The roles and responsibilities have been described as follows:
Key Responsibilities
- Implements technologies deployed across application, network/perimeter, data, endpoint, identity & access, and mobility domains.
- Research attempted or successful efforts to compromise systems security and design countermeasures.
- Understanding and some experience of modern application development
- Coordinates with IT and end users to minimize disruptions and protect assets.
- Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration, or denial of access to information and systems.
- Perform other duties as assigned.
- Identify and assess security risks and vulnerabilities within cloud infrastructures (AWS, Azure).
- Implement and manage identity & access management (IAM) solutions to control access to critical systems and data.
- Utilize AI and data science techniques to analyze security data, detect anomalies, and predict potential threats.
- Develop, implement, and enforce security policies, procedures, and best practices to protect cloud-based applications and data.
- Monitor and respond to security incidents, conducting thorough investigations and implementing remediation measures.
- Stay updated with the latest cybersecurity threats, trends, and technologies to continuously improve security practices.
- Perform other duties as assigned.
Skills and Qualifications:Must-Have Skills:
- Strong expertise in cybersecurity practices and principles.
- Proficiency in cloud security for AWS and/or Azure environments.
- Experience with identity & access management (IAM) solutions.
- Knowledge of AI and data science techniques for security analysis.
- Excellent communication skills, both written and verbal.
- Strong negotiation skills to influence security decisions and policies.
- Project management skills to oversee security projects and initiatives.
- Effective presentation skills to communicate security-related information to various stakeholders.
Nice-to-Have Skills:
- Security certifications such as CISSP, CISM, CEH, or similar.
- Experience with security tools and technologies for threat detection and response.
- Knowledge of regulatory requirements and compliance standards related to cybersecurity.
- Ability to work collaboratively in a team environment and lead security-focused projects.
- Familiarity with DevSecOps practices and integrating security into development workflows.
Minimum Qualifications
- Bachelor's degree in computer science, engineering, or information systems and/or equivalent formal training or work experience.
- 6+ years experience in a minimum of 4 of the following areas: Business continuity and disaster recovery, network forensics, security, and risk frameworks, endpoint security, information systems auditing, vendor risk assessment, cyber risk assessment, network intrusion detection/prevention, identity and access management, IT lifecycle management.
- Knowledge, Skills, and Abilities
- Strong technical, consulting, and project management skills.
- Ability to communicate technical subject matter effectively to multiple organizational layers.