Role summary :
Own and elevate both day-to-day security operations and forward-looking security architecture for a large telecom environment.
Run high-availability security programs (e.g., SOC, EDR, AppSec, VAPT) with operational rigor, while designing next-gen controls for emerging platforms and threats (e.g., AI security, post-quantum cryptography, cloud-native).
A. Technical Accountabilities
Security Operations (Always-On)
1.a
Oversight
and
strategic guidance
for a 24×7
SOC
with tiered response, playbooks, KPIs, and continuous tuning of SIEM / SOAR.
1.b Drive
endpoint protection
and
EDR , threat intel,
incident handling , and post-incident RCA with measurable
MTTA / MTTR
improvements.
Application & Product Security (Shift-Left + Runtime)
2.a Oversight and strategic guidance for a secure SDLC with SAST / DAST program involving dependency scanning, and SBOM.
2.b Build a pragmatic and “ engineering-friendly ” vulnerability
remediation model ; block high-risk releases by policy, not by surprise.
Vulnerability & Exposure Management
3.a
Pragmatic approach
to
vulnerability management
across app, infra and containers, with the end goal of reducing likelihood of exploitation along with minimal downtime.
3.b Implement
risk-based patching
and virtual patching (IPS / WAF / EDR policy) to cut exposure when downtime is constrained.
Cloud & Platform Security
4.a
Deliver CNAPP
(CSPM / CWPP), OpenShift hardening, container scanning, and IaC guardrails.
Architecture & Emerging Threats
5.a Define and deploy
zero-trust
reference architectures spanning IT, cloud, and edge.
5.b Lead
AI security : model / data / agent protections, prompt / guardrail controls, model provenance, and red teaming.
5.c Lead the
quantum-risk
roadmap : crypto inventory, agility, and transition to PQC for long-lived data / links.
B. Non-Technical & Leadership Accountabilities
Stakeholder Management
2.a Partner with engineering to reduce toil (e.g., virtual patching, safe defaults, golden paths).
2.b Align with product, legal, privacy, and network teams; translate risk into business terms.
Strategy & Roadmapping
3.a Maintain a rolling 12–24 month security roadmap covering ops, architecture.
People & Culture
4.a Build and mentor a high-caliber team; succession planning for critical roles.
4.b Raise the bar on “secure by default” through enablement, docs, and incentives.
Communication & Executive Presence
6.a Clear narrative for the board / CXO on threats, posture, and trade-offs.
6.b Calm crisis leadership during incidents; crisp, timely updates.
Qualifications
15+ years in cybersecurity with deep experience across SecOps and security architecture; at least 5 years leading managers.
Telecom-scale background preferred (high-throughput networks, 5G core, OSS / BSS, large consumer base).
Proven delivery running SOC / EDR, VAPT, and AppSec in complex, hybrid environments.
Hands-on familiarity with AWS / GCP, OpenShift, service mesh, APIs, and modern data / ML stacks.
Certifications a plus : CISSP, CISM, CCSP / CCSK, GIAC (e.g., GCIA / GCED / GCSA), OSCP—valued but not a substitute for real outcomes.
Excellent written / spoken communication; ability to influence senior engineering and business leaders.
Interview Signals We’ll Look For
Operational depth :
concrete stories improving SOC signal-to-noise, stopping real incidents, reducing toil.
Architectural judgment :
intelligent trade-offs in security vs agility.
Leadership :
building teams, influencing peers, running tough programs without heroics.
Forward-thinking :
practical plans for AI security and quantum risk that
Security Architecture • Delhi, India