We are looking for Expert level technical experience with Cyber Security Skills
Required Infrastructure Skills :
- Network Security
- Endpoint Security
- EDR
- SOC
Roles and Responsibilities :
Own the design and implementation phases of new and innovative Security architectures.Give direction and design Security solutions to support Technical Towers teams according to Security best practices.Main Interface with clients to understand business and technical requirements to develop competitive comprehensive Security solutions that meet their needs and align with business objectives.Support during the selection, technical evaluation of Security Platform / productsExperience in the definition and the design of complex Security architectural solutions (Firewall, WAF,EDR, SIEM, Proxy ,VPN, SOC Services, etc.)Ability to develop technical relationships with client‘s Security Stakeholders (CISO, CSO, Head of Security technologies, Security Architects, etc.)Strong communication and presentation skills, with the ability to effectively convey complex technical concepts to non-technical stakeholdersReview the current architecture and identify the gaps and share the recommendations.Deep understanding of cyber security principles, technologies, and best practices, with practical architectural design and communication skillsParticipate in risk assessments and translate identified risks into actionable security architecture designs and controls.Development and maintenance of security standards, policies, and proceduresStrong understanding of security frameworks and standards (e.g., NIST CSF, ISO 27001, SOC 2)Able to adapt communication styles for security architectures and solutions to technical and non-technical stakeholdersAbility to connect and communicate effectively with cross-functional teams to ensure security is integrated throughout the development lifecycleStay abreast of the latest cyber security threats, trends, and technologiesStrong understanding on security controls and how it will translate to security technologies and tools, such as firewalls, intrusion detection / prevention systems, SIEM, vulnerability management, and endpoint securityFamiliarity with threat intelligence platforms and methodologies