The departmentCovers Cybersecurity, Information Security, IT Audit, IT Risks, IT Controls,Access Management, Security Operation, ThreatManagement and the portfolio forChange for all these areas. This is a rolling fixed term contract, initially 6 months. You will play a key role in overseeing our Threat Intelligence Centreefforts and ensuring alignment with strategic planning objectives. You will … beresponsible for the end-to-end management of major projects that enhance ourglobal cyber threat intelligence capabilities. This role requiresstrong project management expertise, a solid understanding of cybersecurityoperations, and the ability to effectively collaborate across global teams. Lead the end-to-endmanagement of the threat intelligence activities while ensuring alignment withour global cybersecurity strategy. Develop and … Facilitatecommunication and coordination with global stakeholders across multiple regionsto ensure alignment of requirements and deliverables. Track activityprogress, manage risks, and implement risk mitigation strategies to ensuresuccessful outcomes. DriveStandardisation of threat intelligence protocols, tools, and governance acrossthe region. Partner withtechnology, compliance, and risk management teams to ensure compliance withregulatory and legal requirements in each jurisdiction such as GDPR &ISO27001 More ❯
Microsoft Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … based threats, including phishing, malicious attachments, and compromised links. Monitor on-premises Active Directory signals to identify and investigate threats related to compromised identities. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Work with internal IT and other security teams to ensure the … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk More ❯
Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Your core responsibilities will include threatmanagement, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … based threats, including phishing, malicious attachments, and compromised links. Monitor on-premises Active Directory signals to identify and investigate threats related to compromised identities. Enforce security policies and provide threat protection across our cloud applications. Prioritize and address critical vulnerabilities and misconfigurations based on a risk-based assessment. Utilize Microsoft Entra ID Protection to identify and respond to compromised More ❯
The department Covers Cybersecurity, Information Security, IT Audit, IT Risks, IT Controls,Access Management, Security Operation and Threat Management. This is a rolling fixed term contract, initially 6 months - on site. The Business administrator will play a key role in overseeing our Threat Intelligence Centreefforts and ensuring alignment with strategic planning objectives. You will beresponsible for the … end-to-end management of major projects that enhance ourglobal cyber threat intelligence capabilities. This role requiresstrong project management expertise, a solid understanding of cybersecurityoperations, and the ability to effectively collaborate across global teams. Lead the end-to-endmanagement of the threat intelligence activities while ensuring alignment withour global cybersecurity strategy. Develop and maintaindetailed activity plans … Facilitatecommunication and coordination with global stakeholders across multiple regionsto ensure alignment of requirements and deliverables. Track activityprogress, manage risks, and implement risk mitigation strategies to ensuresuccessful outcomes. DriveStandardisation of threat intelligence protocols, tools, and governance acrossthe region. Partner withtechnology, compliance, and risk management teams to ensure compliance withregulatory and legal requirements in each jurisdiction such as GDPR &ISO27001 More ❯