What does it feel like to be a Senior Cybersecurity Engineer in Netcompany?
As a Senior Cybersecurity Engineer, you will join our highly skilled Cybersecurity Technology Department within the Information Security organization. Your role will focus on designing, implementing, and operating cybersecurity controls and solutions, ensuring the protection of systems, networks, and data across complex environments.
As a Senior Cybersecurity Engineer:
- Design, implement, and manage PAM solutions (e.g., Delinea) to secure privileged accounts and enforce least privileged principles
- Develop and maintain Identity & Access Management strategies, including role-based access control (RBAC) and identity lifecycle management
- Lead the design and deployment of Forcepoint DLP solutions across endpoints, network, and cloud environments
- Create and maintain data classification policies, content inspection rules, and incident response workflows
- Monitor and analyze DLP events, conducting investigations and recommending remediation actions
- Implement and administer Sealpath IRM to protect sensitive documents
- Develop policies for document classification, encryption, and access rights management
- Integrate PAM, IAM, DLP, and IRM solutions with enterprise systems (Active Directory, Microsoft 365, SharePoint, cloud platforms, SIEM)
- Deploy and manage auditing solutions (e.g., Netwrix Auditor) to monitor privileged access, file activity, and configuration changes
- Perform security configuration audits and compliance assessments aligned with international standards (ISO 27001, NIST, GDPR)
- Define and maintain security reporting on access control effectiveness, DLP incidents, data protection metrics, and audit findings
- Collaborate with Cloud Security and Infrastructure teams to embed security best practices into operational pipelines
- Stay ahead of evolving threats and techniques, evaluating and integrating new tools to enhance data protection capabilities
- Mentor junior team members and provide technical guidance on PAM, IAM, DLP, IRM, and auditing architectures