About the job
Join our team as a Senior Information Security and Systems Management Engineer. In this pivotal role, you will be instrumental in shaping our security and systems strategy, ensuring our infrastructure evolves as we grow, and that our global team's work environments adhere to the highest security standards.
Your responsibilities will include addressing challenges related to expanding systems and processes, implementing best practices, and unifying all information security domains. With strong organizational backing, resources, and an experienced team, you will serve as the primary decision-maker for security matters. Collaboration with leaders across the organization, including HR, the CEO, and the Managing Director, will be essential in building integrated processes and promoting the adoption of security initiatives company-wide.
Key Responsibilities:
- Identity & Access Management (IAM): Oversee centralized access management, develop and maintain a robust RBAC model, manage access granting and revocation, and conduct periodic reviews. Ensure proper configuration of SSO, MFA, and least-privilege policies while auditing accounts for privilege misuse or anomalies.
- Application Security: Integrate security into the software development lifecycle, collaborating with the Head of Development to secure application architecture. Implement DevSecOps practices, safeguard secrets and intellectual property, utilize SAST/DAST, perform threat modeling, and regularly review third-party libraries and services to mitigate vulnerabilities and ensure secure deployments.
- Infrastructure Security: Safeguard the company's IT infrastructure through secure network architecture, segregation, server and endpoint hardening, and patching policies. Collaborate closely with the Head of Infrastructure and Networks, focusing on cloud security to prevent vulnerabilities and secure operations across all infrastructure components.
- Incidents Monitoring & Response: Establish a Security Information and Event Management (SIEM) system for real-time monitoring, build a Security Operations Center (SOC), and create response processes for proactive detection and efficient resolution of security incidents, continuously enhancing incident management capabilities.
