Aktuelle Jobs

Entdecken und Bewerben Sie sich für Jobs

L2 Data Classification Engineer (Fortra Titus) (m/f/d)

Permanent
Riyadh, Saudi Arabia
23.09.2025

L2 Data Classification Engineer (Fortra Titus) — Operations & Adoption

Location & Reporting

Riyadh (on-site, Sun–Thu). Reports to the L3 Data Classification Engineer and Security Delivery Lead. Saudi nationals preferred.

Role Purpose

Seeking an experienced candidate who will operate and support the client’s Fortra Titus data-classification platform day-to-day: deploy and validate policies to Microsoft Office & Outlook, triage incidents, drive user adoption, and keep evidence-ready reports for audits. You’ll ensure Titus labels are consistently applied and consumed by downstream controls like Forcepoint DLP and Seclore DRM, raising complex items to L3 as needed. Fortra’s DCS (formerly Titus) enforces classification at document/email creation and persists metadata for downstream tools, which is exactly what this L2 role keeps healthy at scale.

Scope & Toolset (Operate & Validate)

  • Primary: Fortra Data Classification Suite (Titus) for Microsoft Office (Word/Excel/PowerPoint) and Outlook add-ins; user-driven / suggested / automatic labeling; protective markings and metadata.

  • Integrations to Verify: Forcepoint DLP reading Titus tags, Seclore DRM applying rights based on classification, SIEM dashboards for events/telemetry.

  • Environment Context: Microsoft 365 collaboration with sensitivity labeling coexistence patterns (awareness of label GUID/metadata concepts).

Key Responsibilities (L2 — Hands-On Operations)

1. Policy Deployment & Hygiene

  • Import/test Titus policy updates from L3 in pilot OU; execute regression checklists in Office/Outlook; promote via change. Track coverage and client health.

2. End-User & Endpoint Support

  • Troubleshoot Outlook/Office add-in prompts, mandatory classification enforcement, protective markings, and save/send blocks; document KBs and FAQs.

3. Integration Checks

  • Validate that Forcepoint DLP policies correctly consume Titus tags/metadata (spot checks, test artifacts, FP/FN feedback), and that Seclore rights templates trigger from labels in common workflows (email + attachments, shared docs). Escalate mis-mappings to L3.

4. Monitoring, Reporting & Evidence

  • Maintain weekly KPIs: label adoption %, add-in coverage %, DLP tag-match rate, exception backlog, incident MTTR; export audit evidence (change tickets, test logs, screenshots).

5. Adoption & Training

  • Run short enablement sessions; capture UX friction (false prompts, confusing labels) and propose tuning to L3. Reference Microsoft 365 data-classification dashboards where applicable.

6. Change & Incident Management

  • Raise/execute standard changes (policy push, client updates), handle P2/P3 incidents, support P1 as hands-on executor under L3 lead, complete RCA tasks and preventive actions.

Required Qualifications

  • 2–4 years in Data Protection / Endpoint / M365 support, with 1+ year operating Fortra Titus/DCS (Office/Outlook add-ins, labels, markings, policy deployments).

  • Working knowledge of Forcepoint DLP (how it detects/uses classification metadata) and basic familiarity with Seclore classification-driven protection.

  • Strong Microsoft 365 user/admin literacy (Office client behavior, Outlook profiles, add-ins, profile resets, basic tenant concepts; awareness of sensitivity labels).

  • ITIL Incident/Change exposure; clear documentation and evidence habits for audits.

Good to Have

  • Any vendor training/badges for Fortra/Titus; Forcepoint DLP admin exposure; basic understanding of label coexistence/GUIDs in M365.

Success Metrics (First 90–120 Days)

  • ?95% Titus add-in coverage on in-scope endpoints; green client-health dashboards.

  • ?75–80% of new Office docs/emails labeled correctly (measured via spot checks and reports).

  • Forcepoint DLP: validated tag consumption on top 5 policies; FP/FN feedback loop in place.

  • Seclore: confirm label?rights mapping works for top business flows.

  • Runbooks complete: policy deployment SOP, add-in troubleshooting, DLP/DRM validation checklist, weekly KPI report template.

Day-to-Day (What You’ll Do)

  • Push approved policy updates, run validation in Word/Excel/PowerPoint/Outlook, and publish results.

  • Triage tickets: wrong prompts/markings, send-block rules, missing headers/footers, label mismatch.

  • Perform DLP tag checks (attach labeled files/emails, verify rule hits/actions), log findings; sanity-check Seclore rights application from label.

  • Track & publish KPIs; maintain tidy evidence packs for compliance and audits.

  • Escalate abnormal patterns (label GUID mismatches, integration decode issues) to L3 with repro steps (e.g., TLPropertyRoot mapping nuances).


Halian Group:

With over 28 years of experience, we have come to understand that innovation is the only way to provide agile, practical solutions that transform businesses and careers.

Our resourcing and smart services help you to realize tomorrow’s potential. Discover the amazing things possible when you bring the right people and the right technologies together.

At Halian, we recognize that diversity, equity, and inclusion (DEI) are essential to building high-performing teams for our clients. We are committed to connecting organizations with top talent from all backgrounds, ensuring that every individual feels valued, respected, and empowered to contribute their unique perspectives. We encourage applications from all qualified candidates, regardless of race, gender, disability, or any other characteristic that makes them unique. By fostering diverse and inclusive workplaces, we help our clients drive innovation, enhance collaboration, and better reflect the communities they serve.

#LI-CA1

Bereit für den nächsten Schritt?

Melden Sie sich online an - es dauert nur 10 Minuten.