Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
JOB :Compliance Officer
Location: Doha, Qatar
Job Summary
The Compliance Officer is responsible for supporting cybersecurity governance, risk management, and regulatory compliance across enterprise systems and operations. The role ensures that security policies, governance frameworks, and operational procedures align with industry standards and regulatory requirements.
This position works closely with internal teams, external partners, and regulatory stakeholders to strengthen information security posture, monitor compliance maturity, and implement best practices for cybersecurity governance and risk management.
Key Responsibilities Governance and Compliance Management
- Review existing governance models, security frameworks, and operational processes to assess current compliance maturity.
- Conduct documentation reviews, stakeholder interviews, and operational assessments to establish the current governance landscape.
- Define target governance maturity levels aligned with industry standards and regulatory expectations.
- Identify governance gaps and recommend improvements to strengthen security oversight and control mechanisms.
- Develop and implement governance operating models to enhance security management structures.
- Maintain and update the organizational risk register.
- Identify, analyze, and document cybersecurity risks, vulnerabilities, and threat exposure.
- Define risk ownership, escalation paths, and risk acceptance processes.
- Establish risk appetite guidelines and risk mitigation strategies.
- Conduct threat modeling, vulnerability assessments, and attack path analysis.
- Develop countermeasures and security controls to mitigate identified risks.
- Develop and maintain security policies covering areas such as:
- Digital Identity Management
- Information Classification
- Cloud Security
- IoT Security
- Organizational Security Governance
- Ensure security policies are applied consistently across systems, platforms, and operational processes.
- Monitor policy adoption and compliance across stakeholders and departments.
- Align policies with national and international cybersecurity standards.
- Align organizational security practices with industry frameworks such as:
- General Data Protection Regulation
- Health Insurance Portability and Accountability Act
- Payment Card Industry Data Security Standard
- Ensure that information security controls protect the confidentiality, integrity, and availability of data.
- Support privacy impact assessments and compliance monitoring activities.
- Collaborate with relevant teams to ensure regulatory compliance and data protection.
- Develop and manage a continuous security awareness program for employees and stakeholders.
- Define training requirements based on roles and responsibilities across the organization.
- Design security training modules covering policies, procedures, and cybersecurity best practices.
- Deliver workshops and awareness sessions to promote a security-first culture.
- Monitor security performance metrics and governance effectiveness.
- Prepare security compliance reports and risk assessment summaries for leadership.
- Maintain ongoing visibility of the organization’s security posture.
- Recommend improvements to enhance security frameworks, policies, and operational practices.
- Cybersecurity Governance
- Risk Management and Risk Assessment
- Security Policy Development
- Compliance Monitoring and Audit Support
- Threat Modeling and Vulnerability Analysis
- Regulatory Compliance and Privacy Protection
- Security Awareness Program Management
- Information Security Frameworks and Standards
- Data Protection and Privacy Regulations
- Risk Management Methodologies
- Security Controls and Governance Models
- Excellent communication and presentation skills
- Strong stakeholder management capabilities
- Analytical and problem-solving mindset
- Ability to work collaboratively with cross-functional teams
- High attention to detail and compliance discipline
- Bachelor’s degree in Information Security, Cybersecurity, Computer Science, IT, or a related field.
- Professional certifications such as:
- CISSP
- CISM
- CISA
- ISO 27001 Lead Implementer or Lead Auditor
- Experience working in regulated environments or cybersecurity governance programs.
- Security governance and compliance tools
- Risk management and audit tracking systems
- Security monitoring and reporting platforms
- Documentation and collaboration tools such as SharePoint and Microsoft Teams.
#GRC#RiskManagement#CyberSecurityGovernance#SecurityCompliance
#InformationSecurity#SecurityGovernance#SecurityFrameworks
#CyberSecurity#ThreatModeling#VulnerabilityManagement#SecurityRiskAssessment
#CyberRiskManagement#SecurityOperations#SecurityControls#DataProtection
#PrivacyComplianceComplianceOfficer#CyberSecurityGovernance#RiskManagement
#GRC#InformationSecurity#GDPR#SecurityCompliance#CyberRiskManagement
#EnterpriseRiskManagement#SecurityAudit
Skills: risk,compliance,cybersecurity,information security
Key Skills
Ranked by relevanceReady to apply?
Join Saher Management Consultancies LLC and take your career to the next level!
Application takes less than 5 minutes

