Responsibilities
- Help design and implement passwordless authentication and Zero Trust security models.
- Oversee secure user provisioning and deprovisioning, enforcing minimal access rights across business systems.
- Work with Human Resources and IT teams to optimize employee onboarding and offboarding processes, ensuring prompt access removal and traceability.
- Establish and maintain security standards for endpoint devices, including Windows, macOS, and mobile platforms, using MDM tools like Intune and Jamf.
- Operate and fine-tune endpoint and extended detection and response systems to maintain accurate threat detection across workstations and servers.
- Secure corporate Azure environments by managing proper configuration of subscriptions, network settings, and resource deployment, separate from production systems.
- Identify and address security vulnerabilities in the corporate IT environment through regular assessments and scanning activities.
- Lead efforts in vulnerability and patch management to reduce exposure to known threats.
- Collaborate with IT to build automated compliance checks and remediation processes for endpoints.
- Support the creation and upkeep of infrastructure defined through code.
- Ensure endpoints and servers are hardened and meet compliance requirements.
- Evaluate and secure third-party SaaS applications and integrations to prevent unauthorized data access and privilege escalation.
- Partner with Legal and Compliance teams to assess security risks of new vendors and software tools.
- Configure and manage cloud access security brokers and data loss prevention policies to protect sensitive information while maintaining usability.
- Lead incident response efforts for corporate security incidents such as phishing attacks, malware outbreaks, and lost devices.
- Create automation scripts and workflows using Python and PowerShell, and integrate with SOAR platforms to streamline security operations.
- Conduct proactive threat hunting across the corporate network and identity systems.
- Develop and maintain incident response playbooks with specific procedures and forensic data collection steps.
- Build and deploy security controls to protect corporate assets, including endpoints, data repositories, networks, cloud services, and identity systems.
- Assist in automating evidence gathering for internal and external audits.
- Serve as the main security contact for IT and business units, promoting security integration into daily operations and workflows.
- Create and deliver technical security training and awareness programs tailored to engineering and non-engineering teams.