Cyber Security Specialist
PHCC has a vision to be the leader in transforming the health and wellbeing of people’s lives in Qatar. PHCC’s mission is to deliver comprehensive, integrated, and coordinated person-centered healthcare services in the community through focusing on disease prevention, healthy lifestyles and wellness. In partnership with our stakeholders, we will improve the health and wellbeing of our population. The Cyber Security Specialist plays a critical role in safeguarding PHCC’s information systems and data.
The incumbent is responsible for implementing and maintaining effective cybersecurity measures to protect PHCC’s IT infrastructure from threats, monitoring for security incidents, and ensuring compliance with PHCC’s information security policies and any relevant regulations. This role involves identifying and analyzing vulnerabilities, responding to cyber incidents, and continuously strengthening PHCC’s security posture – thereby supporting the continuity of PHCC’s operations and the protection of sensitive patient and corporate information.
Key Accountabilities:
- Security Monitoring Processes: Develop and implement processes for detecting, identifying, and analyzing security-related events.
- Security Policies: Ensure the development and implementation of PHCC’s information security policies and procedures, and update them as needed in light of changing circumstances, best practices, or regulatory directives.
- Compliance Monitoring: Monitor compliance with PHCC’s information security policies and procedures, and report or elevate issues noted to the appropriate divisional or departmental heads.
- Access Control Oversight: Monitor controls in place (manual and system) to ensure that appropriate information access levels and security clearances are maintained.
- Regulatory Awareness: Monitor changes in legislation and accreditation standards that affect information security, and ensure PHCC’s security practices remain compliant with any new requirements.
- Risk Management Integration: Ensure that risk identification, analysis, and mitigation activities are integrated into the information security life cycle.
- Security Architecture: Ensure the adequacy of the network security architecture (including LAN, WAN, and internet protections) and network access controls; manage or recommend security devices and configurations (firewalls, intrusion detection/prevention systems, VPN, etc.) to safeguard the environment.
- System Security Reviews: Assess the adequacy of security frameworks and measures for existing and new systems, and recommend improvements or new controls as necessary.
- Training & Awareness: Initiate, facilitate, and promote activities to foster information security awareness within PHCC. This includes helping develop best-practice guidelines and conducting or coordinating cybersecurity awareness training for employees to reduce the risk of security breaches due to human error.
- Security Systems Administration: Support day-to-day administration of various security systems and tools, including firewalls, Active Directory security controls, email security gateways, antivirus/endpoint protection, and Linux/Windows server security configurations. Ensure these systems are configured and operating in line with PHCC’s security policies.
- Network Security Configuration: Provide technical support and consultation for enhancements or changes to network security configurations, such as firewall rule updates, access control adjustments, and secure network design changes, ensuring that any changes do not compromise security.
- Incident Response: Investigate and respond to security incidents and alerts in a timely manner. This includes analyzing security events (e.g. alerts from SIEM or other monitoring systems), containing and eradicating threats, and coordinating with relevant ICT teams (Systems, Network, Helpdesk) to remediate and recover from incidents. Document incidents and remediation actions for lessons learned and reporting.
- Continuous Improvement: Stay current with emerging cybersecurity threats and vulnerabilities (e.g. new malware, attack techniques) and advise on or implement appropriate countermeasures. This may involve…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).