- Enhance the security operations to protect against sophisticated cyber threats across global operations.
- Deploy advanced tools to continuously assess the security posture of the corporation’s global IT infrastructure.
- Establish a centralised incident response team capable of rapid action and in-depth forensics analysis.
- Implement a state-of-the-art automation platform to enhance the efficiency and effectiveness of the security operations centre (SOC).
- Integrate cutting-edge threat intelligence solutions and conduct regular threat hunting exercises to proactively defend against potential attacks.
- Design a comprehensive identity management solution that covers all employees and contractors globally, ensuring strict access controls and monitoring.
18-24 months. This extensive timeline is required to thoroughly revamp security operations across multiple global locations.
- Program Owner (1): To provide overall leadership and strategic direction for the overhaul.
- Regional Agile Leads (4-5): To oversee implementation and coordination in different geographic regions.
- Cybersecurity Engineers (8-10): To develop and implement security solutions, including automation tools and incident response protocols.
- Threat Intelligence Analysts (3-4): To analyse threat data and provide insights for proactive measures.
- Identity and Access Management Architect (1): To design and implement a comprehensive identity management solution.
- Forensics Experts (2-3): To conduct investigations following incidents.
- Advanced cybersecurity software, including SIEM, endpoint protection, threat intelligence platforms, and identity management solutions.
- A robust communication network to ensure seamless coordination across various regions.