Cybersecurity and Compliance Officer
Posting Date : 5/4/2025
Qatar
The Cybersecurity Analyst and Compliance Officer plays a critical operational role in cybersecurity framework. The role is responsible for operating and enhancing security platforms, managing threat detection, endpoint protection, vulnerability management, and ensuring compliance with ISO27001 and ISO31000 standards. The objective is to maintain a resilient, compliant, and continuously improving cybersecurity posture across infrastructure, cloud, and business operations.
1. Security Platform Operations and Threat Monitoring
▪ Operate, configure, and monitor enterprise-grade security platforms for endpoint protection, email security, identity protection, and threat detection.
▪ Investigate security incidents, tune detection policies, and continuously improve threat visibility.
▪ Conduct proactive threat hunting, incident triage, and response actions.
2. Network and Connectivity Security Management
▪ Configure, monitor, and maintain network security devices including firewalls, web application firewalls (WAFs), and intrusion prevention systems (IPS).
▪ Implement and monitor Zero Trust Network Access (ZTNA) controls and secure remote access policies.
3. Endpoint Security and Mobile Device Management
▪ Administer endpoint protection and threat defense solutions across desktops, laptops, and mobile devices.
▪ Manage Mobile Device Management (MDM) platforms to enforce security compliance, encryption, and secure application usage.
▪ Deploy attack surface reduction controls and monitor endpoint health.
4. Identity and Logical Access Management
▪ Administer identity protection policies, access control configurations, and privileged account management.
▪ Conduct periodic access reviews, identity governance checks, and session monitoring.
5. Physical Access and Asset Protection
▪ Coordinate with Facilities to enforce physical access controls for server rooms, network equipment, and critical assets.
▪ Ensure secure tracking, storage, and disposal of IT assets.
6. Sensitive Document and Output Management
▪ Implement and enforce data protection policies for document classification, secure printing, and controlled output management.
▪ Monitor activities around sensitive data storage and sharing.
7. Vulnerability Management and Patch Management
▪ Perform vulnerability assessments using recognized tools and frameworks.
▪ Prioritize vulnerabilities based on severity and business impact.
▪ Manage patch deployment schedules for operating systems, servers, applications, and endpoint devices.