Resource Solutions - GSC
*3 days working from London office* Manage the Cyber Test and Validation process, Support Cyber Risk Assessment and drive Cyber Assurance programme across the bank through: Conduct cyber assessment of projects helping to drive adoption of application and infrastructure security controls and best practices. Advise on leading edge engineering to protect the bank's network from security risks related to web, mobile, web services, and Client Server architectures. Conduct risk reviews of 3rd party systems and applications to assess the standard and proprietary application security controls used by the application (eg authentication, authorization, input validation, output sanitization, error handling, application resilience) against bank policies and standards. Work with different teams in various jurisdictions where specific technology and cybersecurity regulations create requirements that are not directly supported by our global framework. Drive implementation of security controls in various platforms by working with technology infrastructure teams. Demonstrate deep understanding, passion and thought leadership for Information and Cybersecurity and its impact of new technologies, services and solutions. Investigate, coordinate and address Information and Cybersecurity incidents Act as liaison for global team in coordinating collection and preservation of forensic evidence in support of security event investigation. Analyse potential infrastructure security incidents to determine if incident qualifies as a legitimate security breach. Collaborate with stakeholders to continually operate and improve a world-class cyber program by providing input into the uplift of sensory tools, detection tuning, and access to data sources to increase detection effectiveness. Convey complicated technical analysis to management via investigation synopses, graphical depictions of attacks, and comprehensive presentations. Act as a liaison to stakeholders, including those outside of the technology team(s), during security investigations and incidents Respond to regulatory requests regarding security incidents, as well as the relevant protective and detective security measures. Report the status of ongoing incidents, as well as the follow-up actions for resolved incidents to management Support Compliance, regulatory, or litigation related investigations by coordinating e-discovery, evidence collection and other such activities. Communicating status and risks in a succinct, direct and open manner for proper issue management life cycle tracking. Drafting responses to requests for information from regulators in the jurisdictions in which the bank operates Coordinating engagements with regulators, including periodic reporting, preparation of presentations and written deliverables Conducting analysis to identify potential gaps and issues from ongoing changes of regulatory requirement of relevance to the bank's business and risk environments Preparing presentations and written products on regulatory trends and issues to inform leadership decisions Coordinating with counterparts in other jurisdictions and regional stakeholders (eg Legal, Compliance, Preferred Qualifications and Experience A minimum of 10+ years of experience with a mix of Cybersecurity, Systems, Infrastructure, Network, and Cloud experience. Broad technical security skills in multiple technology areas such as applications deployments, endpoints, data, infrastructure, cloud, DNS, PKI, Email, OS (Windows, MAC,.NIX), SDN, encryption, forensics, authentication, Firewalls, proxies, identity and access control, BC/DR, remote access, and cryptography. Extensive experience in architecting and engineering complex security solutions utilizing and interpreting models to implement company policies, standards globally. Familiarity with techniques/methodologies such as "Attack and Defensive" methods, Threat Hunting, Threat modelling, Reverse engineering, Vulnerability Management, Data modelling, Evaluation of security products/services, Metrics development, etc. Proficiency and experience in automation and Scripting using Python, Shell, Ansible, Jenkins, etc. Demonstrated experience with utilizing and migrating to one or more cloud technologies such as Microsoft Azure, and AWS. Knowledge of Google Cloud Platform, Alibaba Cloud, and Microsoft Office 365 is a plus. Information Security and/or Information Technology industry certification (CISSP, CISM, CISSP-ISSMP, CRISC, GIAC, Azure and AWS equivalent) preferred. Ability to synthesize data, conceptualize and get to the root cause of processes that created the risk. Experience working in a multi-vendor and outsourced IT environment. Good understanding of COBIT and ITIL processes including change, incident and problem management. Experience in Financial Services is a nice to have but not mandatory. Our Recruitment Delivery Team are committed to offering an inclusive recruitment experience to all candidates. If you require any accommodations or adjustments as a result of disability, impairment, or health condition, please do not hesitate to let me know by emailing
*3 days working from London office* Manage the Cyber Test and Validation process, Support Cyber Risk Assessment and drive Cyber Assurance programme across the bank through: Conduct cyber assessment of projects helping to drive adoption of application and infrastructure security controls and best practices. Advise on leading edge engineering to protect the bank's network from security risks related to web, mobile, web services, and Client Server architectures. Conduct risk reviews of 3rd party systems and applications to assess the standard and proprietary application security controls used by the application (eg authentication, authorization, input validation, output sanitization, error handling, application resilience) against bank policies and standards. Work with different teams in various jurisdictions where specific technology and cybersecurity regulations create requirements that are not directly supported by our global framework. Drive implementation of security controls in various platforms by working with technology infrastructure teams. Demonstrate deep understanding, passion and thought leadership for Information and Cybersecurity and its impact of new technologies, services and solutions. Investigate, coordinate and address Information and Cybersecurity incidents Act as liaison for global team in coordinating collection and preservation of forensic evidence in support of security event investigation. Analyse potential infrastructure security incidents to determine if incident qualifies as a legitimate security breach. Collaborate with stakeholders to continually operate and improve a world-class cyber program by providing input into the uplift of sensory tools, detection tuning, and access to data sources to increase detection effectiveness. Convey complicated technical analysis to management via investigation synopses, graphical depictions of attacks, and comprehensive presentations. Act as a liaison to stakeholders, including those outside of the technology team(s), during security investigations and incidents Respond to regulatory requests regarding security incidents, as well as the relevant protective and detective security measures. Report the status of ongoing incidents, as well as the follow-up actions for resolved incidents to management Support Compliance, regulatory, or litigation related investigations by coordinating e-discovery, evidence collection and other such activities. Communicating status and risks in a succinct, direct and open manner for proper issue management life cycle tracking. Drafting responses to requests for information from regulators in the jurisdictions in which the bank operates Coordinating engagements with regulators, including periodic reporting, preparation of presentations and written deliverables Conducting analysis to identify potential gaps and issues from ongoing changes of regulatory requirement of relevance to the bank's business and risk environments Preparing presentations and written products on regulatory trends and issues to inform leadership decisions Coordinating with counterparts in other jurisdictions and regional stakeholders (eg Legal, Compliance, Preferred Qualifications and Experience A minimum of 10+ years of experience with a mix of Cybersecurity, Systems, Infrastructure, Network, and Cloud experience. Broad technical security skills in multiple technology areas such as applications deployments, endpoints, data, infrastructure, cloud, DNS, PKI, Email, OS (Windows, MAC,.NIX), SDN, encryption, forensics, authentication, Firewalls, proxies, identity and access control, BC/DR, remote access, and cryptography. Extensive experience in architecting and engineering complex security solutions utilizing and interpreting models to implement company policies, standards globally. Familiarity with techniques/methodologies such as "Attack and Defensive" methods, Threat Hunting, Threat modelling, Reverse engineering, Vulnerability Management, Data modelling, Evaluation of security products/services, Metrics development, etc. Proficiency and experience in automation and Scripting using Python, Shell, Ansible, Jenkins, etc. Demonstrated experience with utilizing and migrating to one or more cloud technologies such as Microsoft Azure, and AWS. Knowledge of Google Cloud Platform, Alibaba Cloud, and Microsoft Office 365 is a plus. Information Security and/or Information Technology industry certification (CISSP, CISM, CISSP-ISSMP, CRISC, GIAC, Azure and AWS equivalent) preferred. Ability to synthesize data, conceptualize and get to the root cause of processes that created the risk. Experience working in a multi-vendor and outsourced IT environment. Good understanding of COBIT and ITIL processes including change, incident and problem management. Experience in Financial Services is a nice to have but not mandatory. Our Recruitment Delivery Team are committed to offering an inclusive recruitment experience to all candidates. If you require any accommodations or adjustments as a result of disability, impairment, or health condition, please do not hesitate to let me know by emailing
Request Technology - Craig Johnson
San Francisco, California
*We are unable to sponsor for this 6+ Month Contract role* Prestigious Fortune 500 Company is currently seeking a Security Red Team Operator. Candidate will take a structured approach to Red Team operations (ie, testing in lab environments, creating and operating according to runbooks and SOPs, writing detailed after-action reports, participating in daily operation syncs). This is currently a two-person team. As such, the candidate will need to be a highly motivated, self-sufficient, and capable of collaborating on a small team where consensus is a must for operations to be successful. This role will also be involved in our Tabletop Exercise planning and execution, and therefore, will need excellent written and oral communication skills when dealing with all levels of the organization, from executives to individual contributors. The Red team is responsible for testing the overall strength of our organizations defenses (the technology, the processes, and the people) by simulating the objectives and actions of an attacker. Responsibilities: Perform internal and external penetration testing of network infrastructure and applications Perform Red team assessments including physical, social engineering, and network exploitation Perform well controlled vulnerability exploitation/penetration testing on applications, network protocols, and databases Perform network reconnaissance, OSINT, social engineering, and physical security reviews Participate in regular exercises and perform adversary simulations to test defense controls Assist with scoping prospective engagements, leading engagements from kickoff through remediation Work closely with Blue team to test efficacy of existing alerts and help create new detection. Create findings reports and communicate to stakeholders Contribute to enhancing the teams toolkit Write custom scripts to automate tasks related to finding new vulnerabilities Maintain runbooks to continually improve penetration testing methodologies and threat modelling. Qualifications : 5+ years of experience in Penetration testing, Red Team and Purple Team Bachelor of Science in Engineering, Computer Science, Information Technology, or equivalent work experience Advanced knowledge in common penetration testing tools (Metasploit, Burp Suite, Cobalt Strike, Empire, KALI Linux etc.) Must have a demonstrable understanding of voice and data networks, major operating systems, Active Directory, cloud technologies Must demonstrate knowledge of MITREs ATT&CK framework, execute and chain TTPs Must be able to critically examine an organization and system through the perspective of a threat actor and articulate risk in clear, precise terms. Ability to optimally code in a Scripting language (Python, Bash, PowerShell, Perl, etc.) OSCP
*We are unable to sponsor for this 6+ Month Contract role* Prestigious Fortune 500 Company is currently seeking a Security Red Team Operator. Candidate will take a structured approach to Red Team operations (ie, testing in lab environments, creating and operating according to runbooks and SOPs, writing detailed after-action reports, participating in daily operation syncs). This is currently a two-person team. As such, the candidate will need to be a highly motivated, self-sufficient, and capable of collaborating on a small team where consensus is a must for operations to be successful. This role will also be involved in our Tabletop Exercise planning and execution, and therefore, will need excellent written and oral communication skills when dealing with all levels of the organization, from executives to individual contributors. The Red team is responsible for testing the overall strength of our organizations defenses (the technology, the processes, and the people) by simulating the objectives and actions of an attacker. Responsibilities: Perform internal and external penetration testing of network infrastructure and applications Perform Red team assessments including physical, social engineering, and network exploitation Perform well controlled vulnerability exploitation/penetration testing on applications, network protocols, and databases Perform network reconnaissance, OSINT, social engineering, and physical security reviews Participate in regular exercises and perform adversary simulations to test defense controls Assist with scoping prospective engagements, leading engagements from kickoff through remediation Work closely with Blue team to test efficacy of existing alerts and help create new detection. Create findings reports and communicate to stakeholders Contribute to enhancing the teams toolkit Write custom scripts to automate tasks related to finding new vulnerabilities Maintain runbooks to continually improve penetration testing methodologies and threat modelling. Qualifications : 5+ years of experience in Penetration testing, Red Team and Purple Team Bachelor of Science in Engineering, Computer Science, Information Technology, or equivalent work experience Advanced knowledge in common penetration testing tools (Metasploit, Burp Suite, Cobalt Strike, Empire, KALI Linux etc.) Must have a demonstrable understanding of voice and data networks, major operating systems, Active Directory, cloud technologies Must demonstrate knowledge of MITREs ATT&CK framework, execute and chain TTPs Must be able to critically examine an organization and system through the perspective of a threat actor and articulate risk in clear, precise terms. Ability to optimally code in a Scripting language (Python, Bash, PowerShell, Perl, etc.) OSCP