Responsibilities:
1. Technology Scouting & Microsoft Security Product Focus
• Act as the primary lead for evaluating and deploying Microsoft Defender products (Defender for Endpoint, Defender for Office 365, Defender for Identity, Defender for Cloud Apps).
• Align Defender and broader Microsoft Security E5 capabilities with CSOC/CSIRT operational needs.
• Continuously monitor and assess Microsoft’s roadmap, product updates, and feature enhancements for security relevance.
• Evaluate emerging technologies beyond Microsoft where appropriate (e.g., threat intelligence platforms, SOAR enhancements, advanced analytics, etc.).
2. Technology Integration & Operational Enablement
• Lead and oversee the deployment and configuration of Microsoft Defender technologies to ensure optimal coverage and detection efficacy.
• Integrate Microsoft security products into existing SIEM (such as Microsoft Sentinel), SOAR, and other incident response workflows.
• Develop and optimize detection rules, policies, and playbooks aligned with the organization’s risk posture and compliance needs.
3. Security Policy & Control Implementation
• Define and enforce Microsoft E5 security policies, ensuring alignment with financial regulatory requirements (e.g., FFIEC, GDPR, SOX).
• Collaborate with security architects and GRC teams to ensure emerging technologies support security control objectives and audit requirements.
• Work closely with endpoint, email, and cloud security teams to align policies across diverse environments (on-prem, hybrid, cloud).
4. Incident Response Enablement
• Ensure incident response teams have effective visibility, telemetry, and automation capabilities through Microsoft Defender and E5 technologies.
• Develop enhanced response workflows using Defender capabilities (automated investigations, threat analytics, etc.).
• Provide technical leadership during major incidents where Microsoft security technology is central to investigation and containment.
5. Performance Monitoring & Continuous Optimization
• Define and track key performance indicators (KPIs) for Microsoft Defender product adoption, detection effectiveness, and response times.
• Conduct regular reviews to enhance detection coverage, reduce false positives, and streamline processes.
• Gather feedback from CSOC and CSIRT teams to continuously improve product configurations and operational workflows.
6. Stakeholder Collaboration & Governance
• Act as the primary liaison between the CSOC/CSIRT, Microsoft product teams, security engineering, and business stakeholders.
• Provide regular updates to executive leadership on Microsoft security product adoption, threat landscape coverage, and technology ROI.
• Ensure alignment between technology adoption, regulatory requirements, and financial sector-specific securitystandards. DecisioningAuthority: Technologies Integrations Manager – CSOC & Cyber Security Incident Response
Own (Direct Decisioning Authority)
1. Technology Selection & Proof of Concept Execution
• Final decision on which emerging technologies (tools, features, capabilities) will be evaluated for CSOC/CSIRT use cases.
• Direct ownership of proof of concept (PoC) design, evaluation criteria, and outcome recommendations.
2. Defender & E5 Policy Tuning (Operational Level)
• Authority to create, adjust, and optimize Microsoft Defender and E5 security policies, detection rules, and automated response actions within predefined risk tolerances.
• Adjust detection rules, investigation playbooks, and automated actions based on real-time operational feedback.
3. Tool & Technology Configuration
• Owns initial configuration and tuning of Microsoft Defender technologies (MDE, MDO, MDI, etc.) in alignment with security policy.
• Authority to deploy new detections, correlation rules, and automation playbooks in SIEM/SOAR (e.g., Microsoft Sentinel or Splunk).
4. Operational Playbook Development
• Authority to develop and mandate playbooks that govern how CSOC/CSIRT staff engage with new technologies, particularly Microsoft Defender products.
• Authority to modify these playbooks based on lessons learned from real incidents and exercises.
5. Incident Handling Enhancements (Technology-Driven)
• Direct decision-making authority over how new technologies (e.g., automated containment, Defender integrations) are used during incidents.
• Can direct CSOC/CSIRT teams to adopt new capabilities and workflows using Microsoft Defender and E5automation. DecisioningAuthority: Technologies Integrations Manager – CSOC & Cyber Security Incident ResponseOwn (Direct Decisioning Authority)
1. Technology Selection & Proof of Concept Execution
• Final decision on which emerging technologies (tools, features, capabilities) will be evaluated for CSOC/CSIRT use cases.
• Direct ownership of proof of concept (PoC) design, evaluation criteria, and outcome recommendations.
2. Defender & E5 Policy Tuning (Operational Level)
• Authority to create, adjust, and optimize Microsoft Defender and E5 security policies, detection rules, and automated response actions within predefined risk tolerances.
• Adjust detection rules, investigation playbooks, and automated actions based on real-time operational feedback.
3. Tool & Technology Configuration
• Owns initial configuration and tuning of Microsoft Defender technologies (MDE, MDO, MDI, etc.) in alignment with security policy.
• Authority to deploy new detections, correlation rules, and automation playbooks in SIEM/SOAR (e.g., Microsoft Sentinel or Splunk).
4. Operational Playbook Development
• Authority to develop and mandate playbooks that govern how CSOC/CSIRT staff engage with new technologies, particularly Microsoft Defender products.
• Authority to modify these playbooks based on lessons learned from real incidents and exercises.
5. Incident Handling Enhancements (Technology-Driven)
• Direct decision-making authority over how new technologies (e.g., automated containment, Defender integrations) are used during incidents.
• Can direct CSOC/CSIRT teams to adopt new capabilities and workflows using Microsoft Defender and E5 automation.
1. Technology Investment & Roadmap
• Strong influence over the security technology roadmap, particularly related to Defender product adoption, consolidation opportunities, and replacing legacy tools.
• Influence over budget recommendations for new tools or expanded licensing (e.g., adding E5 capabilities to additional business units).
2. Enterprise Security Policies (Governance Level)
• Collaborates with GRC, Security Architecture, and IT Governance teams to shape enterprise-wide security policies related to:
• Endpoint detection and response (EDR)
• Email security
• Identity protection (Conditional Access, Identity Protection policies)
• Cloud security controls (Defender for Cloud Apps, etc.)
• Provides expert input into security standards, baselines, and audit responses.
3. Risk Tolerance & Exceptions
• Provides technical risk assessments and influences decisions when business units request security exceptions, especially if exceptions involve relaxing E5 security policies (Conditional Access, DLP, etc.).
• Advises senior leadership on the operational impact of policy changes or risk acceptance decisions.
4. Vendor/Technology Strategy
• Strong influence over vendor relationships, particularly with Microsoft account teams, ensuring the organization’s feedback drives feature prioritization and roadmap alignment.
• Influence over whether third-party complementary technologies (like SOAR, threat intelligence platforms) should be retained or phased out in favor of native Microsoft capabilities.
5. Incident Response Process Governance
• Works closely with Incident Response leadership to influence:
• How emerging technologies (AI/ML, automation, etc.) are embedded into incident response.
• How Defender telemetry is prioritized for forensic investigation and reporting.
• How incident severity and prioritization criteria evolve to reflect technology capabilities (automated triage, risk-based scoring, etc.).
Please be advised that this job opportunity is subject to provincial regulation for employment purposes. It is imperative to acknowledge that each province or territory within the jurisdiction of Canada may have its own set of regulations, requirements.
If you’re interested in a specific career path or are looking to build certain skills, we want to help you succeed. You’ll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD – and we’re committed to helping you identify opportunities that support your goals.
We will provide training and onboarding sessions to ensure that you’ve got everything you need to succeed in your new role.
משרות נוספות שיכולות לעניין אותך