Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailNot Disclosed
Salary Not Disclosed
1 Vacancy
Job Description:
Key Responsibilities:
Advanced Technical Support & Escalation Management:
Serve as the final escalation point for complex incidents across all data and endpoint security technologies.
Conduct in-depth troubleshooting and root cause analysis and implement long-term corrective measures.
System Design Configuration & Optimization:
Architect and optimize security configurations for data protection and endpoint defense solutions.
Oversee the design implementation and maintenance of security policies and procedures for all supported technologies.
Ensure integration with broader IT and security frameworks.
Incident Response & Continuous Improvement:
Lead the response to critical security events and drive post-incident reviews.
Develop strategies to proactively mitigate emerging threats and system vulnerabilities.
Technical Leadership & Mentorship:
Mentor L2 engineers and junior staff by providing technical guidance training and documentation of advanced procedures.
Collaborate with cross-functional teams to evaluate emerging technologies and process improvements.
Governance & Compliance:
Ensure that all security operations align with industry standards regulatory requirements and organizational policies.
Participate in audits risk assessments and compliance reviews.
Required Qualifications:
Bachelors degree in Computer Science Information Technology Cybersecurity or a related field.
7 years of experience in security engineering with a focus on both data and endpoint security.
Demonstrated expertise with the following technologies:
Data Security: DLP/NDLP DRM Database Activity Monitoring Data Masking & Encryption Data Classification File Integrity Monitoring Watermark Solutions Removable Media Protection
Endpoint Security: Antivirus & Sandboxing Endpoint Detection and Response NextThink
Proven ability to lead incident response efforts and complex troubleshooting.
Excellent analytical problem-solving and communication skills.
Desired Skills & Certifications:
Advanced security certifications (e.g. CISSP CISM or equivalent).
Vendor-specific certifications relevant to data and endpoint security solutions.
Experience with ITIL processes risk management and change management.
Working Conditions:
Full-time role with standard hours and potential on-call responsibilities.
Fast-paced high-pressure environment with opportunities for global collaboration.
Occasional extended hours during critical incidents or scheduled maintenance.
At DXC Technology we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing productivity individual work styles and life circumstances. Were committed to fostering an inclusive environment where everyone can thrive.
Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services such as false websites or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process nor ask a job seeker to purchase IT or other equipment on our information on employment scams is availablehere.
Full-Time