Manage the Cyber Test and Validation process, Support Cyber Risk Assessment and drive Cyber Assurance programme across the bank through: Conduct cyber assessment of projects helping to drive adoption of application and infrastructure security controls and best practices. Advise on leading edge engineering to protect the bank's network from security risks related to web, mobile, web services, and Client Server architectures. Conduct risk reviews of 3rd party systems and applications to assess the standard and proprietary application security controls used by the application (eg authentication, authorization, input validation, output sanitization, error handling, application resilience) against bank policies and standards. Work with different teams in various jurisdictions where specific technology and cybersecurity regulations create requirements that are not directly supported by our global framework. Drive implementation of security controls in various platforms by working with technology infrastructure teams. Demonstrate deep understanding, passion and thought leadership for Information and Cybersecurity and its impact of new technologies, services and solutions. Investigate, coordinate and address Information and Cybersecurity incidents Act as liaison for global team in coordinating collection and preservation of forensic evidence in support of security event investigation. Analyse potential infrastructure security incidents to determine if incident qualifies as a legitimate security breach. Collaborate with stakeholders to continually operate and improve a world-class cyber program by providing input into the uplift of sensory tools, detection tuning, and access to data sources to increase detection effectiveness. Convey complicated technical analysis to management via investigation synopses, graphical depictions of attacks, and comprehensive presentations. Act as a liaison to stakeholders, including those outside of the technology team(s), during security investigations and incidents Respond to regulatory requests regarding security incidents, as well as the relevant protective and detective security measures. Report the status of ongoing incidents, as well as the follow-up actions for resolved incidents to management Support Compliance, regulatory, or litigation related investigations by coordinating e-discovery, evidence collection and other such activities. Communicating status and risks in a succinct, direct and open manner for proper issue management life cycle tracking. Drafting responses to requests for information from regulators in the jurisdictions in which the bank operates Coordinating engagements with regulators, including periodic reporting, preparation of presentations and written deliverables Conducting analysis to identify potential gaps and issues from ongoing changes of regulatory requirement of relevance to the bank's business and risk environments Preparing presentations and written products on regulatory trends and issues to inform leadership decisions Coordinating with counterparts in other jurisdictions and regional stakeholders (eg Legal, Compliance, Preferred Qualifications and Experience A minimum of 10+ years of experience with a mix of Cybersecurity, Systems, Infrastructure, Network, and Cloud experience. Broad technical security skills in multiple technology areas such as applications deployments, endpoints, data, infrastructure, cloud, DNS, PKI, Email, OS (Windows, MAC,.NIX), SDN, encryption, forensics, authentication, Firewalls, proxies, identity and access control, BC/DR, remote access, and cryptography. Extensive experience in architecting and engineering complex security solutions utilizing and interpreting models to implement company policies, standards globally. Familiarity with techniques/methodologies such as "Attack and Defensive" methods, Threat Hunting, Threat modelling, Reverse engineering, Vulnerability Management, Data modelling, Evaluation of security products/services, Metrics development, etc. Proficiency and experience in automation and Scripting using Python, Shell, Ansible, Jenkins, etc. Demonstrated experience with utilizing and migrating to one or more cloud technologies such as Microsoft Azure, and AWS. Knowledge of Google Cloud Platform, Alibaba Cloud, and Microsoft Office 365 is a plus. Information Security and/or Information Technology industry certification (CISSP, CISM, CISSP-ISSMP, CRISC, GIAC, Azure and AWS equivalent) preferred. Ability to synthesize data, conceptualize and get to the root cause of processes that created the risk. Experience working in a multi-vendor and outsourced IT environment. Good understanding of COBIT and ITIL processes including change, incident and problem management. Experience in Financial Services is a nice to have but not mandatory. Our Recruitment Delivery Team are committed to offering an inclusive recruitment experience to all candidates. If you require any accommodations or adjustments as a result of disability, impairment, or health condition, please do not hesitate to let me know by emailing.
24/04/2024
Full time
Manage the Cyber Test and Validation process, Support Cyber Risk Assessment and drive Cyber Assurance programme across the bank through: Conduct cyber assessment of projects helping to drive adoption of application and infrastructure security controls and best practices. Advise on leading edge engineering to protect the bank's network from security risks related to web, mobile, web services, and Client Server architectures. Conduct risk reviews of 3rd party systems and applications to assess the standard and proprietary application security controls used by the application (eg authentication, authorization, input validation, output sanitization, error handling, application resilience) against bank policies and standards. Work with different teams in various jurisdictions where specific technology and cybersecurity regulations create requirements that are not directly supported by our global framework. Drive implementation of security controls in various platforms by working with technology infrastructure teams. Demonstrate deep understanding, passion and thought leadership for Information and Cybersecurity and its impact of new technologies, services and solutions. Investigate, coordinate and address Information and Cybersecurity incidents Act as liaison for global team in coordinating collection and preservation of forensic evidence in support of security event investigation. Analyse potential infrastructure security incidents to determine if incident qualifies as a legitimate security breach. Collaborate with stakeholders to continually operate and improve a world-class cyber program by providing input into the uplift of sensory tools, detection tuning, and access to data sources to increase detection effectiveness. Convey complicated technical analysis to management via investigation synopses, graphical depictions of attacks, and comprehensive presentations. Act as a liaison to stakeholders, including those outside of the technology team(s), during security investigations and incidents Respond to regulatory requests regarding security incidents, as well as the relevant protective and detective security measures. Report the status of ongoing incidents, as well as the follow-up actions for resolved incidents to management Support Compliance, regulatory, or litigation related investigations by coordinating e-discovery, evidence collection and other such activities. Communicating status and risks in a succinct, direct and open manner for proper issue management life cycle tracking. Drafting responses to requests for information from regulators in the jurisdictions in which the bank operates Coordinating engagements with regulators, including periodic reporting, preparation of presentations and written deliverables Conducting analysis to identify potential gaps and issues from ongoing changes of regulatory requirement of relevance to the bank's business and risk environments Preparing presentations and written products on regulatory trends and issues to inform leadership decisions Coordinating with counterparts in other jurisdictions and regional stakeholders (eg Legal, Compliance, Preferred Qualifications and Experience A minimum of 10+ years of experience with a mix of Cybersecurity, Systems, Infrastructure, Network, and Cloud experience. Broad technical security skills in multiple technology areas such as applications deployments, endpoints, data, infrastructure, cloud, DNS, PKI, Email, OS (Windows, MAC,.NIX), SDN, encryption, forensics, authentication, Firewalls, proxies, identity and access control, BC/DR, remote access, and cryptography. Extensive experience in architecting and engineering complex security solutions utilizing and interpreting models to implement company policies, standards globally. Familiarity with techniques/methodologies such as "Attack and Defensive" methods, Threat Hunting, Threat modelling, Reverse engineering, Vulnerability Management, Data modelling, Evaluation of security products/services, Metrics development, etc. Proficiency and experience in automation and Scripting using Python, Shell, Ansible, Jenkins, etc. Demonstrated experience with utilizing and migrating to one or more cloud technologies such as Microsoft Azure, and AWS. Knowledge of Google Cloud Platform, Alibaba Cloud, and Microsoft Office 365 is a plus. Information Security and/or Information Technology industry certification (CISSP, CISM, CISSP-ISSMP, CRISC, GIAC, Azure and AWS equivalent) preferred. Ability to synthesize data, conceptualize and get to the root cause of processes that created the risk. Experience working in a multi-vendor and outsourced IT environment. Good understanding of COBIT and ITIL processes including change, incident and problem management. Experience in Financial Services is a nice to have but not mandatory. Our Recruitment Delivery Team are committed to offering an inclusive recruitment experience to all candidates. If you require any accommodations or adjustments as a result of disability, impairment, or health condition, please do not hesitate to let me know by emailing.
Job: Security Architect Location: Reading, UK, Hybrid Job Type: Permanent Job Description We are seeking a highly skilled and experienced Security Architect to join our team who will be responsible for development of the Security Architecture that ensures the appropriate protection of all aspects of security, (people, process, electronic, data, physical) in Spring Fibre. You will be a subject matter expert and provide security guidance and recommendations to technology/business teams and contribute toSpring's security policies, standards, and guidelines related to information and Network security. This is a technical role and suitable for someone who has hands on experience in Cybersecurity. Responsibilities Help develop an Enterprise Security Architecture Framework, including patterns for identity & authentication, authorization and access control, cryptographic key and certificate management, auditing and security monitoring, data leakage prevention, privacy enhancement & protection and other standards in alignment with Enterprise Architect platforms. Establish metrics and monitoring to report the effectiveness and efficiency of the Security Architecture function. Identify, register and maintain security risks throughout their lifetimes, including agreeing treatment of risks with their owners, and reporting &escalating to Internal Audit and the CIO, when necessary. Develop, review and update security & privacy policies & standards and provide awareness guidelines, implementation and exceptions advice. Engage with owners & custodians of BAU IT systems to understand the architecture, data flow and security controls in their systems. Conduct periodic security compliance assessments and ISO 27001/2 reviews of BAU IT applications, infrastructures & ISMS. Review the security posture of potential M&A acquisition targets. Requirement Mapping long term business requirements to security architecture frameworks such as NIST, CIS etc. Experience delivering Hybrid Cloud and Internet facing applications with a strong focus on cyber security. Broad hands-on knowledge of Firewalls, intrusion detection systems, data encryption, and other industry-standard techniques and practices. Strong knowledge of IT infrastructure, IP Networking, security best practices, and automation technologies. Application security: including but not limited to: authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure code development methodologies. Infrastructure security: including but not limited to: network security, host security, database security, device security, VPNs & SSLs, secure file transfers, security event monitoring, malware security and cyber security. Operational security: including but not limited to: incident management, change & patch management, data centre & physical security, backups, DR & BCP, outsourcing, managed services, cloud computing, asset management, cryptographic keys & certificate management, PCI DSS and DPA compliance and ISO 27001/2. Analysing network security controls, including Firewall and Router security configuration. Preferred Delivering the security review processes and frameworks, with full audit trail. Managing multiple security assessments and changing priorities, simultaneously Ensuring Security Architecture Review is built into group wide and business specific processes for acquiring and developing new technology,including developing any needed processes. Aligning business requirements to complex security architecture frameworks. Skills Required: In depth knowledge of: Firewall: Juniper/Cisco/PaloAlto. Onion Security, Splunk, Suricata, Kali. Application Security. Identity and Access Management. Data Protection. Endpoint Security. Cyber Security Operations. Experienced with Threat Modelling. Pen testing and basic incident response. Scripting languages ( python, or PowerShell/building dashboards/au-tomating common tasks) Preferred: Experience in designing systems against a zero-trust architecture. Experience with designing SOC architectures (ie SIEM, SOAR and vulnerability management solutions). Expert-level certification in either AWS or Azure, with a Security specialization. Experience in working within regulated environments, such as PCI-DSS Experience in defining secure development life cycles. Qualifications Bachelor's Degree in either Computer Science, Computer Engineering, Software Engineering, Electrical Engineering, Math, Physics. CISSP, Certified Information Systems Security Professional, International Information Systems Security Certification Consortium (ISC2) Certification, Microsoft Azure Solutions Architect, or AWS Solutions Architect.
24/04/2024
Full time
Job: Security Architect Location: Reading, UK, Hybrid Job Type: Permanent Job Description We are seeking a highly skilled and experienced Security Architect to join our team who will be responsible for development of the Security Architecture that ensures the appropriate protection of all aspects of security, (people, process, electronic, data, physical) in Spring Fibre. You will be a subject matter expert and provide security guidance and recommendations to technology/business teams and contribute toSpring's security policies, standards, and guidelines related to information and Network security. This is a technical role and suitable for someone who has hands on experience in Cybersecurity. Responsibilities Help develop an Enterprise Security Architecture Framework, including patterns for identity & authentication, authorization and access control, cryptographic key and certificate management, auditing and security monitoring, data leakage prevention, privacy enhancement & protection and other standards in alignment with Enterprise Architect platforms. Establish metrics and monitoring to report the effectiveness and efficiency of the Security Architecture function. Identify, register and maintain security risks throughout their lifetimes, including agreeing treatment of risks with their owners, and reporting &escalating to Internal Audit and the CIO, when necessary. Develop, review and update security & privacy policies & standards and provide awareness guidelines, implementation and exceptions advice. Engage with owners & custodians of BAU IT systems to understand the architecture, data flow and security controls in their systems. Conduct periodic security compliance assessments and ISO 27001/2 reviews of BAU IT applications, infrastructures & ISMS. Review the security posture of potential M&A acquisition targets. Requirement Mapping long term business requirements to security architecture frameworks such as NIST, CIS etc. Experience delivering Hybrid Cloud and Internet facing applications with a strong focus on cyber security. Broad hands-on knowledge of Firewalls, intrusion detection systems, data encryption, and other industry-standard techniques and practices. Strong knowledge of IT infrastructure, IP Networking, security best practices, and automation technologies. Application security: including but not limited to: authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure code development methodologies. Infrastructure security: including but not limited to: network security, host security, database security, device security, VPNs & SSLs, secure file transfers, security event monitoring, malware security and cyber security. Operational security: including but not limited to: incident management, change & patch management, data centre & physical security, backups, DR & BCP, outsourcing, managed services, cloud computing, asset management, cryptographic keys & certificate management, PCI DSS and DPA compliance and ISO 27001/2. Analysing network security controls, including Firewall and Router security configuration. Preferred Delivering the security review processes and frameworks, with full audit trail. Managing multiple security assessments and changing priorities, simultaneously Ensuring Security Architecture Review is built into group wide and business specific processes for acquiring and developing new technology,including developing any needed processes. Aligning business requirements to complex security architecture frameworks. Skills Required: In depth knowledge of: Firewall: Juniper/Cisco/PaloAlto. Onion Security, Splunk, Suricata, Kali. Application Security. Identity and Access Management. Data Protection. Endpoint Security. Cyber Security Operations. Experienced with Threat Modelling. Pen testing and basic incident response. Scripting languages ( python, or PowerShell/building dashboards/au-tomating common tasks) Preferred: Experience in designing systems against a zero-trust architecture. Experience with designing SOC architectures (ie SIEM, SOAR and vulnerability management solutions). Expert-level certification in either AWS or Azure, with a Security specialization. Experience in working within regulated environments, such as PCI-DSS Experience in defining secure development life cycles. Qualifications Bachelor's Degree in either Computer Science, Computer Engineering, Software Engineering, Electrical Engineering, Math, Physics. CISSP, Certified Information Systems Security Professional, International Information Systems Security Certification Consortium (ISC2) Certification, Microsoft Azure Solutions Architect, or AWS Solutions Architect.
Lead IT Security Manager Permanent Birmingham - 2 Days per week on site £48,900 - £61,140 per annum My client in the Rail industry are looking for a Lead IT Security Manager to join their fast-paced Operations team on a permanent basis. The Lead IT Security Manager is responsible for is the effective management of the Security Operations pillar within the IT Security, Compliance & Identity function. This includes Security technology and Security Operations Centre management. Key focus areas for this role, the ideal candidate will have experience in each of the below; Threat & Vulnerability Management Security Operations Centre - 24/7 Outsourced Web & Content Filtering - ProofPoint, Zscaler, etc. Endpoint Security Infrastructure Security Accountabilities * Lead the Security Operations pillar, determining and delivering requirements, methods, and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability management (among other activity) . * Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation (including playbooks and guidance). * Manage the application and compliance of security operations procedures, reviewing actual and potential security breaches, and ensuring their investigation. * Lead the Security Operations team's response to incidents, recommending actions and appropriate control improvements. * Monitor the external environment to gather intelligence on emerging technologies, documenting impacts, threats, and opportunities to IT. * Provide expert advice on threat intelligence activities, identifying which threat categories are most dangerous to the organization and how to defend against them. * Manage vulnerability assessment activities within company IT, providing expert advice where necessary in the review of vulnerability assessment tools and techniques. * Develop, maintain, and test Security Operations' incident management procedures, investigating escalated incidents and facilitating recovery post-incident resolution. * Lead Security Operations risk management activities, leading on the identification of risks and vulnerabilities and assessment of their impacts. * Manage and oversee the day-to-day activity of the SOC supplier who will deliver security capabilities, communicating their activity to relevant teams. * Manage the design, delivery, maintenance, and continuous improvement of the IT Security Ops capabilities in line with business needs. * Manage the Security Operations Centre (SOC) capability, ensuring effective protection, defence, and response to IT security risks. * Promote the Security, Compliance & Identity function to develop and enhance the team profile to develop enduring relationships with stakeholders and teams. * Implement a multi-year Security roadmap that provides proactive capabilities which enable business objectives. * Actively promote and embed Equality Diversity and Inclusion (EDI) in all your work, and support and comply with all organisational initiatives, policies and procedures on EDI. Skills: * Relationship Building. Ability to develop and maintain strong relationships with internal and external stakeholders. * Security Operations. Ability provide leadership for live security incidents and helping conduct robust investigations in order to identify corrective actions and see them through to completion. * Threat Intelligence. Ability to provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of threat landscape. * Vulnerability Assessment. Ability to identify and classify security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. * Risk Management. Ability to identify IT security operations risks and the delivery of audit remediation activities. * Emerging technology monitoring. Ability to identify and assess new and emerging technologies, products, services, methods and techniques. Knowledge: * Knowledge of IT Service Frameworks, methodologies, and best practice such as ITIL v4 and Agile. * Knowledge of day-to-day activities and best practice within a SOC. * Knowledge of technical security such as Firewalls, network security groups, and access controls. Type of Experience: * Experience of leading a team through the full IT service life cycle, enhancing security posture, and evolving capabilities via continual service improvement. * Experience of leading live cyber incidents and the remediation actions. * Experience of partnering with supplier teams for managed services delivery of improvements. * Experience across the full IT security spectrum (software, Servers, infrastructure, and networks). * Experience designing and implementing secure systems, leading review where necessary of complex security issues. * Experience of enabling and informing risk-based decisions. * Experience dealing with the security implications of transformation and day-to-day product changes. * Experience working with system architectures, displaying a strong understanding of the impact of vulnerabilities on varied systems Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition and management consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically and strategically important industries in the UK and the world today. We will never send your CV without your permission.
23/04/2024
Full time
Lead IT Security Manager Permanent Birmingham - 2 Days per week on site £48,900 - £61,140 per annum My client in the Rail industry are looking for a Lead IT Security Manager to join their fast-paced Operations team on a permanent basis. The Lead IT Security Manager is responsible for is the effective management of the Security Operations pillar within the IT Security, Compliance & Identity function. This includes Security technology and Security Operations Centre management. Key focus areas for this role, the ideal candidate will have experience in each of the below; Threat & Vulnerability Management Security Operations Centre - 24/7 Outsourced Web & Content Filtering - ProofPoint, Zscaler, etc. Endpoint Security Infrastructure Security Accountabilities * Lead the Security Operations pillar, determining and delivering requirements, methods, and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability management (among other activity) . * Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation (including playbooks and guidance). * Manage the application and compliance of security operations procedures, reviewing actual and potential security breaches, and ensuring their investigation. * Lead the Security Operations team's response to incidents, recommending actions and appropriate control improvements. * Monitor the external environment to gather intelligence on emerging technologies, documenting impacts, threats, and opportunities to IT. * Provide expert advice on threat intelligence activities, identifying which threat categories are most dangerous to the organization and how to defend against them. * Manage vulnerability assessment activities within company IT, providing expert advice where necessary in the review of vulnerability assessment tools and techniques. * Develop, maintain, and test Security Operations' incident management procedures, investigating escalated incidents and facilitating recovery post-incident resolution. * Lead Security Operations risk management activities, leading on the identification of risks and vulnerabilities and assessment of their impacts. * Manage and oversee the day-to-day activity of the SOC supplier who will deliver security capabilities, communicating their activity to relevant teams. * Manage the design, delivery, maintenance, and continuous improvement of the IT Security Ops capabilities in line with business needs. * Manage the Security Operations Centre (SOC) capability, ensuring effective protection, defence, and response to IT security risks. * Promote the Security, Compliance & Identity function to develop and enhance the team profile to develop enduring relationships with stakeholders and teams. * Implement a multi-year Security roadmap that provides proactive capabilities which enable business objectives. * Actively promote and embed Equality Diversity and Inclusion (EDI) in all your work, and support and comply with all organisational initiatives, policies and procedures on EDI. Skills: * Relationship Building. Ability to develop and maintain strong relationships with internal and external stakeholders. * Security Operations. Ability provide leadership for live security incidents and helping conduct robust investigations in order to identify corrective actions and see them through to completion. * Threat Intelligence. Ability to provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of threat landscape. * Vulnerability Assessment. Ability to identify and classify security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. * Risk Management. Ability to identify IT security operations risks and the delivery of audit remediation activities. * Emerging technology monitoring. Ability to identify and assess new and emerging technologies, products, services, methods and techniques. Knowledge: * Knowledge of IT Service Frameworks, methodologies, and best practice such as ITIL v4 and Agile. * Knowledge of day-to-day activities and best practice within a SOC. * Knowledge of technical security such as Firewalls, network security groups, and access controls. Type of Experience: * Experience of leading a team through the full IT service life cycle, enhancing security posture, and evolving capabilities via continual service improvement. * Experience of leading live cyber incidents and the remediation actions. * Experience of partnering with supplier teams for managed services delivery of improvements. * Experience across the full IT security spectrum (software, Servers, infrastructure, and networks). * Experience designing and implementing secure systems, leading review where necessary of complex security issues. * Experience of enabling and informing risk-based decisions. * Experience dealing with the security implications of transformation and day-to-day product changes. * Experience working with system architectures, displaying a strong understanding of the impact of vulnerabilities on varied systems Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition and management consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically and strategically important industries in the UK and the world today. We will never send your CV without your permission.
Request Technology - Craig Johnson
San Francisco, California
*We are unable to sponsor for this Remote permanent role* *Position is bonus eligible* Prestigious Enterprise Company is currently seeking a Senior RBAC Engineer, preferably with strong SailPoint experience. This individual will be a technical leader in RBAC solutions and should also be able to effectively collaborate, acting as a liaison with business and technology partners. This role requires extensive background and experience in Identity Management and Role-based Access Control. Responsibilities: Analyze the users, including their workflows and the resources they need. Conduct audits of the roles on an ongoing basis to keep them up to date and align them with current requirements. Create a basic role that includes the access every user needs. Determine which roles have a common set of access requirements. Ensure RBAC is integrated across all systems across the organization. Establish a process for handling role changes, including setting up and decommissioning users. Identify the resources that require access control. Qualifications: 8+ years of IT experience with 5+ years developing and implementing enterprise RBAC solutions Excellent written and verbal communication Collaborative approach to problem solving Work well under pressure to produce results Sensitivity to business processes and drivers Demonstrated history of influencing change within teams and across the organization Bachelor's and/or Master's degree in Computer Science, Computer Engineering, Information Systems, etc. (or demonstrated professional experience)
23/04/2024
Full time
*We are unable to sponsor for this Remote permanent role* *Position is bonus eligible* Prestigious Enterprise Company is currently seeking a Senior RBAC Engineer, preferably with strong SailPoint experience. This individual will be a technical leader in RBAC solutions and should also be able to effectively collaborate, acting as a liaison with business and technology partners. This role requires extensive background and experience in Identity Management and Role-based Access Control. Responsibilities: Analyze the users, including their workflows and the resources they need. Conduct audits of the roles on an ongoing basis to keep them up to date and align them with current requirements. Create a basic role that includes the access every user needs. Determine which roles have a common set of access requirements. Ensure RBAC is integrated across all systems across the organization. Establish a process for handling role changes, including setting up and decommissioning users. Identify the resources that require access control. Qualifications: 8+ years of IT experience with 5+ years developing and implementing enterprise RBAC solutions Excellent written and verbal communication Collaborative approach to problem solving Work well under pressure to produce results Sensitivity to business processes and drivers Demonstrated history of influencing change within teams and across the organization Bachelor's and/or Master's degree in Computer Science, Computer Engineering, Information Systems, etc. (or demonstrated professional experience)
My client, a leading multinational defence company, are currently seeking a Principal Engineer/Technical Designer to join the business in a permanent capacity. The role is based out of my client's secure site in New Malden. It is offered on a hybrid basis, 2-3 days a week on site. Due to the nature of my clients work, candidates must either hold a live SC Clearance or be willing and able to undergo the clearance process. The principal engineer will design and implement information systems to support the business Share infrastructure. This candidate will ensure that all systems are working at optimal levels and support the development of new technologies and system requirements. To accomplish their core duty of designing and implementing complex computer systems, this candidate will be responsible for many tasks including: Leads the design and review processes, developing and documenting the proposed technical design for the integration and implementation. Create detailed plans for the integration of new systems architecture into existing infrastructure/systems. This includes logistical plans for the Operations teams to actually conduct the physical integrations, during which the candidate provides technical direction and support Analysing existing systems to ensure they offer adequate security and are effectively meeting the needs of systems/subsystems. They coordinate with all systems and subsystems teams to see that the system of systems is working optimally. They also analyse requirements to identify where they can integrate new hardware, operating systems, or connectivity solutions. Based on their knowledge of infrastructure, systems and their analysis of the systems' needs, the candidate may recommend alternative technologies or improvements to enhance systems to support Share infrastructure teams goals. Core skills: Experience with a broad range of technologies and building roadmaps Experience designing, integrating and managing complex infrastructure solutions Experience producing design documentation and associated governance and assurance processes Ability to provide technical system solutions, determine overall design direction and provide hardware recommendations for complex technical issues Experience planning and developing support processes and adhering to best practices Strong written and oral communication skills, and the ability to effectively communicate with technical and non-technical audiences Advanced skills: Knowledge of server Operating Systems (Windows, Linux, Unix etc) Knowledge of VMWARE and Virtualisation technologies (VMware Horizon, Citrix Xen Desktop) Knowledge of SAN and Storage Networks Knowledge of network technologies. Synergize Consulting is committed to equality and diversity in our workplace. Synergize Consulting provides equal employment opportunity to all employees and applicants without regard to an individual's protected status, including race/ethnic origin, colour, nationality, national origin, ancestry, sex/gender, gender identity/expression, gender reassignment, sexual orientation, marriage/civil partnership, pregnancy/maternity, religion or belief, age, disability, or any other protected status or characteristic
22/04/2024
Full time
My client, a leading multinational defence company, are currently seeking a Principal Engineer/Technical Designer to join the business in a permanent capacity. The role is based out of my client's secure site in New Malden. It is offered on a hybrid basis, 2-3 days a week on site. Due to the nature of my clients work, candidates must either hold a live SC Clearance or be willing and able to undergo the clearance process. The principal engineer will design and implement information systems to support the business Share infrastructure. This candidate will ensure that all systems are working at optimal levels and support the development of new technologies and system requirements. To accomplish their core duty of designing and implementing complex computer systems, this candidate will be responsible for many tasks including: Leads the design and review processes, developing and documenting the proposed technical design for the integration and implementation. Create detailed plans for the integration of new systems architecture into existing infrastructure/systems. This includes logistical plans for the Operations teams to actually conduct the physical integrations, during which the candidate provides technical direction and support Analysing existing systems to ensure they offer adequate security and are effectively meeting the needs of systems/subsystems. They coordinate with all systems and subsystems teams to see that the system of systems is working optimally. They also analyse requirements to identify where they can integrate new hardware, operating systems, or connectivity solutions. Based on their knowledge of infrastructure, systems and their analysis of the systems' needs, the candidate may recommend alternative technologies or improvements to enhance systems to support Share infrastructure teams goals. Core skills: Experience with a broad range of technologies and building roadmaps Experience designing, integrating and managing complex infrastructure solutions Experience producing design documentation and associated governance and assurance processes Ability to provide technical system solutions, determine overall design direction and provide hardware recommendations for complex technical issues Experience planning and developing support processes and adhering to best practices Strong written and oral communication skills, and the ability to effectively communicate with technical and non-technical audiences Advanced skills: Knowledge of server Operating Systems (Windows, Linux, Unix etc) Knowledge of VMWARE and Virtualisation technologies (VMware Horizon, Citrix Xen Desktop) Knowledge of SAN and Storage Networks Knowledge of network technologies. Synergize Consulting is committed to equality and diversity in our workplace. Synergize Consulting provides equal employment opportunity to all employees and applicants without regard to an individual's protected status, including race/ethnic origin, colour, nationality, national origin, ancestry, sex/gender, gender identity/expression, gender reassignment, sexual orientation, marriage/civil partnership, pregnancy/maternity, religion or belief, age, disability, or any other protected status or characteristic
The Role As a SailPoint Engineer, you will contribute to the delivery of the SailPoint infrastructure OS Upgrade. You will join the Logical Access Management project team. This role includes the analysis, design, build, test and deployment of the new infrastructure aligned to the established Euroclear project governance. You will be expected to document the solutions you design in out company standard templates such as a High-Level Technical Design; Detailed Functional Design; Detailed Technical Design, where you will need to obtain sign-off from reviewers while addressing all the concerns. You will build the solution in our test environment and ensure the solution goes through all the formal testing stages with our internal customers to obtain signoffs. Once tested and signed-off, you will perform handovers with the Operations Team, which may include performing training, knowledge sharing, provision of a cookbook to enable them to run and operate the solution you have designed. This will also include providing warranty support. Required Skills and Experience Sailpoint IIQ (Identity IQ), at least 5 to 8 years of experience implementing Sailpoint solution Identity & Access Management (IAM) Expert knowledge on one or more of following technology platforms: Windows, Unix, Network, Office/End User technologies, Mainframe, Tandem or Middleware Professional certification in CISSP, CISM and CISA, or equivalent is a plus Design, Development & Implementation of SailPoint Infrastructure Is creative and sees the bigger picture when designing solutions Works proactively, thereby keeping possible problems from affecting the overall functioning of the team Note: this role has been assessed as Inside IR35 which only affects UK resident candidates
19/04/2024
Project-based
The Role As a SailPoint Engineer, you will contribute to the delivery of the SailPoint infrastructure OS Upgrade. You will join the Logical Access Management project team. This role includes the analysis, design, build, test and deployment of the new infrastructure aligned to the established Euroclear project governance. You will be expected to document the solutions you design in out company standard templates such as a High-Level Technical Design; Detailed Functional Design; Detailed Technical Design, where you will need to obtain sign-off from reviewers while addressing all the concerns. You will build the solution in our test environment and ensure the solution goes through all the formal testing stages with our internal customers to obtain signoffs. Once tested and signed-off, you will perform handovers with the Operations Team, which may include performing training, knowledge sharing, provision of a cookbook to enable them to run and operate the solution you have designed. This will also include providing warranty support. Required Skills and Experience Sailpoint IIQ (Identity IQ), at least 5 to 8 years of experience implementing Sailpoint solution Identity & Access Management (IAM) Expert knowledge on one or more of following technology platforms: Windows, Unix, Network, Office/End User technologies, Mainframe, Tandem or Middleware Professional certification in CISSP, CISM and CISA, or equivalent is a plus Design, Development & Implementation of SailPoint Infrastructure Is creative and sees the bigger picture when designing solutions Works proactively, thereby keeping possible problems from affecting the overall functioning of the team Note: this role has been assessed as Inside IR35 which only affects UK resident candidates
ForgeRock Identity Cloud Consultant - London (Hybrid) - FTE 12 months to be extended - My client, a prominent IT Services and Consulting firm, is renowned for delivering inventive solutions to clients globally. Their proficiency encompasses the deployment of state-of-the-art technologies and spearheading digital transformation endeavors. Presently, they are in search of an adept ForgeRock Identity Cloud Consultant to join their London team on a Full time basis for an initial 12-month contract, with the potential for extension. Location: London (Hybrid: 2 days onsite, 3 days remote) Responsibilities: Lead the implementation, configuration, development, and administration of ForgeRock CIAM solutions, both on-premise and in the cloud. Develop and deploy ForgeRock OpenAM/AM Custom Authentication modules tailored to meet client requirements. Provide operational support and maintenance for ForgeRock Identity Cloud deployments. Collaborate with cross-functional teams to design and implement integrated solutions. Troubleshoot and resolve technical issues related to ForgeRock Identity Cloud platform. Requirements: Bachelor's degree in Computer Science, Engineering, or a related field. Proven experience in implementing, configuring, and administering ForgeRock CIAM solutions. Strong proficiency in developing custom authentication modules for ForgeRock OpenAM/AM. Hands-on experience with ForgeRock Identity Cloud platform, both on-premise and in cloud environments. Familiarity with identity and access management (IAM) principles and best practices. Excellent communication and interpersonal skills, with the ability to collaborate effectively with diverse teams. Problem-solving mindset and ability to thrive in a fast-paced, dynamic environment. If you are a motivated ForgeRock Identity Cloud Consultant looking to take on new challenges and make a meaningful impact, we encourage you to apply. Please submit your resume and cover letter detailing your relevant experience and qualifications to (see below) We look forward to hearing from you! Randstad Technologies Ltd is a leading specialist recruitment business for the IT & Engineering industries. Please note that due to a high level of applications, we can only respond to applicants whose skills & qualifications are suitable for this position. No terminology in this advert is intended to discriminate against any of the protected characteristics that fall under the Equality Act 2010. For the purposes of the Conduct Regulations 2003, when advertising permanent vacancies we are acting as an Employment Agency, and when advertising temporary/contract vacancies we are acting as an Employment Business.
18/04/2024
Full time
ForgeRock Identity Cloud Consultant - London (Hybrid) - FTE 12 months to be extended - My client, a prominent IT Services and Consulting firm, is renowned for delivering inventive solutions to clients globally. Their proficiency encompasses the deployment of state-of-the-art technologies and spearheading digital transformation endeavors. Presently, they are in search of an adept ForgeRock Identity Cloud Consultant to join their London team on a Full time basis for an initial 12-month contract, with the potential for extension. Location: London (Hybrid: 2 days onsite, 3 days remote) Responsibilities: Lead the implementation, configuration, development, and administration of ForgeRock CIAM solutions, both on-premise and in the cloud. Develop and deploy ForgeRock OpenAM/AM Custom Authentication modules tailored to meet client requirements. Provide operational support and maintenance for ForgeRock Identity Cloud deployments. Collaborate with cross-functional teams to design and implement integrated solutions. Troubleshoot and resolve technical issues related to ForgeRock Identity Cloud platform. Requirements: Bachelor's degree in Computer Science, Engineering, or a related field. Proven experience in implementing, configuring, and administering ForgeRock CIAM solutions. Strong proficiency in developing custom authentication modules for ForgeRock OpenAM/AM. Hands-on experience with ForgeRock Identity Cloud platform, both on-premise and in cloud environments. Familiarity with identity and access management (IAM) principles and best practices. Excellent communication and interpersonal skills, with the ability to collaborate effectively with diverse teams. Problem-solving mindset and ability to thrive in a fast-paced, dynamic environment. If you are a motivated ForgeRock Identity Cloud Consultant looking to take on new challenges and make a meaningful impact, we encourage you to apply. Please submit your resume and cover letter detailing your relevant experience and qualifications to (see below) We look forward to hearing from you! Randstad Technologies Ltd is a leading specialist recruitment business for the IT & Engineering industries. Please note that due to a high level of applications, we can only respond to applicants whose skills & qualifications are suitable for this position. No terminology in this advert is intended to discriminate against any of the protected characteristics that fall under the Equality Act 2010. For the purposes of the Conduct Regulations 2003, when advertising permanent vacancies we are acting as an Employment Agency, and when advertising temporary/contract vacancies we are acting as an Employment Business.
My customer is searching the market for a SailPoint engineer to work in Brussels, Belgium 2 days per week/3 days remote. Job Title: SailPoint Engineer Location: Hybrid - Brussels x2 days per week Duration: 6 months + Extension Language: English Role As a SailPoint Engineer, you will contribute to the delivery of the SailPoint infrastructure OS Upgrade. You will join the Logical Access Management project team. This role includes the analysis, design, build, test and deployment of the new infrastructure aligned to the established project governance. Your role involves working closely with colleagues in different domains (and may include external suppliers) to obtain the requirements so that you can design the optimal, secure solutions. A security focus with an understanding of the challenges our internal customers face, as well as a positive problem solving, and an analytical mindset are your strongest skills. You will be expected to document the solutions you design in clients standard templates such as a High-Level Technical Design; Detailed Functional Design; Detailed Technical Design, where you will need to obtain sign-off from reviewers while addressing all the concerns. You will build the solution in our test environment and ensure the solution goes through all the formal testing stages with our internal customers to obtain signoffs. Once tested and signed-off, you will perform handovers with the Operations Team, which may include performing training, knowledge sharing, provision of a cookbook to enable them to run and operate the solution you have designed. This will also include providing warranty support. Skills and experience A combination of several of the below should be covered: SailPoint IIQ (Identity IQ), at least 5 to 8 years of experience implementing SailPoint solution Identity & Access Management (IAM) Expert knowledge on one or more of following technology platforms: Windows, Unix, Network, Office/End User technologies, Mainframe, Tandem or Middleware Professional certification in CISSP, CISM and CISA, or equivalent is a plus Design, Development & Implementation of SailPoint Infrastructure Is creative and sees the bigger picture when designing solutions Works proactively, thereby keeping possible problems from affecting the overall functioning of the team
17/04/2024
Project-based
My customer is searching the market for a SailPoint engineer to work in Brussels, Belgium 2 days per week/3 days remote. Job Title: SailPoint Engineer Location: Hybrid - Brussels x2 days per week Duration: 6 months + Extension Language: English Role As a SailPoint Engineer, you will contribute to the delivery of the SailPoint infrastructure OS Upgrade. You will join the Logical Access Management project team. This role includes the analysis, design, build, test and deployment of the new infrastructure aligned to the established project governance. Your role involves working closely with colleagues in different domains (and may include external suppliers) to obtain the requirements so that you can design the optimal, secure solutions. A security focus with an understanding of the challenges our internal customers face, as well as a positive problem solving, and an analytical mindset are your strongest skills. You will be expected to document the solutions you design in clients standard templates such as a High-Level Technical Design; Detailed Functional Design; Detailed Technical Design, where you will need to obtain sign-off from reviewers while addressing all the concerns. You will build the solution in our test environment and ensure the solution goes through all the formal testing stages with our internal customers to obtain signoffs. Once tested and signed-off, you will perform handovers with the Operations Team, which may include performing training, knowledge sharing, provision of a cookbook to enable them to run and operate the solution you have designed. This will also include providing warranty support. Skills and experience A combination of several of the below should be covered: SailPoint IIQ (Identity IQ), at least 5 to 8 years of experience implementing SailPoint solution Identity & Access Management (IAM) Expert knowledge on one or more of following technology platforms: Windows, Unix, Network, Office/End User technologies, Mainframe, Tandem or Middleware Professional certification in CISSP, CISM and CISA, or equivalent is a plus Design, Development & Implementation of SailPoint Infrastructure Is creative and sees the bigger picture when designing solutions Works proactively, thereby keeping possible problems from affecting the overall functioning of the team
Title : Sailpoint Engineer Location : Brussels - (1x or 2x days a week onsite is mandatory) Duration : 6 months ROLLING contract Budget : €500 - €550 per day, all inclusive Language : English THIS PROJECT IS OUTSIDE IR35 Role As a SailPoint Engineer, you will contribute to the delivery of the SailPoint infrastructure OS Upgrade. You will join the Logical Access Management project team. This role includes the analysis, design, build, test and deployment of the new infrastructure aligned to the established project governance. Your role involves working closely with colleagues in different domains (and may include external suppliers) to obtain the requirements so that you can design the optimal, secure solutions. A security focus with an understanding of the challenges our internal customers face, as well as a positive problem solving, and an analytical mindset are your strongest skills. You will be expected to document the solutions you design in clients standard templates such as a High-Level Technical Design; Detailed Functional Design; Detailed Technical Design, where you will need to obtain sign-off from reviewers while addressing all the concerns. You will build the solution in our test environment and ensure the solution goes through all the formal testing stages with our internal customers to obtain signoffs. Once tested and signed-off, you will perform handovers with the Operations Team, which may include performing training, knowledge sharing, provision of a cookbook to enable them to run and operate the solution you have designed. This will also include providing warranty support. In addition to the role you are expected to: Identify security risks and exposures during the analysis and how the design mitigate these risks. It maybe possible you identify security risks which are not in-scope, however you will be expected to call these out to ensure they are recognised to senior stakeholders who can then take action. Consider the impact on processes and controls based on the solution designed. Makes recommendations for changes and may implement agreed enhancements. Always look for solutions, rather than just call out the problems. Recognise that client is a regulated financial institution and as such your conduct must align with the compliance needs. Skills and experience A combination of several of the below should be covered: Sailpoint IIQ (Identity IQ), at least 5 to 8 years of experience implementing Sailpoint solution Identity & Access Management (IAM) Expert knowledge on one or more of following technology platforms: Windows, Unix, Network, Office/End User technologies, Mainframe, Tandem or Middleware Professional certification in CISSP, CISM and CISA, or equivalent is a plus Design, Development & Implementation of SailPoint Infrastructure Is creative and sees the bigger picture when designing solutions Works proactively, thereby keeping possible problems from affecting the overall functioning of the team Interpersonal/Soft Skills Embraces the belief that teamwork is essential for achieving results Leverages influence and negotiates to achieve the defined goals. Uses a diplomatic attitude to reach goals. Is a good communicator (verbal and written), structured and focuses on the requirements of the customer. Is capable of working in an environment with continuous change on the related services; can adapt to ever changing service needs in a spirit of continuous improvements. You are self-motivated, autonomous, problem oriented and able to make high-quality solutions considering the available means Languages: Mandatory: English excellent both speaking and writing
17/04/2024
Project-based
Title : Sailpoint Engineer Location : Brussels - (1x or 2x days a week onsite is mandatory) Duration : 6 months ROLLING contract Budget : €500 - €550 per day, all inclusive Language : English THIS PROJECT IS OUTSIDE IR35 Role As a SailPoint Engineer, you will contribute to the delivery of the SailPoint infrastructure OS Upgrade. You will join the Logical Access Management project team. This role includes the analysis, design, build, test and deployment of the new infrastructure aligned to the established project governance. Your role involves working closely with colleagues in different domains (and may include external suppliers) to obtain the requirements so that you can design the optimal, secure solutions. A security focus with an understanding of the challenges our internal customers face, as well as a positive problem solving, and an analytical mindset are your strongest skills. You will be expected to document the solutions you design in clients standard templates such as a High-Level Technical Design; Detailed Functional Design; Detailed Technical Design, where you will need to obtain sign-off from reviewers while addressing all the concerns. You will build the solution in our test environment and ensure the solution goes through all the formal testing stages with our internal customers to obtain signoffs. Once tested and signed-off, you will perform handovers with the Operations Team, which may include performing training, knowledge sharing, provision of a cookbook to enable them to run and operate the solution you have designed. This will also include providing warranty support. In addition to the role you are expected to: Identify security risks and exposures during the analysis and how the design mitigate these risks. It maybe possible you identify security risks which are not in-scope, however you will be expected to call these out to ensure they are recognised to senior stakeholders who can then take action. Consider the impact on processes and controls based on the solution designed. Makes recommendations for changes and may implement agreed enhancements. Always look for solutions, rather than just call out the problems. Recognise that client is a regulated financial institution and as such your conduct must align with the compliance needs. Skills and experience A combination of several of the below should be covered: Sailpoint IIQ (Identity IQ), at least 5 to 8 years of experience implementing Sailpoint solution Identity & Access Management (IAM) Expert knowledge on one or more of following technology platforms: Windows, Unix, Network, Office/End User technologies, Mainframe, Tandem or Middleware Professional certification in CISSP, CISM and CISA, or equivalent is a plus Design, Development & Implementation of SailPoint Infrastructure Is creative and sees the bigger picture when designing solutions Works proactively, thereby keeping possible problems from affecting the overall functioning of the team Interpersonal/Soft Skills Embraces the belief that teamwork is essential for achieving results Leverages influence and negotiates to achieve the defined goals. Uses a diplomatic attitude to reach goals. Is a good communicator (verbal and written), structured and focuses on the requirements of the customer. Is capable of working in an environment with continuous change on the related services; can adapt to ever changing service needs in a spirit of continuous improvements. You are self-motivated, autonomous, problem oriented and able to make high-quality solutions considering the available means Languages: Mandatory: English excellent both speaking and writing