• About Us

    StonyPoint Overview

    Learn more about our organization.

    Inclusion

    Leadership

    Life At StonyPoint

    Locations

    Mission and Values

    Who We Are

    Webinars

  • Services

    Services we offer at Stonypoint

    • Core Offerings
    • Security Operations & Transformation
    • Network & Perimeter Security
    • Cloud Security
    • Identity & Access Management
    • Application & Code Security
    • Compliance & Regulatory
    • Cybersecurity Consulting
    • Risk Mitigation Strategies
    • Security Insights
    • Cybersecurity Program Assessments
    • Vulnerability Assessments
    • Incident Response Tabletop Simulations
    • Pen Testing And Cloud Readiness
    • Zero Trust
    • Security Engineering
    • Application & ERP Security
    • Device Intelligence
    • Passwordless Authentication
    • SOAR & SIEM
    • Threat Detection & Response
    • Digital Forensics
    • DevSecOps and Code Security
    • Infra as Code Scanning
    • Policy as Code & Service Mesh
    • Endpoint Detection & Response (EDR)
    • Threat Intelligence
    • Intrusion Detection & Prevention
    • Incident Response
    • ZTNA/OT/IOT/DNS Security
    • Cloud Workload Protection
    • Security Posture Management (SSPM, CSPM)
    • Data Security Posture Mgt – DSPM
    • Sec Config Mgt –SecCM
    • Container Security & Kubernetes
    • API Security
    • Access Broker / SASE
    • CIEM – Cloud Identity & Entitlement Management
    • Security Logging & Monitoring
    • PAM & PIM
    • Privilege security endpoint mgt
    • CIAM – Customer Identity & Access Mgt
    • Identity Identification Verfication
    • Identity Assurance
    • Access Management Solutions
    • Identity Fabric
    • Security policy as a Service
    • Identity As a Service
    • Identity Orchestration
    • Identity Verification & Step Up Authentication
    • Password Mgt
    • Identity Governance and Administration (IGA)
    • Employee Onboarding & JMLT
    • Contractor/Partner Onboarding and Risk Mgt/BYOD
    • Authorization as a Service
    • DevSecOps
    • Infrastructure as Code Scanning
    • API & Web Application Security
    • GDPR, CCPA, LGPD
    • Industry Certifications (ISO, CMMC, etc.)
    • Cyber Insurance & Security Policy

    See all Services we offer at Stonypoint

  • Solutions

    Stonypoint Tailored Solutions

    • Data Security & Governance
    • Governance & Compliance
    • Endpoint & Remote Security
    • Database Security
    • GRC Solutions
    • Data Discovery & Classification
    • Data Loss Prevention (LP)
    • Data Lifecycle Management (DLM)
    • Privilege Access Certifications & Attestations
    • Governance, Risk, & Compliance (GRC)
    • Secrets and Keys Mgt
    • IT Audits & Risk Assessments
    • Ransomware Protection
    • Endpoint Management
    • Secure BYOD / Remote Access

    Comprehensive Cybersecurity Solutions Tailored to Your Needs

  • Industries Served

    StonyPoint Overview

    Learn more about our organization.

    Banking

    Consulting

    Healthcare

    Manufacturing

    Bio Pharma

    Public Sector

    Software Companies

    Insurance

    Investment Management & Financial Services

    Energy and Utilities

    Others

  • Resources

    Resources

    Webinars

    White Paper

    Case Studies

    Stonypoint Overview

    Your Partner in Advanced Cybersecurity consulting

  • Careers

    Search Jobs

    Find open positions at StonyPoint

    Careers Home

    Experienced Hires

    Students & Graduates

    Meet Our People

    Making An Impact

    Your Well-Being

  • About Us

    StonyPoint Overview

    Learn more about our organization.

    Inclusion

    Leadership

    Life At StonyPoint

    Locations

    Mission and Values

    Who We Are

    Webinars

  • Services

    Services we offer at Stonypoint

    • Core Offerings
    • Security Operations & Transformation
    • Network & Perimeter Security
    • Cloud Security
    • Identity & Access Management
    • Application & Code Security
    • Compliance & Regulatory
    • Cybersecurity Consulting
    • Risk Mitigation Strategies
    • Security Insights
    • Cybersecurity Program Assessments
    • Vulnerability Assessments
    • Incident Response Tabletop Simulations
    • Pen Testing And Cloud Readiness
    • Zero Trust
    • Security Engineering
    • Application & ERP Security
    • Device Intelligence
    • Passwordless Authentication
    • SOAR & SIEM
    • Threat Detection & Response
    • Digital Forensics
    • DevSecOps and Code Security
    • Infra as Code Scanning
    • Policy as Code & Service Mesh
    • Endpoint Detection & Response (EDR)
    • Threat Intelligence
    • Intrusion Detection & Prevention
    • Incident Response
    • ZTNA/OT/IOT/DNS Security
    • Cloud Workload Protection
    • Security Posture Management (SSPM, CSPM)
    • Data Security Posture Mgt – DSPM
    • Sec Config Mgt –SecCM
    • Container Security & Kubernetes
    • API Security
    • Access Broker / SASE
    • CIEM – Cloud Identity & Entitlement Management
    • Security Logging & Monitoring
    • PAM & PIM
    • Privilege security endpoint mgt
    • CIAM – Customer Identity & Access Mgt
    • Identity Identification Verfication
    • Identity Assurance
    • Access Management Solutions
    • Identity Fabric
    • Security policy as a Service
    • Identity As a Service
    • Identity Orchestration
    • Identity Verification & Step Up Authentication
    • Password Mgt
    • Identity Governance and Administration (IGA)
    • Employee Onboarding & JMLT
    • Contractor/Partner Onboarding and Risk Mgt/BYOD
    • Authorization as a Service
    • DevSecOps
    • Infrastructure as Code Scanning
    • API & Web Application Security
    • GDPR, CCPA, LGPD
    • Industry Certifications (ISO, CMMC, etc.)
    • Cyber Insurance & Security Policy

    See all Services we offer at Stonypoint

  • Solutions

    Stonypoint Tailored Solutions

    • Data Security & Governance
    • Governance & Compliance
    • Endpoint & Remote Security
    • Database Security
    • GRC Solutions
    • Data Discovery & Classification
    • Data Loss Prevention (LP)
    • Data Lifecycle Management (DLM)
    • Privilege Access Certifications & Attestations
    • Governance, Risk, & Compliance (GRC)
    • Secrets and Keys Mgt
    • IT Audits & Risk Assessments
    • Ransomware Protection
    • Endpoint Management
    • Secure BYOD / Remote Access

    Comprehensive Cybersecurity Solutions Tailored to Your Needs

  • Industries Served

    StonyPoint Overview

    Learn more about our organization.

    Banking

    Consulting

    Healthcare

    Manufacturing

    Bio Pharma

    Public Sector

    Software Companies

    Insurance

    Investment Management & Financial Services

    Energy and Utilities

    Others

  • Resources

    Resources

    Webinars

    White Paper

    Case Studies

    Stonypoint Overview

    Your Partner in Advanced Cybersecurity consulting

  • Careers

    Search Jobs

    Find open positions at StonyPoint

    Careers Home

    Experienced Hires

    Students & Graduates

    Meet Our People

    Making An Impact

    Your Well-Being

Contact Sales

Jobs

Filter by

Security Transformation Lead – Senior Manager

More Details

Senior Security Architect

More Details

GCP Data Engineer (Security)

More Details

Leading Cybersecurity Solutions & Consultation strategies.

Protecting businesses with cutting-edge cybersecurity solutions and expert consultation.

Google Reviews

Company

  • About Us
  • Services
  • Solutions
  • Insustries Served
  • Case Studies
  • Careers

Services

  • Core Offerings
  • Security Operations & Transformation
  • Network & Perimeter Security
  • Cloud Security
  • Identity & Access Management
  • Application & Code Security
  • Compliance & Regulatory

Solutions

  • Data Security & Governance
  • Governance & Compliance
  • Endpoint & Remote Security

Policies & Legal Notices

  • Terms & Conditions
  • Privacy Policy
  • Cookie Preferences
  • Do not sell or share my personal information
  • Accessibility information
  • Privacy Request

Copyright © 2026 StonyPoint | Powered by StonyPoint

StonyPoint
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}