Security Infrastructure & Engineering:
- Design and build operations security infrastructure and IAM from scratch.
- Deploy and manage security tools and solutions, with a preference for open-source technologies.
- Establish and enforce remote work security standards and best practices for company-owned and BOYD devices.
Identity & Access Management:
- Design and implement access structure using identity provider.
- Automate access lifecycle management including onboarding and offboarding processes.
- Implement and maintain identity federation technologies across multiple platforms.
Security Operations & Governance:
- Establish IT security operations (SecOps) best practices and standard operating procedures.
- Conduct regular security assessments and vulnerability management.
- Define security metrics and KPIs and provide regular security posture reports.