11 Data Privacy jobs in Qatar
Data Privacy Engineer
Posted 1 day ago
Job Viewed
Job Description
Job Summary
We mandated to hired a highly skilled Data Privacy Engineer to design, implement, and maintain privacy-focused systems in compliance with Qatar’s Personal Data Privacy Protection Law (PDPPL) and global privacy standards. The role requires expertise in translating privacy requirements into technical solutions, conducting privacy impact assessments, and embedding privacy into system architecture. The successful candidate will bring hands-on technical proficiency, strong regulatory knowledge, and experience working in Qatar or the GCC, ensuring alignment with Qatar’s regulatory environment, cybersecurity mandates, and organizational compliance priorities .
Key Responsibilities
Implement and manage privacy engineering solutions ensuring compliance with Qatar’s PDPPL , GDPR, CCPA/CPRA, and other global data protection regulations.
Collaborate with legal, compliance, and IT governance teams to align technical controls with Qatar’s National Cybersecurity Frameworks and industry standards.
Design and maintain systems for data classification, mapping, and Data Loss Prevention (DLP) to safeguard sensitive personal and national information.
Conduct Privacy Impact Assessments (PIAs), Data Transfer Impact Assessments (DTIAs), and Records of Processing Activities (ROPAs) for new and existing systems.
Develop and deliver privacy training programs for employees handling personal and sensitive data in Qatar , ensuring awareness of local and international obligations.
Oversee privacy governance for tracking technologies and cross-border data transfers , ensuring compliance with Qatar’s Ministry of Communications and Information Technology (MCIT) guidelines .
Configure, manage, and optimize privacy tools such as OneTrust, Archer GRC, BigID, SecuritiAI, MS Purview , and others.
Support incident response, regulatory reporting, and breach notifications in line with Qatar’s Data Privacy Law requirements.
Provide executive-level reporting to senior leadership and regulators, demonstrating compliance readiness.
Stay updated on evolving privacy regulations in Qatar, GCC, and globally , and adjust technical frameworks accordingly.
Qualifications
Bachelor’s or Master’s degree in Information Technology, Cybersecurity, Computer Science, or related field.
7+ years of experience in privacy engineering, data governance, or data protection, ideally with experience in Qatar or GCC markets .
Strong knowledge of Qatar’s PDPPL , GDPR, UK-GDPR, HIPAA, NIST, ISO/IEC 27701, ISO 27001, PCI-DSS, and other global privacy frameworks.
Hands-on expertise with cloud and on-premises environments : AWS, Azure, GCP, Kubernetes.
Certifications strongly preferred: CIPT, CIPP/E, CIPM, FIP , or equivalent.
Proficiency in SQL, Python, and reporting tools (Power BI, Tableau).
Strong stakeholder management and ability to work with multicultural teams in Qatar’s government and private sector .
Bilingual proficiency in English and Arabic is mandatory.
Data Privacy Engineer
Posted 1 day ago
Job Viewed
Job Description
Qatar’s Personal Data Privacy Protection Law (PDPPL)
and global privacy standards. The role requires expertise in translating privacy requirements into technical solutions, conducting privacy impact assessments, and embedding privacy into system architecture. The successful candidate will bring hands-on technical proficiency, strong regulatory knowledge, and experience working in Qatar or the GCC, ensuring alignment with
Qatar’s regulatory environment, cybersecurity mandates, and organizational compliance priorities . Key Responsibilities Implement and manage privacy engineering solutions ensuring compliance with
Qatar’s PDPPL , GDPR, CCPA/CPRA, and other global data protection regulations.
Collaborate with legal, compliance, and IT governance teams to align technical controls with
Qatar’s National Cybersecurity Frameworks
and industry standards.
Design and maintain systems for
data classification, mapping, and Data Loss Prevention (DLP)
to safeguard sensitive personal and national information.
Conduct
Privacy Impact Assessments (PIAs), Data Transfer Impact Assessments (DTIAs), and Records of Processing Activities (ROPAs)
for new and existing systems.
Develop and deliver privacy training programs for employees handling
personal and sensitive data in Qatar , ensuring awareness of local and international obligations.
Oversee privacy governance for
tracking technologies and cross-border data transfers , ensuring compliance with
Qatar’s Ministry of Communications and Information Technology (MCIT) guidelines .
Configure, manage, and optimize privacy tools such as
OneTrust, Archer GRC, BigID, SecuritiAI, MS Purview , and others.
Support incident response, regulatory reporting, and breach notifications in line with
Qatar’s Data Privacy Law
requirements.
Provide executive-level reporting to senior leadership and regulators, demonstrating compliance readiness.
Stay updated on evolving privacy regulations in
Qatar, GCC, and globally , and adjust technical frameworks accordingly.
Qualifications Bachelor’s or Master’s degree in Information Technology, Cybersecurity, Computer Science, or related field.
7+ years of experience in privacy engineering, data governance, or data protection, ideally with
experience in Qatar or GCC markets .
Strong knowledge of
Qatar’s PDPPL , GDPR, UK-GDPR, HIPAA, NIST, ISO/IEC 27701, ISO 27001, PCI-DSS, and other global privacy frameworks.
Hands-on expertise with
cloud and on-premises environments : AWS, Azure, GCP, Kubernetes.
Certifications strongly preferred:
CIPT, CIPP/E, CIPM, FIP , or equivalent.
Proficiency in SQL, Python, and reporting tools (Power BI, Tableau).
Strong stakeholder management and ability to work with
multicultural teams in Qatar’s government and private sector .
Bilingual proficiency in
English and Arabic
is mandatory.
#J-18808-Ljbffr
Data Protection & Personally Identifiable Information (PII) Specialist
Posted 13 days ago
Job Viewed
Job Description
- This role is designed for a professional deeply committed to safeguarding sensitive personal data and ensuring compliance with global and regional data protection regulations (e.g., GDPR, CCPA, Qatar PDPPL). You will lead efforts to identify, classify, and protect PII across the organization while embedding privacy-by-design principles into business processes. Your responsibilities will span data lifecycle governance, third-party risk management, regulatory compliance, and incident response, ensuring that all data processing activities align with legal and ethical standards.
- This position requires a strategic thinker who can balance technical controls with regulatory requirements, collaborate cross-functionally to mitigate risks, and foster a culture of data privacy
KEY RESPONSIBILITIES
1. Data Governance & Compliance
Data Lifecycle Governance :
- Design and implement end-to-end data lifecycle policies to govern data from creation / collection to archival and secure deletion, ensuring compliance with legal, regulatory, and business requirements.
- Define retention schedules, archival protocols, and secure disposal methods for sensitive data (e.g., PII, financial records) in collaboration with legal and IT teams.
Data Classification
- Develop / Enhance Data Classification Frameworks : Design and implement a tiered classification system (e.g., Public, Internal, Restricted, Confidential) to categorize data based on sensitivity, regulatory requirements, and business impact.
- Define Classification Standards : Establish clear criteria for labeling data types (e.g., PII, financial records, intellectual property) and enforce metadata tagging for traceability.
Regulatory Compliance :
- Ensure adherence to GDPR, CCPA, Qatar PDPPL, and other applicable laws by implementing consent management frameworks, data subject rights workflows, and breach notification protocols.
2. Technical Safeguards & Risk Mitigation
Data Protection Controls :
- Implement encryption, tokenization, and pseudonymization for PII at rest and in transit.
- Deploy Data Loss Prevention (DLP) tools to monitor and restrict unauthorized data transfers.
3. Third-Party & Vendor Oversight
- Assess third-party vendors for compliance with data protection obligations through questionnaires, audits, and contractual reviews.
Data Processing Agreements (DPAs) :
- Draft and enforce DPAs to ensure vendors adhere to organizational privacy standards and regulatory mandates.
TECHNICAL REQUIREMENTS
- Expertise in data protection technologies : DLP, encryption (AES-256, TLS), and anonymization tools.
- Proficiency with compliance platforms : OneTrust, TrustArc, or similar for PIAs and consent management.
- Familiarity with cloud security (AWS / Azure / GCP IAM, storage ACLs) and data residency requirements.
- Knowledge of privacy-enhancing technologies (PETs) such as differential privacy or homomorphic encryption.
- Experience with incident response tools for breach detection and analysis.
- Basic scripting skills (Python, SQL) for data mapping and workflow automation.
CERTIFICATIONS
- Required : CIPP (Certified Information Privacy Professional) or CIPM (Certified Information Privacy Manager).
- Preferred : ISO 27001 Lead Implementer, CDPSE (Certified Data Privacy Solutions Engineer).
- Advantageous : Cloud-specific certifications.
REQUIRED EXPERIENCE
- 3+ years in data protection, privacy compliance, or PII governance roles.
- Demonstrated experience conducting PIAs, managing DSARs, and responding to data breaches.
- Proven track record in implementing GDPR / CCPA / Qatar PDPPL requirements within complex organizations.
- Familiarity with third-party risk management frameworks and contract negotiation.
IDEAL CANDIDATE PROFILE
You are a detail-oriented professional with a deep understanding of global privacy regulations and the technical acumen to translate legal requirements into actionable controls. You thrive in collaborative environments, excel at simplifying complex privacy concepts for non-technical stakeholders, and are passionate about fostering a privacy-first culture. Your ability to balance proactive risk mitigation with operational efficiency will be critical in protecting the organization's reputation and maintaining stakeholder trust.
- Skillset Required : Proactive, Loss Prevention, Iso 27001, Devops, Azure, Policy Development, Information Security, Compliance, Intellect, Python, Data Handling, Workflow, Iam, Excel, Triggers, Detail-oriented, Sql, Design Principles, Trends
Data Protection & Personally Identifiable Information (PII) Specialist
Posted 18 days ago
Job Viewed
Job Description
- This role is designed for a professional deeply committed to safeguarding sensitive personal data and ensuring compliance with global and regional data protection regulations (e.g., GDPR, CCPA, Qatar PDPPL). You will lead efforts to identify, classify, and protect PII across the organization while embedding privacy-by-design principles into business processes. Your responsibilities will span data lifecycle governance, third-party risk management, regulatory compliance, and incident response, ensuring that all data processing activities align with legal and ethical standards.
- This position requires a strategic thinker who can balance technical controls with regulatory requirements, collaborate cross-functionally to mitigate risks, and foster a culture of data privacy
KEY RESPONSIBILITIES
1. Data Governance & Compliance
Data Lifecycle Governance :
- Design and implement end-to-end data lifecycle policies to govern data from creation / collection to archival and secure deletion, ensuring compliance with legal, regulatory, and business requirements.
- Define retention schedules, archival protocols, and secure disposal methods for sensitive data (e.g., PII, financial records) in collaboration with legal and IT teams.
Data Classification
- Develop / Enhance Data Classification Frameworks : Design and implement a tiered classification system (e.g., Public, Internal, Restricted, Confidential) to categorize data based on sensitivity, regulatory requirements, and business impact.
- Define Classification Standards : Establish clear criteria for labeling data types (e.g., PII, financial records, intellectual property) and enforce metadata tagging for traceability.
Regulatory Compliance :
- Ensure adherence to GDPR, CCPA, Qatar PDPPL, and other applicable laws by implementing consent management frameworks, data subject rights workflows, and breach notification protocols.
2. Technical Safeguards & Risk Mitigation
Data Protection Controls :
- Implement encryption, tokenization, and pseudonymization for PII at rest and in transit.
- Deploy Data Loss Prevention (DLP) tools to monitor and restrict unauthorized data transfers.
3. Third-Party & Vendor Oversight
- Assess third-party vendors for compliance with data protection obligations through questionnaires, audits, and contractual reviews.
Data Processing Agreements (DPAs) :
- Draft and enforce DPAs to ensure vendors adhere to organizational privacy standards and regulatory mandates.
TECHNICAL REQUIREMENTS
- Expertise in data protection technologies : DLP, encryption (AES-256, TLS), and anonymization tools.
- Proficiency with compliance platforms : OneTrust, TrustArc, or similar for PIAs and consent management.
- Familiarity with cloud security (AWS / Azure / GCP IAM, storage ACLs) and data residency requirements.
- Knowledge of privacy-enhancing technologies (PETs) such as differential privacy or homomorphic encryption.
- Experience with incident response tools for breach detection and analysis.
- Basic scripting skills (Python, SQL) for data mapping and workflow automation.
CERTIFICATIONS
- Required : CIPP (Certified Information Privacy Professional) or CIPM (Certified Information Privacy Manager).
- Preferred : ISO 27001 Lead Implementer, CDPSE (Certified Data Privacy Solutions Engineer).
- Advantageous : Cloud-specific certifications.
REQUIRED EXPERIENCE
- 3+ years in data protection, privacy compliance, or PII governance roles.
- Demonstrated experience conducting PIAs, managing DSARs, and responding to data breaches.
- Proven track record in implementing GDPR / CCPA / Qatar PDPPL requirements within complex organizations.
- Familiarity with third-party risk management frameworks and contract negotiation.
IDEAL CANDIDATE PROFILE
You are a detail-oriented professional with a deep understanding of global privacy regulations and the technical acumen to translate legal requirements into actionable controls. You thrive in collaborative environments, excel at simplifying complex privacy concepts for non-technical stakeholders, and are passionate about fostering a privacy-first culture. Your ability to balance proactive risk mitigation with operational efficiency will be critical in protecting the organization’s reputation and maintaining stakeholder trust.
- Skillset Required : Proactive, Loss Prevention, Iso 27001, Devops, Azure, Policy Development, Information Security, Compliance, Intellect, Python, Data Handling, Workflow, Iam, Excel, Triggers, Detail-oriented, Sql, Design Principles, Trends
Data Protection & Personally Identifiable Information (PII) Specialist
Posted 17 days ago
Job Viewed
Job Description
#J-18808-Ljbffr
Security Specialist - Endpoint Security and Data Leak Protection Analyst
Posted today
Job Viewed
Job Description
Join to apply for the Security Specialist - Endpoint Security and Data Leak Protection Analyst role at ECCO Gulf WLL
The Security Specialist - Endpoint Security and Data Leak Protection Analyst is responsible for ensuring the protection of the organization's information and data through the administration of security policies and practices. This role focuses on endpoint security and data leak protection, ensuring that authorized users can access data while maintaining confidentiality, integrity, and availability. The role requires proactive security monitoring, policy enforcement, incident management, and collaboration with other teams to ensure robust security practices are followed across the organization.
Key Responsibilities & Accountabilities
- Drafts, implements, and maintains security policies, standards, procedures, and documentation for endpoint security.
- Monitors and enforces the application of security operations procedures.
- Reviews systems for potential breaches and ensures all identified security breaches are thoroughly investigated.
- Implements necessary system changes to maintain and enhance endpoint security.
- Ensures that security records and logs related to endpoints and data leak protection are accurate, complete, and up-to-date.
Strategy, Architecture, and Information Strategy
- Conducts vulnerability assessments and security risk assessments on endpoint devices (desktops, laptops, mobile devices, servers) and applications.
- Provides strategic advice on security solutions and best practices for endpoint protection and data leak prevention.
- Investigates major breaches of endpoint security or data leaks and recommends improvements in security controls.
- Contributes to the development and refinement of endpoint security strategies and standards in line with industry best practices and regulatory compliance.
Planning, Prioritization, and Problem Solving
- Plans and prioritizes endpoint security and data leak protection initiatives, ensuring alignment with organizational goals.
- Assesses the impact of technological changes, regulations, and business processes on endpoint security and implements necessary security measures.
- Continuously evaluates and adjusts security strategies and goals based on organizational needs, emerging threats, and regulatory changes.
Technology
- Demonstrates strong technical knowledge of endpoint security technologies, such as antivirus, EDR (Endpoint Detection and Response), XDR (Extended Detection and Response), encryption, and DLP (Data Leak Prevention) systems.
- Utilizes tools such as SIEM, IDS/IPS, and application firewalls to monitor, analyze, and mitigate security threats targeting endpoint devices.
- Ensures compliance with information security policies, focusing on protecting endpoints and preventing data leaks.
Key Responsibilities & Security Measures
- Endpoint Security & Data Leak Prevention: Develops, implements, and manages endpoint security policies for devices including desktops, laptops, mobile devices, and servers.
- Incident Response: Acts as the first responder to security incidents related to endpoints and data leaks, conducts investigations, and recommends remediation actions.
- Security Tools & Technologies: Manages and optimizes endpoint security tools, including antivirus software, EDR/XDR solutions, encryption, and DLP systems.
- Collaboration: Works closely with IT and compliance teams to ensure endpoint security policies align with industry standards, regulatory requirements, and best practices.
- Continuous Monitoring: Stays up-to-date with the latest security trends and threats, continuously monitoring endpoint devices for vulnerabilities, threats, and potential data leaks.
Skills & Qualifications
- 5-6 years of hands-on experience in cybersecurity, with specific focus on endpoint security, data leak protection, incident response, and vulnerability management.
- Bachelor's degree/ Engineering in Information Security, Computer Science, or a related field.
- Proven experience with Endpoint security monitoring tools (Microsoft Defender XDR, Endgame EDR, Microsoft DLP, etc.).
- In-depth knowledge of security policies and standards regarding endpoint protection, data leak prevention, and network security.
- Experience with security technologies such as SIEM, IDS/IPS, antivirus solutions, and encryption tools.
- Strong understanding of networking protocols, operating systems (Windows, Linux, macOS), and internet security.
- Experience in systems installation, configuration, and administration, including endpoint devices and security environments.
- Hands-on experience with DLP technologies and data privacy tools.
- Ability to analyze security incidents, identify root causes, and implement remediation actions.
- Certifications
- Mandatory:
- CompTIA Security+
- Certified Information Privacy Professional (CIPP)
- Microsoft Security Operations Analyst-SE 200
- Preferred (not mandatory):
- CISSP
- Certified Ethical Hacker (CEH)
- SANS GIAC Security Essentials (GSEC)
- SANS GIAC Certified Enterprise Defender (GCED)
Seniority level
- Mid-Senior level
Employment type
- Full-time
Job function
- Other, Information Technology, and Management
- Industries: Outsourcing and Offshoring Consulting
Referrals increase your chances of interviewing at ECCO Gulf WLL by 2x
Get notified about new Security Professional jobs in Qatar .
Note: This description includes only the primary role details and standard EEO information. Other job listings and unrelated content have been omitted for clarity.
Security Specialist - Endpoint Security and Data Leak Protection Analyst
Posted 3 days ago
Job Viewed
Job Description
The Security Specialist - Endpoint Security and Data Leak Protection Analyst is responsible for ensuring the protection of the organization's information and data through the administration of security policies and practices. This role will focus on endpoint security and data leak protection, ensuring that authorized users can access data while maintaining confidentiality, integrity, and availability. The role requires proactive security monitoring, policy enforcement, incident management, and collaboration with other teams to ensure robust security practices are followed across the organization.
Key Responsibilities & Accountabilities: Service Management and Service OperationDrafts, implements, and maintains security policies, standards, procedures, and documentation for endpoint security.
Monitors and enforces the application of security operations procedures.
Reviews systems for potential breaches and ensures all identified security breaches are thoroughly investigated.
Implements necessary system changes to maintain and enhance endpoint security.
Ensures that security records and logs related to endpoints and data leak protection are accurate, complete, and up-to-date.
Conducts vulnerability assessments and security risk assessments on endpoint devices (desktops, laptops, mobile devices, servers) and applications.
Provides strategic advice on security solutions and best practices for endpoint protection and data leak prevention.
Investigates major breaches of endpoint security or data leaks and recommends improvements in security controls.
Contributes to the development and refinement of endpoint security strategies and standards in line with industry best practices and regulatory compliance.
Plans and prioritizes endpoint security and data leak protection initiatives, ensuring alignment with organizational goals.
Assesses the impact of technological changes, regulations, and business processes on endpoint security and implements necessary security measures.
Continuously evaluates and adjusts security strategies and goals based on organizational needs, emerging threats, and regulatory changes.
Demonstrates strong technical knowledge of endpoint security technologies, such as antivirus, EDR (Endpoint Detection and Response), XDR (Extended Detection and Response), encryption, and DLP (Data Leak Prevention) systems.
Utilizes tools such as SIEM, IDS/IPS, and application firewalls to monitor, analyze, and mitigate security threats targeting endpoint devices.
Ensures compliance with information security policies, focusing on protecting endpoints and preventing data leaks.
Endpoint Security & Data Leak Prevention : Develops, implements, and manages endpoint security policies for devices including desktops, laptops, mobile devices, and servers.
Incident Response : Acts as the first responder to security incidents related to endpoints and data leaks, conducts investigations, and recommends remediation actions.
Security Tools & Technologies : Manages and optimizes endpoint security tools, including antivirus software, EDR/XDR solutions, encryption, and DLP systems.
Collaboration : Works closely with IT and compliance teams to ensure endpoint security policies align with industry standards, regulatory requirements, and best practices.
Continuous Monitoring : Stays up-to-date with the latest security trends and threats, continuously monitoring endpoint devices for vulnerabilities, threats, and potential data leaks.
5-6 years of hands-on experience in cybersecurity, with specific focus on endpoint security, data leak protection, incident response, and vulnerability management.
- Bachelor's degree/ Engineering in Information Security, Computer Science, or a related field.
Proven experience with Endpoint security monitoring tools (Microsoft Defender XDR, Endgame EDR, Microsoft DLP, etc.).
In-depth knowledge of security policies and standards regarding endpoint protection, data leak prevention, and network security.
Experience with security technologies such as SIEM, IDS/IPS, antivirus solutions, and encryption tools.
Strong understanding of networking protocols, operating systems (Windows, Linux, macOS), and internet security.
Experience in systems installation, configuration, and administration, including endpoint devices and security environments.
Hands-on experience with DLP technologies and data privacy tools.
Ability to analyze security incidents, identify root causes, and implement remediation actions.
Certifications:
Mandatory :
CompTIA Security+
Certified Information Privacy Professional (CIPP)
Microsoft Security Operations Analyst-SE 200
Preferred (not mandatory):
CISSP
Certified Ethical Hacker (CEH)
SANS GIAC Security Essentials (GSEC)
SANS GIAC Certified Enterprise Defender (GCED)
Be The First To Know
About the latest Data privacy Jobs in Qatar !
Security Specialist - Endpoint Security and Data Leak Protection Analyst
Posted today
Job Viewed
Job Description
Security Specialist - Endpoint Security and Data Leak Protection Analyst
Join to apply for the Security Specialist - Endpoint Security and Data Leak Protection Analyst role at ECCO Gulf WLL
The Security Specialist – Endpoint Security and Data Leak Protection Analyst is responsible for ensuring the protection of the organization's information and data through the administration of security policies and practices. This role focuses on endpoint security and data leak protection, ensuring that authorized users can access data while maintaining confidentiality, integrity, and availability. The role requires proactive security monitoring, policy enforcement, incident management, and collaboration with other teams to ensure robust security practices are followed across the organization.
Key Responsibilities & Accountabilities
- Drafts, implements, and maintains security policies, standards, procedures, and documentation for endpoint security.
- Monitors and enforces the application of security operations procedures.
- Reviews systems for potential breaches and ensures all identified security breaches are thoroughly investigated.
- Implements necessary system changes to maintain and enhance endpoint security.
- Ensures that security records and logs related to endpoints and data leak protection are accurate, complete, and up-to-date.
Strategy, Architecture, and Information Strategy
- Conducts vulnerability assessments and security risk assessments on endpoint devices (desktops, laptops, mobile devices, servers) and applications.
- Provides strategic advice on security solutions and best practices for endpoint protection and data leak prevention.
- Investigates major breaches of endpoint security or data leaks and recommends improvements in security controls.
- Contributes to the development and refinement of endpoint security strategies and standards in line with industry best practices and regulatory compliance.
Planning, Prioritization, and Problem Solving
- Plans and prioritizes endpoint security and data leak protection initiatives, ensuring alignment with organizational goals.
- Assesses the impact of technological changes, regulations, and business processes on endpoint security and implements necessary security measures.
- Continuously evaluates and adjusts security strategies and goals based on organizational needs, emerging threats, and regulatory changes.
Technology
- Demonstrates strong technical knowledge of endpoint security technologies, such as antivirus, EDR (Endpoint Detection and Response), XDR (Extended Detection and Response), encryption, and DLP (Data Leak Prevention) systems.
- Utilizes tools such as SIEM, IDS/IPS, and application firewalls to monitor, analyze, and mitigate security threats targeting endpoint devices.
- Ensures compliance with information security policies, focusing on protecting endpoints and preventing data leaks.
Key Responsibilities & Security Measures
- Endpoint Security & Data Leak Prevention: Develops, implements, and manages endpoint security policies for devices including desktops, laptops, mobile devices, and servers.
- Incident Response: Acts as the first responder to security incidents related to endpoints and data leaks, conducts investigations, and recommends remediation actions.
- Security Tools & Technologies: Manages and optimizes endpoint security tools, including antivirus software, EDR/XDR solutions, encryption, and DLP systems.
- Collaboration: Works closely with IT and compliance teams to ensure endpoint security policies align with industry standards, regulatory requirements, and best practices.
- Continuous Monitoring: Stays up-to-date with the latest security trends and threats, continuously monitoring endpoint devices for vulnerabilities, threats, and potential data leaks.
Skills & Qualifications
- 5-6 years of hands-on experience in cybersecurity, with specific focus on endpoint security, data leak protection, incident response, and vulnerability management.
- Bachelor’s degree/ Engineering in Information Security, Computer Science, or a related field.
- Proven experience with Endpoint security monitoring tools (Microsoft Defender XDR, Endgame EDR, Microsoft DLP, etc.).
- In-depth knowledge of security policies and standards regarding endpoint protection, data leak prevention, and network security.
- Experience with security technologies such as SIEM, IDS/IPS, antivirus solutions, and encryption tools.
- Strong understanding of networking protocols, operating systems (Windows, Linux, macOS), and internet security.
- Experience in systems installation, configuration, and administration, including endpoint devices and security environments.
- Hands-on experience with DLP technologies and data privacy tools.
- Ability to analyze security incidents, identify root causes, and implement remediation actions.
- Certifications
- Mandatory:
- CompTIA Security+
- Certified Information Privacy Professional (CIPP)
- Microsoft Security Operations Analyst-SE 200
- Preferred (not mandatory):
- CISSP
- Certified Ethical Hacker (CEH)
- SANS GIAC Security Essentials (GSEC)
- SANS GIAC Certified Enterprise Defender (GCED)
Seniority level
- Mid-Senior level
Employment type
- Full-time
Job function
- Other, Information Technology, and Management
- Industries: Outsourcing and Offshoring Consulting
Referrals increase your chances of interviewing at ECCO Gulf WLL by 2x
Get notified about new Security Professional jobs in Qatar .
Note: This description includes only the primary role details and standard EEO information. Other job listings and unrelated content have been omitted for clarity.
#J-18808-LjbffrSecurity Specialist - Endpoint Security and Data Leak Protection Analyst
Posted 3 days ago
Job Viewed
Job Description
The Security Specialist – Endpoint Security and Data Leak Protection Analyst is responsible for ensuring the protection of the organization's information and data through the administration of security policies and practices. This role will focus on endpoint security and data leak protection, ensuring that authorized users can access data while maintaining confidentiality, integrity, and availability. The role requires proactive security monitoring, policy enforcement, incident management, and collaboration with other teams to ensure robust security practices are followed across the organization.
Key Responsibilities & Accountabilities: Service Management and Service OperationDrafts, implements, and maintains security policies, standards, procedures, and documentation for endpoint security.
Monitors and enforces the application of security operations procedures.
Reviews systems for potential breaches and ensures all identified security breaches are thoroughly investigated.
Implements necessary system changes to maintain and enhance endpoint security.
Ensures that security records and logs related to endpoints and data leak protection are accurate, complete, and up-to-date.
Conducts vulnerability assessments and security risk assessments on endpoint devices (desktops, laptops, mobile devices, servers) and applications.
Provides strategic advice on security solutions and best practices for endpoint protection and data leak prevention.
Investigates major breaches of endpoint security or data leaks and recommends improvements in security controls.
Contributes to the development and refinement of endpoint security strategies and standards in line with industry best practices and regulatory compliance.
Plans and prioritizes endpoint security and data leak protection initiatives, ensuring alignment with organizational goals.
Assesses the impact of technological changes, regulations, and business processes on endpoint security and implements necessary security measures.
Continuously evaluates and adjusts security strategies and goals based on organizational needs, emerging threats, and regulatory changes.
Demonstrates strong technical knowledge of endpoint security technologies, such as antivirus, EDR (Endpoint Detection and Response), XDR (Extended Detection and Response), encryption, and DLP (Data Leak Prevention) systems.
Utilizes tools such as SIEM, IDS/IPS, and application firewalls to monitor, analyze, and mitigate security threats targeting endpoint devices.
Ensures compliance with information security policies, focusing on protecting endpoints and preventing data leaks.
Endpoint Security & Data Leak Prevention : Develops, implements, and manages endpoint security policies for devices including desktops, laptops, mobile devices, and servers.
Incident Response : Acts as the first responder to security incidents related to endpoints and data leaks, conducts investigations, and recommends remediation actions.
Security Tools & Technologies : Manages and optimizes endpoint security tools, including antivirus software, EDR/XDR solutions, encryption, and DLP systems.
Collaboration : Works closely with IT and compliance teams to ensure endpoint security policies align with industry standards, regulatory requirements, and best practices.
Continuous Monitoring : Stays up-to-date with the latest security trends and threats, continuously monitoring endpoint devices for vulnerabilities, threats, and potential data leaks.
5-6 years of hands-on experience in cybersecurity, with specific focus on endpoint security, data leak protection, incident response, and vulnerability management.
- Bachelor’s degree/ Engineering in Information Security, Computer Science, or a related field.
Proven experience with Endpoint security monitoring tools (Microsoft Defender XDR, Endgame EDR, Microsoft DLP, etc.).
In-depth knowledge of security policies and standards regarding endpoint protection, data leak prevention, and network security.
Experience with security technologies such as SIEM, IDS/IPS, antivirus solutions, and encryption tools.
Strong understanding of networking protocols, operating systems (Windows, Linux, macOS), and internet security.
Experience in systems installation, configuration, and administration, including endpoint devices and security environments.
Hands-on experience with DLP technologies and data privacy tools.
Ability to analyze security incidents, identify root causes, and implement remediation actions.
Certifications:
Mandatory :
CompTIA Security+
Certified Information Privacy Professional (CIPP)
Microsoft Security Operations Analyst-SE 200
Preferred (not mandatory):
CISSP
Certified Ethical Hacker (CEH)
SANS GIAC Security Essentials (GSEC)
SANS GIAC Certified Enterprise Defender (GCED)
Security Specialist - Endpoint Security and Data Leak Protection Analyst
Posted today
Job Viewed
Job Description
Join to apply for the
Security Specialist - Endpoint Security and Data Leak Protection Analyst
role at
ECCO Gulf WLL The Security Specialist – Endpoint Security and Data Leak Protection Analyst is responsible for ensuring the protection of the organization's information and data through the administration of security policies and practices. This role focuses on endpoint security and data leak protection, ensuring that authorized users can access data while maintaining confidentiality, integrity, and availability. The role requires proactive security monitoring, policy enforcement, incident management, and collaboration with other teams to ensure robust security practices are followed across the organization. Key Responsibilities & Accountabilities Drafts, implements, and maintains security policies, standards, procedures, and documentation for endpoint security. Monitors and enforces the application of security operations procedures. Reviews systems for potential breaches and ensures all identified security breaches are thoroughly investigated. Implements necessary system changes to maintain and enhance endpoint security. Ensures that security records and logs related to endpoints and data leak protection are accurate, complete, and up-to-date. Strategy, Architecture, and Information Strategy Conducts vulnerability assessments and security risk assessments on endpoint devices (desktops, laptops, mobile devices, servers) and applications. Provides strategic advice on security solutions and best practices for endpoint protection and data leak prevention. Investigates major breaches of endpoint security or data leaks and recommends improvements in security controls. Contributes to the development and refinement of endpoint security strategies and standards in line with industry best practices and regulatory compliance. Planning, Prioritization, and Problem Solving Plans and prioritizes endpoint security and data leak protection initiatives, ensuring alignment with organizational goals. Assesses the impact of technological changes, regulations, and business processes on endpoint security and implements necessary security measures. Continuously evaluates and adjusts security strategies and goals based on organizational needs, emerging threats, and regulatory changes. Technology Demonstrates strong technical knowledge of endpoint security technologies, such as antivirus, EDR (Endpoint Detection and Response), XDR (Extended Detection and Response), encryption, and DLP (Data Leak Prevention) systems. Utilizes tools such as SIEM, IDS/IPS, and application firewalls to monitor, analyze, and mitigate security threats targeting endpoint devices. Ensures compliance with information security policies, focusing on protecting endpoints and preventing data leaks. Key Responsibilities & Security Measures Endpoint Security & Data Leak Prevention: Develops, implements, and manages endpoint security policies for devices including desktops, laptops, mobile devices, and servers. Incident Response: Acts as the first responder to security incidents related to endpoints and data leaks, conducts investigations, and recommends remediation actions. Security Tools & Technologies: Manages and optimizes endpoint security tools, including antivirus software, EDR/XDR solutions, encryption, and DLP systems. Collaboration: Works closely with IT and compliance teams to ensure endpoint security policies align with industry standards, regulatory requirements, and best practices. Continuous Monitoring: Stays up-to-date with the latest security trends and threats, continuously monitoring endpoint devices for vulnerabilities, threats, and potential data leaks. Skills & Qualifications 5-6 years of hands-on experience in cybersecurity, with specific focus on endpoint security, data leak protection, incident response, and vulnerability management. Bachelor’s degree/ Engineering in Information Security, Computer Science, or a related field. Proven experience with Endpoint security monitoring tools (Microsoft Defender XDR, Endgame EDR, Microsoft DLP, etc.). In-depth knowledge of security policies and standards regarding endpoint protection, data leak prevention, and network security. Experience with security technologies such as SIEM, IDS/IPS, antivirus solutions, and encryption tools. Strong understanding of networking protocols, operating systems (Windows, Linux, macOS), and internet security. Experience in systems installation, configuration, and administration, including endpoint devices and security environments. Hands-on experience with DLP technologies and data privacy tools. Ability to analyze security incidents, identify root causes, and implement remediation actions. Certifications Mandatory: CompTIA Security+ Certified Information Privacy Professional (CIPP) Microsoft Security Operations Analyst-SE 200 Preferred (not mandatory): CISSP Certified Ethical Hacker (CEH) SANS GIAC Security Essentials (GSEC) SANS GIAC Certified Enterprise Defender (GCED) Seniority level Mid-Senior level Employment type Full-time Job function Other, Information Technology, and Management Industries: Outsourcing and Offshoring Consulting Referrals increase your chances of interviewing at ECCO Gulf WLL by 2x Get notified about new Security Professional jobs in
Qatar . Note: This description includes only the primary role details and standard EEO information. Other job listings and unrelated content have been omitted for clarity.
#J-18808-Ljbffr