Description

  • Technical Expertise – Knowledge of IAM, cloud security, SIEM, PKI, Application/Data Security, risk assessment & threat mgmt. and encryption technologies.
  • Leadership & Communication – Ability to manage teams and communicate security strategies effectively.
  • Certifications – Preferred credentials include CISSP, CISM, CEH, or GIAC.
  • Analytical Thinking – Strong problem-solving skills for threat detection and response
  • Excellent communication and collaboration skills with the ability to build strong business relationships with key stakeholders while adhering to company priorities
  • Strong data-driven decision-making skills, leveraging risk and performance metrics to drive improvements
  • Strong leadership and management skills
  • In-depth knowledge of cybersecurity frameworks and regulations
  • Ability to analyze and mitigate risks effectively

 

Key Responsibilities:

  • Oversee the security team and manage security operations in partnership with the Client Technology team
  • Collaborate with leadership across departments to promote a culture of security-awareness
  • Enhance processes and be accountable for reporting security incidents to executive management.
  • Manage security budgets and resources
  • Team Leadership & Training – Manage cybersecurity teams and conduct security awareness programs.
  • Develop & Implement Security Policies – Establish cybersecurity frameworks and best practices.
  • Application/ Data Security - Identify Application vulnerabilities and mitigate security risks.
  • Risk Assessment & Threat Management – Identify vulnerabilities and mitigate security risks.
  • Incident Response & Recovery – Lead investigations and remediation efforts for cyber incidents.
  • Security System Maintenance – Knowledge on PKI Systems, API Gateway, and endpoint security.
  • Compliance & Regulatory Adherence – Ensure alignment with GDPR, HIPAA, NIST, ISO 27001 standards.
  • Vendor & Third-Party Security Management – Evaluate security risks associated with external partners.
  • Identity and Access Management- Knowledge on SailPoint and PAM CyberArk operations
  • OT Security - Knowledge on OT Security tools and procedures
  • GRC- Knowledge on GRC operations and tools and procedures

Education

Any Gradute