Consultant/Senior Consultant - Data Security - Cybersecurity(Arabic Speaking Preferred)
Dubai, United Arab Emirates
Applications have closed
Designation:
Data Protection - Consultant/ Senior Consultant
Years of Experience:- Senior Consultant : 3 – 6 years of experience in data security and protection
- Consultant : 2 – 3 years of experience in data security and protection
- English
- Arabic (added advantage)
At least 1 of the below certifications:
- CDPSE
- CIPT
- CISSP
- CISM
- Microsoft Certified: Information Protection Administrator Associate
- Recognized technical certification such as Symantec CSP in Data Protection, Certified McAfee Security Specialist CMSS DLP Focus, Forcepoint Data Security Suite DSS Professional or similar certifications.
- Excellent team player/leader
- Excellent communication and presentation skills
- Excellent report writing skills
- End-to-end Data Protection Programme Design and Implementation
- Experience working for the Big 4 or Global Consulting Companies
- Ability to coordinate and independently drive activities to an end
- Ability to work in a distributed team across multiple time zones
- Security architecture experience designing and implementing data security and cloud security solutions.
- Experience assessing or building programs in data protection: data encryption (FPE), tokenization, masking, and key management.
- Assist in the development of point of view, white papers, industry thought leadership, and produce knowledge capital.
- Maintain relationships with technology vendors to develop offerings.
- Lead Data Security and Protection strategy, roadmap, and vision definition.
- Drive Data Security and Protection security opportunities, including solution planning, deal shaping, estimating, and pricing.
- Manage large Data Security delivery programs consisting of multiple projects, workstreams, phases, or releases, including financials.
- Data Protection - Provide immutable capabilities layered on top of data at rest or in motion to secure the contents from unauthorized access.
- Secure Data Governance - Enabling the people & process of an organization to secure the flow of data through the organization.
- Secure Data Strategy - Embedding security into the overall approach and vision for data in an organization.
- Database Security – Implementation of technical capabilities to protect and secure structured and unstructured database assets.
- Deep understanding of data encryption with extensive leadership contacts.
- Experience leading the business development and sales capture process.
- Proficient in following areas related data protection:
- Data Discovery of structured/unstructured data
- Data Classification and Labelling
- Data Security cryptographic controls
- Data Loss Prevention
- Digital Rights Management
- Proven track record of designing and implementing Data Protection technology or equivalent Cybersecurity technology such as Data Loss Prevention, Data Classification, Digital Rights Management, Masking or Tokenization Technology, Encryption etc.
- Driven Data Security and Protection security opportunities, including solution planning, deal shaping, estimating, and pricing.
- Assist in Data Security proposal development and sales/marketing collateral.
- Assist in Data Security and Protection strategy, roadmap, and vision definition.
- Developed new offerings and go to market strategies with data teams.
- Maintained relationships with technology vendors to develop offerings.
- Assisted in the development of point of view, white papers, industry thought leadership, and produce knowledge capital.
- Knowledge of securing Office 365, leveraging Microsoft Secure Score.
- Understanding of Microsoft Information Protection with data classification infrastructures and techniques to classify data both on-premises and in the cloud.
- Relevant experience with Data Loss Prevention technologies across endpoints.
- A deep understanding of the underlying Identity and Access management solutions required to operate Microsoft 365 and Microsoft Threat Protection capabilities is a plus.
- Analytical mind with good troubleshooting skill.
- Experience in Symantec, Forcepoint, McAfee, Microsoft or Digital Guardian as well as competitor products is a plus.
- Development of workflows for incident and alert generation for protected data protection policy infringement.
- Configuration and tuning of DLP systems (such as Symantec DLP, zScaler DLP product), policies and response rules (might be required in specific projects).
- Assist and execute Data Protection projects related to the following:
- Data protection gap assessments/ Audits
- Data Protection Programme design, building strategies, frameworks, solution designs and implementation
- Data Discovery
- Data Classification
- Cloud-centric data protection
- Cloud Access Security Broker (CASB) & monitoring
- Data Protection strategy
- Development of the Target Operating Model, policies, procedures and templates that align with data protection laws and regulations
- Assist in project communications involving technology partners and member firms.
- Ensure quality in project deliverables and documentation.
- Lead client presentations.
- Lead project management meetings including:
- Status updates
- Audit / technical assessment reports
- Internal team meetings
- Review and maintain the data protection management workflows that enables clients to identify, log, investigate and resolve data protection-related issues in accordance with industry best practices.
- Assist in and respond to client Request for Proposals (RFP) and pitches.
- Support Thought Leadership and Webinar initiatives for Data Protection.
- Adhere to project management guidelines and financial budget management for engagements.
- Adhere to the firm’s Risk Management guidelines.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
8
1
0
Category:
Consulting Jobs
Tags: Audits CASB CISM CISSP Cloud Encryption Governance IAM Monitoring RFPs Risk management Strategy
Perks/benefits: Career development Team events
Region:
Middle East
Country:
United Arab Emirates
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Product Security Engineer jobsSecurity Operations Engineer jobsSenior Security Analyst jobsSystems Administrator jobsSenior Cybersecurity Engineer jobsSenior Information Security Analyst jobsCybersecurity Editor jobsCybersecurity Content Editor jobsCyber Security Specialist jobsInformation Security Manager jobsIT Security Analyst jobsSenior Network Security Engineer jobsSenior Information Security Engineer jobsSenior Product Security Engineer jobsInformation System Security Officer (ISSO) jobsSecurity Consultant jobsChief Information Security Officer jobsIT Security Engineer jobsInformation Systems Security Engineer jobsSecurity Specialist jobsSenior Cyber Security Engineer jobsCyber Threat Intelligence Analyst jobsSenior Software Engineer jobsCybersecurity Specialist jobsSenior IT Auditor jobs
EDR jobsTS/SCI jobsJava jobsEncryption jobsCEH jobsSplunk jobsTop Secret jobsSDLC jobsIDS jobsThreat detection jobsTerraform jobsIPS jobsMalware jobsFinance jobsRMF jobsSQL jobsDocker jobsForensics jobsSOC 2 jobsActive Directory jobsIntrusion detection jobsCompTIA jobsOWASP jobsITIL jobsTCP/IP jobs
HIPAA jobsCRISC jobsGIAC jobsAnsible jobsClearance Required jobsVPN jobsDoDD 8570 jobsMITRE ATT&CK jobsIT infrastructure jobsOSCP jobsJira jobsData Analytics jobsSOAR jobsDNS jobsSOX jobsJavaScript jobsBanking jobsUNIX jobsCCSP jobsIndustrial jobsZero Trust jobsCISO jobsGCIH jobsArtificial Intelligence jobsSANS jobs