Bachelor degree in Computer Science, Information Security,
Engineering, or equivalent experience.
7+ years of combined experience in technical cybersecurity roles and
project management in a global enterprise environment.
Proven success leading global, cross-functional cybersecurity projects ...
in highly customized and evolving IT environments.
In-depth technical expertise with at least 5 technologies:
o SIEM (e.g., Splunk, Sentinel), SOC workflows
o EDR (e.g., CrowdStrike, SentinelOne, MS Defender, CyberArk
EPM), DLP, and encryption standards
o IAM (e.g., Sailpoint, One Identity Manager), PAM (e.g., CyberArk),
IDPs
o AI/ML in security analytics, UEBA
o Broader network security architecture, network segmentation, and
Secured Communications Protocols
o Cloud Security, and Cloud Access Security Broker (CASB)
platforms (e.g., McAfee, MS Defender)
o Application Security tools such as Fortify, and SAST/DAST
o Next-Generation Firewalls (NGFWs), ZTNA (e.g., Zscaler
ZIA/ZPA), and Intrusion Detection/Prevention Systems (IDP/IPS)
o Cryptographic technologies, including encryption, PKI, and key
management
o Multi-Factor Authentication platforms (MFA)
experience
7show more Bachelor degree in Computer Science, Information Security,
Engineering, or equivalent experience.
7+ years of combined experience in technical cybersecurity roles and
project management in a global enterprise environment.
Proven success leading global, cross-functional cybersecurity projects
in highly customized and evolving IT environments.
In-depth technical expertise with at least 5 technologies:
o SIEM (e.g., Splunk, Sentinel), SOC workflows
o EDR (e.g., CrowdStrike, SentinelOne, MS Defender, CyberArk
EPM), DLP, and encryption standards
o IAM (e.g., Sailpoint, One Identity Manager), PAM (e.g., CyberArk),
IDPs
o AI/ML in security analytics, UEBA
o Broader network security architecture, network segmentation, and
Secured Communications Protocols
o Cloud Security, and Cloud Access Security Broker (CASB)
platforms (e.g., McAfee, MS Defender)
o Application Security tools such as Fortify, and SAST/DAST
o Next-Generation Firewalls (NGFWs), ZTNA (e.g., Zscaler
ZIA/ZPA), and Intrusion Detection/Prevention Systems (IDP/IPS)
o Cryptographic technologies, including encryption, PKI, and key
...
management
o Multi-Factor Authentication platforms (MFA)
experience
7show more