Key Responsibilities
- Lead the implementation and management of endpoint detection and response (EDR) solutions, ensuring optimal security posture through deployment, configuration, and continuous maintenance
- Design and oversee cloud identity architectures, with expertise in modern authentication protocols including SAML, OIDC, and OAuth2
- Spearhead the deployment and optimization of enterprise security solutions across corporate and infrastructure domains, encompassing domain monitoring, endpoint protection, email security, and cloud security platforms
- Drive compliance initiatives and ensure alignment with industry standards such as HIPAA and GDPR, while implementing security frameworks including NIST and CIS
- Architect and enhance security monitoring infrastructure, focusing on SIEM integration, EDR optimization, and comprehensive log management
- Implement robust SaaS security measures through advanced DLP policies, encryption protocols, and seamless endpoint security integration
- Develop and maintain comprehensive security documentation, including policies, standards, and procedural guidelines
Required Qualifications
- Bachelor's degree in Computer Science, Information Security, or related technical field;
- Industry-recognized security certifications (Security+, CISSP, or equivalent) strongly preferred
- Proven expertise in cloud platforms (AWS, GCP) with focus on cloud-native security solutions
- Demonstrated proficiency with leading EDR platforms including CrowdStrike, SentinelOne, Microsoft Defender for Endpoint, or Carbon Black
- Advanced knowledge of SIEM technologies (Splunk, Sentinel, QRadar, Elastic) with proven integration experience
- Comprehensive understanding of network architecture, operating system security (Linux/Windows), and log analysis
- Demonstrated ability with automation and scripting languages (Python, PowerShell, Bash) preferred
Personal Information Collection Statement:Personal data provided by the Job Applicant will be used strictly in accordance with the Employer's Personal Data Policies, a copy of which will be provided immediately upon his/her request. All classified data will be treated confidentially within the Human Resources & Administration Department. Personal data of unsuccessful applicants may be retained for a period of up to 3 months.