Main Responsibilities
- Lead the engineering, design, and implementation of advanced security measures for the protection of systems, networks, applications, and information assets
- Implementation and Administration of Cyber Security Platforms (e.g., EDR, WAF, PAM, email security) including optimization and vendor management
- Deployment and Administration of SIEM platforms, including development of detection use cases, correlation rules, dashboards and reports
- Develop and manage the complete information security policy framework Conductperiodic reviews and continuous enhancements of security policies
- Align policies with internationally recognized frameworks and standards MVL Group | Staff Requisition Form F1 | CONFIDENTIAL
- Perform compliance assessments, including gap analyses and audits
- Coordinate with auditors for internal and external compliance activities
- Assist in establishing and optimizing information security governance structures Prepare compliance reports and manage regulatory submissions Key Requirements
- Manage and administer global Microsoft 365 tenant (GCC G5) Strong experience with Microsoft Entra ID (Azure AD), Conditional Access, Identity Protection, and authentication strength policies
- Hands-on experience with Microsoft Purview (DLP, sensitivity labels, compliance policies, and information protection)
- Experience with Microsoft Intune, Windows 365, and endpoint security management Hands-on experience with Microsoft Defender suite and security incident response
- Solid understanding of Zero Trust architecture and identity-first security models Experience operating within a multi-region or global organization
- Strong scripting and automation skills including PowerShell (M365/Azure administration) and Python (security tooling, integrations, and workflow automation)
- Relevant industry certifications (mandatory — see Certifications section below)
- Experience in enterprise security environments
- Strong understanding of information security frameworks (e.g., ISO/IEC 27001, NIST 800-171/172/53, CMMC)
- Conduct formal information security risk assessments
- Maintain risk registers and treatment plans
- Implement security baselines for servers, endpoints, and network devices Enforce access control and data classification policies
- Ensure encryption standards are applied for data at rest and in transit
- Ability to document processes clearly and support audit requirements
Job Type: Full-time
Application Question(s):
- Do you have any of this certification?
Cybersecurity Governance — At Least One Required:
- CompTIA Security+
- CISSP — Certified Information Systems Security Professional
- CISM — Certified Information Security Manager
- CEH — Certified Ethical Hacker
- Do you have any of this Certification?
Microsoft 365 GCC G5 — At Least One Required:
- SC-200: Security Operations Analyst Associate
- SC-300: Identity and Access Administrator
- SC-400: Information Protection & Compliance Administrator
- AZ-500: Azure Security Engineer Associate
Zscaler (Zero Trust / ZTNA) — At Least One Required:
- ZCCA-IA: Zscaler Certified Cloud Security Administrator
- ZCCP-IA: Zscaler Certified Cloud Security Professional
- What is your salary expectation?
Work Location: In person