Qureos

FIND_THE_RIGHTJOB.

Data Security Specialist/Data Security Analyst (Information Security)

JOB_REQUIREMENTS

Hires in

Not specified

Employment Type

Not specified

Company Location

Not specified

Salary

Not specified

  • Run stakeholder Servicesshops to identify data domains, critical data elements (CDEs), owners/stewards, and business processes.
  • Build and maintain the data inventory/catalog (systems, datasets, flows, lineage) and keep ownership metadata current.
  • Define and operationalize the data taxonomy (classification levels, handling rules) and ensure labels propagate across systems.
  • Perform data discovery and gap assessments to locate sensitive data (e.g., PII,SPI) and reconcile scan results with the catalog.
  • Translate privacy & policy requirements into controls (access models, masking, retention, encryption) and document control mappings.
  • Design and enforce access control models (least privilege, RBAC/ABAC, purpose-based access), including periodic access reviews.
  • Establish data protection baselines for storage, transfer, and processing (e.g., encryption in transit/at rest, key hygiene, segregation).
  • Configure and tune DLP/egress policies across channels (endpoint, email, web/cloud, storage) and reduce false positives.
  • Implement data masking/tokenization strategies for production, analytics, and non-prod environments; manage detokenization approvals.
  • Define and monitor security telemetry (auth, data access, key usage, admin events) and create detections for anomalous data activity.
  • Lead/assist data-related incident response (scoping, containment, evidence handling, root cause, corrective actions, lessons learned).
  • Implement retention & disposal controls (schedules, holds, verification of deletion) and align backups/archives with policy.
  • Assess third-party and SaaS data risks (contracts, DPAs, data flow reviews) and track remediation with vendors and owners.
  • Produce dashboards and KPIs/KRIs (coverage, data classification completeness, DLP precision, access review closure, incident MTTR).
  • Create and maintain documentation & training (standards, playbooks, runbooks, onboarding materials) and brief stakeholders regularly.



Requirements

  • Bachelors in computer science, Information Security, IT and equivalent hands‑on experience.
  • Certifications : ISO/IEC 27701 Lead Implementer/Auditor , CISSP, CIPM and any relevant certifications
  • Clear written and verbal communication
  • 4+ years in information security with at least 2 years focused on data security/privacy (data discovery, classification/taxonomy, DLP, masking/tokenization, retention/disposal, DPIA/PIA, RoPA).

© 2025 Qureos. All rights reserved.