menajobs
  • Resume Tools
  • ATS Checker
  • Offer Checker
  • Features
  • Pricing
  • FAQ
LoginGet Started — Free
  1. Home
  2. Job Descriptions
  3. Cybersecurity Analyst Job Description in the GCC: Roles, Requirements & Responsibilities
~9 min readUpdated Mar 2026

Cybersecurity Analyst Job Description in the GCC: Roles, Requirements & Responsibilities

Currently 250+ related jobs open on MenaJobs

0-10+ years (Junior to Architect/CISO)AED 15,000-45,000/month5 sectors

Cybersecurity Analyst Role Overview

Cybersecurity analysts are the frontline defenders protecting the GCC's digital infrastructure from an escalating landscape of cyber threats. From safeguarding the financial networks of Emirates NBD and Al Rajhi Bank to securing the operational technology (OT) environments of Saudi Aramco and ADNOC, from defending government portals under UAE's Telecommunications and Digital Government Regulatory Authority (TDRA) to protecting smart city platforms in NEOM and Lusail — cybersecurity analysts monitor, detect, and respond to threats that target the region's most critical assets.

The GCC cybersecurity landscape is defined by rapid digitization, geopolitical threat exposure, and aggressive regulatory frameworks. The UAE's National Electronic Security Authority (NESA) and Saudi Arabia's National Cybersecurity Authority (NCA) have introduced mandatory compliance standards that rival NIST and ISO 27001 in rigor. Qatar's National Cyber Security Agency (NCSA), Bahrain's National Cyber Security Centre (NCSC), and Oman's Information Technology Authority (ITA) all enforce sector-specific security mandates. These regulations have created enormous demand for cybersecurity professionals — the GCC cybersecurity market is projected to exceed $10 billion by 2027.

Major employers include telecom operators (Etisalat by e&, stc, du, Ooredoo), managed security service providers (DarkMatter, Help AG, Spire Solutions, Paramount Computer Systems), consulting firms (Deloitte, PwC, EY, KPMG — all with dedicated GCC cyber practices), banks and financial institutions (First Abu Dhabi Bank, Saudi National Bank, Qatar National Bank), government entities (Abu Dhabi Digital Authority, SDAIA, NEOM), and oil & gas operators (Aramco, ADNOC, QatarEnergy) with dedicated cyber defense teams.

Key Responsibilities

Cybersecurity analysts in the GCC work across monitoring, incident response, and compliance, with responsibilities that reflect the region's unique threat environment:

Threat Monitoring & Detection

  • Monitor security events using SIEM platforms (Splunk, IBM QRadar, Microsoft Sentinel, LogRhythm, Elastic SIEM). GCC Security Operations Centers (SOCs) process millions of events daily across distributed infrastructure spanning multiple countries. Analysts triage alerts, investigate anomalies, and escalate confirmed incidents.
  • Analyze network traffic and endpoint telemetry for indicators of compromise (IoCs) using EDR tools (CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne, Carbon Black). GCC organizations face advanced persistent threats (APTs) from state-sponsored actors — OilRig, MuddyWater, and Charming Kitten are well-documented threat groups targeting the region.
  • Conduct threat intelligence analysis — correlate internal alerts with external threat feeds (MITRE ATT&CK, AlienVault OTX, Recorded Future, Mandiant). GCC-specific threat intelligence is critical, as the region faces targeted campaigns against energy, government, and financial sectors that differ from global threat patterns.
  • Monitor dark web and threat actor forums for GCC-specific targeting, leaked credentials, and attack planning. Organizations like DarkMatter and Help AG maintain dedicated threat intelligence teams tracking regional threat actors.

Incident Response & Forensics

  • Execute incident response procedures following established playbooks — containment, eradication, recovery, and lessons learned. GCC regulatory bodies (NESA, NCA) mandate specific incident notification timelines: critical incidents must be reported within 2-6 hours depending on jurisdiction and sector.
  • Perform digital forensics investigations using tools like EnCase, FTK, Volatility, and Autopsy. Evidence handling must comply with local legal frameworks — UAE Federal Law No. 34 (Cybercrimes) and Saudi Anti-Cyber Crime Law impose strict chain-of-custody requirements for digital evidence that may be used in prosecution.
  • Coordinate with internal stakeholders and external parties during incidents — legal, communications, executive leadership, law enforcement (UAE CERT, Saudi CERT), and third-party incident response providers. GCC incident response often involves multi-entity coordination across government and private sector boundaries.
  • Develop and maintain incident response playbooks tailored to GCC-specific threat scenarios — ransomware targeting OT systems, business email compromise (BEC) targeting executives, DDoS attacks against public-facing services, and insider threats.

Vulnerability Management & Compliance

  • Conduct vulnerability assessments and penetration testing using Nessus, Qualys, Burp Suite, and Metasploit. Regular vulnerability scanning is mandated by NESA, NCA Essential Cybersecurity Controls (ECC), and PCI DSS (for financial institutions). GCC organizations typically require quarterly external and monthly internal scans.
  • Manage patch management workflows — prioritize vulnerabilities using CVSS scoring, coordinate with IT teams for remediation windows, and track closure rates. Patch management in the GCC is complicated by legacy OT systems in oil & gas and industrial sectors that cannot be easily updated.
  • Support compliance and audit activities — map controls to NESA IAS, NCA ECC, ISO 27001, PCI DSS, and GDPR (for organizations handling EU data). GCC cybersecurity roles are heavily compliance-driven, and analysts spend significant time preparing evidence for internal and external audits.
  • Conduct security awareness training — phishing simulations, policy education, and new-hire security onboarding. GCC organizations increasingly mandate quarterly security awareness programs, and analysts often design and deliver these campaigns using platforms like KnowBe4, Proofpoint, or Cofense.

Required Qualifications

Education

A bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field is the standard requirement. The GCC cybersecurity market values certifications equally or more than academic degrees — a CompTIA Security+ certified analyst with SOC experience is preferred over a master's degree holder without practical security skills. Degrees must be attested by the relevant ministry for visa processing.

Technical Skills & Certifications

The GCC cybersecurity market is heavily certification-driven, with specific credentials carrying significant weight:

  • CompTIA Security+: The baseline entry certification — expected for all junior analyst roles. Validates foundational security concepts.
  • CEH (Certified Ethical Hacker): Popular in the GCC for roles involving vulnerability assessment and penetration testing. EC-Council certifications are widely recognized by GCC employers.
  • CISSP (Certified Information Systems Security Professional): The gold standard for mid-to-senior cybersecurity roles in the GCC. Commands a 25-40% salary premium. Required for many government and financial sector positions.
  • CISM/CISA (ISACA): Valued for governance, risk, and compliance-focused roles. CISM is particularly relevant for analysts transitioning into cybersecurity management.
  • GIAC Certifications (SANS): GSEC, GCIH, GCIA, GCFA — highly respected in the GCC SOC and incident response community. SANS training is expensive but many GCC employers sponsor attendance.
  • SIEM Expertise: Splunk (Splunk Core Certified User/Power User), IBM QRadar, Microsoft Sentinel (SC-200), or Elastic — platform-specific skills are critical for SOC roles.
  • Cloud Security: AWS Security Specialty, Azure Security Engineer (AZ-500), or CCSP — essential as GCC organizations accelerate cloud adoption on AWS (Bahrain region), Azure (UAE/Qatar regions), and Oracle Cloud (Saudi/UAE).
  • Scripting: Python for automation, PowerShell for Windows security, Bash for Linux — scripting ability separates mid-level analysts from entry-level.

Experience & Salary

  • Junior Cybersecurity Analyst (0-3 years, Security+/CEH): SOC monitoring, alert triage, basic incident response. Typical salary: AED 8,000-15,000/month.
  • Cybersecurity Analyst (3-6 years, CEH/GCIH): Threat hunting, incident response, vulnerability management, and compliance support. Typical salary: AED 15,000-28,000/month.
  • Senior Cybersecurity Analyst (6-10 years, CISSP/GIAC): Advanced threat analysis, forensics, architecture review, and team mentoring. Typical salary: AED 28,000-45,000/month.
  • Cybersecurity Manager/Architect (10+ years, CISSP required): Security strategy, program leadership, executive reporting, and regulatory liaison. Typical salary: AED 40,000-70,000+/month.

Preferred Qualifications

These qualifications set top candidates apart in the competitive GCC cybersecurity market:

  • CISSP certification — the single most impactful credential for cybersecurity careers in the GCC. Required by most government entities and banks for senior roles. Commands immediate salary premium and opens doors to architect and management positions.
  • GCC regulatory experience — hands-on experience with NESA IAS, NCA ECC, SAMA Cybersecurity Framework (banking), or TDRA standards. Employers prioritize candidates who understand regional compliance requirements over generic ISO/NIST experience alone.
  • OT/ICS security knowledge — the GCC's oil & gas, utilities, and industrial sectors need analysts who understand SCADA, DCS, and ICS security. IEC 62443 and NIST 800-82 knowledge is highly valued at Aramco, ADNOC, QatarEnergy, and utility companies.
  • Threat intelligence experience — familiarity with GCC-specific threat actors, MITRE ATT&CK mapping, and threat intelligence platforms (Recorded Future, Anomali, MISP) differentiates tactical analysts.
  • Arabic language skills — essential for government cybersecurity roles, helpful for threat intelligence analysis of Arabic-language threat actor communications, and valued at all GCC employers for stakeholder interaction.
  • SOC leadership — experience building or managing a SOC, including SIEM tuning, playbook development, and analyst mentoring, is in high demand at MSSPs and enterprises building internal security operations.

Work Environment & Benefits

Cybersecurity analyst positions in the GCC offer competitive and often premium compensation packages reflecting the talent shortage:

  • Base salary plus annual bonus (1-3 months, sometimes tied to incident response performance and compliance audit results)
  • Housing allowance — AED 5,000-12,000/month depending on seniority and employer
  • Annual flight allowance for employee and dependents
  • Health insurance for employee and family
  • 30 days annual leave plus public holidays
  • End-of-service gratuity per local labor law
  • Certification sponsorship — most GCC employers cover SANS, CISSP, CEH, and cloud security certification costs including training courses (SANS courses can cost $8,000-10,000 each)
  • Shift differential — SOC analysts working night shifts or rotating 24/7 schedules receive additional allowances

Work environments vary significantly by employer type. SOC analysts at MSSPs (Help AG, DarkMatter, Spire Solutions) work in dedicated operations centers with shift rotations covering 24/7/365. Enterprise security teams typically follow standard Sunday-Thursday schedules but are on-call for incident response. Consulting firm analysts (Big Four) travel between client sites across the GCC. Government cybersecurity roles may require security clearance. Remote work is less common in GCC cybersecurity roles than in other IT domains due to the sensitive nature of the work and regulatory requirements around data handling.

How to Stand Out as a Candidate

The GCC cybersecurity talent pool draws from India, Pakistan, Egypt, Jordan, the Philippines, and Western countries. Competition is intense but demand consistently outstrips supply. To differentiate yourself:

  • Stack certifications strategically — Security+ is baseline, CEH or GCIH for mid-level, CISSP for senior. The GCC market treats certifications as hard requirements, not nice-to-haves. Plan your certification path deliberately and include expected completion dates on your resume.
  • Specify your SIEM and EDR platforms — “3 years operating Splunk Enterprise Security with custom correlation rules processing 50,000 EPS” is far more compelling than “experience with SIEM tools.” Name platforms, versions, and scale.
  • Document incident response experience — “Led response to ransomware incident affecting 200 endpoints, achieved full containment within 4 hours, zero data exfiltration confirmed through forensic analysis” demonstrates real-world capability that GCC employers value highly.
  • Highlight compliance frameworks — explicitly mention NESA, NCA ECC, SAMA CSF, PCI DSS, or ISO 27001 experience. GCC employers search for these keywords because regulatory compliance drives much of their security hiring.
  • Build a visible security profile — contribute to open-source security tools, write threat analysis blog posts, participate in CTF competitions, and maintain an active presence on security communities. GCC hiring managers check candidates' technical depth beyond their resume.

Key Takeaways for the GCC Region

  • Cybersecurity analysts are among the most sought-after technology professionals in the GCC, with demand far exceeding supply across all six countries
  • Regulatory frameworks (NESA, NCA ECC, SAMA CSF) drive significant compliance-related hiring across government, banking, energy, and telecom
  • CISSP is the premier credential for career advancement, with GIAC certifications (SANS) highly respected in SOC and incident response roles
  • Tax-free salaries with housing, flights, generous certification sponsorship, and shift allowances make GCC cybersecurity roles among the best-compensated globally
  • OT/ICS security is a high-growth specialization unique to the GCC's energy sector, commanding premium compensation
  • The GCC's cloud migration wave (AWS Bahrain, Azure UAE/Qatar, Oracle Saudi) is creating strong demand for cloud security specialists

The GCC cybersecurity market offers exceptional career opportunities for analysts who invest in recognized certifications, develop platform-specific expertise, and understand the region's unique regulatory and threat landscape.

Sample Cybersecurity Analyst Job Description Template

Use this template to benchmark your qualifications and understand GCC employer expectations:

Position: Cybersecurity Analyst

Department: Information Security / Cybersecurity Operations
Reports to: CISO / Security Manager / SOC Manager
Location: [City], [Country]
Employment Type: Full-time

About the Role

We are seeking a Cybersecurity Analyst to join our Security Operations Center protecting [number] users and [number] systems across [country/region]. You will monitor, detect, and respond to security threats using industry-leading SIEM, EDR, and threat intelligence platforms while ensuring compliance with [NESA/NCA ECC/SAMA CSF] regulatory requirements.

What You'll Do

  • Monitor security events and alerts through SIEM platform (Splunk/QRadar/Sentinel)
  • Investigate and triage security incidents following established playbooks
  • Perform threat hunting using EDR telemetry and network traffic analysis
  • Execute incident response procedures — containment, eradication, recovery
  • Conduct vulnerability assessments using Nessus, Qualys, or Burp Suite
  • Manage patch management workflows and track remediation progress
  • Support compliance activities for [NESA IAS/NCA ECC/ISO 27001/PCI DSS]
  • Develop and deliver security awareness training and phishing simulations
  • Maintain security documentation, policies, and incident reports

What We're Looking For

  • Bachelor's degree in Cybersecurity, Computer Science, or related field
  • CompTIA Security+ (minimum), CEH or GCIH preferred
  • [X]+ years of cybersecurity or SOC experience
  • Hands-on SIEM experience (Splunk, QRadar, Sentinel, or equivalent)
  • EDR platform proficiency (CrowdStrike, Defender, SentinelOne)
  • Knowledge of MITRE ATT&CK framework and threat intelligence concepts
  • Understanding of network protocols, firewall rules, and IDS/IPS systems
  • Strong analytical and communication skills

Nice to Have

  • CISSP, CISM, or GIAC certifications (GCIH, GCFA, GCIA)
  • Experience with GCC regulatory frameworks (NESA, NCA ECC, SAMA CSF)
  • Cloud security experience (AWS, Azure, or GCP)
  • OT/ICS security knowledge (IEC 62443)
  • Python or PowerShell scripting for security automation
  • Arabic language proficiency

What We Offer

  • Competitive tax-free salary + annual performance bonus
  • Housing allowance
  • Annual flight tickets for employee and dependents
  • Health insurance for family
  • 30 days annual leave
  • SANS, CISSP, and cloud security certification sponsorship
  • Shift differential for SOC rotation

Tailoring Your Resume for Cybersecurity Analyst Roles

Your resume must demonstrate both technical depth and real-world security operations experience. Here is how to position yourself for GCC cybersecurity roles:

  1. Lead with certifications and clearances: Place Security+, CEH, CISSP, GIAC certifications at the top of your resume. Include certification numbers where applicable. If you hold or have held security clearance (from previous government work), note it — GCC government entities value this. Certifications are the primary screening filter for GCC cybersecurity recruiters.
  2. Create a tools and platforms section: List specific tools across categories — SIEM (Splunk Enterprise Security, QRadar 7.5, Sentinel), EDR (CrowdStrike Falcon, Microsoft Defender ATP), Vulnerability (Nessus Professional, Qualys VMDR, Burp Suite Pro), Forensics (EnCase, FTK, Volatility 3), Threat Intel (Recorded Future, MISP, VirusTotal Enterprise). Specificity signals hands-on experience.
  3. Quantify your SOC experience: “Monitored and triaged 200+ daily alerts across Splunk SIEM processing 45,000 EPS from 3,000 endpoints” gives concrete scale. Include metrics: mean time to detect (MTTD), mean time to respond (MTTR), false positive reduction percentages, and number of incidents handled.
  4. Document compliance experience explicitly: “Supported NCA ECC compliance assessment covering 114 controls across 5 domains, achieving 94% compliance score” or “Prepared evidence packages for ISO 27001 recertification audit — zero non-conformities.” GCC employers search for specific framework names.
  5. Showcase incident response stories: Describe 2-3 significant incidents you handled — what was the threat, what tools did you use, what was the outcome? “Detected and contained APT activity using CrowdStrike Falcon and Splunk correlation rules, preventing lateral movement to critical financial systems” demonstrates the real-world capability that separates strong candidates from theoretical ones.

Frequently Asked Questions

What certifications do GCC employers require for cybersecurity analysts?
CompTIA Security+ is the baseline entry certification for junior SOC analyst roles across the GCC. CEH (Certified Ethical Hacker) is popular for vulnerability assessment and penetration testing positions. CISSP is the gold standard for mid-to-senior roles and is often a hard requirement at government entities, banks, and oil and gas companies — it commands a 25-40% salary premium. GIAC certifications (GCIH, GCFA, GCIA) from SANS are highly respected in SOC and incident response teams. CISM and CISA from ISACA are valued for governance and compliance-focused roles. Most GCC employers sponsor certification costs, including expensive SANS training courses ($8,000-10,000 per course).
What is the salary range for cybersecurity analysts in the UAE?
In the UAE, junior cybersecurity analysts (0-3 years, Security+/CEH) earn AED 8,000-15,000/month, mid-level analysts (3-6 years, CEH/GCIH) earn AED 15,000-28,000/month, senior analysts (6-10 years, CISSP/GIAC) earn AED 28,000-45,000/month, and cybersecurity managers or architects (10+ years, CISSP required) earn AED 40,000-70,000+/month. Total compensation including housing allowance, flights, certification sponsorship, and shift allowances adds 30-40% on top of base salary. All income is tax-free. OT/ICS security specialists and CISSP holders command premium rates above these ranges.
Is OT/ICS security experience valuable in the GCC?
OT/ICS security is one of the highest-demand specializations in GCC cybersecurity. Saudi Aramco, ADNOC, QatarEnergy, and utility companies across all six GCC countries need analysts who understand SCADA, DCS, and industrial control system security. The convergence of IT and OT networks has created significant attack surfaces, and state-sponsored threat actors (OilRig, MuddyWater) actively target GCC energy infrastructure. Knowledge of IEC 62443, NIST 800-82, and OT-specific monitoring tools (Claroty, Nozomi Networks, Dragos) commands a 20-35% salary premium over equivalent IT security roles. The talent pool is extremely limited, making this a high-value career path.
What is the career path for cybersecurity analysts in the GCC?
A typical progression: Junior SOC Analyst (0-3 years, Security+/CEH) performing alert monitoring and triage, to Cybersecurity Analyst (3-6 years, CEH/GCIH) handling threat hunting and incident response, to Senior Analyst (6-10 years, CISSP/GIAC) leading forensics and architecture reviews, to Cybersecurity Manager or Security Architect (10+ years). Specialization paths include: SOC Analyst to SOC Lead to SOC Manager, Penetration Tester to Red Team Lead, Threat Intelligence Analyst, Cloud Security Engineer, OT/ICS Security Specialist, and GRC (Governance, Risk, Compliance) Analyst to CISO. The CISO role at major GCC organizations commands AED 80,000-150,000+/month.
How important are GCC regulatory frameworks for cybersecurity roles?
GCC regulatory compliance is a primary driver of cybersecurity hiring in the region. NESA IAS (UAE) mandates security controls for critical infrastructure entities. NCA ECC (Saudi Arabia) applies to all government and critical sector organizations with 114 controls across 5 domains. SAMA Cybersecurity Framework governs all Saudi financial institutions. TDRA (UAE) regulates telecom security standards. Qatar NCSA and Bahrain NCSC enforce sector-specific requirements. Analysts with hands-on experience implementing and auditing against these frameworks are preferred over candidates with only international framework experience (ISO 27001, NIST). Many job descriptions explicitly list GCC framework experience as a requirement.
Do cybersecurity analysts in the GCC work shifts?
It depends on the role and employer. SOC analysts at MSSPs (Help AG, DarkMatter, Spire Solutions, Paramount) and large enterprise SOCs work 24/7 rotating shifts — typically 12-hour shifts in a 4-on/4-off or 3-on/3-off pattern. Shift work includes nights, weekends, and holidays, with shift differential allowances of AED 1,500-3,000/month on top of base salary. Non-SOC cybersecurity roles (GRC analysts, vulnerability management, security architects) typically work standard Sunday-Thursday business hours but are on-call for major incident response. Consulting firm analysts follow client schedules. Senior and management roles generally do not work shifts but are escalation points for critical incidents.

Share this guide

LinkedInXWhatsApp

Related Guides

Essential Cybersecurity Analyst Skills for GCC Jobs in 2026

Discover the threat detection, incident response, SIEM, and compliance skills GCC employers demand from Cybersecurity Analysts. Covers NESA, NCA ECC, and Gulf-specific roles.

Read more

ATS Keywords for Cybersecurity Analyst Resumes: Complete GCC Keyword List

Get the exact keywords ATS systems scan for in Cybersecurity Analyst resumes. 50+ keywords ranked by importance for UAE, Saudi Arabia, and GCC jobs.

Read more

Resume Keywords for Cybersecurity Analyst: Optimize Your CV for GCC Jobs

Discover the best keywords and placement strategies for your Cybersecurity Analyst resume. Section-by-section optimization for Technology jobs in the GCC.

Read more

Cybersecurity Analyst Interview Questions for GCC Jobs: 50+ Questions with Answers

Top cybersecurity analyst interview questions for GCC jobs. Technical, behavioral, and scenario-based questions with model answers for 2026.

Read more

Cybersecurity Analyst Salary: Compare Pay Across All 6 GCC Countries

Compare Cybersecurity Analyst salaries across UAE, Saudi Arabia, Qatar, Kuwait, Bahrain, and Oman. Compensation, certifications, benefits, and cost of living.

Read more

Network Engineer Job Description in the GCC: Roles, Requirements & Responsibilities

Complete network engineer job description for GCC roles. Key responsibilities, required skills, qualifications, and salary expectations for 2026.

Read more

Quick Facts

Experience0-10+ years (Junior to Architect/CISO)
Avg. SalaryAED 15,000-45,000/month
Top Skills
SIEM (Splunk/QRadar/Sentinel)Incident Response & ForensicsEDR (CrowdStrike/Defender)Vulnerability Assessment (Nessus/Qualys)CISSP/CEH/GIAC CertificationsGCC Compliance (NESA/NCA ECC)

Related Guides

  • Essential Cybersecurity Analyst Skills for GCC Jobs in 2026
  • ATS Keywords for Cybersecurity Analyst Resumes: Complete GCC Keyword List
  • Resume Keywords for Cybersecurity Analyst: Optimize Your CV for GCC Jobs
  • Cybersecurity Analyst Interview Questions for GCC Jobs: 50+ Questions with Answers
  • Cybersecurity Analyst Salary: Compare Pay Across All 6 GCC Countries
  • Network Engineer Job Description in the GCC: Roles, Requirements & Responsibilities

Match your resume to this job description

Upload your resume and get personalized feedback on how well it matches this role.

Get Your Free Career Report
menajobs

AI-powered GCC job board with resume optimization tools.

Serving:

UAESaudi ArabiaQatarKuwaitBahrainOman

Product

  • Resume Tools
  • Features
  • Pricing
  • FAQ

Resources

  • Resume Examples
  • CV Format Guides
  • Skills Guides
  • Salary Guides
  • ATS Keywords
  • Job Descriptions
  • Career Paths
  • Interview Questions
  • Achievement Examples
  • Resume Mistakes
  • Cover Letters
  • Resume Summaries
  • Resume Templates
  • ATS Resume Guide
  • Fresher Resumes
  • Career Change
  • Industry Guides

Country Guides

  • Jobs by Country
  • Visa Guides
  • Cost of Living
  • Expat Guides
  • Work Culture

Free Tools

  • ATS Checker
  • Offer Evaluator
  • Salary Guides
  • All Tools

Company

  • About
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • Refund Policy
  • Shipping & Delivery
  • Sitemap

Browse by Location

  • Jobs in UAE
  • Jobs in Saudi Arabia
  • Jobs in Qatar
  • Jobs in Dubai
  • Jobs in Riyadh
  • Jobs in Abu Dhabi

Browse by Category

  • Technology Jobs
  • Healthcare Jobs
  • Finance Jobs
  • Construction Jobs
  • Oil & Gas Jobs
  • Marketing Jobs

Popular Searches

  • Tech Jobs in Dubai
  • Healthcare in Saudi Arabia
  • Engineering in UAE
  • Finance in Qatar
  • IT Jobs in Riyadh
  • Oil & Gas in Abu Dhabi

© 2026 MenaJobs. All rights reserved.

LoginGet Started — Free