Responsibilities:Lead and actively participate in security incident detection, investigation, and response across endpoint, identity, cloud, and SaaS environments including hands-on alert triage, log analysis, and threat intelligence reviewLead incident response coordination with Legal, HR, Compliance, and Communications; own post-incident reviews and drive continuous improvement of response processesEstablish and track key operational metrics (MTTD, MTTR, incident trends) and continuously tune detection rules, playbooks, and SOAR automation to reduce noise and improve signal fidelityOwn and mature the Microsoft security ecosystem - Defender XDR, Microsoft Sentinel (SIEM/SOAR), and Purview - driving integration, automation, and unified detection and response across the environmentDesign and optimize security controls across endpoint (EDR/XDR), identity (Entra ID, MFA, Conditional Access), Azure, AWS, and SaaS applications; lead vulnerability management operations including scanning, prioritization, and remediation trackingConsume and operationalize threat intelligence, integrating indicators into Sentinel detection rules; develop SOAR playbooks via Logic Apps to reduce manual effort and accelerate responseInitially operate as a hands-on individual contributor while building and mentoring a team of 2 security engineers over the next 3–4 months; provide technical guidance and escalation support on complex issuesEnsure effective prioritization and coverage across security operations, fostering a culture of operational discipline, continuous learning, and security awarenessExecute against the cybersecurity roadmap in alignment with business objectives; identify control gaps and implement scalable, practical improvements aligned with the organization's risk tolerancePartner with Legal, Compliance, and IT to support audits, risk assessments, and regulatory requirements including NIST CSF 2.0, ISO 27001, SOC 2, and HIPAA; contribute to security policy development and enforcementSupport third-party risk management, vendor security evaluations, and security platform consolidation efforts to reduce complexity and operational costQualifications:Bachelor’s degree in Information Security, Computer Science, or related field8+ years of progressive cybersecurity experience, with strong focus on security operations and engineering or equivalent experienceProven hands-on experience with the Microsoft security stack: Defender for Endpoint, Defender for Identity, Defender for Office 365, and Microsoft SentinelDemonstrated experience with identity and access management: Microsoft Entra ID, MFA, Conditional Access, and Privileged Identity Management (PIM)Cloud security experience in Azure (required) and AWS (a plus); ability to monitor and respond to threats across hybrid cloud environmentsExperience leading or building security operations programs including SIEM, vulnerability management, and security automation in an enterprise environmentFamiliarity with compliance frameworks including NIST CSF, ISO 27001, SOC 2, and HIPAAPrior experience in a player-coach capacity — comfortable both leading a team and rolling up sleeves on technical executionStrong communication skills with the ability to translate technical risk into business impact for executive and non-technical audiencesRelevant certifications preferred (CISSP, CISM, CRISC, CCSP, GCIH, etc.)The anticipated annualized base pay range for this full-time position is $167,000 - $205,000 Ardelyx utilizes industry data to ensure that our compensation is competitive and aligned with our industry peers. The ideal candidate brings deep technical expertise, operational discipline, and practical leadership, with the ability to communicate effectively with executives, auditors, engineers, and cross-functional teams.