infrastructure. This role focuses on delivering secure, reliable, and high-performance connectivity for over 50,000 users and their devices through the implementation of VPN, SASE, and Zero-Trust Network Access (ZTNA) technologies. With a focus on automation, observability, and user experience, this position plays a vital role in ensuring seamless and secure connectivity across third-party, hybrid, and … resilience, and security using modern software-defined networking principles. Embed zero-trust principles and user-centric design into all remote connectivity services. Align remote connectivity architecture with broader enterprise network, security, and cloud strategies. Engineering & Operations: Lead the engineering, deployment, and lifecycle management of remote access solutions such as Cisco AnyConnect, Zscaler, and other mainstream VPN platforms. Drive automation … policy governance workflows. Support enforcement of access policies for third-party, BYOD, and contractor devices using secure, scalable methods. Collaboration & User Experience: Work closely with cyber, architecture, and global network teams to deliver consistent, aligned remote access capabilities. Act as a champion for user experience, identifying and eliminating pain points through design and support improvements. Enable a seamless hybrid More ❯
architecture(s) and configuration(s) that the discovery phase recommended. Key Responsibilities: Develop and implement security architecture strategies to mitigate risks associated with lateral movement protocols. Design and enforce networksegmentation and access control policies to limit unauthorized lateral movement. Collaborate with IT and security teams to ensure the integration of security best practices into network and … on corrective actions. Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field. At least 8 years of experience in information security, with a focus on network security and architecture. Strong knowledge of malicious lateral movement techniques and mitigation strategies. Experience with security frameworks and standards (e.g., NIST, ISO 27001). Excellent communication and leadership skills. More ❯
and troubleshooting of Windows Server , including Remote Desktop Services, Active Directory, AD Sync Hands-on technical knowledge of LAN/WAN, Routing, Switching, Cisco, Meraki, firewalls, VLANs, VPNs and network segmentations Understanding of virtualization technologies e.g VMware and Hyper-V Understanding of security concepts, compliance and governance Technically certified in some of the following Technical Certifications: MS-100, MS More ❯
management, and supply-chain security; automate enforcement through CI/CD pipelines. Cloud & Infrastructure Security - Design and implement robust controls for AWS (primary) and Azure/GCP (secondary): IAM, networksegmentation, KMS, secrets management, WAF, EDR, and zero-trust patterns. Identity & Access Management (IAM) - Own enterprise IAM strategy, including RBAC, least-privilege provisioning, SSO, federation (OIDC/SAML … and its native security services. Proven success embedding security within modern microservice, container, and serverless architectures. Proficiency with Infrastructure-as-Code (Terraform, CloudFormation) and Kubernetes security hardening (admission controllers, network policies). Strong understanding of and practical experience of software engineering and how security can be an enabler to success as an engineer. Experience working within high-sensitivity data … for ISO27001 and SOC2. FedRAMP experience advantageous. Demonstrated experience performing threat modelling, penetration test scoping, and vulnerability management. Deep understanding of IAM concepts, encryption/key-management, and secure network design. Excellent communication skills with ability to translate technical risk to non-technical stakeholders. Preferred, but not essential Certifications such as CISSP, CSSLP, AWS Certified Security. Familiarity with data More ❯
the safety and trust of our users at the forefront of everything we do. Responsibilities: Build security for large-scale AI clusters, implementing robust cloud security architecture including IAM, networksegmentation, and encryption controls Design secure-by-design workflows across our services and cloud infrastructure, with expertise in AWS/GCP security services, Kubernetes security, and container orchestration More ❯