As a Cybersecurity Engineer at rag & bone, your primary areas of focus include Access Management, Security Awareness, and Endpoint Protection. You play a crucial role in fortifying our organization against cyber threats by utilizing your proficiency in Privileged Access Management (PAM) solutions, extended Detection and Response (XDR) platforms, and awareness initiatives. Your responsibilities encompass designing, implementing, overseeing, and enhancing a comprehensive cybersecurity framework to shield our infrastructure, data, and systems from unauthorized breaches and malicious activities. Working closely with rag & bone's infrastructure, support and delivery teams, you ensure that security considerations are integrated from the inception of any development process and are a top priority for rag & bone. Your direct reporting line is to the rag & bone Director, IT.
Privileged Access Management
- Develop and implement PAM strategies, policies, and procedures to ensure secure management and monitoring of privileged accounts and access rights.
- Configure, deploy, and maintain PAM solutions to enforce least privilege access, session monitoring, and password vaulting.
- Conduct regular reviews and audits of privileged access controls to identify and mitigate potential security risks.
- Provide technical guidance and support to system administrators and IT teams on PAM best practices and usage.
Employee Awareness Program
- Develop and implement an employee awareness program to raise employee understanding of cyber threats.
- In collaboration with the support team, periodically test employee awareness using targeted campaign.
- In collaboration with the support team, deliver targeted Cybersecurity trainings.
- Write and publish corporate cybersecurity newsletter.
Vulnerability Assessment Management
- Maintain rag & bone vulnerability platform and audit it periodically to ensure all rag & bone assets are covered
- Prioritize vulnerabilities and work with the infrastructure team for their remediations.
Endpoint protection
- In collaboration with the infrastructure and support team, prepare the deployment and configuration of future rag & bone XDR platform.
- Monitor XDR alerts and incidents, investigate security incidents, and coordinate response activities to mitigate threats effectively.
- Stay updated with the latest features, capabilities, and threat intelligence and ensure optimal utilization of the XDR platform.
Security Architecture and Design
- Assist in the design and implementation of security architecture, including network segmentation, endpoint protection, and data encryption, with a focus on PAM and XDR integration.
- Evaluate new security technologies, tools, and solutions related to PAM and XDR, and make recommendations for their adoption based on organizational needs and security requirements.
Documentation and Reporting
- Maintain comprehensive documentation of PAM configurations, XDR deployments, security incidents, and related procedures.
- Generate regular reports on PAM activities, XDR alerts, incident response metrics, and security posture for stakeholders and management review.
- Bachelor’s degree in computer science, Information Technology, Cybersecurity, or related field.
- Professional certifications such as CISSP, CISM, CISA, or equivalent, are highly desirable.
- Proven experience in designing, implementing, and managing Privileged Access Management (PAM) solutions like CyberArk or BeyondTrust in enterprise environments.
- Hands-on experience with XDR platform, including CrowdStrike Falcon X, Falcon Endpoint Protection, and CrowdStrike Threat Graph.
- Strong understanding of cybersecurity principles, threat landscape, and attack vectors.
- Excellent analytical and problem-solving skills with the ability to troubleshoot complex security issues.
- Effective communication skills with the ability to articulate technical concepts to non-technical stakeholders.
- Experience working in SOC or incident response teams is a plus.
- Familiarity with regulatory compliance requirements (e.g., GDPR, PCI DSS) related to privileged access and endpoint security.