Work type

Locations

Egypt

Categories

Head Office Functions
Your Experience Level

Our application process

At Alshaya, we make thousands of job offers every year, and we look forward to welcoming successful candidates to our growing business.

Here are some important facts you need to know about our processes, so you can be sure that your job offer is genuine.

  • We never ask candidates to pay fees or send us money.
  • We never ask candidates to give personal information such as date of birth, address, passport details, bank details, etc.
  • You always deal directly with us and all communication will come from an official ‘@alshaya.com’ email address, or through an affiliated Alshaya agency. To check if you’re dealing with an affiliate, you can email us at alshayajobs@alshaya.com

Receiving a job offer

If your job offer seems too good to be true, it probably is. There are three key things to remember if you suspect an offer is not genuine:

  • Do not contact the original sender
  • Do not provide any personal information
  • Do not make any payment

If you have concerns and wish to confirm a job offer is genuine, email us at alshayajobs@alshaya.com. Please include a photo or screenshot of the message you have received (please do not forward the original).

Note: Please do not send your CV to the email address listed above as it will not be considered as an application for work.

Click here to know more about our Job Offer process.



Lead-Information Security (GRC).Information Security & RiskEgypt

Apply now
Job Number:
4642052
Work type:
Permanent - Full Time
Location:
Egypt
Categories:
Entry Level, IT

Role Profile:
The GRC Lead – Privacy, Risk & Access Management will play a pivotal role in strengthening Alshaya Group’s governance, risk, and compliance posture with a core focus on data privacy, enterprise risk management, and identity & access governance. This role will also lead and support cross-functional security projects such as SSO integration and user access reviews, ensuring secure, compliant, and business-aligned identity practices across the enterprise.

The Below Key Performance Areas include but are not limited to:

 Develop and implement privacy and data protection policies aligned with GDPR, KVKK, PDPL, and other regional regulations.
 Conduct DPIAs, PIAs, and privacy risk assessments to ensure responsible data handling.
 Manage enterprise risk through a structured Risk Management Framework and maintain the Enterprise Risk Register.
 Define and enforce IAM policies including RBAC, SoD, and user access reviews.
 Lead or support IAM initiatives such as SSO integrations, PAM implementations, and access certification campaigns.
 Align GRC and IAM practices with standards like ISO 27001, NIST, PCI DSS, and SOX.
 Facilitate internal and external audits, assessments, and third-party reviews.
 Oversee GRC tools and privacy platforms (e.g., Archer, OneTrust, ServiceNow GRC).
 Drive cross-functional projects including policy harmonization and audit remediation.
 Prepare executive-level reports and dashboards for governance and compliance oversight.
 Act as a liaison for privacy, risk, and IAM discussions across departments.
 Promote GRC awareness and training across the organization.

Knowledge:

 Strong understanding of global privacy regulations (e.g., GDPR, KVKK, PDPL) and data protection principles.
 In-depth knowledge of enterprise risk management frameworks and risk assessment methodologies.
 Familiarity with IAM concepts including RBAC, SoD, SSO, PAM, and identity lifecycle management.
 Experience with compliance standards such as ISO 27001, NIST, PCI DSS, and SOX.
 Proficiency in using GRC and privacy management tools (e.g., Archer, OneTrust, ServiceNow GRC).
 Ability to lead cross-functional projects and integrate GRC, IAM, and privacy workflows.
 Strong stakeholder engagement and communication skills for executive and cross-departmental collaboration.
 Analytical skills for conducting DPIAs, PIAs, and interpreting KRIs and audit findings.
 Knowledge of authentication protocols (e.g., SAML, OIDC) and identity governance best practices.
 Experience in managing DSARs, breach responses, and audit readiness activities.
Experience:
 5-7 years experience in Information Security Domain
 Bachelor’s degree in Information Security, Computer Science, Risk Management, or related field. Master’s degree or MBA is a plus.
 CIPP/E, CIPM, or other IAPP certifications; CRISC, CISA, or ISO 27001 Lead Implementer; Identity and Access certifications such as Azure, Okta, or SailPoint; ITIL or PMP for project management is a plus.

Skills:
 Strong understanding of IAM principles, SSO protocols (SAML, OIDC), and identity lifecycle.
 Knowledge of privacy regulations and enterprise risk frameworks.
 Excellent stakeholder management, communication, and cross-functional collaboration skills.
 Proficient in GRC tools , Privacy Tools & Access management platforms.

Advertised: Egypt Daylight Time
Applications close: Egypt Daylight Time

Back Apply now Refer a friend