Role summary :
Own and elevate both day-to-day security operations and forward-looking security architecture for a large telecom environment.
Run high-availability security programs (e.G., SOC, EDR, AppSec, VAPT) with operational rigor, while designing next-gen controls for emerging platforms and threats (e.G., AI security, post-quantum cryptography, cloud-native).
A. Technical Accountabilities
- Security Operations (Always-On)
- 1.A Oversight and strategic guidance for a 24×7 SOC with tiered response, playbooks, KPIs, and continuous tuning of SIEM / SOAR.
- 1.B Drive endpoint protection and EDR , threat intel, incident handling , and post-incident RCA with measurable MTTA / MTTR improvements.
- Application & Product Security (Shift-Left + Runtime)
- 2.A Oversight and strategic guidance for a secure SDLC with SAST / DAST program involving dependency scanning, and SBOM.
- 2.B Build a pragmatic and “ engineering-friendly ” vulnerability remediation model ;
block high-risk releases by policy, not by surprise.
Vulnerability & Exposure Management3.A Pragmatic approach to vulnerability management across app, infra and containers, with the end goal of reducing likelihood of exploitation along with minimal downtime.3.B Implement risk-based patching and virtual patching (IPS / WAF / EDR policy) to cut exposure when downtime is constrained.Cloud & Platform Security4.A Deliver CNAPP (CSPM / CWPP), OpenShift hardening, container scanning, and IaC guardrails.Architecture & Emerging Threats5.A Define and deploy zero-trust reference architectures spanning IT, cloud, and edge.5.B Lead AI security : model / data / agent protections, prompt / guardrail controls, model provenance, and red teaming.5.C Lead the quantum-risk roadmap : crypto inventory, agility, and transition to PQC for long-lived data / links.B. Non-Technical & Leadership Accountabilities
Stakeholder Management2.A Partner with engineering to reduce toil (e.G., virtual patching, safe defaults, golden paths).2.B Align with product, legal, privacy, and network teams;translate risk into business terms.
Strategy & Roadmapping3.A Maintain a rolling 12–24 month security roadmap covering ops, architecture.People & Culture4.A Build and mentor a high-caliber team;succession planning forcritical roles.
4.B Raise the bar on “secure by default” through enablement, docs, and incentives.Communication & Executive Presence6.A Clear narrative for the board / CXO on threats, posture, and trade-offs.6.B Calm crisis leadership during incidents;crisp, timely updates.
Qualifications
15+ years in cybersecurity with deep experience across SecOps and security architecture;at least 5 years leading managers.
Telecom-scale background preferred (high-throughput networks, 5G core, OSS / BSS, large consumer base).Proven delivery running SOC / EDR, VAPT, and AppSec in complex, hybrid environments.Hands-on familiarity with AWS / GCP, OpenShift, service mesh, APIs, and modern data / ML stacks.Certifications a plus : CISSP, CISM, CCSP / CCSK, GIAC (e.G., GCIA / GCED / GCSA), OSCP—valued but not a substitute for real outcomes.Excellent written / spoken communication;ability to influence senior engineering and business leaders.
Interview Signals We’ll Look For
Operational depth : concrete stories improving SOC signal-to-noise, stopping real incidents, reducing toil.Architectural judgment : intelligent trade-offs in security vs agility.Leadership : building teams, influencing peers, running tough programs without heroics.Forward-thinking : practical plans for AI security and quantum risk that