Lead end-to-end cybersecurity operations (network, application, cloud, and data security), ensuring continuous SOC monitoring, threat intelligence integration, vulnerability management, incident response, and secure configuration and lifecycle management across all IT environments. We offer tailor-made consulting services with a focus on professional partnerships and sustainable staffing. * Own and evolve the information security risk management framework, conduct regular security risk assessments, implement mitigation strategies, and maintain oversight of security tooling for threat detection and protection capabilities. * Define and implement secure-by-design architectural principles across applications, infrastructure, and cloud environments (AWS/Azure), establishing robust identity and access management and guiding secure cloud transformation initiatives.
mehr