20:01+00:00</pubDate>

                    <item>
                <title><![CDATA[Threat Intelligence Analyst]]></title>
                <link>https://z2h.me/jobs/threat-intelligence-analyst</link>
                <description><![CDATA[The Threat Intelligence Analyst is responsible for identifying, analyzing, and reporting on current and emerging cybersecurity threats. This role involves collecting threat data from multiple sources, correlating intelligence with organizational risks, and providing actionable insights to help strengthen the company’s security posture.]]></description>
                                    <author><![CDATA[]]></author>
                                <guid>https://z2h.me/jobs/threat-intelligence-analyst</guid>
                <pubDate>Wed, 13 Aug 2025 14:11:34 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://z2h.me/vendor/core/core/base/images/placeholder.png"
                    length="13499"
                />
                            </item>
                    <item>
                <title><![CDATA[AI Cybersecurity Specialist]]></title>
                <link>https://z2h.me/jobs/ai-cybersecurity-specialist</link>
                <description><![CDATA[The AI Cybersecurity Specialist is responsible for securing artificial intelligence systems, machine learning models, and data pipelines against cyber threats. This role combines expertise in cybersecurity practices with a deep understanding of AI technologies to ensure safe, ethical, and reliable AI deployment. The specialist will work closely with data scientists, AI engineers, and security team]]></description>
                                    <author><![CDATA[]]></author>
                                <guid>https://z2h.me/jobs/ai-cybersecurity-specialist</guid>
                <pubDate>Wed, 13 Aug 2025 14:14:08 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://z2h.me/vendor/core/core/base/images/placeholder.png"
                    length="13499"
                />
                            </item>
                    <item>
                <title><![CDATA[Mobile Security Specialist]]></title>
                <link>https://z2h.me/jobs/mobile-security-specialist</link>
                <description><![CDATA[The Mobile Security Specialist is responsible for safeguarding mobile applications, devices, and networks from security threats. This role involves implementing security measures, detecting vulnerabilities, and responding to incidents to ensure that mobile platforms are protected against cyberattacks, data breaches, and malware. The specialist will work with development teams, IT security staff, a]]></description>
                                    <author><![CDATA[]]></author>
                                <guid>https://z2h.me/jobs/mobile-security-specialist</guid>
                <pubDate>Wed, 13 Aug 2025 14:16:42 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://z2h.me/vendor/core/core/base/images/placeholder.png"
                    length="13499"
                />
                            </item>
                    <item>
                <title><![CDATA[Personal Data Protection Specialist]]></title>
                <link>https://z2h.me/jobs/personal-data-protection-specialist</link>
                <description><![CDATA[The Personal Data Protection Specialist is responsible for ensuring that an organization’s handling of personal and sensitive information complies with data protection laws, regulations, and best practices. This role involves implementing privacy policies, managing data protection programs, and minimizing the risk of data breaches. The specialist will collaborate with legal, IT, and compliance tea]]></description>
                                    <author><![CDATA[]]></author>
                                <guid>https://z2h.me/jobs/personal-data-protection-specialist</guid>
                <pubDate>Wed, 13 Aug 2025 14:20:18 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://z2h.me/vendor/core/core/base/images/placeholder.png"
                    length="13499"
                />
                            </item>
                    <item>
                <title><![CDATA[Threat Intelligence Specialist]]></title>
                <link>https://z2h.me/jobs/threat-intelligence-specialist</link>
                <description><![CDATA[The Threat Intelligence Specialist is responsible for collecting, analyzing, and interpreting information about current and emerging cyber threats. This role helps organizations anticipate, detect, and respond to security incidents by providing actionable intelligence. The specialist works closely with cybersecurity teams to strengthen defenses, mitigate risks, and support strategic decision-makin]]></description>
                                    <author><![CDATA[]]></author>
                                <guid>https://z2h.me/jobs/threat-intelligence-specialist</guid>
                <pubDate>Wed, 13 Aug 2025 14:25:32 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://z2h.me/vendor/core/core/base/images/placeholder.png"
                    length="13499"
                />
                            </item>
                    <item>
                <title><![CDATA[AI Cybersecurity Analyst]]></title>
                <link>https://z2h.me/jobs/ai-cybersecurity-analyst</link>
                <description><![CDATA[The AI Cybersecurity Specialist is responsible for protecting artificial intelligence systems, machine learning models, and related data from cyber threats. This role combines expertise in cybersecurity and AI technologies to ensure the secure, ethical, and reliable deployment of AI solutions. The specialist collaborates with data scientists, AI engineers, and IT security teams to detect, prevent,]]></description>
                                    <author><![CDATA[]]></author>
                                <guid>https://z2h.me/jobs/ai-cybersecurity-analyst</guid>
                <pubDate>Wed, 13 Aug 2025 14:27:56 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://z2h.me/vendor/core/core/base/images/placeholder.png"
                    length="13499"
                />
                            </item>
                    <item>
                <title><![CDATA[Mobile Security Engineer]]></title>
                <link>https://z2h.me/jobs/mobile-security-engineer</link>
                <description><![CDATA[The Mobile Security Engineer is responsible for protecting mobile applications, devices, and networks from security threats. This role focuses on implementing security solutions, identifying vulnerabilities, and ensuring mobile platforms are resilient against cyberattacks and data breaches. The engineer works closely with development teams, IT security staff, and compliance officers to deliver sec]]></description>
                                    <author><![CDATA[]]></author>
                                <guid>https://z2h.me/jobs/mobile-security-engineer</guid>
                <pubDate>Wed, 13 Aug 2025 14:30:36 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://z2h.me/vendor/core/core/base/images/placeholder.png"
                    length="13499"
                />
                            </item>
                    <item>
                <title><![CDATA[Personal Data Protection]]></title>
                <link>https://z2h.me/jobs/personal-data-protection</link>
                <description><![CDATA[The Personal Data Protection Officer (DPO) is responsible for ensuring that the organization handles personal and sensitive data in compliance with privacy laws and regulations. This role involves developing data protection policies, monitoring data processing activities, and minimizing risks related to personal data breaches. The DPO works closely with legal, IT, and compliance teams to safeguard]]></description>
                                    <author><![CDATA[]]></author>
                                <guid>https://z2h.me/jobs/personal-data-protection</guid>
                <pubDate>Wed, 13 Aug 2025 14:36:25 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://z2h.me/vendor/core/core/base/images/placeholder.png"
                    length="13499"
                />
                            </item>
                    <item>
                <title><![CDATA[Penetration Tester]]></title>
                <link>https://z2h.me/jobs/penetration-tester-arabian</link>
                <description><![CDATA[The Penetration Tester is responsible for assessing the security of an organization’s IT systems, networks, and applications by simulating cyberattacks. The role identifies vulnerabilities, evaluates risks, and provides actionable recommendations to strengthen defenses. The Penetration Tester works closely with cybersecurity and IT teams to ensure that systems are resilient against potential threa]]></description>
                                    <author><![CDATA[]]></author>
                                <guid>https://z2h.me/jobs/penetration-tester-arabian</guid>
                <pubDate>Wed, 13 Aug 2025 14:48:19 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://z2h.me/vendor/core/core/base/images/placeholder.png"
                    length="13499"
                />
                            </item>
                    <item>
                <title><![CDATA[Penetration Tester]]></title>
                <link>https://z2h.me/jobs/penetration-tester-astra</link>
                <description><![CDATA[The Penetration Tester is responsible for assessing the security of an organization’s IT systems, networks, and applications by simulating cyberattacks. The role identifies vulnerabilities, evaluates risks, and provides actionable recommendations to strengthen defenses. The Penetration Tester works closely with cybersecurity and IT teams to ensure that systems are resilient against potential threa]]></description>
                                    <author><![CDATA[]]></author>
                                <guid>https://z2h.me/jobs/penetration-tester-astra</guid>
                <pubDate>Wed, 13 Aug 2025 15:03:25 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://z2h.me/vendor/core/core/base/images/placeholder.png"
                    length="13499"
                />
                            </item>
                    <item>
                <title><![CDATA[Penetration Tester]]></title>
                <link>https://z2h.me/jobs/penetration-tester-secured</link>
                <description><![CDATA[The Penetration Tester is responsible for assessing the security of an organization’s IT systems, networks, and applications by simulating cyberattacks. The role identifies vulnerabilities, evaluates risks, and provides actionable recommendations to strengthen defenses. The Penetration Tester works closely with cybersecurity and IT teams to ensure that systems are resilient against potential threa]]></description>
                                    <author><![CDATA[]]></author>
                                <guid>https://z2h.me/jobs/penetration-tester-secured</guid>
                <pubDate>Wed, 13 Aug 2025 15:06:38 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://z2h.me/vendor/core/core/base/images/placeholder.png"
                    length="13499"
                />
                            </item>
                    <item>
                <title><![CDATA[Penetration Tester]]></title>
                <link>https://z2h.me/jobs/penetration-tester-watania</link>
                <description><![CDATA[The Penetration Tester is responsible for assessing the security of an organization’s IT systems, networks, and applications by simulating cyberattacks. The role identifies vulnerabilities, evaluates risks, and provides actionable recommendations to strengthen defenses. The Penetration Tester works closely with cybersecurity and IT teams to ensure that systems are resilient against potential threa]]></description>
                                    <author><![CDATA[]]></author>
                                <guid>https://z2h.me/jobs/penetration-tester-watania</guid>
                <pubDate>Wed, 13 Aug 2025 15:09:33 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://z2h.me/vendor/core/core/base/images/placeholder.png"
                    length="13499"
                />
                            </item>
                    <item>
                <title><![CDATA[Penetration Tester]]></title>
                <link>https://z2h.me/jobs/penetration-tester-ejada</link>
                <description><![CDATA[The Penetration Tester is responsible for assessing the security of an organization’s IT systems, networks, and applications by simulating cyberattacks. The role identifies vulnerabilities, evaluates risks, and provides actionable recommendations to strengthen defenses. The Penetration Tester works closely with cybersecurity and IT teams to ensure that systems are resilient against potential threa]]></description>
                                    <author><![CDATA[]]></author>
                                <guid>https://z2h.me/jobs/penetration-tester-ejada</guid>
                <pubDate>Wed, 13 Aug 2025 15:08:59 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://z2h.me/vendor/core/core/base/images/placeholder.png"
                    length="13499"
                />
                            </item>
                    <item>
                <title><![CDATA[Penetration Tester]]></title>
                <link>https://z2h.me/jobs/penetration-tester-kaizen</link>
                <description><![CDATA[The Penetration Tester is responsible for assessing the security of an organization’s IT systems, networks, and applications by simulating cyberattacks. The role identifies vulnerabilities, evaluates risks, and provides actionable recommendations to strengthen defenses. The Penetration Tester works closely with cybersecurity and IT teams to ensure that systems are resilient against potential threa]]></description>
                                    <author><![CDATA[]]></author>
                                <guid>https://z2h.me/jobs/penetration-tester-kaizen</guid>
                <pubDate>Wed, 13 Aug 2025 15:17:59 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://z2h.me/vendor/core/core/base/images/placeholder.png"
                    length="13499"
                />
                            </item>
                    <item>
                <title><![CDATA[Penetration Tester]]></title>
                <link>https://z2h.me/jobs/penetration-tester-middle</link>
                <description><![CDATA[The Penetration Tester is responsible for assessing the security of an organization’s IT systems, networks, and applications by simulating cyberattacks. The role identifies vulnerabilities, evaluates risks, and provides actionable recommendations to strengthen defenses. The Penetration Tester works closely with cybersecurity and IT teams to ensure that systems are resilient against potential threa]]></description>
                                    <author><![CDATA[]]></author>
                                <guid>https://z2h.me/jobs/penetration-tester-middle</guid>
                <pubDate>Wed, 13 Aug 2025 16:09:06 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://z2h.me/vendor/core/core/base/images/placeholder.png"
                    length="13499"
                />
                            </item>
                    <item>
                <title><![CDATA[Penetration Tester]]></title>
                <link>https://z2h.me/jobs/penetration-tester-emdad</link>
                <description><![CDATA[The Penetration Tester is responsible for assessing the security of an organization’s IT systems, networks, and applications by simulating cyberattacks. The role identifies vulnerabilities, evaluates risks, and provides actionable recommendations to strengthen defenses. The Penetration Tester works closely with cybersecurity and IT teams to ensure that systems are resilient against potential threa]]></description>
                                    <author><![CDATA[]]></author>
                                <guid>https://z2h.me/jobs/penetration-tester-emdad</guid>
                <pubDate>Wed, 13 Aug 2025 16:11:03 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://z2h.me/vendor/core/core/base/images/placeholder.png"
                    length="13499"
                />
                            </item>
                    <item>
                <title><![CDATA[Governance, Risk, and Compliance (GRC)]]></title>
                <link>https://z2h.me/jobs/governance-risk-and-compliance-grc-arabian</link>
                <description><![CDATA[The GRC Officer is responsible for ensuring that the organization’s operations align with regulatory requirements, internal policies, and industry best practices. This role involves identifying and mitigating risks, managing compliance programs, and supporting governance initiatives. The GRC Officer collaborates with management, legal, and IT teams to strengthen organizational resilience and maint]]></description>
                                    <author><![CDATA[]]></author>
                                <guid>https://z2h.me/jobs/governance-risk-and-compliance-grc-arabian</guid>
                <pubDate>Wed, 13 Aug 2025 16:13:10 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://z2h.me/vendor/core/core/base/images/placeholder.png"
                    length="13499"
                />
                            </item>
                    <item>
                <title><![CDATA[Governance, Risk, and Compliance (GRC)]]></title>
                <link>https://z2h.me/jobs/governance-risk-and-compliance-grc-emdad</link>
                <description><![CDATA[The GRC Officer is responsible for ensuring that the organization’s operations align with regulatory requirements, internal policies, and industry best practices. This role involves identifying and mitigating risks, managing compliance programs, and supporting governance initiatives. The GRC Officer collaborates with management, legal, and IT teams to strengthen organizational resilience and maint]]></description>
                                    <author><![CDATA[]]></author>
                                <guid>https://z2h.me/jobs/governance-risk-and-compliance-grc-emdad</guid>
                <pubDate>Wed, 13 Aug 2025 16:14:57 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://z2h.me/vendor/core/core/base/images/placeholder.png"
                    length="13499"
                />
                            </item>
                    <item>
                <title><![CDATA[Governance, Risk, and Compliance (GRC)]]></title>
                <link>https://z2h.me/jobs/governance-risk-and-compliance-grc-astra</link>
                <description><![CDATA[The GRC Officer is responsible for ensuring that the organization’s operations align with regulatory requirements, internal policies, and industry best practices. This role involves identifying and mitigating risks, managing compliance programs, and supporting governance initiatives. The GRC Officer collaborates with management, legal, and IT teams to strengthen organizational resilience and maint]]></description>
                                    <author><![CDATA[]]></author>
                                <guid>https://z2h.me/jobs/governance-risk-and-compliance-grc-astra</guid>
                <pubDate>Wed, 13 Aug 2025 16:16:53 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://z2h.me/vendor/core/core/base/images/placeholder.png"
                    length="13499"
                />
                            </item>
                    <item>
                <title><![CDATA[SOC Analyst]]></title>
                <link>https://z2h.me/jobs/soc-analyst-middle</link>
                <description><![CDATA[The SOC Analyst is responsible for monitoring, detecting, and responding to cybersecurity incidents within an organization. This role involves analyzing security alerts, investigating threats, and supporting incident response efforts to protect IT systems and sensitive data. The SOC Analyst works closely with IT and security teams to ensure timely detection and mitigation of cyber threats.]]></description>
                                    <author><![CDATA[]]></author>
                                <guid>https://z2h.me/jobs/soc-analyst-middle</guid>
                <pubDate>Wed, 13 Aug 2025 16:20:01 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://z2h.me/vendor/core/core/base/images/placeholder.png"
                    length="13499"
                />
                            </item>
            </channel>
</rss>
