Vallum
Reading, Berkshire
Job: Security Architect Location: Reading, UK, Hybrid Job Type: Permanent Job Description We are seeking a highly skilled and experienced Security Architect to join our team who will be responsible for development of the Security Architecture that ensures the appropriate protection of all aspects of security, (people, process, electronic, data, physical) in Spring Fibre. You will be a subject matter expert and provide security guidance and recommendations to technology/business teams and contribute toSpring's security policies, standards, and guidelines related to information and Network security. This is a technical role and suitable for someone who has hands on experience in Cybersecurity. Responsibilities Help develop an Enterprise Security Architecture Framework, including patterns for identity & authentication, authorization and access control, cryptographic key and certificate management, auditing and security monitoring, data leakage prevention, privacy enhancement & protection and other standards in alignment with Enterprise Architect platforms. Establish metrics and monitoring to report the effectiveness and efficiency of the Security Architecture function. Identify, register and maintain security risks throughout their lifetimes, including agreeing treatment of risks with their owners, and reporting &escalating to Internal Audit and the CIO, when necessary. Develop, review and update security & privacy policies & standards and provide awareness guidelines, implementation and exceptions advice. Engage with owners & custodians of BAU IT systems to understand the architecture, data flow and security controls in their systems. Conduct periodic security compliance assessments and ISO 27001/2 reviews of BAU IT applications, infrastructures & ISMS. Review the security posture of potential M&A acquisition targets. Requirement Mapping long term business requirements to security architecture frameworks such as NIST, CIS etc. Experience delivering Hybrid Cloud and Internet facing applications with a strong focus on cyber security. Broad hands-on knowledge of Firewalls, intrusion detection systems, data encryption, and other industry-standard techniques and practices. Strong knowledge of IT infrastructure, IP Networking, security best practices, and automation technologies. Application security: including but not limited to: authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure code development methodologies. Infrastructure security: including but not limited to: network security, host security, database security, device security, VPNs & SSLs, secure file transfers, security event monitoring, malware security and cyber security. Operational security: including but not limited to: incident management, change & patch management, data centre & physical security, backups, DR & BCP, outsourcing, managed services, cloud computing, asset management, cryptographic keys & certificate management, PCI DSS and DPA compliance and ISO 27001/2. Analysing network security controls, including Firewall and Router security configuration. Preferred Delivering the security review processes and frameworks, with full audit trail. Managing multiple security assessments and changing priorities, simultaneously Ensuring Security Architecture Review is built into group wide and business specific processes for acquiring and developing new technology,including developing any needed processes. Aligning business requirements to complex security architecture frameworks. Skills Required: In depth knowledge of: Firewall: Juniper/Cisco/PaloAlto. Onion Security, Splunk, Suricata, Kali. Application Security. Identity and Access Management. Data Protection. Endpoint Security. Cyber Security Operations. Experienced with Threat Modelling. Pen testing and basic incident response. Scripting languages ( python, or PowerShell/building dashboards/au-tomating common tasks) Preferred: Experience in designing systems against a zero-trust architecture. Experience with designing SOC architectures (ie SIEM, SOAR and vulnerability management solutions). Expert-level certification in either AWS or Azure, with a Security specialization. Experience in working within regulated environments, such as PCI-DSS Experience in defining secure development life cycles. Qualifications Bachelor's Degree in either Computer Science, Computer Engineering, Software Engineering, Electrical Engineering, Math, Physics. CISSP, Certified Information Systems Security Professional, International Information Systems Security Certification Consortium (ISC2) Certification, Microsoft Azure Solutions Architect, or AWS Solutions Architect.
Job: Security Architect Location: Reading, UK, Hybrid Job Type: Permanent Job Description We are seeking a highly skilled and experienced Security Architect to join our team who will be responsible for development of the Security Architecture that ensures the appropriate protection of all aspects of security, (people, process, electronic, data, physical) in Spring Fibre. You will be a subject matter expert and provide security guidance and recommendations to technology/business teams and contribute toSpring's security policies, standards, and guidelines related to information and Network security. This is a technical role and suitable for someone who has hands on experience in Cybersecurity. Responsibilities Help develop an Enterprise Security Architecture Framework, including patterns for identity & authentication, authorization and access control, cryptographic key and certificate management, auditing and security monitoring, data leakage prevention, privacy enhancement & protection and other standards in alignment with Enterprise Architect platforms. Establish metrics and monitoring to report the effectiveness and efficiency of the Security Architecture function. Identify, register and maintain security risks throughout their lifetimes, including agreeing treatment of risks with their owners, and reporting &escalating to Internal Audit and the CIO, when necessary. Develop, review and update security & privacy policies & standards and provide awareness guidelines, implementation and exceptions advice. Engage with owners & custodians of BAU IT systems to understand the architecture, data flow and security controls in their systems. Conduct periodic security compliance assessments and ISO 27001/2 reviews of BAU IT applications, infrastructures & ISMS. Review the security posture of potential M&A acquisition targets. Requirement Mapping long term business requirements to security architecture frameworks such as NIST, CIS etc. Experience delivering Hybrid Cloud and Internet facing applications with a strong focus on cyber security. Broad hands-on knowledge of Firewalls, intrusion detection systems, data encryption, and other industry-standard techniques and practices. Strong knowledge of IT infrastructure, IP Networking, security best practices, and automation technologies. Application security: including but not limited to: authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure code development methodologies. Infrastructure security: including but not limited to: network security, host security, database security, device security, VPNs & SSLs, secure file transfers, security event monitoring, malware security and cyber security. Operational security: including but not limited to: incident management, change & patch management, data centre & physical security, backups, DR & BCP, outsourcing, managed services, cloud computing, asset management, cryptographic keys & certificate management, PCI DSS and DPA compliance and ISO 27001/2. Analysing network security controls, including Firewall and Router security configuration. Preferred Delivering the security review processes and frameworks, with full audit trail. Managing multiple security assessments and changing priorities, simultaneously Ensuring Security Architecture Review is built into group wide and business specific processes for acquiring and developing new technology,including developing any needed processes. Aligning business requirements to complex security architecture frameworks. Skills Required: In depth knowledge of: Firewall: Juniper/Cisco/PaloAlto. Onion Security, Splunk, Suricata, Kali. Application Security. Identity and Access Management. Data Protection. Endpoint Security. Cyber Security Operations. Experienced with Threat Modelling. Pen testing and basic incident response. Scripting languages ( python, or PowerShell/building dashboards/au-tomating common tasks) Preferred: Experience in designing systems against a zero-trust architecture. Experience with designing SOC architectures (ie SIEM, SOAR and vulnerability management solutions). Expert-level certification in either AWS or Azure, with a Security specialization. Experience in working within regulated environments, such as PCI-DSS Experience in defining secure development life cycles. Qualifications Bachelor's Degree in either Computer Science, Computer Engineering, Software Engineering, Electrical Engineering, Math, Physics. CISSP, Certified Information Systems Security Professional, International Information Systems Security Certification Consortium (ISC2) Certification, Microsoft Azure Solutions Architect, or AWS Solutions Architect.
ARM (Advanced Resource Managers)
Lead IT Security Manager Permanent Birmingham - 2 Days per week on site £48,900 - £61,140 per annum My client in the Rail industry are looking for a Lead IT Security Manager to join their fast-paced Operations team on a permanent basis. The Lead IT Security Manager is responsible for is the effective management of the Security Operations pillar within the IT Security, Compliance & Identity function. This includes Security technology and Security Operations Centre management. Key focus areas for this role, the ideal candidate will have experience in each of the below; Threat & Vulnerability Management Security Operations Centre - 24/7 Outsourced Web & Content Filtering - ProofPoint, Zscaler, etc. Endpoint Security Infrastructure Security Accountabilities * Lead the Security Operations pillar, determining and delivering requirements, methods, and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability management (among other activity) . * Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation (including playbooks and guidance). * Manage the application and compliance of security operations procedures, reviewing actual and potential security breaches, and ensuring their investigation. * Lead the Security Operations team's response to incidents, recommending actions and appropriate control improvements. * Monitor the external environment to gather intelligence on emerging technologies, documenting impacts, threats, and opportunities to IT. * Provide expert advice on threat intelligence activities, identifying which threat categories are most dangerous to the organization and how to defend against them. * Manage vulnerability assessment activities within company IT, providing expert advice where necessary in the review of vulnerability assessment tools and techniques. * Develop, maintain, and test Security Operations' incident management procedures, investigating escalated incidents and facilitating recovery post-incident resolution. * Lead Security Operations risk management activities, leading on the identification of risks and vulnerabilities and assessment of their impacts. * Manage and oversee the day-to-day activity of the SOC supplier who will deliver security capabilities, communicating their activity to relevant teams. * Manage the design, delivery, maintenance, and continuous improvement of the IT Security Ops capabilities in line with business needs. * Manage the Security Operations Centre (SOC) capability, ensuring effective protection, defence, and response to IT security risks. * Promote the Security, Compliance & Identity function to develop and enhance the team profile to develop enduring relationships with stakeholders and teams. * Implement a multi-year Security roadmap that provides proactive capabilities which enable business objectives. * Actively promote and embed Equality Diversity and Inclusion (EDI) in all your work, and support and comply with all organisational initiatives, policies and procedures on EDI. Skills: * Relationship Building. Ability to develop and maintain strong relationships with internal and external stakeholders. * Security Operations. Ability provide leadership for live security incidents and helping conduct robust investigations in order to identify corrective actions and see them through to completion. * Threat Intelligence. Ability to provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of threat landscape. * Vulnerability Assessment. Ability to identify and classify security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. * Risk Management. Ability to identify IT security operations risks and the delivery of audit remediation activities. * Emerging technology monitoring. Ability to identify and assess new and emerging technologies, products, services, methods and techniques. Knowledge: * Knowledge of IT Service Frameworks, methodologies, and best practice such as ITIL v4 and Agile. * Knowledge of day-to-day activities and best practice within a SOC. * Knowledge of technical security such as Firewalls, network security groups, and access controls. Type of Experience: * Experience of leading a team through the full IT service life cycle, enhancing security posture, and evolving capabilities via continual service improvement. * Experience of leading live cyber incidents and the remediation actions. * Experience of partnering with supplier teams for managed services delivery of improvements. * Experience across the full IT security spectrum (software, Servers, infrastructure, and networks). * Experience designing and implementing secure systems, leading review where necessary of complex security issues. * Experience of enabling and informing risk-based decisions. * Experience dealing with the security implications of transformation and day-to-day product changes. * Experience working with system architectures, displaying a strong understanding of the impact of vulnerabilities on varied systems Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition and management consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically and strategically important industries in the UK and the world today. We will never send your CV without your permission.
Lead IT Security Manager Permanent Birmingham - 2 Days per week on site £48,900 - £61,140 per annum My client in the Rail industry are looking for a Lead IT Security Manager to join their fast-paced Operations team on a permanent basis. The Lead IT Security Manager is responsible for is the effective management of the Security Operations pillar within the IT Security, Compliance & Identity function. This includes Security technology and Security Operations Centre management. Key focus areas for this role, the ideal candidate will have experience in each of the below; Threat & Vulnerability Management Security Operations Centre - 24/7 Outsourced Web & Content Filtering - ProofPoint, Zscaler, etc. Endpoint Security Infrastructure Security Accountabilities * Lead the Security Operations pillar, determining and delivering requirements, methods, and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability management (among other activity) . * Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation (including playbooks and guidance). * Manage the application and compliance of security operations procedures, reviewing actual and potential security breaches, and ensuring their investigation. * Lead the Security Operations team's response to incidents, recommending actions and appropriate control improvements. * Monitor the external environment to gather intelligence on emerging technologies, documenting impacts, threats, and opportunities to IT. * Provide expert advice on threat intelligence activities, identifying which threat categories are most dangerous to the organization and how to defend against them. * Manage vulnerability assessment activities within company IT, providing expert advice where necessary in the review of vulnerability assessment tools and techniques. * Develop, maintain, and test Security Operations' incident management procedures, investigating escalated incidents and facilitating recovery post-incident resolution. * Lead Security Operations risk management activities, leading on the identification of risks and vulnerabilities and assessment of their impacts. * Manage and oversee the day-to-day activity of the SOC supplier who will deliver security capabilities, communicating their activity to relevant teams. * Manage the design, delivery, maintenance, and continuous improvement of the IT Security Ops capabilities in line with business needs. * Manage the Security Operations Centre (SOC) capability, ensuring effective protection, defence, and response to IT security risks. * Promote the Security, Compliance & Identity function to develop and enhance the team profile to develop enduring relationships with stakeholders and teams. * Implement a multi-year Security roadmap that provides proactive capabilities which enable business objectives. * Actively promote and embed Equality Diversity and Inclusion (EDI) in all your work, and support and comply with all organisational initiatives, policies and procedures on EDI. Skills: * Relationship Building. Ability to develop and maintain strong relationships with internal and external stakeholders. * Security Operations. Ability provide leadership for live security incidents and helping conduct robust investigations in order to identify corrective actions and see them through to completion. * Threat Intelligence. Ability to provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of threat landscape. * Vulnerability Assessment. Ability to identify and classify security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. * Risk Management. Ability to identify IT security operations risks and the delivery of audit remediation activities. * Emerging technology monitoring. Ability to identify and assess new and emerging technologies, products, services, methods and techniques. Knowledge: * Knowledge of IT Service Frameworks, methodologies, and best practice such as ITIL v4 and Agile. * Knowledge of day-to-day activities and best practice within a SOC. * Knowledge of technical security such as Firewalls, network security groups, and access controls. Type of Experience: * Experience of leading a team through the full IT service life cycle, enhancing security posture, and evolving capabilities via continual service improvement. * Experience of leading live cyber incidents and the remediation actions. * Experience of partnering with supplier teams for managed services delivery of improvements. * Experience across the full IT security spectrum (software, Servers, infrastructure, and networks). * Experience designing and implementing secure systems, leading review where necessary of complex security issues. * Experience of enabling and informing risk-based decisions. * Experience dealing with the security implications of transformation and day-to-day product changes. * Experience working with system architectures, displaying a strong understanding of the impact of vulnerabilities on varied systems Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition and management consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically and strategically important industries in the UK and the world today. We will never send your CV without your permission.
Synergize Consulting Ltd
New Malden, Surrey
My client, a leading multinational defence company, are currently seeking a Principal Engineer/Technical Designer to join the business in a permanent capacity. The role is based out of my client's secure site in New Malden. It is offered on a hybrid basis, 2-3 days a week on site. Due to the nature of my clients work, candidates must either hold a live SC Clearance or be willing and able to undergo the clearance process. The principal engineer will design and implement information systems to support the business Share infrastructure. This candidate will ensure that all systems are working at optimal levels and support the development of new technologies and system requirements. To accomplish their core duty of designing and implementing complex computer systems, this candidate will be responsible for many tasks including: Leads the design and review processes, developing and documenting the proposed technical design for the integration and implementation. Create detailed plans for the integration of new systems architecture into existing infrastructure/systems. This includes logistical plans for the Operations teams to actually conduct the physical integrations, during which the candidate provides technical direction and support Analysing existing systems to ensure they offer adequate security and are effectively meeting the needs of systems/subsystems. They coordinate with all systems and subsystems teams to see that the system of systems is working optimally. They also analyse requirements to identify where they can integrate new hardware, operating systems, or connectivity solutions. Based on their knowledge of infrastructure, systems and their analysis of the systems' needs, the candidate may recommend alternative technologies or improvements to enhance systems to support Share infrastructure teams goals. Core skills: Experience with a broad range of technologies and building roadmaps Experience designing, integrating and managing complex infrastructure solutions Experience producing design documentation and associated governance and assurance processes Ability to provide technical system solutions, determine overall design direction and provide hardware recommendations for complex technical issues Experience planning and developing support processes and adhering to best practices Strong written and oral communication skills, and the ability to effectively communicate with technical and non-technical audiences Advanced skills: Knowledge of server Operating Systems (Windows, Linux, Unix etc) Knowledge of VMWARE and Virtualisation technologies (VMware Horizon, Citrix Xen Desktop) Knowledge of SAN and Storage Networks Knowledge of network technologies. Synergize Consulting is committed to equality and diversity in our workplace. Synergize Consulting provides equal employment opportunity to all employees and applicants without regard to an individual's protected status, including race/ethnic origin, colour, nationality, national origin, ancestry, sex/gender, gender identity/expression, gender reassignment, sexual orientation, marriage/civil partnership, pregnancy/maternity, religion or belief, age, disability, or any other protected status or characteristic
My client, a leading multinational defence company, are currently seeking a Principal Engineer/Technical Designer to join the business in a permanent capacity. The role is based out of my client's secure site in New Malden. It is offered on a hybrid basis, 2-3 days a week on site. Due to the nature of my clients work, candidates must either hold a live SC Clearance or be willing and able to undergo the clearance process. The principal engineer will design and implement information systems to support the business Share infrastructure. This candidate will ensure that all systems are working at optimal levels and support the development of new technologies and system requirements. To accomplish their core duty of designing and implementing complex computer systems, this candidate will be responsible for many tasks including: Leads the design and review processes, developing and documenting the proposed technical design for the integration and implementation. Create detailed plans for the integration of new systems architecture into existing infrastructure/systems. This includes logistical plans for the Operations teams to actually conduct the physical integrations, during which the candidate provides technical direction and support Analysing existing systems to ensure they offer adequate security and are effectively meeting the needs of systems/subsystems. They coordinate with all systems and subsystems teams to see that the system of systems is working optimally. They also analyse requirements to identify where they can integrate new hardware, operating systems, or connectivity solutions. Based on their knowledge of infrastructure, systems and their analysis of the systems' needs, the candidate may recommend alternative technologies or improvements to enhance systems to support Share infrastructure teams goals. Core skills: Experience with a broad range of technologies and building roadmaps Experience designing, integrating and managing complex infrastructure solutions Experience producing design documentation and associated governance and assurance processes Ability to provide technical system solutions, determine overall design direction and provide hardware recommendations for complex technical issues Experience planning and developing support processes and adhering to best practices Strong written and oral communication skills, and the ability to effectively communicate with technical and non-technical audiences Advanced skills: Knowledge of server Operating Systems (Windows, Linux, Unix etc) Knowledge of VMWARE and Virtualisation technologies (VMware Horizon, Citrix Xen Desktop) Knowledge of SAN and Storage Networks Knowledge of network technologies. Synergize Consulting is committed to equality and diversity in our workplace. Synergize Consulting provides equal employment opportunity to all employees and applicants without regard to an individual's protected status, including race/ethnic origin, colour, nationality, national origin, ancestry, sex/gender, gender identity/expression, gender reassignment, sexual orientation, marriage/civil partnership, pregnancy/maternity, religion or belief, age, disability, or any other protected status or characteristic