Reporting to the Global Head of IT Security, the Cybersecurity Lead - Product Security will act as the security architect and guardian for Celestica’s network hardware products and proprietary network operating systems. This role is distinct from enterprise IT security; you will embed security into the very fabric of the products we deliver to customers.You will lead the adoption of "Secure by Design" principles, operationalizing the standardized Software Development Life Cycle (SDLC) within product engineering teams. You will be responsible for translating high-level governance requirements into technical reality—ensuring our network switches, routers, and appliances are hardened against advanced persistent threats (APTs) and comply with Zero Trust principles.Detailed DescriptionPerforms tasks such as, but not limited to, the following: Secure Product Lifecycle: Lead the integration of security gates into the product development lifecycle for network hardware and OS software. Enforce the standardized SDLC policy and ensure threat modeling (using frameworks like STRIDE or PASTA) is conducted during the design phase of every new product release. Network OS Hardening: Direct the security hardening of the network operating system. Define and enforce baseline configurations to ensure the OS is resistant to tampering, implementing controls such as secure boot, kernel hardening, and restricted shell access. Application Security Testing: Orchestrate the "Standardizing Dynamic Testing and Vulnerability Management" initiative for product software. Oversee the implementation of Static Application Security Testing (SAST) using tools like Snyk in the CI/CD pipeline and establish a Dynamic Application Security Testing (DAST) framework to identify runtime vulnerabilities. Zero Trust Architecture: Architect product features that support Zero Trust environments. Ensure network products support granular micro-segmentation capabilities 12and robust identity integration, moving away from local authentication to centralized, MFA-ready administrative access. Vulnerability Remediation: Manage the product vulnerability lifecycle. Establish Service Level Agreements (SLAs) for remediating findings identified during penetration testing and DAST scans, ensuring no critical vulnerabilities ship to production. Crypto & Protocol Security: Ensure all product cryptographic implementations align with the "IT Encryption & Cryptography Policy", mandating AES-256 standards. Validate the security of implemented network protocols (BGP, OSPF, SSH, TLS) against industry best practices.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Number of Employees
5,001-10,000 employees