What you’ll do
-
Operate, administer, and tune CrowdStrike Identity Protection to detect and stop identity threats (e.g., lateral movement, Kerberoasting/NTLM misuse, Golden/Silver Ticket, credential theft).
-
Monitor and triage identity risk events and anomalies across SIEM and identity telemetry (e.g., impossible travel, atypical sign‑ins, MFA fatigue, session hijack); execute rapid containment (disable accounts, revoke sessions, invalidate tokens).
-
Integrate dark web monitoring (CyberInt or equivalent) to identify exposed credentials and targeted campaigns; drive takedowns, credential resets, and layered mitigations.
-
Build and execute incident response playbooks for credential compromise, privilege escalation, directory persistence, and identity‑based lateral movement; document findings and lessons learned.
-
Detect anomalous privileged activity using SIEM/UEBA and Netskope telemetry; apply just‑in‑time and break‑glass patterns with IAM partners.
-
Lead identity threat hunting and detection engineering (KQL/SQL/regex/Sigma) across SIEM/EDR/Identity platforms to close visibility gaps and reduce mean time to detect.
-
Collaborate under our IAM shared responsibility model with Infrastructure and Security to validate mover risk, advise on Conditional Access/MFA exceptions, and mature shared runbooks.
-
Produce metrics, dashboards, and reports on identity threats, response performance, and trends; support audits and evidence collection for identity‑related controls.
-
Automate enrichment and response using PowerShell, Python, and APIs (REST/Graph/CrowdStrike; SOAR) to streamline investigations and orchestrate containment.
-
Participate in readiness testing (tabletop, purple team) and integrate tools (Splunk, Netskope, ticketing, SOAR) to elevate our identity control efficacy.
Minimum qualifications
-
Education:
-
Bachelor’s degree in Information Security, Computer Science, or related field preferred; equivalent experience considered.
-
Experience:
-
5+ years of IT/cybersecurity experience with at least 3+ years focused on identity security/operations (Microsoft Entra ID/Azure AD, on‑prem AD, MFA, Conditional Access, SSO/SCIM).
-
Hands‑on experience with CrowdStrike Identity Protection and SIEM/UEBA (e.g., Splunk) and cloud security platforms (e.g., Netskope).
-
Experience with dark web monitoring and credential exposure remediation (CyberInt or equivalent).
-
Proficiency in incident response, identity threat hunting, and detection engineering; scripting/automation (PowerShell, Python, REST/Graph/CS APIs, SOAR).
-
Strong analytical, communication, and documentation skills; experience supporting audit and evidence requests.
Preferred qualifications
-
Security certifications such as Microsoft SC‑200/SC‑300, CISSP, SSCP, CompTIA Security+, GIAC (e.g., GMON/GCIH/GCDA), Okta Certified Administrator/Professional.
-
Deep knowledge of identity attack paths, Kerberos/NTLM, session/token abuse, persistence techniques, and lateral movement.
-
Experience working across global time zones and participating in on‑call rotations.
What’s in it for you
-
High‑impact mission: Protect our people, data, and operations from the fastest‑growing threat vector—identity.
-
Leading‑edge tooling: Work hands‑on with CrowdStrike, Splunk, Netskope, SOAR, and dark web intelligence at enterprise scale.
-
Growth and visibility: Shape detection strategy, influence identity policy, and collaborate with leaders across Security, Infrastructure, and IAM.
-
Flexibility: Hybrid/remote work with occasional onsite collaboration at company locations.
-
Global teamwork: Partner with experts across regions, time zones, and disciplines.
Our programs are designed to focus on maintaining and enhancing all pillars of health with a robust benefits package including medical, dental, vision and prescription drug coverage with the option of a Health Savings Account with company contributions. In addition, we offer an industry leading 401(k)savings plan, insurance coverage, employee assistance programs and various wellness incentives. We support life-work balance with paid vacation time, sick time, and company holidays. Explore a supportive environment that enriches both your personal and professional growth!
As part of any recruitment process, FUJIFILM Biotechnologies collects and processes personal data relating to job applicants. The organisation is committed to being transparent about how it collects and uses that data and to meeting its data protection obligations and may share this as part of the global recruitment process with hiring managers in Europe and the United States.
This is a global position that will support all FUJIFILM Biotechnologies sites. This position can be based at any of our locations around the globe. Benefits and compensation will be governed by the location that you are based from and considered your home site.
To all agencies: Please, no phone calls or emails to any employee of FUJIFILM about this requisition. All resumes submitted by search firms/employment agencies to any employee at FUJIFILM via-email, the internet or in any form and/or method will be deemed the sole property of FUJIFILM, unless such search firms/employment agencies were engaged by FUJIFILM for this requisition and a valid agreement with FUJIFILM is in place. In the event a candidate who was submitted outside of the FUJIFILM agency engagement process is hired, no fee or payment of any kind will be paid.