Cyber Security Analyst Position bei unserem Kunden aus dem Dienstleistungsbereich in Zürich zu besetzen. Ihre Aufgaben: Leiten und koordinieren von Security Incident Investigations Teilnahmen an Projekten und Umsetzen von Aufträgen im Bereich der Cyber Security Aufbauen, Optimieren und Weiterentwickeln der Cyber Security Services Analysieren, Triage und Incident Response als Teil des Emergency Response Teams Ihre Kenntnisse: Erfahrung mit EDR idealerweise mit Palo Alto Networks Cortex XDR oder Erfahrung im Bereich SIEM idealerweise Palo Alto Networks XSIAM Sehr gute Kenntnisse in Windows und Linux Betriebssystemen Kenntnisse in Netzwerktechnik sowie in Webtechniken und -protokollen Erfahrung in Security (Offense oder Defense) von Vorteil Sprachen: Deutsch und Englisch, fliessend in Wort und Schrift Ihre Soft Skills: Gute Kommunikationsfähigkeit von Vorteil Ort: Zürich, Schweiz Sektor: Dienstleistung Start: ASAP Projektdauer: 07MM+ Ref .Nr.: BH 21587 Machen Sie den nächsten Schritt und senden Sie uns Ihren Lebenslauf sowie eine Telefonnummer, unter der wir Sie tagsüber erreichen können. Aufgrund der schweizerischen Arbeitsgesetzgebung können wir nur Bewerbungen von Schweizer Staatsbürgern, EU-Bürgern und Personen mit einer Arbeitserlaubnis in Betracht ziehen. Ukrainische Flüchtlinge sind herzlich willkommen, und wir werden Sie auf Ihrem Weg unterstützen. Wir begrüssen Bewerbungen von Personen aller Geschlechter, Altersgruppen im erwerbsfähigen Alter, sexuellen Orientierungen, persönlichen Ausdrucksformen, ethnischen Zugehörigkeiten und religiösen Überzeugungen. Daher sind Angaben zum Geschlecht oder ein Foto in Ihrer Bewerbung nicht erforderlich. Aufgrund von Kundenanforderungen benötigen wir Informationen zu Ihrem Familienstand, Ihrer Staatsangehörigkeit, Ihrem Geburtsdatum sowie einer gültigen Schweizer Arbeitsbewilligung. Bei Bewerbern mit Behinderungen sind wir gerne bereit, gemeinsam mit unserem Endkunden mögliche Lösungen zu prüfen.
25/04/2024
Project-based
Cyber Security Analyst Position bei unserem Kunden aus dem Dienstleistungsbereich in Zürich zu besetzen. Ihre Aufgaben: Leiten und koordinieren von Security Incident Investigations Teilnahmen an Projekten und Umsetzen von Aufträgen im Bereich der Cyber Security Aufbauen, Optimieren und Weiterentwickeln der Cyber Security Services Analysieren, Triage und Incident Response als Teil des Emergency Response Teams Ihre Kenntnisse: Erfahrung mit EDR idealerweise mit Palo Alto Networks Cortex XDR oder Erfahrung im Bereich SIEM idealerweise Palo Alto Networks XSIAM Sehr gute Kenntnisse in Windows und Linux Betriebssystemen Kenntnisse in Netzwerktechnik sowie in Webtechniken und -protokollen Erfahrung in Security (Offense oder Defense) von Vorteil Sprachen: Deutsch und Englisch, fliessend in Wort und Schrift Ihre Soft Skills: Gute Kommunikationsfähigkeit von Vorteil Ort: Zürich, Schweiz Sektor: Dienstleistung Start: ASAP Projektdauer: 07MM+ Ref .Nr.: BH 21587 Machen Sie den nächsten Schritt und senden Sie uns Ihren Lebenslauf sowie eine Telefonnummer, unter der wir Sie tagsüber erreichen können. Aufgrund der schweizerischen Arbeitsgesetzgebung können wir nur Bewerbungen von Schweizer Staatsbürgern, EU-Bürgern und Personen mit einer Arbeitserlaubnis in Betracht ziehen. Ukrainische Flüchtlinge sind herzlich willkommen, und wir werden Sie auf Ihrem Weg unterstützen. Wir begrüssen Bewerbungen von Personen aller Geschlechter, Altersgruppen im erwerbsfähigen Alter, sexuellen Orientierungen, persönlichen Ausdrucksformen, ethnischen Zugehörigkeiten und religiösen Überzeugungen. Daher sind Angaben zum Geschlecht oder ein Foto in Ihrer Bewerbung nicht erforderlich. Aufgrund von Kundenanforderungen benötigen wir Informationen zu Ihrem Familienstand, Ihrer Staatsangehörigkeit, Ihrem Geburtsdatum sowie einer gültigen Schweizer Arbeitsbewilligung. Bei Bewerbern mit Behinderungen sind wir gerne bereit, gemeinsam mit unserem Endkunden mögliche Lösungen zu prüfen.
Job Title: Service Monitoring and Maintenance Engineer Contract Type: Contract (Inside IR35), 12 Months Job Description: We are seeking a highly skilled Service Monitoring and Maintenance Engineer to join our team on a 12-month contract basis. The successful candidate will be responsible for monitoring and maintaining the operational health of various services within our technology ecosystem. This role is crucial in ensuring the reliability and performance of our services, making use of a variety of tools and platforms. Key Responsibilities: Service Monitoring: Continuously monitor service metrics through various platforms such as BES, ECP Platform Health Dashboard, and CloudWatch metrics. Identify and respond to anomalies and performance issues promptly. Application Maintenance: Regularly update and maintain application code across services. This includes managing: Python runtime and dependencies Terraform configurations GitHub Actions workflows Incident Management Develop and execute runbooks/playbooks for efficient response to incidents and service requests. Ensure swift resolution and minimal downtime. Testing and Quality Assurance: Create, maintain, and enhance testing frameworks and infrastructure. Responsibilities include: Developing and executing unit tests and synthetic tests Integrating and maintaining BES Monitoring Ensuring proper functioning with the ECP Platform Health Dashboard Deployment and Configuration Management: Manage GitHub deployment workflows to ensure smooth and reliable deployment processes. Responsibilities include: Performing tests on deployments Reverting configurations that compromise operational availability, such as erroneous Firewall rules Service Review and Stakeholder Engagement: Regularly review service performance and incident reports. Provide constructive feedback and recommendations to ECP stakeholders and incorporate feedback from customers to enhance service delivery. Required Skills and Qualifications: Technical Expertise: Proficiency in Python, Terraform, and GitHub. Experience with AWS CloudWatch or similar monitoring tools is highly desired. Problem Solving: Strong analytical and problem-solving skills with the ability to handle multiple incidents and emergencies. Communication: Excellent communication skills, capable of effectively articulating technical challenges and solutions to stakeholders and team members. Experience: Proven experience in managing IT service delivery, monitoring, and incident response. Additional Requirements: Ability to work in a fast-paced, dynamic environment. Demonstrated experience in handling large-scale services and deployments. A proactive approach to service health and improvements.
25/04/2024
Project-based
Job Title: Service Monitoring and Maintenance Engineer Contract Type: Contract (Inside IR35), 12 Months Job Description: We are seeking a highly skilled Service Monitoring and Maintenance Engineer to join our team on a 12-month contract basis. The successful candidate will be responsible for monitoring and maintaining the operational health of various services within our technology ecosystem. This role is crucial in ensuring the reliability and performance of our services, making use of a variety of tools and platforms. Key Responsibilities: Service Monitoring: Continuously monitor service metrics through various platforms such as BES, ECP Platform Health Dashboard, and CloudWatch metrics. Identify and respond to anomalies and performance issues promptly. Application Maintenance: Regularly update and maintain application code across services. This includes managing: Python runtime and dependencies Terraform configurations GitHub Actions workflows Incident Management Develop and execute runbooks/playbooks for efficient response to incidents and service requests. Ensure swift resolution and minimal downtime. Testing and Quality Assurance: Create, maintain, and enhance testing frameworks and infrastructure. Responsibilities include: Developing and executing unit tests and synthetic tests Integrating and maintaining BES Monitoring Ensuring proper functioning with the ECP Platform Health Dashboard Deployment and Configuration Management: Manage GitHub deployment workflows to ensure smooth and reliable deployment processes. Responsibilities include: Performing tests on deployments Reverting configurations that compromise operational availability, such as erroneous Firewall rules Service Review and Stakeholder Engagement: Regularly review service performance and incident reports. Provide constructive feedback and recommendations to ECP stakeholders and incorporate feedback from customers to enhance service delivery. Required Skills and Qualifications: Technical Expertise: Proficiency in Python, Terraform, and GitHub. Experience with AWS CloudWatch or similar monitoring tools is highly desired. Problem Solving: Strong analytical and problem-solving skills with the ability to handle multiple incidents and emergencies. Communication: Excellent communication skills, capable of effectively articulating technical challenges and solutions to stakeholders and team members. Experience: Proven experience in managing IT service delivery, monitoring, and incident response. Additional Requirements: Ability to work in a fast-paced, dynamic environment. Demonstrated experience in handling large-scale services and deployments. A proactive approach to service health and improvements.
*Fully remote position* *Long Term Contract* A prestigious company is looking for a Red Team Operator - Contract to Hire. This person use and will develop scanning tools. They will go on the offensive side and help find bugs that the scanning tools can't find. They will need experience in a large enterprise environment and work within Linux/Windows/VMware/Azure, etc. Also needed is a coding background for automation purposes (Python, C, Go, Rust, etc.) Responsibilities/Qualifications: We are looking for candidates that take a structured approach to Red Team operations (ie, testing in lab environments, creating and operating according to runbooks and SOPs, writing detailed after-action reports, participating in daily operation syncs). Development experience, including low-level exploit and/or implant development experience (ie, they must have experience in a low-level language such as C or assembly), to aid in our shift to automating as much of our Red Team program as possible. Experience automating repeated tasks with building CI/CD pipelines in Gitlab. Experience developing automation tools using distributed workers using technologies such as RabbitMQ and Celery Experience developing custom red team tools across the entire spectrum of an operation Experience from the initial access exploits to the core implant, the implant features to achieve mission objectives, control posts, and everything in between using programming languages including C, Python, Assembly, Go, Rust Experience with Incident Response Tabletop Exercises including running the exercises and the dispositioning of results from previous exercises
24/04/2024
*Fully remote position* *Long Term Contract* A prestigious company is looking for a Red Team Operator - Contract to Hire. This person use and will develop scanning tools. They will go on the offensive side and help find bugs that the scanning tools can't find. They will need experience in a large enterprise environment and work within Linux/Windows/VMware/Azure, etc. Also needed is a coding background for automation purposes (Python, C, Go, Rust, etc.) Responsibilities/Qualifications: We are looking for candidates that take a structured approach to Red Team operations (ie, testing in lab environments, creating and operating according to runbooks and SOPs, writing detailed after-action reports, participating in daily operation syncs). Development experience, including low-level exploit and/or implant development experience (ie, they must have experience in a low-level language such as C or assembly), to aid in our shift to automating as much of our Red Team program as possible. Experience automating repeated tasks with building CI/CD pipelines in Gitlab. Experience developing automation tools using distributed workers using technologies such as RabbitMQ and Celery Experience developing custom red team tools across the entire spectrum of an operation Experience from the initial access exploits to the core implant, the implant features to achieve mission objectives, control posts, and everything in between using programming languages including C, Python, Assembly, Go, Rust Experience with Incident Response Tabletop Exercises including running the exercises and the dispositioning of results from previous exercises
Job Title: Security Analyst - NATO Clearance Location: Belgium Salary/Rate: €500-€530 Start Date: May 2024 Job Type: Contract *Candidates must hold NATO Clearance* Job description Perform initial analysis of logs and network traffic, determine alert severity and escalate if necessary. Collate information in clear format, providing recommendation and first line response. Responsibility: Conduct assessment of security events. Analyse of Firewalls, IDS, anti-virus and network sensors events. Use tool set for investigations (eg Log collection, Intrusion detection, Packet Capture, Network devices) Support the end-to-end incident handling Process. Propose enhancements in Cybersecurity. Technical skills Degree in IT Experience in cybersecurity analysis: 1 years. Knowledge in communication security, including TCP/IP network, Windows and Linux operating systems. Knowledge of network security threats and mitigation techniques. Experience of two years in: SIEM ( eg Splunk, Arcsight ) Analysis, of NIDS events ( eg Palo Alto Network Threat Prevention, Sourcefire ) Log analysis of various sources ( Firewall, Routers, Proxies ) Network traffic Capture analysis using Wireshark Logical approach to analysis. Desirable: Certification in cybersecurity area such as GCIA, GNFA Computer Incident response Team CIRT, CERT Full packet Capture System ( eg NetWitness, Niksun ) HIDS Computer security tools - vulnerability Assessment, Protocol analysis, Anti-virus; Forensics tools Disclaimer Notwithstanding any guidelines given to level of experience sought, we will consider candidates from outside this range if they can demonstrate the necessary competencies. Square One is acting as both an employment agency and an employment business, and is an equal opportunities recruitment business. Square One embraces diversity and will treat everyone equally. Please see our website for our full diversity statement.
24/04/2024
Project-based
Job Title: Security Analyst - NATO Clearance Location: Belgium Salary/Rate: €500-€530 Start Date: May 2024 Job Type: Contract *Candidates must hold NATO Clearance* Job description Perform initial analysis of logs and network traffic, determine alert severity and escalate if necessary. Collate information in clear format, providing recommendation and first line response. Responsibility: Conduct assessment of security events. Analyse of Firewalls, IDS, anti-virus and network sensors events. Use tool set for investigations (eg Log collection, Intrusion detection, Packet Capture, Network devices) Support the end-to-end incident handling Process. Propose enhancements in Cybersecurity. Technical skills Degree in IT Experience in cybersecurity analysis: 1 years. Knowledge in communication security, including TCP/IP network, Windows and Linux operating systems. Knowledge of network security threats and mitigation techniques. Experience of two years in: SIEM ( eg Splunk, Arcsight ) Analysis, of NIDS events ( eg Palo Alto Network Threat Prevention, Sourcefire ) Log analysis of various sources ( Firewall, Routers, Proxies ) Network traffic Capture analysis using Wireshark Logical approach to analysis. Desirable: Certification in cybersecurity area such as GCIA, GNFA Computer Incident response Team CIRT, CERT Full packet Capture System ( eg NetWitness, Niksun ) HIDS Computer security tools - vulnerability Assessment, Protocol analysis, Anti-virus; Forensics tools Disclaimer Notwithstanding any guidelines given to level of experience sought, we will consider candidates from outside this range if they can demonstrate the necessary competencies. Square One is acting as both an employment agency and an employment business, and is an equal opportunities recruitment business. Square One embraces diversity and will treat everyone equally. Please see our website for our full diversity statement.
Are you passionate about ensuring the security and integrity of digital systems? Do you thrive in a dynamic environment where your expertise can make a real impact? If so, Lorien are currently working with a leading SaaS provider to the public and private sector that enables millions of end users to use there platform for certification and compliance. They require an IT Security Administrator to support the IT Security Manager on a number of objectives including safeguarding the digital assets, highest standards of security across the business and its users. Responsibilities include: Management of the ISMS to maintain confidentiality, integrity and availability of information assets Oversee and maintain the business continuity programme to ensure uninterrupted operations in the face of disruptions Responding to and coordinating cyber security incidents, conducting investigations and implementing remediation measures Assisting on compliance with industry standards such as ISO 27001 and Cyber Security Essentials Plus Assistance with implementing PCI DSS and SOC-2 as well as proactively adopting new standards as/when identified Experience: 2-3 years in an IT Role 2 years+ experience in a security discipline Working knowledge of industry IT Compliance standards particularly in design and implementation of an ISMS in line with IS) 27001 and Cyber Essentials Plus Experience of Anti-virus prevention, Firewalls, SIEM, IDS and other technical security controls Performing or supporting Information Security Audits Resolving Security issues Experience of Security Incident Response As this is a newly created role for the business as they grow out the internal Information Security function, it is very important that the person coming into the role would be highly motivated, proactive, thrives on change, willingness to gain new knowledge and skills, multitasker and flexible and adaptable. More importantly, excellent communication skills verbal and written. The role is paying up to £52,000 on a hybrid model with 1 day a week (at least) in the office. Benefits include, 25 days holiday plus bank holidays, flexible bank holidays, EV car scheme, matched pension, BUPA Healthscheme and early finish on last Friday of each month. If the role is of interest, please apply for further details. Carbon60, Lorien & SRG - The Impellam Group STEM Portfolio are acting as an Employment Business in relation to this vacancy.
24/04/2024
Full time
Are you passionate about ensuring the security and integrity of digital systems? Do you thrive in a dynamic environment where your expertise can make a real impact? If so, Lorien are currently working with a leading SaaS provider to the public and private sector that enables millions of end users to use there platform for certification and compliance. They require an IT Security Administrator to support the IT Security Manager on a number of objectives including safeguarding the digital assets, highest standards of security across the business and its users. Responsibilities include: Management of the ISMS to maintain confidentiality, integrity and availability of information assets Oversee and maintain the business continuity programme to ensure uninterrupted operations in the face of disruptions Responding to and coordinating cyber security incidents, conducting investigations and implementing remediation measures Assisting on compliance with industry standards such as ISO 27001 and Cyber Security Essentials Plus Assistance with implementing PCI DSS and SOC-2 as well as proactively adopting new standards as/when identified Experience: 2-3 years in an IT Role 2 years+ experience in a security discipline Working knowledge of industry IT Compliance standards particularly in design and implementation of an ISMS in line with IS) 27001 and Cyber Essentials Plus Experience of Anti-virus prevention, Firewalls, SIEM, IDS and other technical security controls Performing or supporting Information Security Audits Resolving Security issues Experience of Security Incident Response As this is a newly created role for the business as they grow out the internal Information Security function, it is very important that the person coming into the role would be highly motivated, proactive, thrives on change, willingness to gain new knowledge and skills, multitasker and flexible and adaptable. More importantly, excellent communication skills verbal and written. The role is paying up to £52,000 on a hybrid model with 1 day a week (at least) in the office. Benefits include, 25 days holiday plus bank holidays, flexible bank holidays, EV car scheme, matched pension, BUPA Healthscheme and early finish on last Friday of each month. If the role is of interest, please apply for further details. Carbon60, Lorien & SRG - The Impellam Group STEM Portfolio are acting as an Employment Business in relation to this vacancy.
Operations Engineer Multi-Asset Trading (London - Remote) Cititec Talent is partnered with a fast-growth scale up in the multi-asset trading space. They are looking for an Operations Engineer where you'll be at the forefront of maintaining their platform's reliability and efficiency, ensuring their clients receive top-notch trading experiences. From monitoring technical infrastructure to managing client onboarding and FIX integrations, you'll contribute directly to their mission of delivering market-leading multi-asset trading technology. Responsibilities: Monitor system performance, troubleshoot technical issues, and collaborate with cross-functional teams to integrate new features while maintaining stability. Assist in onboarding new clients, including setup on the platform, provisioning liquidity, and maintaining clear communication throughout the process. Support FIX integrations for external clients, liquidity providers, and partners, ensuring smooth onboarding and maintenance of trading platform environment. Provide timely responses to technical incidents, analyse root causes, and collaborate with teams to address challenges and prevent recurrence. Identify opportunities to enhance platform performance, scalability, and reliability, implementing optimizations in collaboration with the development team. Skills Required: Bachelor's degree in Computer Science, Information Technology, or related field. Minimum 4 years of experience in operations or infrastructure management within the FinTech industry, preferably with exposure to FX trading platforms. Proficiency in FIX protocol implementation within financial markets. Strong understanding of technical infrastructure components, network protocols, and trading environments. Experience with operating systems and Scripting languages (eg, Python). Familiarity with monitoring and alerting tools for incident management. Excellent problem-solving skills and ability to work effectively under pressure in a dynamic startup environment.
24/04/2024
Full time
Operations Engineer Multi-Asset Trading (London - Remote) Cititec Talent is partnered with a fast-growth scale up in the multi-asset trading space. They are looking for an Operations Engineer where you'll be at the forefront of maintaining their platform's reliability and efficiency, ensuring their clients receive top-notch trading experiences. From monitoring technical infrastructure to managing client onboarding and FIX integrations, you'll contribute directly to their mission of delivering market-leading multi-asset trading technology. Responsibilities: Monitor system performance, troubleshoot technical issues, and collaborate with cross-functional teams to integrate new features while maintaining stability. Assist in onboarding new clients, including setup on the platform, provisioning liquidity, and maintaining clear communication throughout the process. Support FIX integrations for external clients, liquidity providers, and partners, ensuring smooth onboarding and maintenance of trading platform environment. Provide timely responses to technical incidents, analyse root causes, and collaborate with teams to address challenges and prevent recurrence. Identify opportunities to enhance platform performance, scalability, and reliability, implementing optimizations in collaboration with the development team. Skills Required: Bachelor's degree in Computer Science, Information Technology, or related field. Minimum 4 years of experience in operations or infrastructure management within the FinTech industry, preferably with exposure to FX trading platforms. Proficiency in FIX protocol implementation within financial markets. Strong understanding of technical infrastructure components, network protocols, and trading environments. Experience with operating systems and Scripting languages (eg, Python). Familiarity with monitoring and alerting tools for incident management. Excellent problem-solving skills and ability to work effectively under pressure in a dynamic startup environment.
Job: Security Architect Location: Reading, UK, Hybrid Job Type: Permanent Job Description We are seeking a highly skilled and experienced Security Architect to join our team who will be responsible for development of the Security Architecture that ensures the appropriate protection of all aspects of security, (people, process, electronic, data, physical) in Spring Fibre. You will be a subject matter expert and provide security guidance and recommendations to technology/business teams and contribute toSpring's security policies, standards, and guidelines related to information and Network security. This is a technical role and suitable for someone who has hands on experience in Cybersecurity. Responsibilities Help develop an Enterprise Security Architecture Framework, including patterns for identity & authentication, authorization and access control, cryptographic key and certificate management, auditing and security monitoring, data leakage prevention, privacy enhancement & protection and other standards in alignment with Enterprise Architect platforms. Establish metrics and monitoring to report the effectiveness and efficiency of the Security Architecture function. Identify, register and maintain security risks throughout their lifetimes, including agreeing treatment of risks with their owners, and reporting &escalating to Internal Audit and the CIO, when necessary. Develop, review and update security & privacy policies & standards and provide awareness guidelines, implementation and exceptions advice. Engage with owners & custodians of BAU IT systems to understand the architecture, data flow and security controls in their systems. Conduct periodic security compliance assessments and ISO 27001/2 reviews of BAU IT applications, infrastructures & ISMS. Review the security posture of potential M&A acquisition targets. Requirement Mapping long term business requirements to security architecture frameworks such as NIST, CIS etc. Experience delivering Hybrid Cloud and Internet facing applications with a strong focus on cyber security. Broad hands-on knowledge of Firewalls, intrusion detection systems, data encryption, and other industry-standard techniques and practices. Strong knowledge of IT infrastructure, IP Networking, security best practices, and automation technologies. Application security: including but not limited to: authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure code development methodologies. Infrastructure security: including but not limited to: network security, host security, database security, device security, VPNs & SSLs, secure file transfers, security event monitoring, malware security and cyber security. Operational security: including but not limited to: incident management, change & patch management, data centre & physical security, backups, DR & BCP, outsourcing, managed services, cloud computing, asset management, cryptographic keys & certificate management, PCI DSS and DPA compliance and ISO 27001/2. Analysing network security controls, including Firewall and Router security configuration. Preferred Delivering the security review processes and frameworks, with full audit trail. Managing multiple security assessments and changing priorities, simultaneously Ensuring Security Architecture Review is built into group wide and business specific processes for acquiring and developing new technology,including developing any needed processes. Aligning business requirements to complex security architecture frameworks. Skills Required: In depth knowledge of: Firewall: Juniper/Cisco/PaloAlto. Onion Security, Splunk, Suricata, Kali. Application Security. Identity and Access Management. Data Protection. Endpoint Security. Cyber Security Operations. Experienced with Threat Modelling. Pen testing and basic incident response. Scripting languages ( python, or PowerShell/building dashboards/au-tomating common tasks) Preferred: Experience in designing systems against a zero-trust architecture. Experience with designing SOC architectures (ie SIEM, SOAR and vulnerability management solutions). Expert-level certification in either AWS or Azure, with a Security specialization. Experience in working within regulated environments, such as PCI-DSS Experience in defining secure development life cycles. Qualifications Bachelor's Degree in either Computer Science, Computer Engineering, Software Engineering, Electrical Engineering, Math, Physics. CISSP, Certified Information Systems Security Professional, International Information Systems Security Certification Consortium (ISC2) Certification, Microsoft Azure Solutions Architect, or AWS Solutions Architect.
24/04/2024
Full time
Job: Security Architect Location: Reading, UK, Hybrid Job Type: Permanent Job Description We are seeking a highly skilled and experienced Security Architect to join our team who will be responsible for development of the Security Architecture that ensures the appropriate protection of all aspects of security, (people, process, electronic, data, physical) in Spring Fibre. You will be a subject matter expert and provide security guidance and recommendations to technology/business teams and contribute toSpring's security policies, standards, and guidelines related to information and Network security. This is a technical role and suitable for someone who has hands on experience in Cybersecurity. Responsibilities Help develop an Enterprise Security Architecture Framework, including patterns for identity & authentication, authorization and access control, cryptographic key and certificate management, auditing and security monitoring, data leakage prevention, privacy enhancement & protection and other standards in alignment with Enterprise Architect platforms. Establish metrics and monitoring to report the effectiveness and efficiency of the Security Architecture function. Identify, register and maintain security risks throughout their lifetimes, including agreeing treatment of risks with their owners, and reporting &escalating to Internal Audit and the CIO, when necessary. Develop, review and update security & privacy policies & standards and provide awareness guidelines, implementation and exceptions advice. Engage with owners & custodians of BAU IT systems to understand the architecture, data flow and security controls in their systems. Conduct periodic security compliance assessments and ISO 27001/2 reviews of BAU IT applications, infrastructures & ISMS. Review the security posture of potential M&A acquisition targets. Requirement Mapping long term business requirements to security architecture frameworks such as NIST, CIS etc. Experience delivering Hybrid Cloud and Internet facing applications with a strong focus on cyber security. Broad hands-on knowledge of Firewalls, intrusion detection systems, data encryption, and other industry-standard techniques and practices. Strong knowledge of IT infrastructure, IP Networking, security best practices, and automation technologies. Application security: including but not limited to: authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure code development methodologies. Infrastructure security: including but not limited to: network security, host security, database security, device security, VPNs & SSLs, secure file transfers, security event monitoring, malware security and cyber security. Operational security: including but not limited to: incident management, change & patch management, data centre & physical security, backups, DR & BCP, outsourcing, managed services, cloud computing, asset management, cryptographic keys & certificate management, PCI DSS and DPA compliance and ISO 27001/2. Analysing network security controls, including Firewall and Router security configuration. Preferred Delivering the security review processes and frameworks, with full audit trail. Managing multiple security assessments and changing priorities, simultaneously Ensuring Security Architecture Review is built into group wide and business specific processes for acquiring and developing new technology,including developing any needed processes. Aligning business requirements to complex security architecture frameworks. Skills Required: In depth knowledge of: Firewall: Juniper/Cisco/PaloAlto. Onion Security, Splunk, Suricata, Kali. Application Security. Identity and Access Management. Data Protection. Endpoint Security. Cyber Security Operations. Experienced with Threat Modelling. Pen testing and basic incident response. Scripting languages ( python, or PowerShell/building dashboards/au-tomating common tasks) Preferred: Experience in designing systems against a zero-trust architecture. Experience with designing SOC architectures (ie SIEM, SOAR and vulnerability management solutions). Expert-level certification in either AWS or Azure, with a Security specialization. Experience in working within regulated environments, such as PCI-DSS Experience in defining secure development life cycles. Qualifications Bachelor's Degree in either Computer Science, Computer Engineering, Software Engineering, Electrical Engineering, Math, Physics. CISSP, Certified Information Systems Security Professional, International Information Systems Security Certification Consortium (ISC2) Certification, Microsoft Azure Solutions Architect, or AWS Solutions Architect.
Cyber Defence Engineer - DV Clearance Required! The Cyber Defence Engineer will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extensions Corsham (4 days on site) What we're looking for: Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Experience using virtualisation software. Excellent communication skills Experience of writing Defence/Government documentation Someone hands on. Responsibilities include: Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and dashboards to give visibility of the Enterprise infrastructure. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further.
23/04/2024
Project-based
Cyber Defence Engineer - DV Clearance Required! The Cyber Defence Engineer will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extensions Corsham (4 days on site) What we're looking for: Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Experience using virtualisation software. Excellent communication skills Experience of writing Defence/Government documentation Someone hands on. Responsibilities include: Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and dashboards to give visibility of the Enterprise infrastructure. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further.
Cyber Defence Engineer - DV Clearance Required! The Cyber Defence Engineer will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extensions Corsham (4 days on site) What we're looking for: Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Experience using virtualisation software. Excellent communication skills Experience of writing Defence/Government documentation Someone hands on. Responsibilities include: Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and dashboards to give visibility of the Enterprise infrastructure. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further.
23/04/2024
Project-based
Cyber Defence Engineer - DV Clearance Required! The Cyber Defence Engineer will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extensions Corsham (4 days on site) What we're looking for: Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Experience using virtualisation software. Excellent communication skills Experience of writing Defence/Government documentation Someone hands on. Responsibilities include: Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and dashboards to give visibility of the Enterprise infrastructure. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further.
IT Security Manager - Security Operations - Birmingham Hybrid working available Salary up to £56,000 %Flex fund IT Security Manager required for a leading client based in Birmingham. My client is currently seeking a IT Security Manager to come on board to effectively manage the Security Operations pillar within the IT Security, Compliance & Identity function. This involves overseeing Security technology and Security Operations Centre management. Additionally, this position involves leveraging and applying understanding of business objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response, threat management, and vulnerability management, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity with IT Service Frameworks, methodologies, and industry best practices such as ITIL v4 and Agile. * Understanding of day-to-day operations and industry best practices within a Security Operations Center (SOC). * Proficiency in technical security aspects including Firewalls, network security groups, and access controls. * Demonstrated leadership in guiding teams through the entire IT service life cycle, fortifying security measures, and advancing capabilities through continual service enhancement. * Track record of leading response efforts during live cyber incidents and executing remediation strategies. * Experience collaborating with supplier teams to facilitate managed services delivery for enhancements. * Broad experience spanning the entire spectrum of IT security, encompassing software, Servers, infrastructure, and networks. * Proven expertise in designing and implementing secure systems, and leading reviews of intricate security matters when necessary. Interested? Please submit your updated CV to Emma Siwicki at Crimson for immediate consideration. Not interested? Do you know someone who might be a perfect fit for this role? Refer a friend and earn £250 worth of vouchers! Crimson is acting as an employment agency regarding this vacancy
23/04/2024
Full time
IT Security Manager - Security Operations - Birmingham Hybrid working available Salary up to £56,000 %Flex fund IT Security Manager required for a leading client based in Birmingham. My client is currently seeking a IT Security Manager to come on board to effectively manage the Security Operations pillar within the IT Security, Compliance & Identity function. This involves overseeing Security technology and Security Operations Centre management. Additionally, this position involves leveraging and applying understanding of business objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response, threat management, and vulnerability management, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity with IT Service Frameworks, methodologies, and industry best practices such as ITIL v4 and Agile. * Understanding of day-to-day operations and industry best practices within a Security Operations Center (SOC). * Proficiency in technical security aspects including Firewalls, network security groups, and access controls. * Demonstrated leadership in guiding teams through the entire IT service life cycle, fortifying security measures, and advancing capabilities through continual service enhancement. * Track record of leading response efforts during live cyber incidents and executing remediation strategies. * Experience collaborating with supplier teams to facilitate managed services delivery for enhancements. * Broad experience spanning the entire spectrum of IT security, encompassing software, Servers, infrastructure, and networks. * Proven expertise in designing and implementing secure systems, and leading reviews of intricate security matters when necessary. Interested? Please submit your updated CV to Emma Siwicki at Crimson for immediate consideration. Not interested? Do you know someone who might be a perfect fit for this role? Refer a friend and earn £250 worth of vouchers! Crimson is acting as an employment agency regarding this vacancy
Lead IT Security Manager Permanent Birmingham - 2 Days per week on site £48,900 - £61,140 per annum My client in the Rail industry are looking for a Lead IT Security Manager to join their fast-paced Operations team on a permanent basis. The Lead IT Security Manager is responsible for is the effective management of the Security Operations pillar within the IT Security, Compliance & Identity function. This includes Security technology and Security Operations Centre management. Key focus areas for this role, the ideal candidate will have experience in each of the below; Threat & Vulnerability Management Security Operations Centre - 24/7 Outsourced Web & Content Filtering - ProofPoint, Zscaler, etc. Endpoint Security Infrastructure Security Accountabilities * Lead the Security Operations pillar, determining and delivering requirements, methods, and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability management (among other activity) . * Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation (including playbooks and guidance). * Manage the application and compliance of security operations procedures, reviewing actual and potential security breaches, and ensuring their investigation. * Lead the Security Operations team's response to incidents, recommending actions and appropriate control improvements. * Monitor the external environment to gather intelligence on emerging technologies, documenting impacts, threats, and opportunities to IT. * Provide expert advice on threat intelligence activities, identifying which threat categories are most dangerous to the organization and how to defend against them. * Manage vulnerability assessment activities within company IT, providing expert advice where necessary in the review of vulnerability assessment tools and techniques. * Develop, maintain, and test Security Operations' incident management procedures, investigating escalated incidents and facilitating recovery post-incident resolution. * Lead Security Operations risk management activities, leading on the identification of risks and vulnerabilities and assessment of their impacts. * Manage and oversee the day-to-day activity of the SOC supplier who will deliver security capabilities, communicating their activity to relevant teams. * Manage the design, delivery, maintenance, and continuous improvement of the IT Security Ops capabilities in line with business needs. * Manage the Security Operations Centre (SOC) capability, ensuring effective protection, defence, and response to IT security risks. * Promote the Security, Compliance & Identity function to develop and enhance the team profile to develop enduring relationships with stakeholders and teams. * Implement a multi-year Security roadmap that provides proactive capabilities which enable business objectives. * Actively promote and embed Equality Diversity and Inclusion (EDI) in all your work, and support and comply with all organisational initiatives, policies and procedures on EDI. Skills: * Relationship Building. Ability to develop and maintain strong relationships with internal and external stakeholders. * Security Operations. Ability provide leadership for live security incidents and helping conduct robust investigations in order to identify corrective actions and see them through to completion. * Threat Intelligence. Ability to provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of threat landscape. * Vulnerability Assessment. Ability to identify and classify security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. * Risk Management. Ability to identify IT security operations risks and the delivery of audit remediation activities. * Emerging technology monitoring. Ability to identify and assess new and emerging technologies, products, services, methods and techniques. Knowledge: * Knowledge of IT Service Frameworks, methodologies, and best practice such as ITIL v4 and Agile. * Knowledge of day-to-day activities and best practice within a SOC. * Knowledge of technical security such as Firewalls, network security groups, and access controls. Type of Experience: * Experience of leading a team through the full IT service life cycle, enhancing security posture, and evolving capabilities via continual service improvement. * Experience of leading live cyber incidents and the remediation actions. * Experience of partnering with supplier teams for managed services delivery of improvements. * Experience across the full IT security spectrum (software, Servers, infrastructure, and networks). * Experience designing and implementing secure systems, leading review where necessary of complex security issues. * Experience of enabling and informing risk-based decisions. * Experience dealing with the security implications of transformation and day-to-day product changes. * Experience working with system architectures, displaying a strong understanding of the impact of vulnerabilities on varied systems Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition and management consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically and strategically important industries in the UK and the world today. We will never send your CV without your permission.
23/04/2024
Full time
Lead IT Security Manager Permanent Birmingham - 2 Days per week on site £48,900 - £61,140 per annum My client in the Rail industry are looking for a Lead IT Security Manager to join their fast-paced Operations team on a permanent basis. The Lead IT Security Manager is responsible for is the effective management of the Security Operations pillar within the IT Security, Compliance & Identity function. This includes Security technology and Security Operations Centre management. Key focus areas for this role, the ideal candidate will have experience in each of the below; Threat & Vulnerability Management Security Operations Centre - 24/7 Outsourced Web & Content Filtering - ProofPoint, Zscaler, etc. Endpoint Security Infrastructure Security Accountabilities * Lead the Security Operations pillar, determining and delivering requirements, methods, and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability management (among other activity) . * Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation (including playbooks and guidance). * Manage the application and compliance of security operations procedures, reviewing actual and potential security breaches, and ensuring their investigation. * Lead the Security Operations team's response to incidents, recommending actions and appropriate control improvements. * Monitor the external environment to gather intelligence on emerging technologies, documenting impacts, threats, and opportunities to IT. * Provide expert advice on threat intelligence activities, identifying which threat categories are most dangerous to the organization and how to defend against them. * Manage vulnerability assessment activities within company IT, providing expert advice where necessary in the review of vulnerability assessment tools and techniques. * Develop, maintain, and test Security Operations' incident management procedures, investigating escalated incidents and facilitating recovery post-incident resolution. * Lead Security Operations risk management activities, leading on the identification of risks and vulnerabilities and assessment of their impacts. * Manage and oversee the day-to-day activity of the SOC supplier who will deliver security capabilities, communicating their activity to relevant teams. * Manage the design, delivery, maintenance, and continuous improvement of the IT Security Ops capabilities in line with business needs. * Manage the Security Operations Centre (SOC) capability, ensuring effective protection, defence, and response to IT security risks. * Promote the Security, Compliance & Identity function to develop and enhance the team profile to develop enduring relationships with stakeholders and teams. * Implement a multi-year Security roadmap that provides proactive capabilities which enable business objectives. * Actively promote and embed Equality Diversity and Inclusion (EDI) in all your work, and support and comply with all organisational initiatives, policies and procedures on EDI. Skills: * Relationship Building. Ability to develop and maintain strong relationships with internal and external stakeholders. * Security Operations. Ability provide leadership for live security incidents and helping conduct robust investigations in order to identify corrective actions and see them through to completion. * Threat Intelligence. Ability to provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of threat landscape. * Vulnerability Assessment. Ability to identify and classify security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. * Risk Management. Ability to identify IT security operations risks and the delivery of audit remediation activities. * Emerging technology monitoring. Ability to identify and assess new and emerging technologies, products, services, methods and techniques. Knowledge: * Knowledge of IT Service Frameworks, methodologies, and best practice such as ITIL v4 and Agile. * Knowledge of day-to-day activities and best practice within a SOC. * Knowledge of technical security such as Firewalls, network security groups, and access controls. Type of Experience: * Experience of leading a team through the full IT service life cycle, enhancing security posture, and evolving capabilities via continual service improvement. * Experience of leading live cyber incidents and the remediation actions. * Experience of partnering with supplier teams for managed services delivery of improvements. * Experience across the full IT security spectrum (software, Servers, infrastructure, and networks). * Experience designing and implementing secure systems, leading review where necessary of complex security issues. * Experience of enabling and informing risk-based decisions. * Experience dealing with the security implications of transformation and day-to-day product changes. * Experience working with system architectures, displaying a strong understanding of the impact of vulnerabilities on varied systems Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition and management consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically and strategically important industries in the UK and the world today. We will never send your CV without your permission.
Dublin based, Middleware Engineer, Message Queues ( IBM MQ/RabbitMQ preferred ), Linux, ITIL, CI/CD, PL/SQL. Any PCF, Groovy and Gitbucket are desirable. You will be required to be in their Dublin office 2-3 times a week for meetings etc so this will require someone local to Dublin. *MQ (IBM or Rabbit) experience is mandatory - monitoring, configuration, creating, setting up MQs.* An agile and next-generation digital accelerating company providing digital transformation and technology services are looking for a Middleware Engineer with Message Queues (MQ). They work across a variety of industries, including banking & financial services, insurance, retail, higher education, food, healthcare, and manufacturing. Responsibilities Engage in and improve the whole life cycle of services - from inception and design, through deployment, operation, and refinement. Analyse ITSM activities of the platform and provide feedback loop to development teams on operational gaps or resiliency concerns. Support services before they go live through activities such as system design consulting, capacity planning and launch reviews. Maintain services once they are live by measuring and monitoring availability, latency, and overall system health with automated alerts. Scale systems sustainably through mechanisms like automation and evolve systems by pushing for changes that improve reliability and velocity. Practice sustainable incident response and detailed post mortems. Take a holistic approach to problem solving, by connecting the dots during a production event through the various technology stack that makes up the platform, to optimize mean time to recover. Dublin based, Middleware Engineer, Message Queues (IBM MQ/RabbitMQ preferred ), Linux, ITIL, CI/CD, PL/SQL. Any PCF, Groovy and Gitbucket are desirable.
23/04/2024
Full time
Dublin based, Middleware Engineer, Message Queues ( IBM MQ/RabbitMQ preferred ), Linux, ITIL, CI/CD, PL/SQL. Any PCF, Groovy and Gitbucket are desirable. You will be required to be in their Dublin office 2-3 times a week for meetings etc so this will require someone local to Dublin. *MQ (IBM or Rabbit) experience is mandatory - monitoring, configuration, creating, setting up MQs.* An agile and next-generation digital accelerating company providing digital transformation and technology services are looking for a Middleware Engineer with Message Queues (MQ). They work across a variety of industries, including banking & financial services, insurance, retail, higher education, food, healthcare, and manufacturing. Responsibilities Engage in and improve the whole life cycle of services - from inception and design, through deployment, operation, and refinement. Analyse ITSM activities of the platform and provide feedback loop to development teams on operational gaps or resiliency concerns. Support services before they go live through activities such as system design consulting, capacity planning and launch reviews. Maintain services once they are live by measuring and monitoring availability, latency, and overall system health with automated alerts. Scale systems sustainably through mechanisms like automation and evolve systems by pushing for changes that improve reliability and velocity. Practice sustainable incident response and detailed post mortems. Take a holistic approach to problem solving, by connecting the dots during a production event through the various technology stack that makes up the platform, to optimize mean time to recover. Dublin based, Middleware Engineer, Message Queues (IBM MQ/RabbitMQ preferred ), Linux, ITIL, CI/CD, PL/SQL. Any PCF, Groovy and Gitbucket are desirable.
IT Security Manager - Security Operations - Birmingham Hybrid working available Salary £40,000-50,950 %Flex fund IT Security Manager required for a leading client based in Birmingham. My client is currently seeking a IT Security Manager to come on board to effectively manage the Security Operations pillar within the IT Security, Compliance & Identity function. This involves overseeing Security technology and Security Operations Centre management. Additionally, this position involves leveraging and applying understanding of business objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, Strong IT Security Management experience Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response, threat management, and vulnerability management, among other areas. Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. Familiarity with IT Service Frameworks, methodologies, and industry best practices such as ITIL v4 and Agile. Understanding of day-to-day operations and industry best practices within a Security Operations Center (SOC). Proficiency in technical security aspects including Firewalls, network security groups, and access controls. Demonstrated leadership in guiding teams through the entire IT service life cycle, fortifying security measures, and advancing capabilities through continual service enhancement. Track record of leading response efforts during live cyber incidents and executing remediation strategies. Experience collaborating with supplier teams to facilitate managed services delivery for enhancements. Broad experience spanning the entire spectrum of IT security, encompassing software, Servers, infrastructure, and networks. Proven expertise in designing and implementing secure systems, and leading reviews of intricate security matters when necessary. Interested? Please submit your updated CV to Emma Siwicki at Crimson for immediate consideration. Not interested? Do you know someone who might be a perfect fit for this role? Refer a friend and earn £250 worth of vouchers! Crimson is acting as an employment agency regarding this vacancy
22/04/2024
Full time
IT Security Manager - Security Operations - Birmingham Hybrid working available Salary £40,000-50,950 %Flex fund IT Security Manager required for a leading client based in Birmingham. My client is currently seeking a IT Security Manager to come on board to effectively manage the Security Operations pillar within the IT Security, Compliance & Identity function. This involves overseeing Security technology and Security Operations Centre management. Additionally, this position involves leveraging and applying understanding of business objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, Strong IT Security Management experience Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response, threat management, and vulnerability management, among other areas. Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. Familiarity with IT Service Frameworks, methodologies, and industry best practices such as ITIL v4 and Agile. Understanding of day-to-day operations and industry best practices within a Security Operations Center (SOC). Proficiency in technical security aspects including Firewalls, network security groups, and access controls. Demonstrated leadership in guiding teams through the entire IT service life cycle, fortifying security measures, and advancing capabilities through continual service enhancement. Track record of leading response efforts during live cyber incidents and executing remediation strategies. Experience collaborating with supplier teams to facilitate managed services delivery for enhancements. Broad experience spanning the entire spectrum of IT security, encompassing software, Servers, infrastructure, and networks. Proven expertise in designing and implementing secure systems, and leading reviews of intricate security matters when necessary. Interested? Please submit your updated CV to Emma Siwicki at Crimson for immediate consideration. Not interested? Do you know someone who might be a perfect fit for this role? Refer a friend and earn £250 worth of vouchers! Crimson is acting as an employment agency regarding this vacancy
Operations Engineer Multi-Asset Trading (London - Remote) Cititec Talent is partnered with a fast-growth scale up in the multi-asset trading space. They are looking for an Operations Engineer where you'll be at the forefront of maintaining their platform's reliability and efficiency, ensuring their clients receive top-notch trading experiences. From monitoring technical infrastructure to managing client onboarding and FIX integrations, you'll contribute directly to their mission of delivering market-leading multi-asset trading technology. Responsibilities: Monitor system performance, troubleshoot technical issues, and collaborate with cross-functional teams to integrate new features while maintaining stability. Assist in onboarding new clients, including setup on the platform, provisioning liquidity, and maintaining clear communication throughout the process. Support FIX integrations for external clients, liquidity providers, and partners, ensuring smooth onboarding and maintenance of trading platform environment. Provide timely responses to technical incidents, analyse root causes, and collaborate with teams to address challenges and prevent recurrence. Identify opportunities to enhance platform performance, scalability, and reliability, implementing optimizations in collaboration with the development team. Skills Required: Bachelor's degree in Computer Science, Information Technology, or related field. Minimum 4 years of experience in operations or infrastructure management within the FinTech industry, preferably with exposure to FX trading platforms. Proficiency in FIX protocol implementation within financial markets. Strong understanding of technical infrastructure components, network protocols, and trading environments. Experience with operating systems and Scripting languages (eg, Python). Familiarity with monitoring and alerting tools for incident management. Excellent problem-solving skills and ability to work effectively under pressure in a dynamic startup environment.
22/04/2024
Full time
Operations Engineer Multi-Asset Trading (London - Remote) Cititec Talent is partnered with a fast-growth scale up in the multi-asset trading space. They are looking for an Operations Engineer where you'll be at the forefront of maintaining their platform's reliability and efficiency, ensuring their clients receive top-notch trading experiences. From monitoring technical infrastructure to managing client onboarding and FIX integrations, you'll contribute directly to their mission of delivering market-leading multi-asset trading technology. Responsibilities: Monitor system performance, troubleshoot technical issues, and collaborate with cross-functional teams to integrate new features while maintaining stability. Assist in onboarding new clients, including setup on the platform, provisioning liquidity, and maintaining clear communication throughout the process. Support FIX integrations for external clients, liquidity providers, and partners, ensuring smooth onboarding and maintenance of trading platform environment. Provide timely responses to technical incidents, analyse root causes, and collaborate with teams to address challenges and prevent recurrence. Identify opportunities to enhance platform performance, scalability, and reliability, implementing optimizations in collaboration with the development team. Skills Required: Bachelor's degree in Computer Science, Information Technology, or related field. Minimum 4 years of experience in operations or infrastructure management within the FinTech industry, preferably with exposure to FX trading platforms. Proficiency in FIX protocol implementation within financial markets. Strong understanding of technical infrastructure components, network protocols, and trading environments. Experience with operating systems and Scripting languages (eg, Python). Familiarity with monitoring and alerting tools for incident management. Excellent problem-solving skills and ability to work effectively under pressure in a dynamic startup environment.
The role is based in Dublin. Might have some flexibility to make it a bit hybrid Responsibilities Engage in and improve the whole life cycle of services-from inception and design, through deployment, operation, and refinement. Analyze ITSM activities of the platform and provide feedback loop to development teams on operational gaps or resiliency concerns. Support services before they go live through activities such as system design consulting, capacity planning and launch reviews. Maintain services once they are live by measuring and monitoring availability, latency, and overall system health with automated alerts. Scale systems sustainably through mechanisms like automation and evolve systems by pushing for changes that improve reliability and velocity. Practice sustainable incident response and detailed postmortems. Take a holistic approach to problem solving, by connecting the dots during a production event thru the various technology stack that makes up the platform, to optimize mean time to recover. Work with a global team spread across tech hubs in multiple geographies and time zones. Share knowledge and mentor junior resources. Skills Set: Linux MQ like IBM MQ/Kafka/NATS ITIL CI/CD pipeline PL/SQL Jenkins Troubleshooting Deployments Any Monitoring Tool - Splunk preferred. Incident Management Secondary Skills: PCF Groovy Gitbucket Message Queues
19/04/2024
Full time
The role is based in Dublin. Might have some flexibility to make it a bit hybrid Responsibilities Engage in and improve the whole life cycle of services-from inception and design, through deployment, operation, and refinement. Analyze ITSM activities of the platform and provide feedback loop to development teams on operational gaps or resiliency concerns. Support services before they go live through activities such as system design consulting, capacity planning and launch reviews. Maintain services once they are live by measuring and monitoring availability, latency, and overall system health with automated alerts. Scale systems sustainably through mechanisms like automation and evolve systems by pushing for changes that improve reliability and velocity. Practice sustainable incident response and detailed postmortems. Take a holistic approach to problem solving, by connecting the dots during a production event thru the various technology stack that makes up the platform, to optimize mean time to recover. Work with a global team spread across tech hubs in multiple geographies and time zones. Share knowledge and mentor junior resources. Skills Set: Linux MQ like IBM MQ/Kafka/NATS ITIL CI/CD pipeline PL/SQL Jenkins Troubleshooting Deployments Any Monitoring Tool - Splunk preferred. Incident Management Secondary Skills: PCF Groovy Gitbucket Message Queues
Middleware Engineer - IBM MQ/RabbitMQ - Hybrid Dublin based, Middleware, Production Support, Message Queues (IBM MQ/RabbitMQ preferred), Linux, ITIL, CI/CD, PL/SQL. Any PCF, Groovy and Gitbucket are desirable. You will be required to be in their Dublin office up to 2 times/twice a week for meetings etc so this will require someone local to Dublin. *MQ (IBM/Rabbit) experience is mandatory - monitoring, configuration, creating, setting up MQs.* An agile and next-generation digital accelerating company providing digital transformation and technology services are looking for a Middleware Engineer with Message Queues (MQ) ideally IBM MQ or RabbitMQ. They work across a variety of industries, including banking & financial services, insurance, retail, higher education, food, healthcare, and manufacturing. Responsibilities Engage in and improve the whole life cycle of services - from inception and design, through deployment, operation, and refinement. Analyse ITSM activities of the platform and provide feedback loop to development teams on operational gaps or resiliency concerns. Support services before they go live through activities such as system design consulting, capacity planning and launch reviews. Maintain services once they are live by measuring and monitoring availability, latency, and overall system health with automated alerts. Scale systems sustainably through mechanisms like automation and evolve systems by pushing for changes that improve reliability and velocity. Practice sustainable incident response and detailed post mortems. Take a holistic approach to problem solving, by connecting the dots during a production event through the various technology stack that makes up the platform, to optimize mean time to recover. Dublin based, Middleware, Message Queues (IBM MQ/RabbitMQ preferred), Linux, ITIL, CI/CD, PL/SQL. Any PCF, Groovy and Gitbucket are desirable.
19/04/2024
Full time
Middleware Engineer - IBM MQ/RabbitMQ - Hybrid Dublin based, Middleware, Production Support, Message Queues (IBM MQ/RabbitMQ preferred), Linux, ITIL, CI/CD, PL/SQL. Any PCF, Groovy and Gitbucket are desirable. You will be required to be in their Dublin office up to 2 times/twice a week for meetings etc so this will require someone local to Dublin. *MQ (IBM/Rabbit) experience is mandatory - monitoring, configuration, creating, setting up MQs.* An agile and next-generation digital accelerating company providing digital transformation and technology services are looking for a Middleware Engineer with Message Queues (MQ) ideally IBM MQ or RabbitMQ. They work across a variety of industries, including banking & financial services, insurance, retail, higher education, food, healthcare, and manufacturing. Responsibilities Engage in and improve the whole life cycle of services - from inception and design, through deployment, operation, and refinement. Analyse ITSM activities of the platform and provide feedback loop to development teams on operational gaps or resiliency concerns. Support services before they go live through activities such as system design consulting, capacity planning and launch reviews. Maintain services once they are live by measuring and monitoring availability, latency, and overall system health with automated alerts. Scale systems sustainably through mechanisms like automation and evolve systems by pushing for changes that improve reliability and velocity. Practice sustainable incident response and detailed post mortems. Take a holistic approach to problem solving, by connecting the dots during a production event through the various technology stack that makes up the platform, to optimize mean time to recover. Dublin based, Middleware, Message Queues (IBM MQ/RabbitMQ preferred), Linux, ITIL, CI/CD, PL/SQL. Any PCF, Groovy and Gitbucket are desirable.