Job Summary:We are seeking a highly skilled and experienced cybersecurity professional to lead and manage our organization's information security strategy. The ideal candidate will possess strong technical knowledge, leadership abilities, and a proactive approach to risk mitigation and incident response.Key Responsibilities: Develop, implement, and monitor comprehensive security strategies and policies. Lead security incident response and investigations, including root cause analysis and mitigation. Manage and improve SIEM systems, endpoint protection, IDS/IPS, firewalls, and threat intelligence platforms. Conduct risk assessments, vulnerability assessments, and penetration testing. Ensure compliance with frameworks such as ISO 27001, NIST, GDPR, or HIPAA. Work with DevOps and cloud teams to secure infrastructure (e.g., AWS, Azure). Mentor and guide junior security staff and coordinate with external vendors. Manage audits, assessments, and security awareness training programs. Keep abreast of evolving cyber threats, zero-day vulnerabilities, and threat actor tactics.Required Skills and Qualifications: 7+ years of experience in cybersecurity, information security, or related roles. Strong knowledge of networking, encryption, identity & access management, and application security. Experience with tools such as Splunk, Nessus, Burp Suite, Metasploit, Wireshark, Palo Alto, or CrowdStrike. Familiarity with compliance standards like ISO 27001, NIST, PCI DSS, SOC 2. Experience with incident handling, forensic analysis, and threat modeling. Ability to write and present reports to technical and executive stakeholders. Excellent analytical, problem-solving, and communication skills.Job Types: Full-time, Part-time, Permanent, Contractual / Temporary, FreelanceBenefits: Work from homeSchedule: Day shift Evening shift Monday to Friday Morning shift Night shift UK shift US shiftWork Location: Remote,
Sign-in & see how your skills match this job
Sign-in & Get noticed by top recruiters and get hired fast
network security, security management, network engineering, security analysis, network administration,
VAPT, Burp Suite, Splunk, Programming Languages, Database, Networking,Pen Test, Wire shark
network security, security management, network engineering, security analysis, network administration,
VAPT, Burp Suite, Splunk, Programming Languages, Database, Networking,Pen Test, Wire shark