Job Description:Threats and Controls AssessmentHands-on experience in threat and vulnerability management within large-scale or regulated environmentsSkilled in analyzing complex architectures, systems, and networks to identify potential security gaps and implement effective controlsProficient in conducting thorough threat and control assessments across internal, external, and cloud environmentsExperienced in detecting threats across applications, databases, networks, and other IT infrastructure components2. Risk and ControlProficient in risk and control management practicesAbility to evaluate threats, controls, and vulnerabilities, and communicate findings to both technical and business stakeholdersSkilled in threat modeling and risk assessment, with the ability to define effective controls to enhance security postureWorking knowledge of risk management frameworks and security assessment methodologies3. Technical LeadershipProven experience working as a technical lead with ownership of process improvementsAbility to guide cross-functional teams, ensuring technical excellence and alignment with project goals4. Stakeholder Management & Soft SkillsExperience working in international and diverse environmentsStrong interpersonal skills for influencing and managing stakeholdersAbility to build strong relationships and collaborate effectively within and across teamsExcellent communication skills for coordinating with global infrastructure, application, and compliance teamsPositive attitude, strong teamwork, flexibility, and a solid understanding of emerging technologies and associated security threatsSkilled in preparing reports and presentations for senior management and delivering them to large audiences5. Tools and TechnologiesStrong experience in application design and architecture with expertise in network, host, and application security practicesProficient in working with cloud service providers such as AWS, GCP, and AzureStrong understanding of the Software Development Life Cycle (SDLC), with a focus on integrating security at each stageProven experience in driving continuous improvement and process optimization initiativeGood to Have:Prior experience in threat handling across IT infrastructure, including applications, databases, networks, and other componentsExperience leading continuous improvement initiatives and process optimizationPossession of one or more of the following certifications: CISSP, CISA, CISM, or Cloud Security CertificationsFamiliarity with regulatory security requirements across multiple jurisdictionsSkills:Threat, Risk, VulnerabilityAbout Company:UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to operation. With deep domain expertise and a future-proof philosophy, UST embeds innovation and agility into their clients’ organizations. With over 30,000 employees in 30 countries, UST builds for boundless impact—touching billions of lives in the process.