What Success Looks Like In This Role
Roles and Responsibilities (but not limited to):
- Oversee the management of security risks and mitigation plans.
- Ensure compliance with security policies
- Collaborate with various resolver team to mitigate identified risk
- Lead and coordinate response to security incidents and breaches
- Assist in the architecture and deployment of security tools
- Analyze threat landscapes and provide actionable intelligence
- Serve as the liaison for third-party audits and compliance evaluations.
- Work with various IT teams to prioritize and patch vulnerabilities.
- Work as a bridge between Resolver team and SOC for any security related issues
- Support in creation of the of Security Reports
- Create and maintain risk registers and regularly report on risk metrics.
- Provide recommendations for improving the security posture.
- Approving monthly patches for workstations and servers.
- Ability to develop and implement security policies and procedures.
Desired Candidate Profile
- Expertise in incident response, threat detection, and SOC operations.
- Excellent communication and reporting skills.
- Experience in vulnerability assessments
- Proficiency in using threat-hunting tools and techniques.
- Knowledge of key threat landscapes and attack vectors
- Strong knowledge of advanced persistent threats (APTs) and adversary techniques (e.g., MITRE ATT&CK framework).
- Ability to translate technical threat data into actionable insights.
- Ability to work independently and search for emerging threats in networks.
- Understanding of various security tools and platforms like Microsoft Defender ATP, Office ATP etc.
- Strong understanding of Cloud Security and Networking Concepts and practices.
- Work with Tactical Use Case Development team to assist in processing the more intricate use case development tickets from our customer request queue.
- Experience with methodologies and tools, for threat analysis of complex systems, such as threat modeling
- Ability to learn and retain new skills in a changing technical environment.
You will be successful in this role if you have:
Qualifications
- University degree or equivalent education with relevant experience.
- Minimum 6 years of total experience in security domain with exposure to Security Products
- Excellent verbal and written communication skills.
- Ability to participate in on-call support
- Willingness to learn new technology platforms
- Preferred Qualifications: Vulnerability Management, SIEM Experience Recognized network and security certifications, Security+, CEH, ECIH, GCIH, GCIE etc.
- Certification on the respective tool is added advantage
Unisys is proud to be an equal opportunity employer that considers all qualified applicants without regard to age, blood type, caste, citizenship, color, disability, family medical history, family status, ethnicity, gender, gender expression, gender identity, genetic information, marital status, national origin, parental status, pregnancy, race, religion, sex, sexual orientation, transgender status, veteran status or any other category protected by law.
This commitment includes our efforts to provide for all those who seek to express interest in employment the opportunity to participate without barriers. If you are a US job seeker unable to review the job opportunities herein, or cannot otherwise complete your expression of interest, without additional assistance and would like to discuss a request for reasonable accommodation, please contact our Global Recruiting organization at [Confidential Information] or alternatively Toll Free: 888-560-1782 (Prompt 4). US job seekers can find more information about Unisys EEO commitment here.