Drive modernization of DLP and Identity Defense capabilities, identifying opportunities to enhance, expand, or rationalize existing platforms
Lead exploration and evaluation of emerging technologies, tools, and techniques to address evolving data loss and identity‑based threats
Assess and recommend new vendors and products, developing clear problem statements, options analysis, and business cases
Shape future‑state architectures for identity‑centric threat defense and data protection, including ITDR‑aligned capabilities
Lead initiatives to increase automation, reduce manual effort, and improve detection signal quality across DLP and identity workflows
Leverage AI, machine learning, behavioral analytics, and advanced data analysis to enhance prevention, detection, and decision‑making
Perform advanced analysis and investigation of identity‑based attacks and data misuse scenarios, including account takeover, privilege escalation, insider risk, and anomalous behavior
Help govern and optimize security technologies such as DLP platforms, MFA, identity verification, IGA, behavioral analytics, and ITDR‑adjacent controls
Drive complex, multi‑phase initiatives from concept through execution, including planning, delivery, risk management, and stakeholder communication.
Requirements
8+ years of experience in cybersecurity, with strong depth in Data Loss Prevention, Identity Security, or adjacent protection domains
Proven experience driving large‑scale or transformational security initiatives from ideation to execution as an individual contributor
Strong understanding of modern DLP and identity defense architectures, including cloud, endpoint, email, collaboration, and SaaS environments
Hands‑on experience investigating identity‑centric attacks and data misuse scenarios, with a solid grasp of attacker TTPs
Demonstrated ability to improve operational efficiency through automation, orchestration, and workflow optimization
Experience evaluating and integrating new security technologies and vendors into complex enterprise environments
Ability to operate independently, manage ambiguity, and drive outcomes without a people‑manager remit
Excellent communication skills, with the ability to translate complex technical topics into clear, actionable guidance.
Tech Stack
Cloud
Cyber Security
Benefits
Employees are eligible for an annual discretionary award based on their overall individual performance results and behaviors