Lead end-to-end cybersecurity operations (network, application, cloud, and data security), ensuring continuous SOC monitoring, threat intelligence integration, vulnerability management, incident response, and secure configuration and lifecycle management across all IT environments. * Own and evolve the information security risk management framework, conduct regular security risk assessments, implement mitigation strategies, and maintain oversight of security tooling for threat detection and protection capabilities. * Strong operational background in vulnerability management, incident response, and enterprise security tooling, including platforms such as Splunk and Microsoft Defender * Oversee compliance with financial regulatory requirements (BaFin, DORA, GDPR, ISO 27001, SOC2), coordinate internal and external audits, ensure timely remediation of findings, and maintain business continuity ...
mehr