×
Register Here to Apply for Jobs or Post Jobs. X

Cybersecurity Manager

Job in Doha, Baladīyat ad Dawḩah, Qatar
Listing for: Protiviti Middle East Member Firm
Full Time position
Listed on 2026-02-15
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant
Salary/Wage Range or Industry Benchmark: 400000 - 600000 QAR Yearly QAR 400000.00 600000.00 YEAR
Job Description & How to Apply Below

Understanding and experience is preferable but not mandatory.

  • Conduct comprehensive cybersecurity maturity assessments across organizational systems and processes, with a focus on aligning with the Capability Maturity Model Integration (CMMI).
  • Perform evaluations that measure the maturity of existing cybersecurity practices, identifying areas of strength and opportunities for improvement.
  • Experience in compliance with relevant regulations, standards, and best practices, including but not limited to:
  • ISO 27001 (Information Security Management)
  • Provide detailed, actionable recommendations to address identified gaps during assessments, focusing on improving cybersecurity practices.
  • Develop a clear, strategic roadmap outlining short-term, mid-term, and long-term actions needed to close gaps and achieve maturity goals.
  • Prepare comprehensive reports on assessment findings, compliance status, and risk mitigation strategies, presenting them to senior leadership and relevant stakeholders.
  • Serve as a subject matter expert on cybersecurity, advising organizations on compliance and best practices.
  • Assist members of the Governance, Risk, and Compliance team to answer technical inquiries from auditors and clients.
  • Recommend emerging security technologies/tools to address current and future threats.
  • Interact and handle vendors, outsource rs, and contractors regarding security products and services.
  • Conduct performance and efficacy testing to stress the limitations of security solutions while ensuring business innovation and day‑to‑day processes are not negatively impacted.
  • Serve as a trusted advisor, collaborating closely with clients to understand their unique challenges and providing expert guidance on cybersecurity and risk management.
  • Manage end‑to‑end delivery of client engagements, from scoping through execution.
  • Assist clients in developing / enhancing their cybersecurity strategies and multi‑year implementation roadmaps, in alignment with their risk landscape.
  • Provide support in the design and implementation of cybersecurity governance frameworks and policies.
  • Understanding of Security Configuration Review:
    Conduct in‑depth security configuration reviews for firewalls, routers, switches, servers, and other security devices.
  • Review and assess firewall rulesets, identifying redundant, outdated, or overly permissive rules, and recommend necessary optimizations.
  • Ensure that firewall configurations follow the principle of least privilege and are aligned with security best practices.
  • Understanding of File Integrity Monitoring (FIM):
    Experience in deploying FIM solutions and monitoring changes in critical system files, directories, and configurations.
  • Experience in continuous monitoring of file changes and generating alerts for unauthorized modifications.
  • Analyze and report on FIM alerts, working with clients to remediate suspicious activity.
  • Provide recommendations for improving FIM configurations based on threat landscape and compliance requirements.
  • Integrate FIM with security operations tools such as SIEM to enhance visibility and threat detection.
  • Antimalware:
    Assess client environments to recommend the best‑fit antivirus and anti‑malware solutions.
  • Implement and configure antivirus/anti‑malware software across endpoints, servers, and network devices.
  • Monitor and maintain antivirus solutions, ensuring timely signature updates, patches, and upgrades.
  • Integrate antivirus systems with SIEM and other security tools to enhance threat detection and response capabilities.
  • Develop strategies for malware incident response, including investigation, containment, and remediation.
  • Understanding of Web Proxy:
    Deploy, configure, and maintain web proxy solutions to filter and monitor client internet traffic, ensuring compliance with internal and regulatory requirements.
  • Set up content filtering policies, block malicious websites, and protect against web‑based threats like malware, ransomware, and phishing.
  • Monitor and analyze web traffic patterns to identify and respond to suspicious activities and security incidents.
  • To ensure seamless integration of the web proxy with existing network architecture and other cybersecurity tools.
  • Maintain and…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary