15 Data Loss Prevention jobs in Qatar
Data Protection & Personally Identifiable Information (PII) Specialist
Posted 13 days ago
Job Viewed
Job Description
- This role is designed for a professional deeply committed to safeguarding sensitive personal data and ensuring compliance with global and regional data protection regulations (e.g., GDPR, CCPA, Qatar PDPPL). You will lead efforts to identify, classify, and protect PII across the organization while embedding privacy-by-design principles into business processes. Your responsibilities will span data lifecycle governance, third-party risk management, regulatory compliance, and incident response, ensuring that all data processing activities align with legal and ethical standards.
- This position requires a strategic thinker who can balance technical controls with regulatory requirements, collaborate cross-functionally to mitigate risks, and foster a culture of data privacy
KEY RESPONSIBILITIES
1. Data Governance & Compliance
Data Lifecycle Governance :
- Design and implement end-to-end data lifecycle policies to govern data from creation / collection to archival and secure deletion, ensuring compliance with legal, regulatory, and business requirements.
- Define retention schedules, archival protocols, and secure disposal methods for sensitive data (e.g., PII, financial records) in collaboration with legal and IT teams.
Data Classification
- Develop / Enhance Data Classification Frameworks : Design and implement a tiered classification system (e.g., Public, Internal, Restricted, Confidential) to categorize data based on sensitivity, regulatory requirements, and business impact.
- Define Classification Standards : Establish clear criteria for labeling data types (e.g., PII, financial records, intellectual property) and enforce metadata tagging for traceability.
Regulatory Compliance :
- Ensure adherence to GDPR, CCPA, Qatar PDPPL, and other applicable laws by implementing consent management frameworks, data subject rights workflows, and breach notification protocols.
2. Technical Safeguards & Risk Mitigation
Data Protection Controls :
- Implement encryption, tokenization, and pseudonymization for PII at rest and in transit.
- Deploy Data Loss Prevention (DLP) tools to monitor and restrict unauthorized data transfers.
3. Third-Party & Vendor Oversight
- Assess third-party vendors for compliance with data protection obligations through questionnaires, audits, and contractual reviews.
Data Processing Agreements (DPAs) :
- Draft and enforce DPAs to ensure vendors adhere to organizational privacy standards and regulatory mandates.
TECHNICAL REQUIREMENTS
- Expertise in data protection technologies : DLP, encryption (AES-256, TLS), and anonymization tools.
- Proficiency with compliance platforms : OneTrust, TrustArc, or similar for PIAs and consent management.
- Familiarity with cloud security (AWS / Azure / GCP IAM, storage ACLs) and data residency requirements.
- Knowledge of privacy-enhancing technologies (PETs) such as differential privacy or homomorphic encryption.
- Experience with incident response tools for breach detection and analysis.
- Basic scripting skills (Python, SQL) for data mapping and workflow automation.
CERTIFICATIONS
- Required : CIPP (Certified Information Privacy Professional) or CIPM (Certified Information Privacy Manager).
- Preferred : ISO 27001 Lead Implementer, CDPSE (Certified Data Privacy Solutions Engineer).
- Advantageous : Cloud-specific certifications.
REQUIRED EXPERIENCE
- 3+ years in data protection, privacy compliance, or PII governance roles.
- Demonstrated experience conducting PIAs, managing DSARs, and responding to data breaches.
- Proven track record in implementing GDPR / CCPA / Qatar PDPPL requirements within complex organizations.
- Familiarity with third-party risk management frameworks and contract negotiation.
IDEAL CANDIDATE PROFILE
You are a detail-oriented professional with a deep understanding of global privacy regulations and the technical acumen to translate legal requirements into actionable controls. You thrive in collaborative environments, excel at simplifying complex privacy concepts for non-technical stakeholders, and are passionate about fostering a privacy-first culture. Your ability to balance proactive risk mitigation with operational efficiency will be critical in protecting the organization's reputation and maintaining stakeholder trust.
- Skillset Required : Proactive, Loss Prevention, Iso 27001, Devops, Azure, Policy Development, Information Security, Compliance, Intellect, Python, Data Handling, Workflow, Iam, Excel, Triggers, Detail-oriented, Sql, Design Principles, Trends
Data Protection & Personally Identifiable Information (PII) Specialist
Posted 18 days ago
Job Viewed
Job Description
- This role is designed for a professional deeply committed to safeguarding sensitive personal data and ensuring compliance with global and regional data protection regulations (e.g., GDPR, CCPA, Qatar PDPPL). You will lead efforts to identify, classify, and protect PII across the organization while embedding privacy-by-design principles into business processes. Your responsibilities will span data lifecycle governance, third-party risk management, regulatory compliance, and incident response, ensuring that all data processing activities align with legal and ethical standards.
- This position requires a strategic thinker who can balance technical controls with regulatory requirements, collaborate cross-functionally to mitigate risks, and foster a culture of data privacy
KEY RESPONSIBILITIES
1. Data Governance & Compliance
Data Lifecycle Governance :
- Design and implement end-to-end data lifecycle policies to govern data from creation / collection to archival and secure deletion, ensuring compliance with legal, regulatory, and business requirements.
- Define retention schedules, archival protocols, and secure disposal methods for sensitive data (e.g., PII, financial records) in collaboration with legal and IT teams.
Data Classification
- Develop / Enhance Data Classification Frameworks : Design and implement a tiered classification system (e.g., Public, Internal, Restricted, Confidential) to categorize data based on sensitivity, regulatory requirements, and business impact.
- Define Classification Standards : Establish clear criteria for labeling data types (e.g., PII, financial records, intellectual property) and enforce metadata tagging for traceability.
Regulatory Compliance :
- Ensure adherence to GDPR, CCPA, Qatar PDPPL, and other applicable laws by implementing consent management frameworks, data subject rights workflows, and breach notification protocols.
2. Technical Safeguards & Risk Mitigation
Data Protection Controls :
- Implement encryption, tokenization, and pseudonymization for PII at rest and in transit.
- Deploy Data Loss Prevention (DLP) tools to monitor and restrict unauthorized data transfers.
3. Third-Party & Vendor Oversight
- Assess third-party vendors for compliance with data protection obligations through questionnaires, audits, and contractual reviews.
Data Processing Agreements (DPAs) :
- Draft and enforce DPAs to ensure vendors adhere to organizational privacy standards and regulatory mandates.
TECHNICAL REQUIREMENTS
- Expertise in data protection technologies : DLP, encryption (AES-256, TLS), and anonymization tools.
- Proficiency with compliance platforms : OneTrust, TrustArc, or similar for PIAs and consent management.
- Familiarity with cloud security (AWS / Azure / GCP IAM, storage ACLs) and data residency requirements.
- Knowledge of privacy-enhancing technologies (PETs) such as differential privacy or homomorphic encryption.
- Experience with incident response tools for breach detection and analysis.
- Basic scripting skills (Python, SQL) for data mapping and workflow automation.
CERTIFICATIONS
- Required : CIPP (Certified Information Privacy Professional) or CIPM (Certified Information Privacy Manager).
- Preferred : ISO 27001 Lead Implementer, CDPSE (Certified Data Privacy Solutions Engineer).
- Advantageous : Cloud-specific certifications.
REQUIRED EXPERIENCE
- 3+ years in data protection, privacy compliance, or PII governance roles.
- Demonstrated experience conducting PIAs, managing DSARs, and responding to data breaches.
- Proven track record in implementing GDPR / CCPA / Qatar PDPPL requirements within complex organizations.
- Familiarity with third-party risk management frameworks and contract negotiation.
IDEAL CANDIDATE PROFILE
You are a detail-oriented professional with a deep understanding of global privacy regulations and the technical acumen to translate legal requirements into actionable controls. You thrive in collaborative environments, excel at simplifying complex privacy concepts for non-technical stakeholders, and are passionate about fostering a privacy-first culture. Your ability to balance proactive risk mitigation with operational efficiency will be critical in protecting the organization’s reputation and maintaining stakeholder trust.
- Skillset Required : Proactive, Loss Prevention, Iso 27001, Devops, Azure, Policy Development, Information Security, Compliance, Intellect, Python, Data Handling, Workflow, Iam, Excel, Triggers, Detail-oriented, Sql, Design Principles, Trends
Data Protection & Personally Identifiable Information (PII) Specialist
Posted 17 days ago
Job Viewed
Job Description
#J-18808-Ljbffr
Professor -Data and Cyber Security
Posted 13 days ago
Job Viewed
Job Description
Join to apply for the Professor -Data and Cyber Security role at University of Doha for Science & Technology
Join to apply for the Professor -Data and Cyber Security role at University of Doha for Science & Technology
Get AI-powered advice on this job and more exclusive features.
Overview
University of Doha for Science and Technology (UDST) is the first national applied University in the State of Qatar, offering applied bachelor's and master's degrees in different fields. UDST has over 50 programs in the fields of Computing and Information Technology, Engineering Technology and Industrial Trades, Business Management, Health Sciences, and more.
Overview
University of Doha for Science and Technology (UDST) is the first national applied University in the State of Qatar, offering applied bachelor's and master's degrees in different fields. UDST has over 50 programs in the fields of Computing and Information Technology, Engineering Technology and Industrial Trades, Business Management, Health Sciences, and more.
Thanks to a generous grant from the National Cyber Security Agency (NCSA, ) in the State of Qatar, the College of Computing and Information Technology (CCIT) invites applications for the position of NCSA Professorship Chair at the rank of Full Professor in Data and Cyber Security. This 10-month renewable full-time position will entail teaching (1 course per semester), applied research (with focus on critical infrastructure security), and service.
Responsibilities
Your Commitment
Reporting to the Head of Data and Cyber-Security Department, the successful candidate will collaborate with the faculty in the CCIT and staff members in the NCSA to achieve their respective missions. She/He will liaise with NCSA and key industry stakeholders in the State of Qatar to advance critical infrastructure security posture by working on research projects, developing strategic initiatives, and conducting workshops relevant to the field. The current data and cyber-security degree program in the CCIT encompasses a broad range of courses from applied cryptography to industrial control systems security, through network security, ethical hacking, security monitoring, and incident response. The degree program is also complemented with a master program in artificial intelligence and cognitive cybersecurity.
Qualifications
Education and Experience Requirements Education
PhD in Cyber-Security or closely related field from an internationally recognized university.
Experience
- A minimum of 10 years teaching and research experience in a higher-education institution, along with preferably 5 years of employment experience as a practitioner/professional within the field of critical infrastructure security.
- A distinguished research record and international reputation evidenced by high quality publications in top tier journals.
- Excellent record of supervising research students.
- A thorough knowledge and work experience in different areas of cyber security.
- Commitment to applied and experiential learning as a pedagogy and a key feature of UDST's mandate.
- Digital literacy and demonstrated fluency in technology systems, and an ability to model and facilitate use of current and emerging digital tools to support research and learning.
- Demonstrated ability to develop technology-enriched learning environments that enable students to be active participants in their own learning.
- Commitment to the effectiveness, vitality, and self-renewal of the teaching profession through self-driven continuous professional development and life-long learning.
- Effective oral and written communication skills.
- Collaborative and collegial spirit and a demonstrated ability to establish rapport with learners, colleagues, sponsor-employers, and members of the community.
- Ability to initiate applied research projects.
Applicants must meet all essential qualifications to be shortlisted for the position; other qualifications may be a deciding factor in the selection. Qualifications and experience will be assessed through your application, which may include but not be limited to curricula vitae, motivation letter, references, teaching dossiers, and sample publications. It is the applicant's responsibility to provide appropriate examples that illustrate how s/he meets each requirement. Failing to do so could result in the application being rejected. We thank all applicants for applying for the role; only those selected for further consideration will be contacted. Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Education and Training
- Industries Higher Education
Referrals increase your chances of interviewing at University of Doha for Science & Technology by 2x
Get notified about new Professor jobs in Doha, Qatar .
Assistant/Associate Professor in Computer Networks-2025 Assistant/Associate Professor in Cyber Security - 2025 Assistant Professor or Lecturer in Mathematics or Statistics-2025 Associate Professor/ Assistant Professor- Construction Engineering Associate Professor/ Assistant Professor- Chemical Engineering Teacher of Humanities (August 2025 start) Early Years Teacher - International Academies, Qatar - August 2025 Start, ASQ INTERNATIONAL Female Primary Class Teacher required (August 2025 start) Junior Teacher - Year 3-6 (August 2025 start) English Teacher - Doha, Qatar - August 2025, TEACH ANYWHERE Grades 8 & 9 ELA and Social Studies Teacher (2025/26)Doha, Qatar CA$46,000.00-CA$63,000.00 1 month ago
Secondary Humanities Teacher - British International School in Doha - August 2025 Start, ASQ INTERNATIONAL Secondary Science Teacher - British International School in Doha - August 2025 Start, ASQ INTERNATIONAL Key Stage 2 Teacher - British Academies, Doha, Qatar - August 2025 Start, ASQ INTERNATIONALWe're unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Professor -Data and Cyber Security
Posted 3 days ago
Job Viewed
Job Description
Join to apply for the Professor -Data and Cyber Security role at University of Doha for Science & Technology
Join to apply for the Professor -Data and Cyber Security role at University of Doha for Science & Technology
Get AI-powered advice on this job and more exclusive features.
Overview
University of Doha for Science and Technology (UDST) is the first national applied University in the State of Qatar, offering applied bachelor’s and master’s degrees in different fields. UDST has over 50 programs in the fields of Computing and Information Technology, Engineering Technology and Industrial Trades, Business Management, Health Sciences, and more.
Overview
University of Doha for Science and Technology (UDST) is the first national applied University in the State of Qatar, offering applied bachelor’s and master’s degrees in different fields. UDST has over 50 programs in the fields of Computing and Information Technology, Engineering Technology and Industrial Trades, Business Management, Health Sciences, and more.
Thanks to a generous grant from the National Cyber Security Agency (NCSA, in the State of Qatar, the College of Computing and Information Technology (CCIT) invites applications for the position of NCSA Professorship Chair at the rank of Full Professor in Data and Cyber Security. This 10-month renewable full-time position will entail teaching (1 course per semester), applied research (with focus on critical infrastructure security), and service.
Responsibilities
Your Commitment
Reporting to the Head of Data and Cyber-Security Department, the successful candidate will collaborate with the faculty in the CCIT and staff members in the NCSA to achieve their respective missions. She/He will liaise with NCSA and key industry stakeholders in the State of Qatar to advance critical infrastructure security posture by working on research projects, developing strategic initiatives, and conducting workshops relevant to the field. The current data and cyber-security degree program in the CCIT encompasses a broad range of courses from applied cryptography to industrial control systems security, through network security, ethical hacking, security monitoring, and incident response. The degree program is also complemented with a master program in artificial intelligence and cognitive cybersecurity.
Qualifications
Education and Experience Requirements Education
PhD in Cyber-Security or closely related field from an internationally recognized university.
Experience
- A minimum of 10 years teaching and research experience in a higher-education institution, along with preferably 5 years of employment experience as a practitioner/professional within the field of critical infrastructure security.
- A distinguished research record and international reputation evidenced by high quality publications in top tier journals.
- Excellent record of supervising research students.
- A thorough knowledge and work experience in different areas of cyber security.
- Commitment to applied and experiential learning as a pedagogy and a key feature of UDST’s mandate.
- Digital literacy and demonstrated fluency in technology systems, and an ability to model and facilitate use of current and emerging digital tools to support research and learning.
- Demonstrated ability to develop technology-enriched learning environments that enable students to be active participants in their own learning.
- Commitment to the effectiveness, vitality, and self-renewal of the teaching profession through self-driven continuous professional development and life-long learning.
- Effective oral and written communication skills.
- Collaborative and collegial spirit and a demonstrated ability to establish rapport with learners, colleagues, sponsor-employers, and members of the community.
- Ability to initiate applied research projects.
Applicants must meet all essential qualifications to be shortlisted for the position; other qualifications may be a deciding factor in the selection. Qualifications and experience will be assessed through your application, which may include but not be limited to curricula vitae, motivation letter, references, teaching dossiers, and sample publications. It is the applicant’s responsibility to provide appropriate examples that illustrate how s/he meets each requirement. Failing to do so could result in the application being rejected. We thank all applicants for applying for the role; only those selected for further consideration will be contacted. Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Education and Training
- Industries Higher Education
Referrals increase your chances of interviewing at University of Doha for Science & Technology by 2x
Get notified about new Professor jobs in Doha, Qatar .
Assistant/Associate Professor in Computer Networks-2025 Assistant/Associate Professor in Cyber Security - 2025 Assistant Professor or Lecturer in Mathematics or Statistics-2025 Associate Professor/ Assistant Professor- Construction Engineering Associate Professor/ Assistant Professor- Chemical Engineering Teacher of Humanities (August 2025 start) Early Years Teacher – International Academies, Qatar – August 2025 Start, ASQ INTERNATIONAL Female Primary Class Teacher required (August 2025 start) Junior Teacher - Year 3-6 (August 2025 start) English Teacher - Doha, Qatar - August 2025, TEACH ANYWHERE Grades 8 & 9 ELA and Social Studies Teacher (2025/26)Doha, Qatar CA$46,000.00-CA$63,000.00 1 month ago
Secondary Humanities Teacher - British International School in Doha - August 2025 Start, ASQ INTERNATIONAL Secondary Science Teacher - British International School in Doha - August 2025 Start, ASQ INTERNATIONAL Key Stage 2 Teacher – British Academies, Doha, Qatar – August 2025 Start, ASQ INTERNATIONALWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrProfessor -Data and Cyber Security
Posted 1 day ago
Job Viewed
Job Description
Professor -Data and Cyber Security
role at
University of Doha for Science & Technology Join to apply for the
Professor -Data and Cyber Security
role at
University of Doha for Science & Technology Get AI-powered advice on this job and more exclusive features. Overview
University of Doha for Science and Technology (UDST) is the first national applied University in the State of Qatar, offering applied bachelor’s and master’s degrees in different fields. UDST has over 50 programs in the fields of Computing and Information Technology, Engineering Technology and Industrial Trades, Business Management, Health Sciences, and more. Overview
University of Doha for Science and Technology (UDST) is the first national applied University in the State of Qatar, offering applied bachelor’s and master’s degrees in different fields. UDST has over 50 programs in the fields of Computing and Information Technology, Engineering Technology and Industrial Trades, Business Management, Health Sciences, and more.
Thanks to a generous grant from the National Cyber Security Agency (NCSA, in the State of Qatar, the College of Computing and Information Technology (CCIT) invites applications for the position of NCSA Professorship Chair at the rank of Full Professor in Data and Cyber Security. This 10-month renewable full-time position will entail teaching (1 course per semester), applied research (with focus on critical infrastructure security), and service.
Responsibilities
Your Commitment
Reporting to the Head of Data and Cyber-Security Department, the successful candidate will collaborate with the faculty in the CCIT and staff members in the NCSA to achieve their respective missions. She/He will liaise with NCSA and key industry stakeholders in the State of Qatar to advance critical infrastructure security posture by working on research projects, developing strategic initiatives, and conducting workshops relevant to the field. The current data and cyber-security degree program in the CCIT encompasses a broad range of courses from applied cryptography to industrial control systems security, through network security, ethical hacking, security monitoring, and incident response. The degree program is also complemented with a master program in artificial intelligence and cognitive cybersecurity.
Qualifications
Education and Experience Requirements
Education
PhD in Cyber-Security or closely related field from an internationally recognized university.
Experience
A minimum of 10 years teaching and research experience in a higher-education institution, along with preferably 5 years of employment experience as a practitioner/professional within the field of critical infrastructure security. A distinguished research record and international reputation evidenced by high quality publications in top tier journals. Excellent record of supervising research students.
Other Required Skills
A thorough knowledge and work experience in different areas of cyber security. Commitment to applied and experiential learning as a pedagogy and a key feature of UDST’s mandate. Digital literacy and demonstrated fluency in technology systems, and an ability to model and facilitate use of current and emerging digital tools to support research and learning. Demonstrated ability to develop technology-enriched learning environments that enable students to be active participants in their own learning. Commitment to the effectiveness, vitality, and self-renewal of the teaching profession through self-driven continuous professional development and life-long learning. Effective oral and written communication skills. Collaborative and collegial spirit and a demonstrated ability to establish rapport with learners, colleagues, sponsor-employers, and members of the community. Ability to initiate applied research projects.
How To Apply
Applicants must meet all essential qualifications to be shortlisted for the position; other qualifications may be a deciding factor in the selection. Qualifications and experience will be assessed through your application, which may include but not be limited to curricula vitae, motivation letter, references, teaching dossiers, and sample publications. It is the applicant’s responsibility to provide appropriate examples that illustrate how s/he meets each requirement. Failing to do so could result in the application being rejected. We thank all applicants for applying for the role; only those selected for further consideration will be contacted. Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Education and Training Industries Higher Education Referrals increase your chances of interviewing at University of Doha for Science & Technology by 2x Get notified about new Professor jobs in
Doha, Qatar . Assistant/Associate Professor in Computer Networks-2025
Assistant/Associate Professor in Cyber Security - 2025
Assistant Professor or Lecturer in Mathematics or Statistics-2025
Associate Professor/ Assistant Professor- Construction Engineering
Associate Professor/ Assistant Professor- Chemical Engineering
Teacher of Humanities (August 2025 start)
Early Years Teacher – International Academies, Qatar – August 2025 Start, ASQ INTERNATIONAL
Female Primary Class Teacher required (August 2025 start)
Junior Teacher - Year 3-6 (August 2025 start)
English Teacher - Doha, Qatar - August 2025, TEACH ANYWHERE
Grades 8 & 9 ELA and Social Studies Teacher (2025/26)
Doha, Qatar CA$46,000.00-CA$63,000.00 1 month ago Secondary Humanities Teacher - British International School in Doha - August 2025 Start, ASQ INTERNATIONAL
Secondary Science Teacher - British International School in Doha - August 2025 Start, ASQ INTERNATIONAL
Key Stage 2 Teacher – British Academies, Doha, Qatar – August 2025 Start, ASQ INTERNATIONAL
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Professor of Data and Cyber Security
Posted 2 days ago
Job Viewed
Job Description
University of Doha for Science and Technology (UDST) is the first national applied University in the State of Qatar, offering applied bachelor's and master's degrees in different fields. UDST has over 50 programs in the fields of Computing and Information Technology, Engineering Technology and Industrial Trades, Business Management, Health Sciences, and more.
Thanks to a generous grant from the National Cyber Security Agency (NCSA, ncsa.gov.qa/en ) in the State of Qatar, the College of Computing and Information Technology (CCIT) invites applications for the position of NCSA Professorship Chair at the rank of Full Professor in Data and Cyber Security. This 10-month renewable full-time position will entail teaching (1 course per semester), applied research (with focus on critical infrastructure security), and service.
ResponsibilitiesYour Commitment
Reporting to the Head of Data and Cyber-Security Department, the successful candidate will collaborate with the faculty in the CCIT and staff members in the NCSA to achieve their respective missions. She/He will liaise with NCSA and key industry stakeholders in the State of Qatar to advance critical infrastructure security posture by working on research projects, developing strategic initiatives, and conducting workshops relevant to the field. The current data and cyber-security degree program in the CCIT encompasses a broad range of courses from applied cryptography to industrial control systems security, through network security, ethical hacking, security monitoring, and incident response. The degree program is also complemented with a master program in artificial intelligence and cognitive cybersecurity.
QualificationsEducation and Experience Requirements Education
PhD in Cyber-Security or closely related field from an internationally recognized university.
Experience
- A minimum of 10 years teaching and research experience in a higher-education institution, along with preferably 5 years of employment experience as a practitioner/professional within the field of critical infrastructure security.
- A distinguished research record and international reputation evidenced by high quality publications in top tier journals.
- Excellent record of supervising research students.
Other Required Skills:
- A thorough knowledge and work experience in different areas of cyber security.
- Commitment to applied and experiential learning as a pedagogy and a key feature of UDST's mandate.
- Digital literacy and demonstrated fluency in technology systems, and an ability to model and facilitate use of current and emerging digital tools to support research and learning.
- Demonstrated ability to develop technology-enriched learning environments that enable students to be active participants in their own learning.
- Commitment to the effectiveness, vitality, and self-renewal of the teaching profession through self-driven continuous professional development and life-long learning.
- Effective oral and written communication skills.
- Collaborative and collegial spirit and a demonstrated ability to establish rapport with learners, colleagues, sponsor-employers, and members of the community.
- Ability to initiate applied research projects.
How to Apply
Applicants must meet all essential qualifications to be shortlisted for the position; other qualifications may be a deciding factor in the selection. Qualifications and experience will be assessed through your application, which may include but not be limited to curricula vitae, motivation letter, references, teaching dossiers, and sample publications. It is the applicant's responsibility to provide appropriate examples that illustrate how s/he meets each requirement. Failing to do so could result in the application being rejected. We thank all applicants for applying for the role; only those selected for further consideration will be contacted.
Be The First To Know
About the latest Data loss prevention Jobs in Qatar !
Professor of Data and Cyber Security
Posted 2 days ago
Job Viewed
Job Description
University of Doha for Science and Technology (UDST) is the first national applied University in the State of Qatar, offering applied bachelor’s and master’s degrees in different fields. UDST has over 50 programs in the fields of Computing and Information Technology, Engineering Technology and Industrial Trades, Business Management, Health Sciences, and more.
Thanks to a generous grant from the National Cyber Security Agency (NCSA, ncsa.gov.qa/en ) in the State of Qatar, the College of Computing and Information Technology (CCIT) invites applications for the position of NCSA Professorship Chair at the rank of Full Professor in Data and Cyber Security. This 10-month renewable full-time position will entail teaching (1 course per semester), applied research (with focus on critical infrastructure security), and service.
ResponsibilitiesYour Commitment
Reporting to the Head of Data and Cyber-Security Department, the successful candidate will collaborate with the faculty in the CCIT and staff members in the NCSA to achieve their respective missions. She/He will liaise with NCSA and key industry stakeholders in the State of Qatar to advance critical infrastructure security posture by working on research projects, developing strategic initiatives, and conducting workshops relevant to the field. The current data and cyber-security degree program in the CCIT encompasses a broad range of courses from applied cryptography to industrial control systems security, through network security, ethical hacking, security monitoring, and incident response. The degree program is also complemented with a master program in artificial intelligence and cognitive cybersecurity.
QualificationsEducation and Experience Requirements Education
PhD in Cyber-Security or closely related field from an internationally recognized university.
Experience
- A minimum of 10 years teaching and research experience in a higher-education institution, along with preferably 5 years of employment experience as a practitioner/professional within the field of critical infrastructure security.
- A distinguished research record and international reputation evidenced by high quality publications in top tier journals.
- Excellent record of supervising research students.
Other Required Skills:
- A thorough knowledge and work experience in different areas of cyber security.
- Commitment to applied and experiential learning as a pedagogy and a key feature of UDST’s mandate.
- Digital literacy and demonstrated fluency in technology systems, and an ability to model and facilitate use of current and emerging digital tools to support research and learning.
- Demonstrated ability to develop technology-enriched learning environments that enable students to be active participants in their own learning.
- Commitment to the effectiveness, vitality, and self-renewal of the teaching profession through self-driven continuous professional development and life-long learning.
- Effective oral and written communication skills.
- Collaborative and collegial spirit and a demonstrated ability to establish rapport with learners, colleagues, sponsor-employers, and members of the community.
- Ability to initiate applied research projects.
How to Apply
Applicants must meet all essential qualifications to be shortlisted for the position; other qualifications may be a deciding factor in the selection. Qualifications and experience will be assessed through your application, which may include but not be limited to curricula vitae, motivation letter, references, teaching dossiers, and sample publications. It is the applicant’s responsibility to provide appropriate examples that illustrate how s/he meets each requirement. Failing to do so could result in the application being rejected. We thank all applicants for applying for the role; only those selected for further consideration will be contacted.
#J-18808-LjbffrProfessor of Data and Cyber Security
Posted 2 days ago
Job Viewed
Job Description
Your Commitment Reporting to the Head of Data and Cyber-Security Department, the successful candidate will collaborate with the faculty in the CCIT and staff members in the NCSA to achieve their respective missions. She/He will liaise with NCSA and key industry stakeholders in the State of Qatar to advance critical infrastructure security posture by working on research projects, developing strategic initiatives, and conducting workshops relevant to the field. The current data and cyber-security degree program in the CCIT encompasses a broad range of courses from applied cryptography to industrial control systems security, through network security, ethical hacking, security monitoring, and incident response. The degree program is also complemented with a master program in artificial intelligence and cognitive cybersecurity. Qualifications
Education and Experience Requirements
Education PhD in Cyber-Security or closely related field from an internationally recognized university. Experience A minimum of 10 years teaching and research experience in a higher-education institution, along with preferably 5 years of employment experience as a practitioner/professional within the field of critical infrastructure security. A distinguished research record and international reputation evidenced by high quality publications in top tier journals. Excellent record of supervising research students. Other Required Skills: A thorough knowledge and work experience in different areas of cyber security. Commitment to applied and experiential learning as a pedagogy and a key feature of UDST’s mandate. Digital literacy and demonstrated fluency in technology systems, and an ability to model and facilitate use of current and emerging digital tools to support research and learning. Demonstrated ability to develop technology-enriched learning environments that enable students to be active participants in their own learning. Commitment to the effectiveness, vitality, and self-renewal of the teaching profession through self-driven continuous professional development and life-long learning. Effective oral and written communication skills. Collaborative and collegial spirit and a demonstrated ability to establish rapport with learners, colleagues, sponsor-employers, and members of the community. Ability to initiate applied research projects. How to Apply Applicants must meet all essential qualifications to be shortlisted for the position; other qualifications may be a deciding factor in the selection. Qualifications and experience will be assessed through your application, which may include but not be limited to curricula vitae, motivation letter, references, teaching dossiers, and sample publications. It is the applicant’s responsibility to provide appropriate examples that illustrate how s/he meets each requirement. Failing to do so could result in the application being rejected. We thank all applicants for applying for the role; only those selected for further consideration will be contacted.
#J-18808-Ljbffr
Security Specialist - Endpoint Security and Data Leak Protection Analyst
Posted today
Job Viewed
Job Description
Join to apply for the Security Specialist - Endpoint Security and Data Leak Protection Analyst role at ECCO Gulf WLL
The Security Specialist - Endpoint Security and Data Leak Protection Analyst is responsible for ensuring the protection of the organization's information and data through the administration of security policies and practices. This role focuses on endpoint security and data leak protection, ensuring that authorized users can access data while maintaining confidentiality, integrity, and availability. The role requires proactive security monitoring, policy enforcement, incident management, and collaboration with other teams to ensure robust security practices are followed across the organization.
Key Responsibilities & Accountabilities
- Drafts, implements, and maintains security policies, standards, procedures, and documentation for endpoint security.
- Monitors and enforces the application of security operations procedures.
- Reviews systems for potential breaches and ensures all identified security breaches are thoroughly investigated.
- Implements necessary system changes to maintain and enhance endpoint security.
- Ensures that security records and logs related to endpoints and data leak protection are accurate, complete, and up-to-date.
Strategy, Architecture, and Information Strategy
- Conducts vulnerability assessments and security risk assessments on endpoint devices (desktops, laptops, mobile devices, servers) and applications.
- Provides strategic advice on security solutions and best practices for endpoint protection and data leak prevention.
- Investigates major breaches of endpoint security or data leaks and recommends improvements in security controls.
- Contributes to the development and refinement of endpoint security strategies and standards in line with industry best practices and regulatory compliance.
Planning, Prioritization, and Problem Solving
- Plans and prioritizes endpoint security and data leak protection initiatives, ensuring alignment with organizational goals.
- Assesses the impact of technological changes, regulations, and business processes on endpoint security and implements necessary security measures.
- Continuously evaluates and adjusts security strategies and goals based on organizational needs, emerging threats, and regulatory changes.
Technology
- Demonstrates strong technical knowledge of endpoint security technologies, such as antivirus, EDR (Endpoint Detection and Response), XDR (Extended Detection and Response), encryption, and DLP (Data Leak Prevention) systems.
- Utilizes tools such as SIEM, IDS/IPS, and application firewalls to monitor, analyze, and mitigate security threats targeting endpoint devices.
- Ensures compliance with information security policies, focusing on protecting endpoints and preventing data leaks.
Key Responsibilities & Security Measures
- Endpoint Security & Data Leak Prevention: Develops, implements, and manages endpoint security policies for devices including desktops, laptops, mobile devices, and servers.
- Incident Response: Acts as the first responder to security incidents related to endpoints and data leaks, conducts investigations, and recommends remediation actions.
- Security Tools & Technologies: Manages and optimizes endpoint security tools, including antivirus software, EDR/XDR solutions, encryption, and DLP systems.
- Collaboration: Works closely with IT and compliance teams to ensure endpoint security policies align with industry standards, regulatory requirements, and best practices.
- Continuous Monitoring: Stays up-to-date with the latest security trends and threats, continuously monitoring endpoint devices for vulnerabilities, threats, and potential data leaks.
Skills & Qualifications
- 5-6 years of hands-on experience in cybersecurity, with specific focus on endpoint security, data leak protection, incident response, and vulnerability management.
- Bachelor's degree/ Engineering in Information Security, Computer Science, or a related field.
- Proven experience with Endpoint security monitoring tools (Microsoft Defender XDR, Endgame EDR, Microsoft DLP, etc.).
- In-depth knowledge of security policies and standards regarding endpoint protection, data leak prevention, and network security.
- Experience with security technologies such as SIEM, IDS/IPS, antivirus solutions, and encryption tools.
- Strong understanding of networking protocols, operating systems (Windows, Linux, macOS), and internet security.
- Experience in systems installation, configuration, and administration, including endpoint devices and security environments.
- Hands-on experience with DLP technologies and data privacy tools.
- Ability to analyze security incidents, identify root causes, and implement remediation actions.
- Certifications
- Mandatory:
- CompTIA Security+
- Certified Information Privacy Professional (CIPP)
- Microsoft Security Operations Analyst-SE 200
- Preferred (not mandatory):
- CISSP
- Certified Ethical Hacker (CEH)
- SANS GIAC Security Essentials (GSEC)
- SANS GIAC Certified Enterprise Defender (GCED)
Seniority level
- Mid-Senior level
Employment type
- Full-time
Job function
- Other, Information Technology, and Management
- Industries: Outsourcing and Offshoring Consulting
Referrals increase your chances of interviewing at ECCO Gulf WLL by 2x
Get notified about new Security Professional jobs in Qatar .
Note: This description includes only the primary role details and standard EEO information. Other job listings and unrelated content have been omitted for clarity.