Role Definition
Plans, designs and implements cybersecurity strategies and solutions to prevent critical damage to the organization brought by cyber-attacks.
Responsibilities
- Develops and implements security controls, systems, remote access solutions, and infrastructure architecture in alignment with defined requirements and guidelines; configures network controls to protect the organization's environment in a timely manner.
- Provides recommendations for security products, services, and procedures to enhance system architecture and security controls; conducts testing and evaluation of new cybersecurity technologies and controls.
- Collaborates with cybersecurity and technology teams to deploy vulnerability mitigations and support integration activities; leverages industry standards and frameworks to identify capabilities and technologies that strengthen cyber defenses across diverse scenarios.
- Implements security systems by defining intrusion detection methodologies and preparing both preventive and reactive measures.
- Reviews security technologies, tools, and services, and provides recommendations to the broader security team based on security, financial, and operational metrics.
- Defines processes and architectures for securing networks, applications, and infrastructure; builds firewalls and implements intrusion detection systems in complex environments.
Qualifications
- Proven experience in designing, implementing, and maintaining scalable IAM solutions and platforms
- Expertise in developing and enforcing access control policies and procedures
- Hands-on experience with implementing automated workflows for identity and access requests
- Proficiency in IAM tools such as SailPoint, Microsoft Entra ID, and Aveksa
- Strong background in IAM automation and scripting (e.g., Python, PowerShell, Java), including API integrations
- Familiarity with cloud security and IAM frameworks across Azure, AWS, and Google Cloud environments