Principal Duties and Responsibilities:
Security Operations and Monitoring
-
Review Windows Defender and Suricata Logs Daily to proactively identify, investigate, and triage potential security incidents and anomalies.
-
Manage Security Related tickets and maintain diligence to stay on top of updating, escalating, and closing them in a timely manner.
-
Conduct daily reviews of AI usage logs across the enterprise in Microsoft to ensure compliance with acceptable use policies and identify potential data risks.
-
Assist in incident response activities, providing detailed analysis and documentation.
-
Perform in-depth investigations into insider threat incidents, working closely with business leaders.
-
Conduct Red Team Assessments and Penetration Tests. Ensure vulnerabilities are remediated in a timely manner.
-
Create PowerShell and KQL scripts within Azure Sentinel and Office 365.
Security Policy and Administration
-
Maintain and update Windows Defender Policies across the organization's endpoints to ensure robust protection.
-
Review and maintain Conditional Access Policies within Microsoft to enforce Zero Trust principles and secure access to resources.
-
Establish Identity & Access Management controls to govern, monitor, and audit privileged access.
-
Update AI related safeguards
-
Refine detection capabilities by creating and optimizing rules, alerts, and risk scoring models.
Governance, Risk, and Compliance (GRC)
-
Manage Vendor Security by performing due diligence, assessing third-party risks, and tracking vendor compliance.
-
Play a key role in conducting SOC 2 Type 2 audits and other regulatory compliance efforts by gathering evidence, documenting controls, and coordinating with auditors.
-
Establish security best practices and create formal documentation, policies, and procedural guides.
-
Provide training through Knowbe4 to educate employees and users on cybersecurity best practices.
Security Architecture and Improvement
-
Implement Security Changes in infrastructure, applications, and processes, ensuring security is integrated early in the design lifecycle.
-
Advance our usage of Microsoft DLP (Data Loss Prevention) capabilities to protect sensitive and confidential data across the enterprise.
-
Demonstrate a strong understanding of Network Segmentation, firewall rules, SSO (Single Sign-On), and MFA (Multi-Factor Authentication) to implement and maintain a secure network architecture.
-
Define metrics and reporting frameworks to measure the effectiveness of the security program.