FIND_THE_RIGHTJOB.
o System must produce logs to be stored on file on the server level or streamed to SIEM.
o System must generate audit trails of all activities done by the admin/user/customer such as (creating meetings, meeting reminders, etc.).
o System must generate security logs of each activity to cover (Login, logout, password reset, password change, change of permissions, change of roles, etc.)
o System must store logs for at least 30 days and then archived for one year with sharing process of how to restore archives during security incidents.
o System must generate event logs when logs are tampered with or changed.
o System must have protected logs from tampering or deleting.
o System must generate logs when configuration changed by admin/user.
o System must generate logs when files or folders are changed.
o Databases are tables to store data and won’t be accepted as logs.
o System must provide enriched data on the event log where it shows (Src IP, Dest IP, event type, time, user, actioned user, details of action, any additional information that might support cybersecurity cases).
o Middleware systems that transfer logs are not accepted as log sources.
o System must generate logs on all attempts including successful, or failed attempts.
o System must generate logs when start, stop, restart, of system processes and events.
Similar jobs
Omada Rail Systems
Riyadh, Saudi Arabia
7 days ago
Tabby | تابي
Riyadh, Saudi Arabia
7 days ago
Mung Investments
Riyadh, Saudi Arabia
7 days ago
Marriott International
Riyadh, Saudi Arabia
7 days ago
Adobe
Riyadh, Saudi Arabia
7 days ago
Leuwint technologies
Riyadh, Saudi Arabia
7 days ago
Devoteam
Riyadh, Saudi Arabia
7 days ago
© 2026 Qureos. All rights reserved.