Information Security Compliance Manager

Majid Al Futtaim - قطر


Majid Al Futtaim Holding is the leading shopping mall, retail, communities, entertainment developer and operator in the Middle East, North Africa, and Central Asia regions. With over 48,000 people, revenues of over US$ 11 Billion, and operations in 18 countries. Some of the iconic brands we carry include Mall of the Emirates, Carrefour, All Saints, Lego, City Center, Abercrombie & Fitch, & Vox Cinemas. We believe in making Great Moments for Everyone, Everyday.


ROLE-SUMMARY
The Information Security Compliance Manger is responsible for leading the efforts in managing and mitigating information security risks and ensuring compliance with internal control framework, relevant industry regulations and standards. The ideal candidate will have a strong technical background in compliance management and Identity and Access Management, along with exceptional communication.

ROLE PROFILE

Identity and Access Management

  • Develop and maintain identity and access management (IAM) procedures and policies in alignment with Group’s IAM strategy.
  • Design and configure user access controls, including role-based access control (RBAC), permissions, and privileged across various platforms and applications.
  • Monitor IAM systems for security incidents, anomalies, and unauthorized access attempts, and take appropriate action to mitigate risks.
  • Conduct regular audits and assessments of IAM processes and controls to identify areas for improvement, and implementation of IAM best practices.
  • Act as technical SME / architect for design and implementation of IAM and PAM solutions, collaborate with IT and business stakeholders to define requirements and onboard new applications on IAM platforms.
  • Document access review calendar covering all the business applications and technology platforms. Coordinate with business and application owners to conduct periodic access reviews, prepare access review reports, and ensure timely remediation.
  • Document IAM configurations, workflows, and procedures, and contribute to the development of training materials and knowledge base articles for end-users and tech support teams.

Security Audits and Posture Assessments

  • Manage and coordinate audit engagements, work closely with auditors, including external audit firms and internal audit teams to ensure smooth audit processes and compliance with security requirements and industry standards.
  • Track and manage audit observations and findings to ensure timely resolution and closure, including the development and implementation of corrective action plans.
  • Manage security testing and posture assessment engagements, assess security control effectiveness, and manage the remediation activities by closely working with business and technical teams.
  • Define the approach, guidelines and use cases for static and dynamic application security testing. Continuously improve security testing methods, tools and approaches.
  • Conduct / manage security penetration testing during new projects, major feature enhancement or change as per defined security testing guidelines.

Risk & Compliance Management

  • Serve as a single point of contact for security risks identified by IT Governance teams, risk and internal control functions of different business units.
  • Maintain Information Security risk tracker to capture and prioritize all identified risks, including further assessing the potential impact and likelihood of each risk and assigning appropriate risk owners.
  • Track mitigation actions and remediation plans for identified risks, working closely with action owners to ensure timely completion and effectiveness of mitigation measures.
  • Conduct technical risk assessment and analysis as needed to identify actual risk rating, define/ agree risk treatment plan with action owners and ensure timely closure of mitigation activities.
  • Develop, implement and maintain security controls and processes in accordance with the internal control framework, industry standards and organizational policies.
  • Define Key Risk Indicators (KRIs) for security controls and establish mechanisms for monitoring and reporting on these indicators.
  • Analyze security-related data and metrics to identify emerging risks and trends and make recommendations for mitigating actions.
  • Participate in security incident investigations, root cause analysis, and the development of remediation plans to prevent recurrence.

Vendor Management

  • Collaborate with managed service providers to oversee risk and audit management services and remediation support and ensure service level agreements (SLAs) are met.
  • Monitor vendor performance, define security reporting metrics and address any issues or concerns promptly.
  • Key Operational metrics met, for example SLA compliance, effective risk mitigation and compliance, operational excellence
  • Key Delivery metrics, for example, security control coverage, a, delivering new functionality and services, automation and process optimization
  • Key Organizational metrics - staff performance and productivity, service provider management
  • Cost Management Metrics - cost of delivering IT services, resource costs, and budget control
  • Customer Satisfaction metrics

Functional/Technical Competencies

  • Strong understanding of IAM principles, concepts, and technologies, including identity governance, authentication methods, and access control mechanisms.
  • Proficiency in IAM and PAM platforms and tools such as Active Directory, Azure Active Directory, CyberArk, SailPoint, or similar solutions.
  • Excellent Knowledge of IT security solutions and platforms (e.g. CASB, Data Leakage Prevention, Web Application Firewall, Multi Factor Authentication, Database Activity Management, Vulnerability Management, Application Security Testing tools etc.)
  • Solid understanding of firewalls, intrusion detection and prevention systems, active network security, end point security; identity and access management, encryption, web content filtering, e-mail protection, network access protection, SIEM and hardening policies & procedures etc.
  • Experience with industry standards, guidelines, and regulatory compliance requirements related to information security and cloud computing such as GDPR, ISO 27001, Cloud Security Alliance, NIST, PCI DSS, etc.
  • Strong understanding of security risk management frameworks, tools and techniques, and experience of managing security risks throughout the risk lifecycle.
  • Strong knowledge and experience of implementing security automation tools and techniques in a hybrid, multi-cloud environment.
  • Solid understanding of security threat management frameworks and attack/defense techniques including MITRE Att&ck, and OWASP.
  • Strong analytical skills to analyze requirements and translate them into appropriate security controls.
  • Experience of working with managed service providers and ensuring SLA compliance.
  • Ability to work under pressure and respond effectively to high-priority incidents on a 24x7 basis.

Personal Characteristics and Required Background:

Skillset (job-specific skills)

  • Excellent inter-personal, communication and documentation skills
  • Good understanding of information management practices, system development life cycle management, IT services management, agile and lean methodologies, infrastructure and operations, and EA and ITIL frameworks.
  • Proven analytical and problem-solving abilities
  • Ability to effectively prioritize and execute tasks in a high-pressure environment
  • Excellent written, verbal, communication and presentation skills with the ability to articulate new ideas and concepts to technical and nontechnical audiences.
  • Ability to conduct research on new features / products and troubleshoot technical issues
  • Team player and skilled in working within a collaborative environment

Demonstrably self-motivated, pro-active, action orientated to achieve deadlines

Minimum experience

  • 6-8 years or more experience of working in multiple IT Security domains in a large organization, preferably in Retail industry.
  • 3 years or more experience of managing security risks and compliance activities in a supervisory role.

 

Minimum Qualifications/education

  • A Bachelors or Masters degree in computer science, engineering or technology-related field, or equivalent

 

Preferred Qualifications

  • Certified Information Systems Security Professional (CISSP)
  • Certified Information Security Manager (CISM)
  • Certified Information Systems Auditor (CISA)
  • ITIL (Information Technology Infrastructure Library) Certification

Security product specific technical certifications i.e. Azure, AWS, IAM, PAM etc

تاريخ النشر: ٢٢ مايو ٢٠٢٤
الناشر: Majid Alfuttaim jobs
تاريخ النشر: ٢٢ مايو ٢٠٢٤
الناشر: Majid Alfuttaim jobs