About the Job
- Advanced Technical Support & Escalation Management: Serve as the final escalation point for complex incidents across all data and endpoint security technologies. Conduct in-depth troubleshooting and root cause analysis, and implement long-term corrective measures.
- System Design, Configuration & Optimization: Architect and optimize security configurations for data protection and endpoint defense solutions. Oversee the design, implementation, and maintenance of security policies and procedures for all supported technologies, ensuring integration with broader IT and security frameworks.
- Incident Response & Continuous Improvement: Lead the response to critical security events and drive post-incident reviews. Develop strategies to proactively mitigate emerging threats and system vulnerabilities.
- Technical Leadership & Mentorship: Mentor L2 engineers and junior staff by providing technical guidance, training, and documentation of advanced procedures. Collaborate with cross-functional teams to evaluate emerging technologies and process improvements.
- Governance & Compliance: Ensure that all security operations align with industry standards, regulatory requirements, and organizational policies. Participate in audits, risk assessments, and compliance reviews.
Required Qualifications:
- Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- 7+ years of experience in security engineering, with a focus on both data and endpoint security.
- Demonstrated expertise with the following technologies:
- Data Security: DLP/NDLP, DRM, Database Activity Monitoring, Data Masking & Encryption, Data Classification, File Integrity Monitoring, Watermark Solutions, Removable Media Protection.
- Endpoint Security: Antivirus & Sandboxing, Endpoint Detection and Response, NextThink.
- Proven ability to lead incident response efforts and complex troubleshooting.
- Excellent analytical, problem-solving, and communication skills.
Desired Skills & Certifications:
- Advanced security certifications (e.g., CISSP, CISM, or equivalent).
- Vendor-specific certifications relevant to data and endpoint security solutions.
- Experience with ITIL processes, risk management, and change management.
Working Conditions:
- Full-time role with standard hours and potential on-call responsibilities.
- Fast-paced, high-pressure environment with opportunities for global collaboration.
- Occasional extended hours during critical incidents or scheduled maintenance.
At DXC Technology, we prioritize strong connections and community as key to our success. Our work model focuses on in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We are committed to fostering an inclusive environment where everyone can thrive.