IT Security Lead (Endpoint Security and Identity)
Veröffentlicht:
21 Dezember 2024Pensum:
100%- Arbeitsort:Zurich
In short
In the dynamic landscape of On, the tech thrives much like a spirited runner: always moving, always improving. We are building technology that continues to supercharge the growth of On, helping to ignite the human spirit through movement.
As an integral part of the Information Security team at On, you'll find yourself at the heart of a fast-paced, diverse environment. Our ecosystem thrives on collaboration — a confluence of curious minds challenging and learning from one another, always seeking the uncharted. Here, we venture into new territories of technology and security, continuously refining our approach and embracing challenges head-on.
Your role will be pivotal in building synergies, reducing complexities, and prioritising essential work areas that further On's mission.As a strategic leader you will shape and drive the organization's approach to securing access and defending endpoints by combining advanced Endpoint Security strategies, Zero Trust principles and Identity and Access Management solutions, ensuring a secure and resilient IT environment.
Your Mission
- Design and Implement Advanced Endpoint Security Strategies with technologies like EPP and EDR safeguarding against malware, phishing and zero-day threats. Collaborate closely with SOC and Detection Engineering teams to define and refine detection rules, ensuring robust and proactive endpoint security
- Oversee Endpoint Integration processes to ensure interoperability across security and IT systems
- Monitor and Enforce Endpoint Security Compliance with internal policies and regulatory requirements
- Partner with the IT Security IAM Lead by developing and optimizing the IAM framework to ensure secure and seamless access across the organization. Drive the adoption of modern IAM technologies and best practices to enhance user experience while reducing risk
- Collaborate with stakeholders to design and implement role-based access controls, enforcing least-privilege principles, and strengthen Privileged Access Management (PAM) by deploying advanced tools, establishing secure provisioning processes, and managing the lifecycle of critical accounts
- Training and Mentoring: Providing training and mentoring to team members, fostering a culture of learning and knowledge sharing within the organisation
Kontakt
On AG