This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Our client, a cybersecurity consultancy operating across the UAE, is seeking an experienced Security Assessor with strong Big Data Platform knowledge. This role focuses on assessing, validating, and reporting on security controls across complex data-driven environments. The successful candidate will understand how large-scale data platforms are architected, how data flows through them, and how security controls are implemented, tested, and governed. This position is client-facing and requires a blend of deep technical capability and clear, structured risk communication.
Job Responsibility:
Conduct security assessments of Big Data platforms, evaluating how data is ingested, stored, processed, and secured
Review and validate data security controls, including encryption, access controls, key management, and data governance measures
Assess application security risks across data-driven applications and services
Evaluate security controls within CI/CD pipelines, focusing on automation security and secure software delivery practices
Perform infrastructure security assessments across on-prem, cloud, and hybrid environments supporting big data platforms
Identify security gaps, risks, and control weaknesses aligned to industry standards and best practices
Produce clear, high-quality risk assessment and security assessment reports tailored for both technical and non-technical stakeholders
Work directly with client engineering and architecture teams to explain findings and remediation priorities
Requirements:
Strong core knowledge of Big Data Platforms and data lifecycle management
Deep understanding of Data Security, including: Data classification and governance, Encryption at rest and in transit, Identity and access management for data platforms
Application Security (secure design, vulnerability identification, API and service-level security)