Send me Jobs like this
Nationality
Any Nationality
Gender
Any
Vacancy
1 Vacancy
Job Description
Roles & Responsibilities
Data Security Architecture & Implementation
Security Architecture: Design and implement data security controls including DLP, encryption, and data protection mechanisms across structured and unstructured environments.
Control Enforcement: Ensure consistent enforcement of data classification, encryption, and access controls across databases, endpoints, and cloud platforms.
Compliance Enablement: Translate PDPPL and national data classification requirements (C0–C4) into enforceable technical controls.
Data Privacy Engineering
Privacy Controls Implementation: Embed privacy controls (masking, tokenization, anonymization) into applications and data platforms.
DPIA Execution: Conduct Data Protection Impact Assessments (DPIAs) with a focus on identifying and mitigating technical risks.
Data Visibility: Implement data discovery, classification, and lineage tooling to track sensitive data flows.
Data Residency Controls: Enforce data residency and sovereignty requirements across cloud platforms (Azure/GCP).
AI Data Security
AI Security Controls: Implement safeguards for Generative AI and LLM usage, including access control, logging, and data leakage prevention.
Data Sanitization: Apply masking and anonymization techniques to datasets used in AI/ML pipelines.
Third-Party Risk (Technical): Perform technical security validation of AI vendors, focusing on data handling and model training exposure risks.
IT/OT Data Protection Integration
Secure Data Transfer: Implement encryption and data filtering controls for data flows between OT and IT/cloud environments.
Segmentation Controls: Enforce security controls at Industrial DMZ and integration points (e.g., firewalls, proxies, encryption gateways).
Monitoring & Risk Detection: Support detection of data exposure risks from industrial systems through logging and monitoring solutions.
________________________________________
Data Protection Operations & Cryptography
Encryption & Key Management: Operate and manage encryption solutions including HSMs and Cloud KMS (BYOK/HYOK).
Security Tools Operation: Deploy, tune, and operate DLP, Database Activity Monitoring (DAM), and data classification tools (e.g., Microsoft Purview / Azure Information Protection).
Monitoring & Response: Support incident detection and response related to data leakage, misuse, or unauthorized access.
OR
Key Responsibilities
Security Assurance & Risk Management
Lead security assessments, architecture reviews, vulnerability management, and assurance activities.
Establish and operate a structured Security Assurance Framework covering control validation, coverage tracking, and continuous assurance.
Manage the full security lifecycle from risk identification through remediation and validation.
Translate technical findings into business-level risk statements and remediation plans.
Application, Cloud & Infrastructure Security
Perform in-depth security assessments of web applications, APIs, mobile applications, cloud platforms, containers, and infrastructure.
Identify advanced security risks such as business logic flaws, authentication weaknesses, privilege abuse, and modern attack techniques.
Validate secure architectures, configuration baselines, and cloud-native security controls.
Support secure SDLC and DevSecOps practices, including security testing and release controls.
Configuration Baselines & Continuous Hardening (New)
Define and maintain secure configuration baselines across the enterprise technology stack (OS, databases, network devices, cloud services, identity platforms, and security tools).
Align baselines with industry standards (e.g., CIS Benchmarks) and organizational risk requirements.
Implement automated configuration compliance checks and continuous monitoring mechanisms.
Conduct periodic reviews and validation of configurations to detect drift, misconfigurations, and unauthorized changes.
Work with engineering and operations teams to enforce hardening standards and remediate deviations.
Architecture, Threat Modeling & Secure Design
Lead security architecture and design reviews across applications, platforms, and integrations.
Conduct threat modeling to identify attack paths, risks, and mitigation strategies.
Ensure alignment with enterprise security architecture and Zero Trust principles.
Third-Party, Data Protection & Resilience
Conduct security assessments of vendors, SaaS providers, and external integrations.
Validate data protection, encryption, and privacy controls for sensitive and regulated data.
Support cyber resilience activities, including OT/ICS security reviews, red team exercises, and incident response simulations.
Governance, Compliance & Reporting
Ensure continuous alignment with regulatory and framework requirements (ISO 27001, NIST CSF, Qatar NIA, QCSF).
Support internal and external audits with defensible, evidence-based controls.
Define and report on security metrics, KPIs, and executive dashboards.
________________________________________
Desired Candidate Profile
Education & Experience:
8+ years in Information Security, with at least 5 years focused on data security implementation or privacy engineering
Experience in Critical Infrastructure, Energy, or Government sectors (Qatar regulatory exposure preferred)
English (Fluent); Arabic (Preferred)
Technical Competencies:
Cloud: Hands-on implementation of Azure/GCP data security controls
Regulations (Applied): Practical implementation of PDPPL, ISO 27001, NIA, NIST CSF
AI/ML: Understanding of AI data security risks (e.g., OWASP Top 10 for LLMs)
OT Exposure: Familiarity with Purdue Model and IEC 62443
Certifications:
CISSP or CISM
CDPSE or CIPP/E
CCSP or relevant AI security certifications (e.g., AIGP)
Employment Type
- Full Time
Company Industry
- Retail
Department / Functional Area
- Engineering
Keywords
- Data Security
- Information Security
- Security Operations
- Security Operations Engineer
- Security Operations Center
- Information Security Officer
- Security Engineer
- Information Security Analyst
- Risk Assessment
- Data Loss Prevention
- DLP
- Security Specialist
Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at abuse@naukrigulf.com
Starlink WLL
Mohamed Shiras Shiras - Recruiter
PO Box 201213 Level 20, Manarat Tower Lusail Level 20, Manarat Tower Lusail, Doha, Qatar