Qureos

FIND_THE_RIGHTJOB.

Cyber Security Analyst

Doha, Qatar

JOB PURPOSE:

The Cyber Security Analyst creates a comprehensive program for establishing a Healthcare carrier-class Security Operation Center. S/he develop and maintain threat monitoring and security incident response procedures within Naufar. The analyst designs frameworks, procedures, and toolkits to enhance capabilities in professional forensic collection and digital evidence analysis. S/he also develop dashboards for reporting the organization's threat landscape, Awareness and security posture to senior management. This role is expert role with roles and responsibilities.


Description

  • Develops and implements a cyber-security program to enhance Naufar capabilities regarding Cyber Attack incident monitoring, incidents response and intrusive and non-intrusive forensics capabilities.
  • Develops and matures the service capabilities of the SOC, such as Forensics, Threat Management, Penetration Assessments, and Tool Management.
  • Develops, Contributes and maintains of the cyber security strategy.
  • Implements, configures and maintains security control and process, to ensure threat indicators are rated by severity and responded to in a manner consistent with the threat.
  • Identifies deficiencies and recommends corrective action to strengthen information security control and decrease the risk of data breach.
  • Maintains and updates standard operation policies and procedures for incident response plans, e-discovery processing, remote acquisition/analysis tools, collections and forensic analysis techniques.
  • Maintains industry standard tools and processes used for forensic analysis and eDiscovery collections and processes.
  • Monitors security alerts for potential events/incidents as well as trending and historical analysis and ensuring all incident reports are complete and written within standard operations and ensures ticket audits and reviews are completed
  • Utilizes leading forensic software to identify, collect, preserve and analyze electronic data from laptops, desktops, servers, email archives, infrastructure logs, network file servers, backup tapes, cell phones, PDAs and a wide variety of other media devices.
  • Manages requests for electronic data and digital forensic investigations that relate to Litigation, Regulatory matters, Compliance, and Employee Investigations.
  • Performs cybersecurity incident analysis and assist with incident response, including analysis of network content and metadata for investigations or malware detection and identifies the cause and extent of a breach.
  • Serves as a subject matter expert and technical advisor in matters relating to the proper collection, preservation, packaging, and submission of digital and multimedia evidence.
  • Participates in incident electronic evidence collection activities in major field investigations. Ensures evidence handling requirements are met.
  • Performs post-incident report according to standard operations.
  • Analyzes the tools and methodology used for investigation and accordingly presents improvements in control and corrective actions if any.
  • Escalates and works with senior management on resolutions to overdue security items or any negative trends identified.
  • Develops focused reporting and briefings for advanced cyber threats.
  • Conducts studies and research for improving forensic analyses, scientific methods, and resolving forensic examination problems.
  • Creates detailed, professional documentation and reports, including performance metrics and presentations for management.
  • Leads or contributes to key projects related to corporate threat monitoring, forensics or information security initiatives.
  • Facilitates group risk assessment activities and identifies any security-related process improvement opportunities.
  • Monitors and performs trending on root cause analysis activities within assigned group and participates as needed to resolve clinical systems security related incidents.
  • Assists on monitoring compliance with information security policies, standards and ENTERPRISE-WIDE strategy and facilitates threat and vulnerability evaluations on a regular basis. Measures and reports on the effectiveness of information security controls.
  • Supports the security initiatives, corrective and preventative actions, and security measures by ensuring timely updates and escalating concerns and non-compliances.
  • Understands and maintains the appropriate knowledge of Security Technologies, (Firewall, Anti-Virus, Email and Web Encryption, HIPS, NIPS, SIEM, WAF, DLP), security procedures, and services within Naufar IT Security as well as ensures all tools are functioning properly.
  • Keeps up to date on changes to significant regulatory and applicable standards issued by internal or external agencies, as applicable to the Naufar’s domain.
  • Adheres to Naufar’s standards as they appear in the Code of Conduct and Conflict of Interest policies


Academic Qualifications:

  • Bachelor’s degree – IT - Mandate
  • Master’s degree – Cybersecurity - Desired


Experience Requirements:

  • 8+ years of experience working as a security analyst or SME within a Security Operations Center with exposure to cyber security collection, analysis and threats management, investigation and digital forensics.
  • Demonstrated experience in threat detection and analysis, incident response, and reporting.
  • Demonstrated experience with incident response, deep dive forensics, insider threat, cyber and data exfiltration incidents.
  • Demonstrated experience conducting assessments, digital forensic investigations, vulnerability management and incident response.
  • Demonstrated experience with current cyber threats and the associated tactics, techniques, and procedures used to infiltrate computer networks.
  • Demonstrated experience with SEIM products in the detection, response, mitigation, and/or reporting of cyber threats
  • Demonstrated experience in the use of forensic tools (e.g. FTK, Encase, Forensic Toolkit, X-Ways, Linux based tools, etc.)
  • Experienced with (or equivalent) the following regulations and frameworks: PCI, HIPAA, and ISO/IEC 2700x

© 2025 Qureos. All rights reserved.