Role Overview: You will lead the design, implementation, and monitoring of enterprise-grade cybersecurity solutions with a strong emphasis on cloud security, zero trust architecture, and threat hunting. This role requires real-time incident response, red/blue teaming, and the integration of AI-powered SIEM/SOAR tools across multi-cloud and hybrid environments. Monitor and analyze network traffic for suspicious activity. Conduct regular vulnerability assessments and penetration testing. Implement and manage security tools (SIEM, DLP, antivirus, firewalls). Ensure compliance with cybersecurity standards (ISO 27001, NIST, GDPR). Respond to security incidents and coordinate incident response activities. Conduct security awareness training for employees. Work closely with infrastructure and application teams on secure design. Key Responsibilities: Implement Zero Trust Security frameworks (NIST 800-207) across enterprise systems. Design and manage Cloud-native security controls (AWS GuardDuty, Azure Sentinel, GCP SCC). Lead threat hunting and malware analysis using tools like Elastic Stack, Carbon Black, CrowdStrike Falcon. Develop custom detection rules and automation workflows in SOAR platforms (Cortex XSOAR, Splunk Phantom). Conduct advanced red/purple team simulations using MITRE ATT&CK, Atomic Red Team, and Cobalt Strike. Oversee security architecture reviews for containerized and serverless applications (Kubernetes, Fargate). Drive organization-wide compliance with ISO27001, NIST, CIS Controls, and MAS TRM. Technology Stack: SIEM/SOAR: Splunk, Sentinel, QRadar, Cortex XSOAR Threat Intel: MISP, Recorded Future, ThreatConnect Cloud Security: Prisma Cloud, Dome9, AWS WAF, Azure Defender Automation: Python, PowerShell, Terraform Certifications Preferred: CISSP, OSCP, GCIA, GCPN, AWS Security Specialty, CCSP Requirements: Bachelor's degree in Computer Science, Information Security, or equivalent. 7+ years of experience in cybersecurity or related field. Knowledge of network protocols, firewalls, IDS/IPS. Familiarity with tools like Splunk, Wireshark, Nessus, Metasploit.