Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Key Responsibilities & Accountabilities:
Service Management and Service Operation
- Drafts, implements, and maintains security policies, standards, procedures, and documentation for endpoint security.
- Monitors and enforces the application of security operations procedures.
- Reviews systems for potential breaches and ensures all identified security breaches are thoroughly investigated.
- Implements necessary system changes to maintain and enhance endpoint security.
- Ensures that security records and logs related to endpoints and data leak protection are accurate, complete, and up-to-date.
- Conducts vulnerability assessments and security risk assessments on endpoint devices (desktops, laptops, mobile devices, servers) and applications.
- Provides strategic advice on security solutions and best practices for endpoint protection and data leak prevention.
- Investigates major breaches of endpoint security or data leaks and recommends improvements in security controls.
- Contributes to the development and refinement of endpoint security strategies and standards in line with industry best practices and regulatory compliance.
- Plans and prioritizes endpoint security and data leak protection initiatives, ensuring alignment with organizational goals.
- Assesses the impact of technological changes, regulations, and business processes on endpoint security and implements necessary security measures.
- Continuously evaluates and adjusts security strategies and goals based on organizational needs, emerging threats, and regulatory changes.
- Demonstrates strong technical knowledge of endpoint security technologies, such as antivirus, EDR (Endpoint Detection and Response), XDR (Extended Detection and Response), encryption, and DLP (Data Leak Prevention) systems.
- Utilizes tools such as SIEM, IDS/IPS, and application firewalls to monitor, analyze, and mitigate security threats targeting endpoint devices.
- Ensures compliance with information security policies, focusing on protecting endpoints and preventing data leaks.
- Endpoint Security & Data Leak Prevention: Develops, implements, and manages endpoint security policies for devices including desktops, laptops, mobile devices, and servers.
- Incident Response: Acts as the first responder to security incidents related to endpoints and data leaks, conducts investigations, and recommends remediation actions.
- Security Tools & Technologies: Manages and optimizes endpoint security tools, including antivirus software, EDR/XDR solutions, encryption, and DLP systems.
- Collaboration: Works closely with IT and compliance teams to ensure endpoint security policies align with industry standards, regulatory requirements, and best practices.
- Continuous Monitoring: Stays up-to-date with the latest security trends and threats, continuously monitoring endpoint devices for vulnerabilities, threats, and potential data leaks.
- 5-6 years of hands-on experience in cybersecurity, with specific focus on endpoint security, data leak protection, incident response, and vulnerability management.
- Bachelor’s degree/ Engineering in Information Security, Computer Science, or a related field.
- Proven experience with Endpoint security monitoring tools (Microsoft Defender XDR, Endgame EDR, Microsoft DLP, etc.).
- In-depth knowledge of security policies and standards regarding endpoint protection, data leak prevention, and network security.
- Experience with security technologies such as SIEM, IDS/IPS, antivirus solutions, and encryption tools.
- Strong understanding of networking protocols, operating systems (Windows, Linux, macOS), and internet security.
- Experience in systems installation, configuration, and administration, including endpoint devices and security environments.
- Hands-on experience with DLP technologies and data privacy tools.
- Ability to analyze security incidents, identify root causes, and implement remediation actions.
- Certifications:
- Mandatory:
- CompTIA Security+
- Certified Information Privacy Professional (CIPP)
- Microsoft Security Operations Analyst-SE 200
- Preferred (not mandatory):
- CISSP
- Certified Ethical Hacker (CEH)
- SANS GIAC Security Essentials (GSEC)
- SANS GIAC Certified Enterprise Defender (GCED)
Key Skills
Ranked by relevanceReady to apply?
Join ECCO Gulf WLL and take your career to the next level!
Application takes less than 5 minutes