Security Operations Officer
Skills
About This Role
• Data Security Architecture & Implementation
- Security Architecture: Design and implement data security controls including DLP, encryption, and data protection mechanisms across structured and unstructured environments.
- Control Enforcement: Ensure consistent enforcement of data classification, encryption, and access controls across databases, endpoints, and cloud platforms.
- Compliance Enablement: Translate PDPPL and national data classification requirements (C0–C4) into enforceable technical controls.
• Data Privacy Engineering
- Privacy Controls Implementation: Embed privacy controls (masking, tokenization, anonymization) into applications and data platforms.
- DPIA Execution: Conduct Data Protection Impact Assessments (DPIAs) with a focus on identifying and mitigating technical risks.
- Data Visibility: Implement data discovery, classification, and lineage tooling to track sensitive data flows.
- Data Residency Controls: Enforce data residency and sovereignty requirements across cloud platforms (Azure/GCP).
• AI Data Security
- AI Security Controls: Implement safeguards for Generative AI and LLM usage, including access control, logging, and data leakage prevention.
- Data Sanitization: Apply masking and anonymization techniques to datasets used in AI/ML pipelines.
- Third-Party Risk (Technical): Perform technical security validation of AI vendors, focusing on data handling and model training exposure risks.
• IT/OT Data Protection Integration
- Secure Data Transfer: Implement encryption and data filtering controls for data flows between OT and IT/cloud environments.
- Segmentation Controls: Enforce security controls at Industrial DMZ and integration points (e.g., firewalls, proxies, encryption gateways).
- Monitoring & Risk Detection: Support detection of data exposure risks from industrial systems through logging and monitoring solutions.
- ________________________________________
• Data Protection Operations & Cryptography
- Encryption & Key Management: Operate and manage encryption solutions including HSMs and Cloud KMS (BYOK/HYOK).
- Security Tools Operation: Deploy, tune, and operate DLP, Database Activity Monitoring (DAM), and data classification tools (e.g., Microsoft Purview / Azure Information Protection).
- Monitoring & Response: Support incident detection and response related to data leakage, misuse, or unauthorized access.
Security Assurance & Risk Management
- Lead security assessments, architecture reviews, vulnerability management, and assurance activities.
- Establish and operate a structured Security Assurance Framework covering control validation, coverage tracking, and continuous assurance.
- Manage the full security lifecycle from risk identification through remediation and validation.
- Translate technical findings into business-level risk statements and remediation plans.
Application, Cloud & Infrastructure Security
- Perform in-depth security assessments of web applications, APIs, mobile applications, cloud platforms, containers, and infrastructure.
- Identify advanced security risks such as business logic flaws, authentication weaknesses, privilege abuse, and modern attack techniques.
- Validate secure architectures, configuration baselines, and cloud-native security controls.
- Support secure SDLC and DevSecOps practices, including security testing and release controls.
Configuration Baselines & Continuous Hardening (New)
- Define and maintain secure configuration baselines across the enterprise technology stack (OS, databases, network devices, cloud services, identity platforms, and security tools).
- Align baselines with industry standards (e.g., CIS Benchmarks) and organizational risk requirements.
- Implement automated configuration compliance checks and continuous monitoring mechanisms.
- Conduct periodic reviews and validation of configurations to detect drift, misconfigurations, and unauthorized changes.
- Work with engineering and operations teams to enforce hardening standards and remediate deviations.
Architecture, Threat Modeling & Secure Design
- Lead security architecture and design reviews across applications, platforms, and integrations.
- Conduct threat modeling to identify attack paths, risks, and mitigation strategies.
- Ensure alignment with enterprise security architecture and Zero Trust principles.
Third-Party, Data Protection & Resilience
- Conduct security assessments of vendors, SaaS providers, and external integrations.
- Validate data protection, encryption, and privacy controls for sensitive and regulated data.
- Support cyber resilience activities, including OT/ICS security reviews, red team exercises, and incident response simulations.
Governance, Compliance & Reporting
- Ensure continuous alignment with regulatory and framework requirements (ISO 27001, NIST CSF, Qatar NIA, QCSF).
- Support internal and external audits with defensible, evidence-based controls.
- Define and report on security metrics, KPIs, and executive dashboards.
- ________________________________________
Your resume, rewritten
for this exact role.
Sign up free — Base Career tailors your CV to this job description in 60 seconds.
01 / 05
Resume Tailored to This Job

Your keywords, structure, and story — rewritten to match this exact role and pass ATS filters.
Free · No card · 60 seconds
02 / 05
Cover Letter for This Role, Done

Job-specific cover letters written in Gulf professional tone — ready in seconds, not hours.
Free · No card · 60 seconds
03 / 05
See How Well You Fit This Role

AI match score with clear reasons — know your fit before investing time in the application.
Free · No card · 60 seconds
04 / 05
Apply in One Click

Autofill any application form on Workday, LinkedIn, Bayt, Greenhouse — with your tailored content.
Free · No card · 60 seconds
05 / 05
Track It. Follow Up at the Right Time.

Visual pipeline for every application with AI-timed follow-up reminders so nothing slips.
Free · No card · 60 seconds
Similar Jobs
Security Operations Officer- Data Security Specialist
INTALEQ · Doha
Responsible for implementing data security controls, ensuring compliance with regulations, and managing encryption solutions across IT and AI platforms.
Skills
1 weeks ago
Apply Now↗Apply Now ↗Security Operations Officer-Security Assessment & Assurance Specialist
INTALEQ · Doha
Lead security assurance activities, manage vulnerability assessments, and ensure compliance with ISO 27001 and NIST CSF while possessing expertise in application and cloud secur...
Skills
1 weeks ago
Apply Now↗Apply Now ↗Security Operations Officer (Data Security Specialist)
Starlink Qatar · Doha
We’re Hiring | Security Operations Officer – Data Security (Arabic Speaking) We are looking for an experienced Security Operations Officer / Data Security Specialist with strong expertise in data protection, cloud data s
Skills
2 weeks ago
Apply Now↗Apply Now ↗Security Operations Center Analyst
MACH CONSULTANTS · Doha
Security specialist - Soc Analyst Responsibilities: Support internal & external users for E-services solution -> Microsoft Dynamic CRM and Field service and related integrations, E-Portal users, mobile app. How to use
Skills
3 weeks ago
Apply Now↗Apply Now ↗Security Operations Manager
ICSS UAE - Doha Office · Doha
Job Overview We are seeking a highly skilled and proactive Security Operations Manager to oversee and enhance our organization’s security operations. This role is responsible for managing security personnel, implementing
Skills
4 weeks ago
Apply Now↗Apply Now ↗Security Operations Officer – Security Assessment & Assurance Specialist
Black & Grey HR · Doha
Black & Grey HR is recruiting for an established technology solutions and services provider in Doha, Qatar. Our client is seeking an experienced Security Operations Officer – Security Assessment & Assurance Specialist wh
Skills
1 months ago
Apply Now↗Apply Now ↗2.2K+
Cover Letters & Follow-ups
1.8K+
Resumes Tailored
190.5K+
Jobs Tracked
Trusted by professionals at
Stop applying blindly.
Start getting hired.
Base Career automates the hardest parts of job searching — apply smarter, not harder.
AI Resume in 60s
Your resume rewritten for this exact role using the job description as the brief.
ATS-Optimized
Get past automated screening filters with the right keywords matched to each job.
Application Tracker
Track every job, follow-up, and interview in one visual kanban board.
Free plan · No credit card required