120 IT Security Specialist jobs in Qatar

Security specialist

Doha, Doha Flip retail

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Security specialist vacancy in Doha Qatar

Job title: IT Security Specialist

Responsibilities
  • Install and configure networks
  • Manage data sources
  • Provide user support
  • Manage information security
  • Troubleshoot systems and hardware
Qualifications
  • Software and hardware setup — strong understanding of equipment and software installation for servers, networks, computers, and peripherals
  • Problem-solving skills — able to fix networks, computers, and devices; strong analytical and technical problem-solving abilities
  • Time management — ability to multitask and prioritize tasks effectively
Job details

Job Type: Full-time

Location: Doha, Qatar

Relocation/availability: Accurately commute or planning to transfer prior to starting job (Required)

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security specialist

Doha, Doha Abroad Work

Posted 22 days ago

Job Viewed

Tap Again To Close

Job Description

Security Specialist Vacancy in Doha, Qatar

We are seeking an IT Security Specialist to work with our reputed client in Qatar.

Minimum Requirements:

  • Bachelor's degree in Computer Technology or a related field
  • At least 5 years of relevant experience
  • Certifications: CEH, GIAC, CIH, CCNA, CISM or similar
  • Microsoft Licensed Azure Basics
  • Available immediately with valid QID/NOC
  • Residing in Qatar

Interested candidates should send their CV via WhatsApp to .

Job Type: Permanent, Full-Time

Salary: QAR 1.00 monthly

Experience: Minimum 5 years in IT Security

This job posting is active and accepting applications.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security specialist

Doha, Doha Flip retail

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Security specialist vacancy in Doha Qatar

Job title: IT Security Specialist Responsibilities

Install and configure networks Manage data sources Provide user support Manage information security Troubleshoot systems and hardware Qualifications

Software and hardware setup — strong understanding of equipment and software installation for servers, networks, computers, and peripherals Problem-solving skills — able to fix networks, computers, and devices; strong analytical and technical problem-solving abilities Time management — ability to multitask and prioritize tasks effectively Job details

Job Type: Full-time Location: Doha, Qatar Relocation/availability: Accurately commute or planning to transfer prior to starting job (Required)

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security specialist

Doha, Doha Abroad Work

Posted 22 days ago

Job Viewed

Tap Again To Close

Job Description

Security Specialist Vacancy in Doha, Qatar

We are seeking an IT Security Specialist to work with our reputed client in Qatar. Minimum Requirements: Bachelor's degree in Computer Technology or a related field At least 5 years of relevant experience Certifications: CEH, GIAC, CIH, CCNA, CISM or similar Microsoft Licensed Azure Basics Available immediately with valid QID/NOC Residing in Qatar Interested candidates should send their CV via WhatsApp to . Job Type:

Permanent, Full-Time Salary:

QAR 1.00 monthly Experience:

Minimum 5 years in IT Security This job posting is active and accepting applications.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Network Security Engineering Specialist

Civil Service and Government Development Bureau

Posted 21 days ago

Job Viewed

Tap Again To Close

Job Description

The Role
Executing a set of specialized tasks that require expertise and mastery of the principles and fundamentals of work in the field of identifying security vulnerabilities in information systems networks and securing the infrastructure of networks and communication lines using protection systems against breaches.

Requirements
• Education: Bachelor's degree in engineering (computer). • Years of Experience: ( 9 -13 years ).

About the company
The Civil Service and Government Development Bureau was established on October 19, 2021. The role of the Bureau is to strengthen the workforce capabilities and capacity, and promote transformation of the Government of Qatar.
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Specialist

Civil Service and Government Development Bureau

Posted 21 days ago

Job Viewed

Tap Again To Close

Job Description

The Role
Perform a set of specialized tasks requiring experience and mastery of principles and fundamentals in the field of identifying security issues related to data, information, and applications, securing them against viruses, and protecting them from hacking and data theft.

Requirements
• Education: Bachelor's Degree in Computer Science or Information System • Years of Experience: 8 - 13 years

About the company
The Civil Service and Government Development Bureau was established on October 19, 2021. The role of the Bureau is to strengthen the workforce capabilities and capacity, and promote transformation of the Government of Qatar.
This advertiser has chosen not to accept applicants from your region.

Security Specialist (Soc Analyst)

Doha, Doha Arab Solutions

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

Position Overview

The Security Specialist (SOC Analyst) is responsible for the administration, monitoring, and enforcement of the organization’s information security policies and practices. This role ensures that information assets remain protected in terms of confidentiality, integrity, and availability, while authorized users can readily access the information they need. The SOC Analyst will play a key role in incident detection, response, threat hunting, vulnerability management, and ensuring compliance with cybersecurity standards.

Responsibilities
  • Service Management & Operations: Draft, maintain, and enforce policies, standards, procedures, and documentation for security.
  • Monitor compliance with security operations procedures and investigate actual/potential security breaches.
  • Ensure timely and thorough investigations of incidents, implementing corrective measures.
  • Maintain accurate and complete records of security operations.
  • Plan and implement security changes required to maintain organizational defenses.
  • Strategy & Risk Management: Conduct risk assessments, vulnerability assessments, and business impact analyses for applications and systems.
  • Provide expert advice on security strategies and recommend control improvements.
  • Investigate and report on major breaches, leveraging forensic tools and practices.
  • Contribute to the development of security standards and guidelines in line with organizational policies.
  • Ensure proportionate response to vulnerabilities and threats.
  • Incident Detection & Response: Monitor security alerts and events using SIEM tools (e.g., Azure Sentinel).
  • Investigate and analyze incidents to determine root cause and impact.
  • Execute containment, eradication, and recovery measures.
  • Maintain and update incident response playbooks and procedures.
  • Coordinate with the National Cyber Security Agency in case of reportable incidents.
  • Conduct internal investigations and recommend corrective measures.
  • Threat Hunting & Vulnerability Management: Perform threat hunting to proactively identify risks and vulnerabilities.
  • Conduct vulnerability scans and penetration tests using Tenable, Burp Suite, and similar tools.
  • Tune and implement threat detection analytics and SOC infrastructure.
  • Develop custom signatures/rules for detection and prevention systems.
  • Script automation for security analysis and incident response (Python, PowerShell, Bash).
  • Security Tools & Technologies: Manage and configure firewalls, IDS/IPS, and endpoint protection solutions.
  • Administer and optimize security monitoring platforms (e.g., Microsoft Defender, Microsoft Cloud Defender, Microsoft Purview, Insider Risk Management).
  • Support compliance with frameworks such as GDPR, HIPAA, NIA, Qatar 2022 CSF, ISO 27001.
  • Conduct cybersecurity drills and disaster recovery exercises.
  • Ensure compliance with data privacy and data protection requirements.
  • Collaboration & Reporting: Work closely with IT teams to align with security best practices.
  • Provide timely and accurate reporting on incidents, risks, and trends to management.
  • Stay updated with emerging cybersecurity threats, vulnerabilities, and technologies.
  • Contribute to awareness and training initiatives.
Key Skills & Competencies
  • Minimum 5–6 years’ experience in cybersecurity, preferably within a SOC environment.
  • Proven experience in incident response, threat hunting, and vulnerability management.
  • Strong knowledge of SIEM tools (Azure Sentinel mandatory).
  • Experience with endpoint protection and vulnerability scanners (Defender, Tenable, Burp Suite, etc.).
  • Understanding of network forensics, endpoint forensics, and threat intelligence.
  • Strong knowledge of networking protocols, firewalls, IDS/IPS.
  • Scripting skills in Python, PowerShell, or Bash.
  • Strong problem-solving, analytical, and communication skills.
  • Ability to work under pressure and handle multiple tasks effectively.
Qualifications
  • Education: Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or related field.
  • Mandatory Certifications: CSA, CEH, SC-200.
  • Preferred (Not Mandatory): CompTIA Security+, CISSP, GIAC GSEC, GCIH, or equivalent certifications.

Skills: cybersecurity, certified ethical hacker, vulnerability, networking, risk, soc

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest It security specialist Jobs in Qatar !

Security Specialist – SOC Analyst

ECCO Gulf WLL

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

The Security Specialist is responsible for the administration of the organization’s information and data security policies and practices. The primary goal of this role is to ensure that authorized users can access information with ease while protecting its confidentiality, integrity, and availability in accordance with security best practices. The Security Specialist will manage, monitor, and respond to security incidents, ensuring the organization's information systems remain secure. This individual will play an integral part in maintaining compliance with internal security standards and external regulatory frameworks.

Responsibilities
  • Service Management and Service Operation
  • Draft and maintain security policies, standards, procedures, and documentation.
  • Monitor compliance with security operations procedures and assess systems for potential or actual breaches.
  • Investigate security breaches and ensure thorough investigation and remediation actions.
  • Implement system changes required to maintain security.
  • Ensure the accuracy and completeness of security records.
  • Strategy & Architecture and Information Strategy
  • Assess vulnerabilities and perform security risk assessments on business applications and computer systems.
  • Provide expert advice on security strategies to mitigate identified risks.
  • Investigate major security breaches and recommend appropriate control improvements.
  • Contribute to the development of security standards and guidelines.
  • Conduct risk assessments, business impact analysis, and accreditation for all major information systems.
  • Apply appropriate forensics to investigate vulnerabilities and breaches.
  • Plan, Prioritize, and Solve Problems
  • Develop team/unit goals, strategies, and plans aligned with organizational objectives.
  • Anticipate the impact of changes (e.g., government policy, economic conditions) and adjust strategies accordingly.
  • Ensure activities align with the organization’s change initiatives.
  • Evaluate achievements and adapt future strategies.
  • Technology
  • Apply a solid understanding of relevant technology and select the best tools for assigned tasks.
  • Leverage a broad range of communications technologies to deliver effective security messages.
  • Ensure compliance with information and communication security policies.
  • Identify opportunities to use existing technologies to achieve team outcomes.
  • Support compliance with the organization's records and knowledge management requirements.
  • Key Accountabilities
  • Monitor security alerts using Security Information and Event Management (SIEM) tools.
  • Investigate and analyze security incidents, determining root causes and impacts.
  • Respond to security incidents, implementing containment, eradication, and recovery measures.
  • Conduct proactive threat hunting activities to identify potential vulnerabilities.
  • Maintain and configure security tools such as firewalls, intrusion detection/prevention systems, and endpoint protection solutions.
  • Collaborate with IT teams to ensure adherence to security best practices.
  • Develop, maintain, and update incident response playbooks and procedures.
  • Perform regular security assessments and vulnerability scans.
  • Stay updated with the latest trends and technologies in cybersecurity.
  • Coordinate incident response efforts in the event of a breach, ensuring compliance with national security agencies when necessary.
  • Conduct internal investigations, identify root causes of incidents, and recommend corrective actions.
  • Develop custom security signatures/rules for detection and prevention systems.
  • Create custom scripts for analysis and automation in security tasks.
  • Develop, tune, and implement threat detection analytics and security sensors.
  • Additional Responsibilities
  • Participate in internal cyber drills and disaster recovery exercises.
  • Conduct vulnerability assessments and penetration tests to identify and address security risks.
  • Collaborate with the National Cyber Security Agency during major incidents.
Qualifications and Requirements

Essential Qualifications :

  • Education: Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • Certifications:
    • Certified SOC Analyst (CSA), Certified Ethical Hacker (CEH), Microsoft Security Operations Analyst-SE 200 professional certification is mandatory.
    • Relevant certifications (e.g., CompTIA Security+, CISSP, GIAC Security Essentials (GSEC), GCIH) are preferred.
  • Experience :
  • Minimum 5-6 years of experience in cybersecurity, ideally in a SOC (Security Operations Center) environment.
  • Hands-on experience with SIEM tools such as Azure Sentinel is a must.
  • Experience in incident response, threat hunting, and vulnerability management.
  • Familiarity with Microsoft Defender, Microsoft Cloud Defender, Microsoft Purview, Microsoft Insider Risk Management, and vulnerability scanning tools (e.g., Tenable, Burp Suite).
  • Experience with regulatory and compliance frameworks like GDPR, HIPAA, ISO 27001, Qatar 2022 CSF is a plus.
Seniority level
  • Mid-Senior level
Employment type
  • Full-time
Job function
  • Information Technology
Industries
  • Outsourcing and Offshoring Consulting

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Specialist – SOC Analyst

ECCO Gulf Majorel Qatar

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

The Security Specialist is responsible for the administration of the organization’s information and data security policies and practices. The primary goal of this role is to ensure that authorized users can access information with ease while protecting its confidentiality, integrity, and availability in accordance with security best practices. The Security Specialist will manage, monitor, and respond to security incidents, ensuring the organization's information systems remain secure. This individual will play an integral part in maintaining compliance with internal security standards and external regulatory frameworks.

Key Responsibilities 1. Service Management and Service Operation
  • Draft and maintain security policies, standards, procedures, and documentation.

  • Monitor compliance with security operations procedures and assess systems for potential or actual breaches.

  • Investigate security breaches and ensure thorough investigation and remediation actions.

  • Implement system changes required to maintain security.

  • Ensure the accuracy and completeness of security records.

2. Strategy & Architecture and Information Strategy
  • Assess vulnerabilities and perform security risk assessments on business applications and computer systems.

  • Provide expert advice on security strategies to mitigate identified risks.

  • Investigate major security breaches and recommend appropriate control improvements.

  • Contribute to the development of security standards and guidelines.

  • Conduct risk assessments, business impact analysis, and accreditation for all major information systems.

  • Apply appropriate forensics to investigate vulnerabilities and breaches.

3. Plan, Prioritize, and Solve Problems
  • Develop team/unit goals, strategies, and plans aligned with organizational objectives.

  • Anticipate the impact of changes (e.g., government policy, economic conditions) and adjust strategies accordingly.

  • Ensure activities align with the organization’s change initiatives.

  • Evaluate achievements and adapt future strategies.

4. Technology
  • Apply a solid understanding of relevant technology and select the best tools for assigned tasks.

  • Leverage a broad range of communications technologies to deliver effective security messages.

  • Ensure compliance with information and communication security policies.

  • Identify opportunities to use existing technologies to achieve team outcomes.

  • Support compliance with the organization's records and knowledge management requirements.

5. Key Accountabilities
  • Monitor security alerts using Security Information and Event Management (SIEM) tools.

  • Investigate and analyze security incidents, determining root causes and impacts.

  • Respond to security incidents, implementing containment, eradication, and recovery measures.

  • Conduct proactive threat hunting activities to identify potential vulnerabilities.

  • Maintain and configure security tools such as firewalls, intrusion detection/prevention systems, and endpoint protection solutions.

  • Collaborate with IT teams to ensure adherence to security best practices.

  • Develop, maintain, and update incident response playbooks and procedures.

  • Perform regular security assessments and vulnerability scans.

  • Stay updated with the latest trends and technologies in cybersecurity.

  • Coordinate incident response efforts in the event of a breach, ensuring compliance with national security agencies when necessary.

  • Conduct internal investigations, identify root causes of incidents, and recommend corrective actions.

  • Develop custom security signatures/rules for detection and prevention systems.

  • Create custom scripts for analysis and automation in security tasks.

  • Develop, tune, and implement threat detection analytics and security sensors.

6. Additional Responsibilities
  • Participate in internal cyber drills and disaster recovery exercises.

  • Conduct vulnerability assessments and penetration tests to identify and address security risks.

  • Collaborate with the National Cyber Security Agency during major incidents.

Qualifications and Requirements Essential Qualifications :
  • Education : Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.

  • Certifications :

    • Certified SOC Analyst (CSA), Certified Ethical Hacker (CEH), Microsoft Security Operations Analyst-SE 200 professional certification is mandatory .

    • Relevant certifications (e.g., CompTIA Security+, CISSP, GIAC Security Essentials (GSEC), GCIH) are preferred .

Experience :
  • Minimum 5-6 years of experience in cybersecurity, ideally in a SOC (Security Operations Center) environment.

  • Hands-on experience with SIEM tools such as Azure Sentinel is a must.

  • Experience in incident response, threat hunting, and vulnerability management.

  • Familiarity with Microsoft Defender, Microsoft Cloud Defender, Microsoft Purview, Microsoft Insider Risk Management, and vulnerability scanning tools (e.g., Tenable, Burp Suite).

  • Experience with regulatory and compliance frameworks like GDPR, HIPAA, ISO 27001, Qatar 2022 CSF is a plus.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Specialist (Soc Analyst)

Doha, Doha Arab Solutions

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

Overview Position Overview

The Security Specialist (SOC Analyst) is responsible for the administration, monitoring, and enforcement of the organization’s information security policies and practices. This role ensures that information assets remain protected in terms of confidentiality, integrity, and availability, while authorized users can readily access the information they need. The SOC Analyst will play a key role in incident detection, response, threat hunting, vulnerability management, and ensuring compliance with cybersecurity standards.

Responsibilities

Service Management & Operations: Draft, maintain, and enforce policies, standards, procedures, and documentation for security.

Monitor compliance with security operations procedures and investigate actual/potential security breaches.

Ensure timely and thorough investigations of incidents, implementing corrective measures.

Maintain accurate and complete records of security operations.

Plan and implement security changes required to maintain organizational defenses.

Strategy & Risk Management: Conduct risk assessments, vulnerability assessments, and business impact analyses for applications and systems.

Provide expert advice on security strategies and recommend control improvements.

Investigate and report on major breaches, leveraging forensic tools and practices.

Contribute to the development of security standards and guidelines in line with organizational policies.

Ensure proportionate response to vulnerabilities and threats.

Incident Detection & Response: Monitor security alerts and events using SIEM tools (e.g., Azure Sentinel).

Investigate and analyze incidents to determine root cause and impact.

Execute containment, eradication, and recovery measures.

Maintain and update incident response playbooks and procedures.

Coordinate with the National Cyber Security Agency in case of reportable incidents.

Conduct internal investigations and recommend corrective measures.

Threat Hunting & Vulnerability Management: Perform threat hunting to proactively identify risks and vulnerabilities.

Conduct vulnerability scans and penetration tests using Tenable, Burp Suite, and similar tools.

Tune and implement threat detection analytics and SOC infrastructure.

Develop custom signatures/rules for detection and prevention systems.

Script automation for security analysis and incident response (Python, PowerShell, Bash).

Security Tools & Technologies: Manage and configure firewalls, IDS/IPS, and endpoint protection solutions.

Administer and optimize security monitoring platforms (e.g., Microsoft Defender, Microsoft Cloud Defender, Microsoft Purview, Insider Risk Management).

Support compliance with frameworks such as GDPR, HIPAA, NIA, Qatar 2022 CSF, ISO 27001.

Conduct cybersecurity drills and disaster recovery exercises.

Ensure compliance with data privacy and data protection requirements.

Collaboration & Reporting: Work closely with IT teams to align with security best practices.

Provide timely and accurate reporting on incidents, risks, and trends to management.

Stay updated with emerging cybersecurity threats, vulnerabilities, and technologies.

Contribute to awareness and training initiatives.

Key Skills & Competencies

Minimum 5–6 years’ experience in cybersecurity, preferably within a SOC environment.

Proven experience in incident response, threat hunting, and vulnerability management.

Strong knowledge of SIEM tools (Azure Sentinel mandatory).

Experience with endpoint protection and vulnerability scanners (Defender, Tenable, Burp Suite, etc.).

Understanding of network forensics, endpoint forensics, and threat intelligence.

Strong knowledge of networking protocols, firewalls, IDS/IPS.

Scripting skills in Python, PowerShell, or Bash.

Strong problem-solving, analytical, and communication skills.

Ability to work under pressure and handle multiple tasks effectively.

Qualifications

Education: Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or related field.

Mandatory Certifications: CSA, CEH, SC-200.

Preferred (Not Mandatory): CompTIA Security+, CISSP, GIAC GSEC, GCIH, or equivalent certifications.

Skills: cybersecurity, certified ethical hacker, vulnerability, networking, risk, soc

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All IT Security Specialist Jobs