Management Information Systems, or related discipline, or equivalent work experience.
Communication Skills: Excellent communication and technical documentation skills, including the ability to discuss complex topics with both technical and executive stakeholders.
Compliance Standards: Knowledge of varying compliance standards and their relevance to regulated customers.
Demonstrate proficiency in a cybersecurity / compliance role within a SaaS organization
Security Tooling: Possess deep knowledge of security auditing and compliance tools such as Vulnerability scanners(Nessus), SIEM, EDRs, etc
Cloud Security: Have foundational knowledge of Cloud Security in AWS, IBM Cloud, or similar hyperscale's
Audit Support: Assist in security audits conducted by third parties and possess a working knowledge of compliance frameworks like ISO27001, PCI-DSS, SOC2, etc.
Secure Development Experience & Knowledge: Understand security controls into Secure SDLC to enhance security practice.
Issue Resolution: Troubleshoot, triage, and resolve security issues across Dev, Test, and Production environments.
Cross-Functional Collaboration: Engage with other business units to drive deployment and maintenance initiatives.
Team Collaboration: Collaborate with other teams to identify areas for improvement and opportunities.
Automation: Utilize scripting technologies like Python, Bash, and Ansible to automate deployment, configuration, and various compliance activities.
Technical: Python, JavaScript, Knowledge with Both SQL and NoSQL Database implementations, Microsoft toolchain.
Agile Methodologies: Solid understanding of the agile software. development life cycle, continuous integration, and continuous delivery.
Adaptability: Demonstrated willingness and aptitude for learning new skills.
Virtualization: Understanding of virtualization technologies such as VMWare, VirtualBox, Proxmox, etc.
Cloud Experience: Experience working with high availability, high-performance, multi-data center systems, multi cloud environments.
Technology Knowledge: Knowledge of related technologies including encryption, IPsec, VLANs, VPNs, routing, firewalls, proxy services, LAN/WAN connectivity.