**Key Responsibilities**:
- ** Advanced Technical Support & Escalation Management**:
- Serve as the final escalation point for complex incidents across all data and endpoint security technologies.
- Conduct in-depth troubleshooting and root cause analysis, and implement long-term corrective measures.
- ** System Design, Configuration & Optimization**:
- Architect and optimize security configurations for data protection and endpoint defense solutions.
- Oversee the design, implementation, and maintenance of security policies and procedures for all supported technologies.
- Ensure integration with broader IT and security frameworks.
- ** Incident Response & Continuous Improvement**:
- Lead the response to critical security events and drive post-incident reviews.
- Develop strategies to proactively mitigate emerging threats and system vulnerabilities.
- ** Technical Leadership & Mentorship**:
- Mentor L2 engineers and junior staff by providing technical guidance, training, and documentation of advanced procedures.
- Collaborate with cross-functional teams to evaluate emerging technologies and process improvements.
- ** Governance & Compliance**:
- Ensure that all security operations align with industry standards, regulatory requirements, and organizational policies.
- Participate in audits, risk assessments, and compliance reviews.
• *Required Qualifications**:
- Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- 7+ years of experience in security engineering, with a focus on both data and endpoint security.
- Demonstrated expertise with the following technologies:
- Data Security: DLP/NDLP, DRM, Database Activity Monitoring, Data Masking & Encryption, Data Classification, File Integrity Monitoring, Watermark Solutions, Removable Media Protection
- Endpoint Security: Antivirus & Sandboxing, Endpoint Detection and Response, NextThink
- Proven ability to lead incident response efforts and complex troubleshooting.
- Excellent analytical, problem-solving, and communication skills.
• *Desired Skills & Certifications**:
- Advanced security certifications (e.g., CISSP, CISM, or equivalent).
- Vendor-specific certifications relevant to data and endpoint security solutions.
- Experience with ITIL processes, risk management, and change management.
• *Working Conditions**:
- Full-time role with standard hours and potential on-call responsibilities.
- Fast-paced, high-pressure environment with opportunities for global collaboration.
- Occasional extended hours during critical incidents or scheduled maintenance.
At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.