JSR Services-posted 4 days ago
Full-time • Mid Level

The Information Security Technical Lead serves as the primary technical authority and strategic deputy to the CISO. This is a hands-on, multi-disciplinary role responsible for the architecture, implementation, and maintenance of the organization’s security posture. This role requires a hybrid skillset covering Security Operation, GRC (Governance, Risk, Compliance), Network Security, Cloud Security, and Incident Response. The successful candidate will act as the acting CISO in their absence, serving as the primary point of contact for internal/external auditors and leading the remediation of cyber risks.

  • Governance, Risk & Compliance (GRC)
  • Audit & Remediation: Act as the primary technical interface for internal and external audits. Provide evidence, track findings, and manage regulatory remediation efforts to completion.
  • Policy Enforcement: Enforce information security policies and network guidelines across the organization.
  • Risk Management: Track remediation of cyber risk findings for both internal systems and third-party vendors.
  • Reporting: support with the monthly security reviews, reports, and dashboards for executive leadership.
  • Network Security & Architecture
  • Infrastructure Defense: Manage FW rule creation, modification, and annual recertification. Oversee VPN configuration, NAC rules, and Web Filtering/WAF configurations.
  • Architecture: Conduct network architecture security reviews, design segmentation, and approve network changes.
  • Traffic Analysis: Manage IDS/IPS tuning, monitor for network traffic anomalies, and validate logging configurations for SIEM ingestion.
  • Maintenance: Perform regular maintenance and updates on security network devices.
  • Endpoint Security & Vulnerability Management
  • XDR & Hardening: Lead the deployment and triage of XDR (Workstations/Servers). Enforce hardening baselines and monitor for configuration drift.
  • Vulnerability Lifecycle: Execute vulnerability scanning and assessments (Server/Workstation) and oversee the patching process.
  • Device Management: Configure MDM policies, ensure compliance, and manage software installation approvals.
  • Tool Maintenance: Maintain security suites (AV, DLP, etc.) and perform tuning to reduce false positives.
  • Cloud Security
  • Cloud Posture: Perform cloud architecture security reviews and manage Cloud Security Posture Management (CSPM).
  • Configuration: Define and enforce cloud secure configurations, IAM roles/policies, and ensure proper log collection.
  • Threat Detection: Monitor cloud environments for threats and manage cloud-specific alerts.
  • Identity & Access Management (IAM) & Data Protection
  • Identity Lifecycle: Oversee provisioning/provisioning processes, Privileged Account Reviews, and IAM application maintenance.
  • Authentication: Implement and verify MFA enforcement and SSO configurations.
  • Data Security: Tune DLP rules, triage DLP alerts, apply data classification policies, and manage encryption keys.
  • App Security: Conduct security evaluations of vendor applications and review integration/implementation security.
  • Security Operations (SOC) & Incident Response
  • Incident Response: Lead alert triage, execute protection/response technical tasks, and generate post-incident reports.
  • Monitoring Oversight: Oversee the 24/7/365 monitoring operations (SOC) and ensure systems/devices are monitored daily.
  • Email Security: Manage email protection configurations and execute the Phishing Awareness Program.
  • Bachelor’s degree in Computer Science, Computer Engineer, Information Technology, or Cybersecurity.
  • 5+ years of hands-on experience in Information Security across multiple domains (Network, Endpoint, Cloud).
  • Proven experience interfacing with auditors and managing compliance frameworks.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service