We’re hiring at our location in

Security Specialist - Endpoint Security and Data Leak Protection Analyst

The Security Specialist – Endpoint Security and Data Leak Protection Analyst is responsible for ensuring the protection of the organization's information and data through the administration of security policies and practices. This role will focus on endpoint security and data leak protection, ensuring that authorized users can access data while maintaining confidentiality, integrity, and availability. The role requires proactive security monitoring, policy enforcement, incident management, and collaboration with other teams to ensure robust security practices are followed across the organization.

Key Responsibilities & Accountabilities:

Service Management and Service Operation

  • Drafts, implements, and maintains security policies, standards, procedures, and documentation for endpoint security.

  • Monitors and enforces the application of security operations procedures.

  • Reviews systems for potential breaches and ensures all identified security breaches are thoroughly investigated.

  • Implements necessary system changes to maintain and enhance endpoint security.

  • Ensures that security records and logs related to endpoints and data leak protection are accurate, complete, and up-to-date.

Strategy, Architecture, and Information Strategy

  • Conducts vulnerability assessments and security risk assessments on endpoint devices (desktops, laptops, mobile devices, servers) and applications.

  • Provides strategic advice on security solutions and best practices for endpoint protection and data leak prevention.

  • Investigates major breaches of endpoint security or data leaks and recommends improvements in security controls.

  • Contributes to the development and refinement of endpoint security strategies and standards in line with industry best practices and regulatory compliance.

Planning, Prioritization, and Problem Solving

  • Plans and prioritizes endpoint security and data leak protection initiatives, ensuring alignment with organizational goals.

  • Assesses the impact of technological changes, regulations, and business processes on endpoint security and implements necessary security measures.

  • Continuously evaluates and adjusts security strategies and goals based on organizational needs, emerging threats, and regulatory changes.

Technology

  • Demonstrates strong technical knowledge of endpoint security technologies, such as antivirus, EDR (Endpoint Detection and Response), XDR (Extended Detection and Response), encryption, and DLP (Data Leak Prevention) systems.

  • Utilizes tools such as SIEM, IDS/IPS, and application firewalls to monitor, analyze, and mitigate security threats targeting endpoint devices.

  • Ensures compliance with information security policies, focusing on protecting endpoints and preventing data leaks.

Key Responsibilities & Security Measures

  • Endpoint Security & Data Leak Prevention: Develops, implements, and manages endpoint security policies for devices including desktops, laptops, mobile devices, and servers.

  • Incident Response: Acts as the first responder to security incidents related to endpoints and data leaks, conducts investigations, and recommends remediation actions.

  • Security Tools & Technologies: Manages and optimizes endpoint security tools, including antivirus software, EDR/XDR solutions, encryption, and DLP systems.

  • Collaboration: Works closely with IT and compliance teams to ensure endpoint security policies align with industry standards, regulatory requirements, and best practices.

  • Continuous Monitoring: Stays up-to-date with the latest security trends and threats, continuously monitoring endpoint devices for vulnerabilities, threats, and potential data leaks.

Skills & Qualifications:

    • 5-6 years of hands-on experience in cybersecurity, with specific focus on endpoint security, data leak protection, incident response, and vulnerability management.

    • Bachelor’s degree/ Engineering in Information Security, Computer Science, or a related field.
    • Proven experience with Endpoint security monitoring tools (Microsoft Defender XDR, Endgame EDR, Microsoft DLP, etc.).

    • In-depth knowledge of security policies and standards regarding endpoint protection, data leak prevention, and network security.

    • Experience with security technologies such as SIEM, IDS/IPS, antivirus solutions, and encryption tools.

    • Strong understanding of networking protocols, operating systems (Windows, Linux, macOS), and internet security.

    • Experience in systems installation, configuration, and administration, including endpoint devices and security environments.

    • Hands-on experience with DLP technologies and data privacy tools.

    • Ability to analyze security incidents, identify root causes, and implement remediation actions.

  • Certifications:

    • Mandatory:

      • CompTIA Security+

      • Certified Information Privacy Professional (CIPP)

      • Microsoft Security Operations Analyst-SE 200

    • Preferred (not mandatory):

      • CISSP

      • Certified Ethical Hacker (CEH)

      • SANS GIAC Security Essentials (GSEC)

      • SANS GIAC Certified Enterprise Defender (GCED)

A big team is looking forward to you. Apply here!

ECCO Gulf Majorel Qatar | Human Resources | Vishnupriya G


You want to learn more about us?
Visit us on Eccogulf.