20 Security Monitoring jobs in Qatar

Senior Consultant, Incident Response &

Doha, Doha EY

Posted today

Job Viewed

Tap Again To Close

Job Description

Our Incident Response & Cybersecurity team supports our national and international client to address security incidents, hunt down security risks or incidents within environments, and act as a supporting team member in FIS.

**The opportunity**

In this role, you will require extensive experience and knowledge of technology, tools, policies, and standards related to security systems and incident response, which includes being up to date with latest trends. You must be competent to work at a proficient technical level of digital forensic, security incident response, and malware analysis, capable of identifying vectors of threats and security incidents, able to remediate or coordinate incident response efforts, and develop documentation to support the security incident response process.

**Your key responsibilities**

As a senior consultant you will be responsible to investigate network intrusions and other cybersecurity incidents to determine the cause and extent of the breach. Includes ability to perform host-based and network-based analysis across all major operating systems and network device platforms.

You will work to preserve, harvest, and analyze data from electronic data sources, including laptop and desktop computers, servers, and mobile devices while supporting the complex forensic analyses handled by the firm.

Moreover, it will be your responsibility to produce high-quality oral and written work product, presenting complex technical matters clearly and concisely to form and articulate expert opinions based on analysis. One should possess the experience, credibility, and integrity to perform as an expert witness. As a senior consultant you should consult with and take direction from supervisors, engagement managers, and clients regarding case investigation and status. Investigate instances of malicious code and documents to determine attack vectors and payloads and develop and refine policies and procedures for forensic and malware analyses.

You will play a vital role of researching, developing, and recommending hardware and software needed for incident response and help develop and maintain policies and procedures to analyze digital evidence.

Furthermore, should also participate in technical meetings and working groups to address issues related to cybersecurity and incident preparedness and ability to create targeted remediation plans for clients who have been compromised.

**Skills and attributes for success**
- Must have experience in performing security incident response and/or digital forensic analysis in support of security incident response
- Demonstrated ability to document processes
- The ability to respond to crises objectively
- Proficiency with MS Office Applications
- Must be able to work collaboratively with teams and independently across physical locations

**To qualify for the role, you must have**
- Bachelor's degree and approximately 3-5 years of related work experience
- Experience in computer intrusion analysis and incident response
- Intrusion detection
- Computer network surveillance/monitoring
- Knowledge and understanding of network protocols, network devices, multiple operating systems, and secure architectures
- Experience in computer evidence seizure, computer forensic analysis, and data recovery
- Computer network forensics
- System log analysis
- Experience with current cyber threats and the associated tactics, techniques, and procedures used to infiltrate computer networks
- Effective communication skills with different stakeholders about cybersecurity and incident response analysis
- Ability to develop effective workflows, timelines, budgets for client engagements
- Ability to ensure quality in project deliverables and documentation
- Excellent troubleshooting skills
- Excellent project management skills and the ability to prioritize when working on multiple engagements
- A history of business development and team development success
- Proficient English

**Ideally, you’ll also have**
- An advanced degree in areas of at least one of the following professional certifications such as CIPT, CISSP, CISM, or CIPP/E, CDPSE, GCIH, GCED, CEH, GCIA, GCFA, GSE, Microsoft Certified: Information Protection Administrator Associate, or other relevant internationally recognized certifications
- Proficient Arabic

**What we offer**

We offer a competitive compensation package where you’ll be rewarded based on performance and recognized for the value you bring to our business. Plus, we offer:

- Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
- Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.

**If you can demonstrate tha
This advertiser has chosen not to accept applicants from your region.

Senior Consultant, Incident Response &

Doha, Doha EY

Posted today

Job Viewed

Tap Again To Close

Job Description

Our Incident Response & Cybersecurity team supports our national and international client to address security incidents, hunt down security risks or incidents within environments, and act as a supporting team member in FIS.

**The opportunity**

In this role, you will require extensive experience and knowledge of technology, tools, policies, and standards related to security systems and incident response, which includes being up to date with latest trends. You must be competent to work at a proficient technical level of digital forensic, security incident response, and malware analysis, capable of identifying vectors of threats and security incidents, able to remediate or coordinate incident response efforts, and develop documentation to support the security incident response process.

**Your key responsibilities**

As a senior consultant you will be responsible to investigate network intrusions and other cybersecurity incidents to determine the cause and extent of the breach. Includes ability to perform host-based and network-based analysis across all major operating systems and network device platforms.

You will work to preserve, harvest, and analyze data from electronic data sources, including laptop and desktop computers, servers, and mobile devices while supporting the complex forensic analyses handled by the firm.

Moreover, it will be your responsibility to produce high-quality oral and written work product, presenting complex technical matters clearly and concisely to form and articulate expert opinions based on analysis. One should possess the experience, credibility, and integrity to perform as an expert witness. As a senior consultant you should consult with and take direction from supervisors, engagement managers, and clients regarding case investigation and status. Investigate instances of malicious code and documents to determine attack vectors and payloads and develop and refine policies and procedures for forensic and malware analyses.

You will play a vital role of researching, developing, and recommending hardware and software needed for incident response and help develop and maintain policies and procedures to analyze digital evidence.

Furthermore, should also participate in technical meetings and working groups to address issues related to cybersecurity and incident preparedness and ability to create targeted remediation plans for clients who have been compromised.

**Skills and attributes for success**
- Must have experience in performing security incident response and/or digital forensic analysis in support of security incident response
- Demonstrated ability to document processes
- The ability to respond to crises objectively
- Proficiency with MS Office Applications
- Must be able to work collaboratively with teams and independently across physical locations

**To qualify for the role, you must have**
- Bachelor's degree and approximately 3-5 years of related work experience
- Experience in computer intrusion analysis and incident response
- Intrusion detection
- Computer network surveillance/monitoring
- Knowledge and understanding of network protocols, network devices, multiple operating systems, and secure architectures
- Experience in computer evidence seizure, computer forensic analysis, and data recovery
- Computer network forensics
- System log analysis
- Experience with current cyber threats and the associated tactics, techniques, and procedures used to infiltrate computer networks
- Effective communication skills with different stakeholders about cybersecurity and incident response analysis
- Ability to develop effective workflows, timelines, budgets for client engagements
- Ability to ensure quality in project deliverables and documentation
- Excellent troubleshooting skills
- Excellent project management skills and the ability to prioritize when working on multiple engagements
- A history of business development and team development success
- Proficient English

**Ideally, you’ll also have**
- An advanced degree in areas of at least one of the following professional certifications such as CIPT, CISSP, CISM, or CIPP/E, CDPSE, GCIH, GCED, CEH, GCIA, GCFA, GSE, Microsoft Certified: Information Protection Administrator Associate, or other relevant internationally recognized certifications
- Proficient Arabic

**What we offer**

We offer a competitive compensation package where you’ll be rewarded based on performance and recognized for the value you bring to our business. Plus, we offer:

- Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
- Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.

**If you can demonstrate tha
This advertiser has chosen not to accept applicants from your region.

Senior Consultant, Incident Response &

Doha, Doha EY

Posted today

Job Viewed

Tap Again To Close

Job Description

Our Incident Response & Cybersecurity team supports our national and international client to address security incidents, hunt down security risks or incidents within environments, and act as a supporting team member in FIS.

**The opportunity**

In this role, you will require extensive experience and knowledge of technology, tools, policies, and standards related to security systems and incident response, which includes being up to date with latest trends. You must be competent to work at a proficient technical level of digital forensic, security incident response, and malware analysis, capable of identifying vectors of threats and security incidents, able to remediate or coordinate incident response efforts, and develop documentation to support the security incident response process.

**Your key responsibilities**

As a senior consultant you will be responsible to investigate network intrusions and other cybersecurity incidents to determine the cause and extent of the breach. Includes ability to perform host-based and network-based analysis across all major operating systems and network device platforms.

You will work to preserve, harvest, and analyze data from electronic data sources, including laptop and desktop computers, servers, and mobile devices while supporting the complex forensic analyses handled by the firm.

Moreover, it will be your responsibility to produce high-quality oral and written work product, presenting complex technical matters clearly and concisely to form and articulate expert opinions based on analysis. One should possess the experience, credibility, and integrity to perform as an expert witness. As a senior consultant you should consult with and take direction from supervisors, engagement managers, and clients regarding case investigation and status. Investigate instances of malicious code and documents to determine attack vectors and payloads and develop and refine policies and procedures for forensic and malware analyses.

You will play a vital role of researching, developing, and recommending hardware and software needed for incident response and help develop and maintain policies and procedures to analyze digital evidence.

Furthermore, should also participate in technical meetings and working groups to address issues related to cybersecurity and incident preparedness and ability to create targeted remediation plans for clients who have been compromised.

**Skills and attributes for success**
- Must have experience in performing security incident response and/or digital forensic analysis in support of security incident response
- Demonstrated ability to document processes
- The ability to respond to crises objectively
- Proficiency with MS Office Applications
- Must be able to work collaboratively with teams and independently across physical locations

**To qualify for the role, you must have**
- Bachelor's degree and approximately 3-5 years of related work experience
- Experience in computer intrusion analysis and incident response
- Intrusion detection
- Computer network surveillance/monitoring
- Knowledge and understanding of network protocols, network devices, multiple operating systems, and secure architectures
- Experience in computer evidence seizure, computer forensic analysis, and data recovery
- Computer network forensics
- System log analysis
- Experience with current cyber threats and the associated tactics, techniques, and procedures used to infiltrate computer networks
- Effective communication skills with different stakeholders about cybersecurity and incident response analysis
- Ability to develop effective workflows, timelines, budgets for client engagements
- Ability to ensure quality in project deliverables and documentation
- Excellent troubleshooting skills
- Excellent project management skills and the ability to prioritize when working on multiple engagements
- A history of business development and team development success
- Proficient English

**Ideally, you’ll also have**
- An advanced degree in areas of at least one of the following professional certifications such as CIPT, CISSP, CISM, or CIPP/E, CDPSE, GCIH, GCED, CEH, GCIA, GCFA, GSE, Microsoft Certified: Information Protection Administrator Associate, or other relevant internationally recognized certifications
- Proficient Arabic

**What we offer**

We offer a competitive compensation package where you’ll be rewarded based on performance and recognized for the value you bring to our business. Plus, we offer:

- Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
- Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.

**If you can demonstrate tha
This advertiser has chosen not to accept applicants from your region.

Senior Incident Response Consultant QAtar

Doha, Doha Mandiant

Posted today

Job Viewed

Tap Again To Close

Job Description

Company Description

Since 2004, Mandiant has been a trusted partner to security-conscious organizations. Effective security is based on the right combination of expertise, intelligence, and adaptive technology, and the Mandiant Advantage SaaS platform scales decades of frontline experience and industry-leading threat intelligence to deliver a range of dynamic cyber defense solutions. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats.

**Job Description**:
Mandiant Security Consulting Services ensures the long-term success of our clients by providing talented, passionate, and specialized security expertise. Our Consultants partner with Mandiant clients to evaluate, create, develop, improve, and mature information security operations and programs. By utilizing the latest industry standards and combining experience and knowledge gained from Mandiant Incident Response, Intelligence and Managed Defense practices, we are able to develop defense forward information security programs for our clients.

**What You Will Do**:

- Lead large, client-facing projects while mentoring/training junior team members
- Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations
- Utilize Mandiant technology to conduct large-scale investigations and examine endpoint and network-based sources of evidence
- Recognize and codify attacker tools, tactics, and procedures in indicators of compromise (IOCs) that can be applied to current and future investigations
- Build scripts, tools, or methodologies to enhance Mandiant’s incident investigation processes
- Develop and present comprehensive and accurate reports, trainings and presentations for both technical and executive audiences
- Work with clients security and IT operations teams to implement remediation plans in response to incidents

**Qualifications**:

- 5+ years of experience in incident response, security operations, consulting or similar
- Experience with at least three of the following:

- Windows disk and memory forensics
- Network Security Monitoring (NSM), network traffic analysis, and log analysis
- Unix or Linux disk and memory forensics
- Static and dynamic malware analysis
- Experience and understanding of enterprise security controls in Active Directory/Windows environments
- Experience building scripts, tools, or methodologies to enhance investigation processes
- Experience leading external client engagements
- Experience conducting analysis of electronic media, packet capture, log data, and network devices in support of intrusion analysis or enterprise level information security operations
- Experience with advanced computer exploitation methodologies
- Demonstrated ability to make decisions on remediation and countermeasures for challenging information security threats

**Desired Qualifications**:

- Experience with a scripting language such as Perl, Python, or other scripting language in an incident handling environment, highly desired
- Effectively communicating investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients
- Effectively develop documentation and explain technical details in a concise, understandable manner
- Strong time management skills to balance time among multiple tasks, and lead junior staff when required
This advertiser has chosen not to accept applicants from your region.

Incident Response and Digital Forensics Engineer

Doha, Doha Techpace

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Description: We are seeking a highly skilled and experienced Incident Response and Digital Forensics Engineer to join our cybersecurity team. As an Incident Response and Digital Forensics Engineer, you will be responsible for investigating security incidents, performing digital forensics analysis, and coordinating incident response efforts. You will work closely with cross-functional teams to detect, contain, and remediate security breaches, ensuring the protection of our organization's systems and data. This role requires strong technical expertise, excellent problem-solving skills, and a deep understanding of incident response and digital forensics methodologies.

**Responsibilities**:

- Conduct thorough investigations of security incidents and breaches.
- Perform digital forensics analysis to collect and preserve evidence.
- Identify the root cause and scope of security incidents and recommend remediation actions.
- Coordinate incident response efforts with cross-functional teams.
- Develop and maintain incident response playbooks and standard operating procedures.
- Stay updated with the latest threat landscape, attack techniques, and forensic tools.

**Requirements**:

- Bachelor's degree in Computer Science, Information Security, or a related field.
- Proven experience in incident response and digital forensics.
- Strong knowledge of incident response methodologies and best practices.
- Proficiency in digital forensics tools and techniques.
- Familiarity with log analysis, malware analysis, and network forensics.
- Excellent problem-solving and analytical skills.
- Effective communication and collaboration abilities.

Preferred Qualifications:

- Relevant certifications, such as GIAC Certified Incident Handler (GCIH), Certified Computer Forensics Examiner (CCFE), or EnCase Certified Examiner (EnCE).
- Experience with incident response platforms and tools.
- Knowledge of regulatory frameworks, such as GDPR or HIPAA.

We offer competitive compensation packages, opportunities for professional development, and a collaborative work environment focused on innovation and continuous improvement. If you are passionate about incident response, digital forensics, and protecting organizations from cyber threats, we would love to hear from you.

**Salary**: QAR25,000.00 - QAR30,000.00 per month

Ability to commute/relocate:

- Doha: Reliably commute or planning to relocate before starting work (required)

**Education**:

- Bachelor's (preferred)

License/Certification:

- SANS, Elearn Security (required)
This advertiser has chosen not to accept applicants from your region.

Application Security Analyst

Doha, Doha Management Solutions International MSI

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Job Objectives

The Information Security Application Consultants develops, operates, and manages the application security frameworks to continuously monitor and improve organization's security posture to build secure applications and reduce threat footprint. The role also provides subject matter expertise and operational direction on application security governance, application security control and risk analysis, security assessment automation, secure development practices and incident response.

Description

1. Establish and manage industry-leading application security processes and practices at each phase of the software development lifecycle and implement operational roadmap for assessment, penetration testing and source code reviews.

2. Ensure acquired and developed applications are consistent with secure software development lifecycle and security architecture guidelines.

3. Conduct regular manual and automated application security testing, assessments, review results, track issues and follow up to ensure remediation in line with secure software development lifecycle.

4. Coordinate and scope Third party penetration testing and application assessments activities including configuration reviews for compliance and additional assurance of secured implementation and operation of solutions.

5. Design, develop and implement the integration and automation of threat modelling, security assessments and testing tools with DevOps, application development and QA tools to improve detection and prevention capabilities.

6. Recommend improvements to the secure reference architecture through continuous review and assessment of the application security requirements, policies, and procedures.

7. Ensure secure coding practices and Software Development Life Cycle (SDLC) are followed by providing training and awareness to the internal stakeholders.

8. Ensure Data Protection, privacy concerns and regulations are in place and addressed in Policies and procedures.

9. Help support and enhance existing cloud security model, ensuring adherence to best practice in alignment with industry standards at technology, operational, legal measures.

10. Define the high-level requirements for preserving the confidentiality, integrity, and availability of information and assets, protecting assets from threats based on an assessment of risks to the organization, and supporting the fulfillment of relevant legal, regulatory, operational, and contractual requirements.

11. Provide regular updates to management on application security and vulnerability management posture by defining operational KPIs and metrics, build dashboard and reports.

12. Manage follow up, close and report upon all department’s information security regulatory requirements, audits, inconformity reports, compliance issues and observations that arise during conducted internal and external assurance engagements.

13. Conduct Risk Assessments on the required Applications to identify applicable risk scenarios and mitigating controls as per Qatargas Information security risk management practices.

14. Perform other related duties or assignments as directed.

Requirements

Minimum Qualifications :

Bachelor’s degree in Computer Engineering / Science, Electronics Engineering, or any other appropriately relevant field.

Minimum Experience :

10 years of progressive experience in a directly related field.

7 years of professional experience in ICT information, application security in an enterprise level environment.

3 years in similarly relevant Application security role with around the same team capacity and complexity of assigned tasks.

Job Specific Skills :

Certifications in industry relative standards, frameworks, and schools of practice, such as CSSLP, GWAPT, OSCP, etc.

Excellent knowledge in maintaining effective working relationships with staff and clients; excellent people management skills.

Excellent written and verbal communication skills.

Strong analytical and problem-solving skills.

Proven success in working in a similarly complex ICT information security within same industry.

Professional experience in conducting manual and automated application assessments (DAST, SAST & RAST), penetration testing and configuration review.

Excellent understanding of modern development approaches and environments, secure Software Development Life Cycle (SDLC), secure coding practices and DevSecOps.

Good understanding of cryptography, web service frameworks, mobile application architectures, and service architectures (such as event-driven, service-oriented, or serverless architectures)

Good understanding of implementing enterprise information security architectures and frameworks.

Strong understanding of project management principles and requirements.

Excellent knowledge and understanding of Information Technology industry, trends, architectures, integrations, operational security, and process computing.

Excellent knowledge and understanding of leading industry standards, frameworks, methodologies, and best practices.

Excellent knowledge and understanding of information security governance, compliance, architecture components, technical solutions, and operational services.

Understanding of SAP products, Applications development concepts, change management and landscape

Propose security guidelines for new SAP systems ensuring critical design and implementation elements are captured addressed.

Excellent knowledge and understanding of SAP cloud platform Application services, types of deployments and security requirements to ensuring secure operations and data integrity.

  • Skillset Required : Information Technology, Risk Assessment, Css, Verbal Communication Skill, Devops, Information Security, Verbal Communication Skills, Sdlc, Management Skill, Analytical And Problem-solving Skill, Application Security, Compliance, Aris, Change Management, Application Development, Web Service, Problem-solving Skill, Methodologies, Excel, People Management, Communication Skill, Written And Verbal Communication, Strong Understanding, Trends, Project Management, Strong Analytical, Software Development
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Application Security Analyst

Doha, Doha Management Solutions International MSI

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Job Objectives

The Information Security Application Consultants develops, operates, and manages the application security frameworks to continuously monitor and improve organization's security posture to build secure applications and reduce threat footprint. The role also provides subject matter expertise and operational direction on application security governance, application security control and risk analysis, security assessment automation, secure development practices and incident response.

Description

1. Establish and manage industry-leading application security processes and practices at each phase of the software development lifecycle and implement operational roadmap for assessment, penetration testing and source code reviews.

2. Ensure acquired and developed applications are consistent with secure software development lifecycle and security architecture guidelines.

3. Conduct regular manual and automated application security testing, assessments, review results, track issues and follow up to ensure remediation in line with secure software development lifecycle.

4. Coordinate and scope Third party penetration testing and application assessments activities including configuration reviews for compliance and additional assurance of secured implementation and operation of solutions.

5. Design, develop and implement the integration and automation of threat modelling, security assessments and testing tools with DevOps, application development and QA tools to improve detection and prevention capabilities.

6. Recommend improvements to the secure reference architecture through continuous review and assessment of the application security requirements, policies, and procedures.

7. Ensure secure coding practices and Software Development Life Cycle (SDLC) are followed by providing training and awareness to the internal stakeholders.

8. Ensure Data Protection, privacy concerns and regulations are in place and addressed in Policies and procedures.

9. Help support and enhance existing cloud security model, ensuring adherence to best practice in alignment with industry standards at technology, operational, legal measures.

10. Define the high-level requirements for preserving the confidentiality, integrity, and availability of information and assets, protecting assets from threats based on an assessment of risks to the organization, and supporting the fulfillment of relevant legal, regulatory, operational, and contractual requirements.

11. Provide regular updates to management on application security and vulnerability management posture by defining operational KPIs and metrics, build dashboard and reports.

12. Manage follow up, close and report upon all department's information security regulatory requirements, audits, inconformity reports, compliance issues and observations that arise during conducted internal and external assurance engagements.

13. Conduct Risk Assessments on the required Applications to identify applicable risk scenarios and mitigating controls as per Qatargas Information security risk management practices.

14. Perform other related duties or assignments as directed.

Requirements

Minimum Qualifications :

Bachelor's degree in Computer Engineering / Science, Electronics Engineering, or any other appropriately relevant field.

Minimum Experience :

10 years of progressive experience in a directly related field.

7 years of professional experience in ICT information, application security in an enterprise level environment.

3 years in similarly relevant Application security role with around the same team capacity and complexity of assigned tasks.

Job Specific Skills :

Certifications in industry relative standards, frameworks, and schools of practice, such as CSSLP, GWAPT, OSCP, etc.

Excellent knowledge in maintaining effective working relationships with staff and clients; excellent people management skills.

Excellent written and verbal communication skills.

Strong analytical and problem-solving skills.

Proven success in working in a similarly complex ICT information security within same industry.

Professional experience in conducting manual and automated application assessments (DAST, SAST & RAST), penetration testing and configuration review.

Excellent understanding of modern development approaches and environments, secure Software Development Life Cycle (SDLC), secure coding practices and DevSecOps.

Good understanding of cryptography, web service frameworks, mobile application architectures, and service architectures (such as event-driven, service-oriented, or serverless architectures)

Good understanding of implementing enterprise information security architectures and frameworks.

Strong understanding of project management principles and requirements.

Excellent knowledge and understanding of Information Technology industry, trends, architectures, integrations, operational security, and process computing.

Excellent knowledge and understanding of leading industry standards, frameworks, methodologies, and best practices.

Excellent knowledge and understanding of information security governance, compliance, architecture components, technical solutions, and operational services.

Understanding of SAP products, Applications development concepts, change management and landscape

Propose security guidelines for new SAP systems ensuring critical design and implementation elements are captured addressed.

Excellent knowledge and understanding of SAP cloud platform Application services, types of deployments and security requirements to ensuring secure operations and data integrity.

  • Skillset Required : Information Technology, Risk Assessment, Css, Verbal Communication Skill, Devops, Information Security, Verbal Communication Skills, Sdlc, Management Skill, Analytical And Problem-solving Skill, Application Security, Compliance, Aris, Change Management, Application Development, Web Service, Problem-solving Skill, Methodologies, Excel, People Management, Communication Skill, Written And Verbal Communication, Strong Understanding, Trends, Project Management, Strong Analytical, Software Development
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Security monitoring Jobs in Qatar !

SR. SECURITY ANALYST

Doha, Doha Qatar Energy

Posted 15 days ago

Job Viewed

Tap Again To Close

Job Description

Overview
Lead and implement QatarEnergy Corporate Security Program and management systems, lead assurance, standardization of security operations for commercial, industrial, international assets.

Monitor geopolitical and security incidents, threats, and internal and external security risks to then evaluate, analyse, and create risk advice and business intelligence disseminated to all levels of QatarEnergy, Joint Ventures, governmental agencies in Qatar and overseas.

Guide and support QatarEnergy, Joint Ventures and governmental agencies in security response planning, security emergencies, business continuity and crisis management and provide best practice advise for security design and practice.

Experience
At least 15 years working experience with 10 years of in Operational Security, military, police; prefer experience in energy sector.

Qualifications
Bachelor's degree in Engineering/Science/Security or relevant discipline from an internationally recognized university; professional qualifications in Security highly desirable.
Exposure and good understanding of cyber security.
Excellent communication skills in English and preferably Arabic.
Strong leadership, management, decision making, networking, and influencing skills.
Ability to influence and guide senior management in QatarEnergy, external stakeholders.
Good understanding of the geopolitical security risks.
This advertiser has chosen not to accept applicants from your region.

Application Security Analyst

Doha, Doha Management Solutions International MSI

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Job Objectives The Information Security Application Consultants develops, operates, and manages the application security frameworks to continuously monitor and improve organization's security posture to build secure applications and reduce threat footprint. The role also provides subject matter expertise and operational direction on application security governance, application security control and risk analysis, security assessment automation, secure development practices and incident response. Description 1. Establish and manage industry-leading application security processes and practices at each phase of the software development lifecycle and implement operational roadmap for assessment, penetration testing and source code reviews. 2. Ensure acquired and developed applications are consistent with secure software development lifecycle and security architecture guidelines. 3. Conduct regular manual and automated application security testing, assessments, review results, track issues and follow up to ensure remediation in line with secure software development lifecycle. 4. Coordinate and scope Third party penetration testing and application assessments activities including configuration reviews for compliance and additional assurance of secured implementation and operation of solutions. 5. Design, develop and implement the integration and automation of threat modelling, security assessments and testing tools with DevOps, application development and QA tools to improve detection and prevention capabilities. 6. Recommend improvements to the secure reference architecture through continuous review and assessment of the application security requirements, policies, and procedures. 7. Ensure secure coding practices and Software Development Life Cycle (SDLC) are followed by providing training and awareness to the internal stakeholders. 8. Ensure Data Protection, privacy concerns and regulations are in place and addressed in Policies and procedures. 9. Help support and enhance existing cloud security model, ensuring adherence to best practice in alignment with industry standards at technology, operational, legal measures. 10. Define the high-level requirements for preserving the confidentiality, integrity, and availability of information and assets, protecting assets from threats based on an assessment of risks to the organization, and supporting the fulfillment of relevant legal, regulatory, operational, and contractual requirements. 11. Provide regular updates to management on application security and vulnerability management posture by defining operational KPIs and metrics, build dashboard and reports. 12. Manage follow up, close and report upon all department’s information security regulatory requirements, audits, inconformity reports, compliance issues and observations that arise during conducted internal and external assurance engagements. 13. Conduct Risk Assessments on the required Applications to identify applicable risk scenarios and mitigating controls as per Qatargas Information security risk management practices. 14. Perform other related duties or assignments as directed. Requirements Minimum Qualifications : Bachelor’s degree in Computer Engineering / Science, Electronics Engineering, or any other appropriately relevant field. Minimum Experience : 10 years of progressive experience in a directly related field. 7 years of professional experience in ICT information, application security in an enterprise level environment. 3 years in similarly relevant Application security role with around the same team capacity and complexity of assigned tasks. Job Specific Skills : Certifications in industry relative standards, frameworks, and schools of practice, such as CSSLP, GWAPT, OSCP, etc. Excellent knowledge in maintaining effective working relationships with staff and clients; excellent people management skills. Excellent written and verbal communication skills. Strong analytical and problem-solving skills. Proven success in working in a similarly complex ICT information security within same industry. Professional experience in conducting manual and automated application assessments (DAST, SAST & RAST), penetration testing and configuration review. Excellent understanding of modern development approaches and environments, secure Software Development Life Cycle (SDLC), secure coding practices and DevSecOps. Good understanding of cryptography, web service frameworks, mobile application architectures, and service architectures (such as event-driven, service-oriented, or serverless architectures) Good understanding of implementing enterprise information security architectures and frameworks. Strong understanding of project management principles and requirements. Excellent knowledge and understanding of Information Technology industry, trends, architectures, integrations, operational security, and process computing. Excellent knowledge and understanding of leading industry standards, frameworks, methodologies, and best practices. Excellent knowledge and understanding of information security governance, compliance, architecture components, technical solutions, and operational services. Understanding of SAP products, Applications development concepts, change management and landscape Propose security guidelines for new SAP systems ensuring critical design and implementation elements are captured addressed. Excellent knowledge and understanding of SAP cloud platform Application services, types of deployments and security requirements to ensuring secure operations and data integrity. Skillset Required : Information Technology, Risk Assessment, Css, Verbal Communication Skill, Devops, Information Security, Verbal Communication Skills, Sdlc, Management Skill, Analytical And Problem-solving Skill, Application Security, Compliance, Aris, Change Management, Application Development, Web Service, Problem-solving Skill, Methodologies, Excel, People Management, Communication Skill, Written And Verbal Communication, Strong Understanding, Trends, Project Management, Strong Analytical, Software Development

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

SR. SECURITY ANALYST

Doha, Doha Qatar Energy

Posted 15 days ago

Job Viewed

Tap Again To Close

Job Description

Overview Lead and implement QatarEnergy Corporate Security Program and management systems, lead assurance, standardization of security operations for commercial, industrial, international assets.

Monitor geopolitical and security incidents, threats, and internal and external security risks to then evaluate, analyse, and create risk advice and business intelligence disseminated to all levels of QatarEnergy, Joint Ventures, governmental agencies in Qatar and overseas.

Guide and support QatarEnergy, Joint Ventures and governmental agencies in security response planning, security emergencies, business continuity and crisis management and provide best practice advise for security design and practice.

Experience At least 15 years working experience with 10 years of in Operational Security, military, police; prefer experience in energy sector.

Qualifications Bachelor's degree in Engineering/Science/Security or relevant discipline from an internationally recognized university; professional qualifications in Security highly desirable. Exposure and good understanding of cyber security. Excellent communication skills in English and preferably Arabic. Strong leadership, management, decision making, networking, and influencing skills. Ability to influence and guide senior management in QatarEnergy, external stakeholders. Good understanding of the geopolitical security risks. #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Security Monitoring Jobs