
Transformational Lead - Data Loss Prevention & Identity Defense
Stryker Corporation, Grand Junction, CO, United States
Transformational Lead - Data Loss Prevention (DLP) & Identity Defense
The Transformational Lead is a senior individual contributor responsible for driving innovation, modernization, and operational maturity across the organization's data protection and identity‑centric threat defense capabilities. Positioned within Cyber Security Operations (CSO), the role focuses on leading emerging technology initiatives that expand and enhance existing security platforms while exploring and evaluating new tools, vendors, and techniques.
Key Responsibilities
Drive modernization of DLP and Identity Defense capabilities, identifying opportunities to enhance, expand, or rationalize existing platforms.
Lead exploration and evaluation of emerging technologies, tools, and techniques to address evolving data loss and identity‑based threats.
Assess and recommend new vendors and products, developing clear problem statements, options analysis, and business cases.
Shape future‑state architectures for identity‑centric threat defense and data protection, including ITDR‑aligned capabilities.
Lead initiatives to increase automation, reduce manual effort, and improve detection signal quality across DLP and identity workflows.
Leverage AI, machine learning, behavioral analytics, and advanced data analysis to enhance prevention, detection, and decision‑making.
Partner with engineering, SOAR, and platform teams to embed automation and orchestration into end‑to‑end security workflows.
Focus on capacity creation by reducing noise, streamlining response paths, and improving analyst effectiveness.
Perform advanced analysis and investigation of identity‑based attacks and data misuse scenarios, including account takeover, privilege escalation, insider risk, and anomalous behavior.
Apply deep understanding of attacker TTPs, identity abuse patterns, and data exfiltration techniques to evolve detections and mitigations.
Help govern and optimize security technologies such as DLP platforms, MFA, identity verification, IGA, behavioral analytics, and ITDR‑adjacent controls.
Collaborate with detection engineering to continuously refine use cases, logic, and coverage.
Stay current on emerging threats, attacker techniques, and industry trends related to identity compromise and data protection.
Translate threat intelligence and risk insights into actionable controls, roadmap enhancements, and mitigation strategies.
Support alignment of DLP and identity controls to enterprise policy and external standards (NIST, ISO, MITRE, GDPR).
Inspect and challenge existing controls to strengthen risk posture and operational discipline.
Drive complex, multi‑phase initiatives from concept through execution, including planning, delivery, risk management, and stakeholder communication.
Establish clear success metrics, milestones, and outcomes for transformation efforts.
Influence across organizational boundaries to align priorities, sequencing, and execution without formal authority.
Contribute to the definition and maintenance of KRIs and operational metrics for DLP and identity defense effectiveness.
Deliver concise, executive‑ready insights that clearly articulate risk posture, trade‑offs, and impact.
Required Qualifications & Skills
8+ years of experience in cybersecurity, with strong depth in Data Loss Prevention, Identity Security, or adjacent protection domains.
Proven experience driving large‑scale or transformational security initiatives from ideation to execution as an individual contributor.
Strong understanding of modern DLP and identity defense architectures, including cloud, endpoint, email, collaboration, and SaaS environments.
Hands‑on experience investigating identity‑centric attacks and data misuse scenarios, with a solid grasp of attacker TTPs.
Demonstrated ability to improve operational efficiency through automation, orchestration, and workflow optimization.
Experience evaluating and integrating new security technologies and vendors into complex enterprise environments.
Ability to operate independently, manage ambiguity, and drive outcomes without a people‑manager remit.
Excellent communication skills, with the ability to translate complex technical topics into clear, actionable guidance.
Desired Qualifications
Experience with AI/ML‑powered security tools, such as user behavior analytics, intelligent data classification, or adaptive controls.
Background in IAM, privileged access management, fraud, insider risk, or ITDR.
Familiarity with SOAR platforms, policy orchestration, or low
o‑code automation tools.
Experience operating in large, matrixed enterprises with hybrid and cloud‑first architectures.
Strong strategic thinking with the ability to translate vision into practical, phased roadmaps.
Prior exposure to regulatory, risk, or compliance considerations related to data protection and identity security.
Advanced degree in Information Security, Computer Science, Engineering, or equivalent experience.
Skills
Cyber Security
Data Privacy and Protection
Problem Solving
Process Management
Threat Analysis
Access and Identity Management
Business Acumen
Interpret Relevant Laws, Rules, and Regulations
Risk Analytics
Stakeholder Management
Data Governance
Data and Trend Analysis
Incident Management
Information Systems Management
Technology System Assessment
Compensation & Benefits
Pay: $140,000.00 - $200,000.00 annualized salary, offers determined based on experience, education and skill set.
Discretionary incentive: Eligible for annual discretionary award based on individual performance.
Benefits: Eligible for industry‑leading benefits, paid time off, resources and support.
Shift: 1st shift (United States).
Hours per week: 40.
#J-18808-Ljbffr
The Transformational Lead is a senior individual contributor responsible for driving innovation, modernization, and operational maturity across the organization's data protection and identity‑centric threat defense capabilities. Positioned within Cyber Security Operations (CSO), the role focuses on leading emerging technology initiatives that expand and enhance existing security platforms while exploring and evaluating new tools, vendors, and techniques.
Key Responsibilities
Drive modernization of DLP and Identity Defense capabilities, identifying opportunities to enhance, expand, or rationalize existing platforms.
Lead exploration and evaluation of emerging technologies, tools, and techniques to address evolving data loss and identity‑based threats.
Assess and recommend new vendors and products, developing clear problem statements, options analysis, and business cases.
Shape future‑state architectures for identity‑centric threat defense and data protection, including ITDR‑aligned capabilities.
Lead initiatives to increase automation, reduce manual effort, and improve detection signal quality across DLP and identity workflows.
Leverage AI, machine learning, behavioral analytics, and advanced data analysis to enhance prevention, detection, and decision‑making.
Partner with engineering, SOAR, and platform teams to embed automation and orchestration into end‑to‑end security workflows.
Focus on capacity creation by reducing noise, streamlining response paths, and improving analyst effectiveness.
Perform advanced analysis and investigation of identity‑based attacks and data misuse scenarios, including account takeover, privilege escalation, insider risk, and anomalous behavior.
Apply deep understanding of attacker TTPs, identity abuse patterns, and data exfiltration techniques to evolve detections and mitigations.
Help govern and optimize security technologies such as DLP platforms, MFA, identity verification, IGA, behavioral analytics, and ITDR‑adjacent controls.
Collaborate with detection engineering to continuously refine use cases, logic, and coverage.
Stay current on emerging threats, attacker techniques, and industry trends related to identity compromise and data protection.
Translate threat intelligence and risk insights into actionable controls, roadmap enhancements, and mitigation strategies.
Support alignment of DLP and identity controls to enterprise policy and external standards (NIST, ISO, MITRE, GDPR).
Inspect and challenge existing controls to strengthen risk posture and operational discipline.
Drive complex, multi‑phase initiatives from concept through execution, including planning, delivery, risk management, and stakeholder communication.
Establish clear success metrics, milestones, and outcomes for transformation efforts.
Influence across organizational boundaries to align priorities, sequencing, and execution without formal authority.
Contribute to the definition and maintenance of KRIs and operational metrics for DLP and identity defense effectiveness.
Deliver concise, executive‑ready insights that clearly articulate risk posture, trade‑offs, and impact.
Required Qualifications & Skills
8+ years of experience in cybersecurity, with strong depth in Data Loss Prevention, Identity Security, or adjacent protection domains.
Proven experience driving large‑scale or transformational security initiatives from ideation to execution as an individual contributor.
Strong understanding of modern DLP and identity defense architectures, including cloud, endpoint, email, collaboration, and SaaS environments.
Hands‑on experience investigating identity‑centric attacks and data misuse scenarios, with a solid grasp of attacker TTPs.
Demonstrated ability to improve operational efficiency through automation, orchestration, and workflow optimization.
Experience evaluating and integrating new security technologies and vendors into complex enterprise environments.
Ability to operate independently, manage ambiguity, and drive outcomes without a people‑manager remit.
Excellent communication skills, with the ability to translate complex technical topics into clear, actionable guidance.
Desired Qualifications
Experience with AI/ML‑powered security tools, such as user behavior analytics, intelligent data classification, or adaptive controls.
Background in IAM, privileged access management, fraud, insider risk, or ITDR.
Familiarity with SOAR platforms, policy orchestration, or low
o‑code automation tools.
Experience operating in large, matrixed enterprises with hybrid and cloud‑first architectures.
Strong strategic thinking with the ability to translate vision into practical, phased roadmaps.
Prior exposure to regulatory, risk, or compliance considerations related to data protection and identity security.
Advanced degree in Information Security, Computer Science, Engineering, or equivalent experience.
Skills
Cyber Security
Data Privacy and Protection
Problem Solving
Process Management
Threat Analysis
Access and Identity Management
Business Acumen
Interpret Relevant Laws, Rules, and Regulations
Risk Analytics
Stakeholder Management
Data Governance
Data and Trend Analysis
Incident Management
Information Systems Management
Technology System Assessment
Compensation & Benefits
Pay: $140,000.00 - $200,000.00 annualized salary, offers determined based on experience, education and skill set.
Discretionary incentive: Eligible for annual discretionary award based on individual performance.
Benefits: Eligible for industry‑leading benefits, paid time off, resources and support.
Shift: 1st shift (United States).
Hours per week: 40.
#J-18808-Ljbffr