Define and implement secure-by-design architectural principles across applications, infrastructure, and cloud environments (AWS/Azure), establishing robust identity and access management and guiding secure cloud transformation initiatives. * Lead end-to-end cybersecurity operations (network, application, cloud, and data security), ensuring continuous SOC monitoring, threat intelligence integration, vulnerability management, incident response, and secure configuration and lifecycle management across all IT environments. * Own and evolve the information security risk management framework, conduct regular security risk assessments, implement mitigation strategies, and maintain oversight of security tooling for threat detection and protection capabilities. * Strong operational background in vulnerability management, incident response, and enterprise security tooling, including ...
more