Easy Apply

Please enter a valid email.
Please enter a valid phone number.
Please select a valid country.
Please provide a resume.
You must review and agree before submitting.
Head-Cyber Security

15+ years of hard-core Security/Cybersecurity background.

  • Advanced Knowledge of Security Frameworks: Familiarity with ISO 27001, NIST, and other cybersecurity frameworks.
  • Intrusion Detection and Prevention Systems (IDPS): Proficiency in setting up, managing, and interpreting IDPS.
  • Firewall Management: Hands-on experience with firewall rules, policy management, and troubleshooting.
  • Cloud Security: Expertise in securing cloud-based solutions like AWS, Azure, and Google Cloud.
  • Penetration Testing: Ability to conduct and oversee penetration tests, including white-box and black-box approaches.
  • Security Information and Event Management (SIEM): Proficiency in SIEM tools like Splunk, ArcSight, or LogRhythm.
  • Endpoint Security: Experience with endpoint protection platforms like Symantec, McAfee, or CrowdStrike.
  • Data Loss Prevention (DLP): Skills in implementing and managing DLP solutions to protect sensitive data.
  • Secure Software Development: Familiarity with secure coding practices and software development life cycle (SDLC).
  • Cryptography: Strong understanding of cryptographic protocols and secure communications.
  • Network Protocols: Deep understanding of TCP/IP and other network protocols and the ability to analyze packet captures.
  • VPN Technologies: Experience with VPNs, including site-to-site and remote access solutions.
  • Identity and Access Management (IAM): Expertise in IAM solutions like Okta, Azure AD, and LDAP.
  • Incident Response: Demonstrated ability in managing incident response plans and activities.
  • Compliance and Regulations: Understanding GDPR, CCPA, and other data protection regulations.
  • Threat Intelligence: Ability to use threat intelligence platforms to inform security posture.
  • Scripting and Automation: Proficiency in scripting languages like Python, Bash, or PowerShell for automating security tasks.
  • OSINT Techniques: Skills in open-source intelligence gathering and analysis.
  • Vulnerability Management: Experience in managing vulnerability assessment tools like Nessus or Qualys.
  • Mobile Security: Understanding of securing mobile devices and applications.
  • Cybersecurity Awareness Training: Ability to develop and deliver employee security training programs.