Resource Solutions - GSC
*3 days working from London office* Manage the Cyber Test and Validation process, Support Cyber Risk Assessment and drive Cyber Assurance programme across the bank through: Conduct cyber assessment of projects helping to drive adoption of application and infrastructure security controls and best practices. Advise on leading edge engineering to protect the bank's network from security risks related to web, mobile, web services, and Client Server architectures. Conduct risk reviews of 3rd party systems and applications to assess the standard and proprietary application security controls used by the application (eg authentication, authorization, input validation, output sanitization, error handling, application resilience) against bank policies and standards. Work with different teams in various jurisdictions where specific technology and cybersecurity regulations create requirements that are not directly supported by our global framework. Drive implementation of security controls in various platforms by working with technology infrastructure teams. Demonstrate deep understanding, passion and thought leadership for Information and Cybersecurity and its impact of new technologies, services and solutions. Investigate, coordinate and address Information and Cybersecurity incidents Act as liaison for global team in coordinating collection and preservation of forensic evidence in support of security event investigation. Analyse potential infrastructure security incidents to determine if incident qualifies as a legitimate security breach. Collaborate with stakeholders to continually operate and improve a world-class cyber program by providing input into the uplift of sensory tools, detection tuning, and access to data sources to increase detection effectiveness. Convey complicated technical analysis to management via investigation synopses, graphical depictions of attacks, and comprehensive presentations. Act as a liaison to stakeholders, including those outside of the technology team(s), during security investigations and incidents Respond to regulatory requests regarding security incidents, as well as the relevant protective and detective security measures. Report the status of ongoing incidents, as well as the follow-up actions for resolved incidents to management Support Compliance, regulatory, or litigation related investigations by coordinating e-discovery, evidence collection and other such activities. Communicating status and risks in a succinct, direct and open manner for proper issue management life cycle tracking. Drafting responses to requests for information from regulators in the jurisdictions in which the bank operates Coordinating engagements with regulators, including periodic reporting, preparation of presentations and written deliverables Conducting analysis to identify potential gaps and issues from ongoing changes of regulatory requirement of relevance to the bank's business and risk environments Preparing presentations and written products on regulatory trends and issues to inform leadership decisions Coordinating with counterparts in other jurisdictions and regional stakeholders (eg Legal, Compliance, Preferred Qualifications and Experience A minimum of 10+ years of experience with a mix of Cybersecurity, Systems, Infrastructure, Network, and Cloud experience. Broad technical security skills in multiple technology areas such as applications deployments, endpoints, data, infrastructure, cloud, DNS, PKI, Email, OS (Windows, MAC,.NIX), SDN, encryption, forensics, authentication, Firewalls, proxies, identity and access control, BC/DR, remote access, and cryptography. Extensive experience in architecting and engineering complex security solutions utilizing and interpreting models to implement company policies, standards globally. Familiarity with techniques/methodologies such as "Attack and Defensive" methods, Threat Hunting, Threat modelling, Reverse engineering, Vulnerability Management, Data modelling, Evaluation of security products/services, Metrics development, etc. Proficiency and experience in automation and Scripting using Python, Shell, Ansible, Jenkins, etc. Demonstrated experience with utilizing and migrating to one or more cloud technologies such as Microsoft Azure, and AWS. Knowledge of Google Cloud Platform, Alibaba Cloud, and Microsoft Office 365 is a plus. Information Security and/or Information Technology industry certification (CISSP, CISM, CISSP-ISSMP, CRISC, GIAC, Azure and AWS equivalent) preferred. Ability to synthesize data, conceptualize and get to the root cause of processes that created the risk. Experience working in a multi-vendor and outsourced IT environment. Good understanding of COBIT and ITIL processes including change, incident and problem management. Experience in Financial Services is a nice to have but not mandatory. Our Recruitment Delivery Team are committed to offering an inclusive recruitment experience to all candidates. If you require any accommodations or adjustments as a result of disability, impairment, or health condition, please do not hesitate to let me know by emailing
*3 days working from London office* Manage the Cyber Test and Validation process, Support Cyber Risk Assessment and drive Cyber Assurance programme across the bank through: Conduct cyber assessment of projects helping to drive adoption of application and infrastructure security controls and best practices. Advise on leading edge engineering to protect the bank's network from security risks related to web, mobile, web services, and Client Server architectures. Conduct risk reviews of 3rd party systems and applications to assess the standard and proprietary application security controls used by the application (eg authentication, authorization, input validation, output sanitization, error handling, application resilience) against bank policies and standards. Work with different teams in various jurisdictions where specific technology and cybersecurity regulations create requirements that are not directly supported by our global framework. Drive implementation of security controls in various platforms by working with technology infrastructure teams. Demonstrate deep understanding, passion and thought leadership for Information and Cybersecurity and its impact of new technologies, services and solutions. Investigate, coordinate and address Information and Cybersecurity incidents Act as liaison for global team in coordinating collection and preservation of forensic evidence in support of security event investigation. Analyse potential infrastructure security incidents to determine if incident qualifies as a legitimate security breach. Collaborate with stakeholders to continually operate and improve a world-class cyber program by providing input into the uplift of sensory tools, detection tuning, and access to data sources to increase detection effectiveness. Convey complicated technical analysis to management via investigation synopses, graphical depictions of attacks, and comprehensive presentations. Act as a liaison to stakeholders, including those outside of the technology team(s), during security investigations and incidents Respond to regulatory requests regarding security incidents, as well as the relevant protective and detective security measures. Report the status of ongoing incidents, as well as the follow-up actions for resolved incidents to management Support Compliance, regulatory, or litigation related investigations by coordinating e-discovery, evidence collection and other such activities. Communicating status and risks in a succinct, direct and open manner for proper issue management life cycle tracking. Drafting responses to requests for information from regulators in the jurisdictions in which the bank operates Coordinating engagements with regulators, including periodic reporting, preparation of presentations and written deliverables Conducting analysis to identify potential gaps and issues from ongoing changes of regulatory requirement of relevance to the bank's business and risk environments Preparing presentations and written products on regulatory trends and issues to inform leadership decisions Coordinating with counterparts in other jurisdictions and regional stakeholders (eg Legal, Compliance, Preferred Qualifications and Experience A minimum of 10+ years of experience with a mix of Cybersecurity, Systems, Infrastructure, Network, and Cloud experience. Broad technical security skills in multiple technology areas such as applications deployments, endpoints, data, infrastructure, cloud, DNS, PKI, Email, OS (Windows, MAC,.NIX), SDN, encryption, forensics, authentication, Firewalls, proxies, identity and access control, BC/DR, remote access, and cryptography. Extensive experience in architecting and engineering complex security solutions utilizing and interpreting models to implement company policies, standards globally. Familiarity with techniques/methodologies such as "Attack and Defensive" methods, Threat Hunting, Threat modelling, Reverse engineering, Vulnerability Management, Data modelling, Evaluation of security products/services, Metrics development, etc. Proficiency and experience in automation and Scripting using Python, Shell, Ansible, Jenkins, etc. Demonstrated experience with utilizing and migrating to one or more cloud technologies such as Microsoft Azure, and AWS. Knowledge of Google Cloud Platform, Alibaba Cloud, and Microsoft Office 365 is a plus. Information Security and/or Information Technology industry certification (CISSP, CISM, CISSP-ISSMP, CRISC, GIAC, Azure and AWS equivalent) preferred. Ability to synthesize data, conceptualize and get to the root cause of processes that created the risk. Experience working in a multi-vendor and outsourced IT environment. Good understanding of COBIT and ITIL processes including change, incident and problem management. Experience in Financial Services is a nice to have but not mandatory. Our Recruitment Delivery Team are committed to offering an inclusive recruitment experience to all candidates. If you require any accommodations or adjustments as a result of disability, impairment, or health condition, please do not hesitate to let me know by emailing
Base 3
Brussel (Stad), Brussel
Required Profile: years cyber security professional experience with at least 5 years in domain or enterprise architecture experience Deep knowledge of the IAM and CIAM framework and industry best practice, Identity Governance, Logical and Privileged Access Management, Role Modelling, Access Recertification, and authentication mechanisms. Familiar with market leader's products CyberArk, SailPoint, Microsoft Azure AD, Microsoft AD, Beyond Trust, One Identity and its implementation in a strong regulated and complex environment. Knowledge and experience with security technologies, identity management platforms, secure access management and federation, IDAAS (Identity as a service), Single Sign On, SAML, Opend ID Connect, OAUTH, multi-factor authentication, PKI and cryptographic solutions, web application Firewalls, automated code review tools, Cloud SAAS solutions Worked in financial or highly regulated industries. Professional certifications such as TOGAF, SABSA or IAF architecture frameworks. CISSP, GIAC, CISM, ISO 27001 LA/LI or specific security product certifications are an asset. Fluent in English mandatory. As a the Cyber Security IAM Architect, your role will include: Lead the Identity and Access Management architecture domain. Define the IAM strategy, the reference/target Architecture, blueprint for your domain in close collaboration with your stakeholders (IDAM, GTS, GBS, Security Architecture and Enterprise Architecture). Design the architecture principles, tools, patterns, building blocks and contribute to IAM policies, standards and solutions. Advise on solution designs, implementation, and processes required to protect information system assets in line with the IAM and IT strategy. Provide guidance and act as a facilitator to ensure security standard and best practices are applied consistently and in a meaningful way across all divisions and the group. Collect feedback from stakeholders, detect unaddressed security IAM needs and identify opportunities for improvements or new architecture services. Translate the business requirements, risk assessments, high-level policies, and controls into security architecture requirements and designs for existing or new IAM capabilities, services and projects on business and IT side. Participate in discussions on IAM subjects, operational process design and implementation of security controls into project delivery. Your stakeholders are mainly Tribe Leads, Product Owners, Project Leaders, Enterprise Architects, risk management, internal/external Auditors and IT engineers, Developers and Solution Designers. Note: this role has been assessed as Inside IR35 which only affects UK resident candidates
Required Profile: years cyber security professional experience with at least 5 years in domain or enterprise architecture experience Deep knowledge of the IAM and CIAM framework and industry best practice, Identity Governance, Logical and Privileged Access Management, Role Modelling, Access Recertification, and authentication mechanisms. Familiar with market leader's products CyberArk, SailPoint, Microsoft Azure AD, Microsoft AD, Beyond Trust, One Identity and its implementation in a strong regulated and complex environment. Knowledge and experience with security technologies, identity management platforms, secure access management and federation, IDAAS (Identity as a service), Single Sign On, SAML, Opend ID Connect, OAUTH, multi-factor authentication, PKI and cryptographic solutions, web application Firewalls, automated code review tools, Cloud SAAS solutions Worked in financial or highly regulated industries. Professional certifications such as TOGAF, SABSA or IAF architecture frameworks. CISSP, GIAC, CISM, ISO 27001 LA/LI or specific security product certifications are an asset. Fluent in English mandatory. As a the Cyber Security IAM Architect, your role will include: Lead the Identity and Access Management architecture domain. Define the IAM strategy, the reference/target Architecture, blueprint for your domain in close collaboration with your stakeholders (IDAM, GTS, GBS, Security Architecture and Enterprise Architecture). Design the architecture principles, tools, patterns, building blocks and contribute to IAM policies, standards and solutions. Advise on solution designs, implementation, and processes required to protect information system assets in line with the IAM and IT strategy. Provide guidance and act as a facilitator to ensure security standard and best practices are applied consistently and in a meaningful way across all divisions and the group. Collect feedback from stakeholders, detect unaddressed security IAM needs and identify opportunities for improvements or new architecture services. Translate the business requirements, risk assessments, high-level policies, and controls into security architecture requirements and designs for existing or new IAM capabilities, services and projects on business and IT side. Participate in discussions on IAM subjects, operational process design and implementation of security controls into project delivery. Your stakeholders are mainly Tribe Leads, Product Owners, Project Leaders, Enterprise Architects, risk management, internal/external Auditors and IT engineers, Developers and Solution Designers. Note: this role has been assessed as Inside IR35 which only affects UK resident candidates