Hands-on experience in threat and vulnerability management within large-scale or regulated environments
Skilled in analyzing complex architectures, systems, and networks to identify potential security gaps and implement effective controls
Proficient in conducting thorough threat and control assessments across internal, external, and cloud environments
Experienced in detecting threats across applications, databases, networks, and other IT infrastructure components
2. Risk and ControlProficient in risk and control management practices
Ability to evaluate threats, controls, and vulnerabilities, and communicate findings to both technical and business stakeholders
Skilled in threat modeling and risk assessment, with the ability to define effective controls to enhance security posture
Working knowledge of risk management frameworks and security assessment methodologies
3. Technical LeadershipProven experience working as a technical lead with ownership of process improvements
Ability to guide cross-functional teams, ensuring technical excellence and alignment with project goals
4. Stakeholder Management & Soft SkillsExperience working in international and diverse environments
Strong interpersonal skills for influencing and managing stakeholders
Ability to build strong relationships and collaborate effectively within and across teams
Excellent communication skills for coordinating with global infrastructure, application, and compliance teams
Positive attitude, strong teamwork, flexibility, and a solid understanding of emerging technologies and associated security threats
Skilled in preparing reports and presentations for senior management and delivering them to large audiences
5. Tools and TechnologiesStrong experience in application design and architecture with expertise in network, host, and application security practices
Proficient in working with cloud service providers such as AWS, GCP, and Azure
Strong understanding of the Software Development Life Cycle (SDLC), with a focus on integrating security at each stage
Proven experience in driving continuous improvement and process optimization initiative
Good to Have:
Prior experience in threat handling across IT infrastructure, including applications, databases, networks, and other components
Experience leading continuous improvement initiatives and process optimization
Possession of one or more of the following certifications: CISSP, CISA, CISM, or Cloud Security Certifications
Familiarity with regulatory security requirements across multiple jurisdictions