CBSButler are looking for a number of SOC Analysts (Beveiligingscentrum) to join on an exciting top secret project with a Dutch government organisation, this will be a permanent position and we can pay between €4000 - €8000 per month (Up to €96,000 per year), depending on experience, we are looking for junior/mid through to senior and lead level SOC Analyst candidates. P.S if you're not interested but know someone who might be we do pay €250 referral fees for successful referrals. You will have to be on site 5 days a week in the Rotterdam area and be a Dutch citizen as you will be working on a top secret project and will require Security Clearance. The organisation can get the clearance for you if you don't hold active clearance already, so as long as you are a Dutch citizen you can apply. Please see below for what we're looking for: - A strong background in Cyber Security blue teaming - Ideally experience working in the Security Operation Centre previously (Beveiligingscentrum) as a SOC Analyst, SOC Developer or SOC Engineer - Strong experience working with Firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection tools. - Familiarity with security monitoring tools and knowledge of protocols for intrusion detection/threat intelligence - Proficiency with a SIEM tool (eg, Splunk, ArcSight, Sentinel, ELK Stack) for security event management and analysis, and a basic understanding of network protocols (TCP/IP, DNS, HTTP/HTTPS, etc.) and common attack vectors. No shift pattern for this role is required. If you're suitable please send through an updated CV and I will call ASAP!
14/01/2025
Full time
CBSButler are looking for a number of SOC Analysts (Beveiligingscentrum) to join on an exciting top secret project with a Dutch government organisation, this will be a permanent position and we can pay between €4000 - €8000 per month (Up to €96,000 per year), depending on experience, we are looking for junior/mid through to senior and lead level SOC Analyst candidates. P.S if you're not interested but know someone who might be we do pay €250 referral fees for successful referrals. You will have to be on site 5 days a week in the Rotterdam area and be a Dutch citizen as you will be working on a top secret project and will require Security Clearance. The organisation can get the clearance for you if you don't hold active clearance already, so as long as you are a Dutch citizen you can apply. Please see below for what we're looking for: - A strong background in Cyber Security blue teaming - Ideally experience working in the Security Operation Centre previously (Beveiligingscentrum) as a SOC Analyst, SOC Developer or SOC Engineer - Strong experience working with Firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection tools. - Familiarity with security monitoring tools and knowledge of protocols for intrusion detection/threat intelligence - Proficiency with a SIEM tool (eg, Splunk, ArcSight, Sentinel, ELK Stack) for security event management and analysis, and a basic understanding of network protocols (TCP/IP, DNS, HTTP/HTTPS, etc.) and common attack vectors. No shift pattern for this role is required. If you're suitable please send through an updated CV and I will call ASAP!
Role: APIGEE Developer Duration: until December 31st Location: Birmingham Contract Inside IR35 Job description: Skills and Experience: Experience in building API products and API management eg Apigee. Including API versioning, documentation, and developer onboarding experience Experience of working in the development of AWS cloud native solutions. Experience of working with DevOps tools such as Jenkins, Bamboo, Git, or similar, for deployment purposes Experience of various database paradigms including SQL & NoSQL Solid understanding of security protocols and standards Experience with Back End/compute languages delivering business value such as Python & Typescript Serverless solution design & Event Driven integration patterns Experience in Automated Testing principles Deep understanding of the importance and principles of engineering excellence and demonstrating this knowledge in your work. Experience of feature or function design and delivery as part of an agile software development team (Scrum, Kanban, XP, etc.). Experience of working with Product Owners, customers, end-users, or stakeholders in the delivery of software, solutions, or products. Skills and Experience (desirable) Have experience in integration design, development & delivery. Have experience in Infrastructure as Code (AWS CDK (ideally), Terraform etc) Have experience in supporting, monitoring, and maintaining production grade systems: Investigation via observability tooling eg Splunk, Datadog, AWS tooling Responding and identifying production impacting issues Creating remediation plans and reporting for issues
14/01/2025
Project-based
Role: APIGEE Developer Duration: until December 31st Location: Birmingham Contract Inside IR35 Job description: Skills and Experience: Experience in building API products and API management eg Apigee. Including API versioning, documentation, and developer onboarding experience Experience of working in the development of AWS cloud native solutions. Experience of working with DevOps tools such as Jenkins, Bamboo, Git, or similar, for deployment purposes Experience of various database paradigms including SQL & NoSQL Solid understanding of security protocols and standards Experience with Back End/compute languages delivering business value such as Python & Typescript Serverless solution design & Event Driven integration patterns Experience in Automated Testing principles Deep understanding of the importance and principles of engineering excellence and demonstrating this knowledge in your work. Experience of feature or function design and delivery as part of an agile software development team (Scrum, Kanban, XP, etc.). Experience of working with Product Owners, customers, end-users, or stakeholders in the delivery of software, solutions, or products. Skills and Experience (desirable) Have experience in integration design, development & delivery. Have experience in Infrastructure as Code (AWS CDK (ideally), Terraform etc) Have experience in supporting, monitoring, and maintaining production grade systems: Investigation via observability tooling eg Splunk, Datadog, AWS tooling Responding and identifying production impacting issues Creating remediation plans and reporting for issues
CONTRACT SPLUNK OBSERVABILITY SME BRAND NEW CONTRACT OPPORTUNITY AVAILABLE WITHIN A GLOBALLY LEADING CONSULTANCY FOR A CONTRACT OBSERVABILITY SME Contract opportunity for a Contract Observability SME/Observability Engineer/Observability Architect Globally leading consultancy £500 - 650 per day Fully Remote contract To apply please call or email (see below) WHO WE ARE? We are recruiting a Contract Observability SME to work with a multi-national, industry leading consultancy. WE NEED THE CONTRACT SPLUNK OBSERVABILITY SME TO HAVE. Splunk Observability setups and rollouts Moving from event based ticketing to adaptive Building of Splunk Observability platform Creating the framework of how to onboard clients, educate the team and clients and create POC's for client onboarding ITSI and importing CI's Experience moving from event correlation to Adaptive Thresholds and predictive analysis TO BE CONSIDERED. Please either apply by clicking online or emailing me directly to (see below) For further information please call me. I can make myself available outside of normal working hours to suit from 7am until 10pm. If unavailable please leave a message and either myself or one of my colleagues will respond. By applying for this role you give express consent for us to process & submit (subject to required skills) your application to our client in conjunction with this vacancy only. I look forward to hearing from you. CONTRACT SPLUNK OBSERVABILITY SME KEY SKILLS: SPLUNK SME/SPLUNK ARCHITECT/OBSERVABILITY ARCHITECT/OBSERVABILITY CONSULTANT/OBSERVABILITY SME/OBSERVABILITY ENGINEER/SPLUNK OBSERVABILITY ENGINEER
14/01/2025
Project-based
CONTRACT SPLUNK OBSERVABILITY SME BRAND NEW CONTRACT OPPORTUNITY AVAILABLE WITHIN A GLOBALLY LEADING CONSULTANCY FOR A CONTRACT OBSERVABILITY SME Contract opportunity for a Contract Observability SME/Observability Engineer/Observability Architect Globally leading consultancy £500 - 650 per day Fully Remote contract To apply please call or email (see below) WHO WE ARE? We are recruiting a Contract Observability SME to work with a multi-national, industry leading consultancy. WE NEED THE CONTRACT SPLUNK OBSERVABILITY SME TO HAVE. Splunk Observability setups and rollouts Moving from event based ticketing to adaptive Building of Splunk Observability platform Creating the framework of how to onboard clients, educate the team and clients and create POC's for client onboarding ITSI and importing CI's Experience moving from event correlation to Adaptive Thresholds and predictive analysis TO BE CONSIDERED. Please either apply by clicking online or emailing me directly to (see below) For further information please call me. I can make myself available outside of normal working hours to suit from 7am until 10pm. If unavailable please leave a message and either myself or one of my colleagues will respond. By applying for this role you give express consent for us to process & submit (subject to required skills) your application to our client in conjunction with this vacancy only. I look forward to hearing from you. CONTRACT SPLUNK OBSERVABILITY SME KEY SKILLS: SPLUNK SME/SPLUNK ARCHITECT/OBSERVABILITY ARCHITECT/OBSERVABILITY CONSULTANT/OBSERVABILITY SME/OBSERVABILITY ENGINEER/SPLUNK OBSERVABILITY ENGINEER
Request Technology - Craig Johnson
Chicago, Illinois
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Company is currently seeking an Information Technology Internal Auditor. Candidate will support independent assessments of the Information Technology and Security environment, risk management, and other objectives as needed. The role is responsible for determining the sufficiency of management's controls and activities related to the management of regulatory, operational, and strategic risks and presenting recommendations for improvements to the engagement team. Responsibilities: Support the team on delivery of assigned audits within the annual audit plan. Support the team confirming a professional auditee experience. Owning the audit quality, accuracy of results, and delivery in a timely manner. Proactively identify regulatory, operational, and/or strategic risks to the organization and bring them to your engagement team. Evaluate exceptions or inefficient practices for root causes and propose advice and recommendations for achievable solutions. Leading audits related to organization changes including business requirements definitions, technology implementations (eg, change management, security), engagement and alignment of change initiatives to business objectives. Maintaining an understanding of policies, procedures, standards, and supporting technologies, and educating staff accordingly, to effectively identify potential risks and alternatives to mitigate risk exposure leveraging leading practices. Ability to understand professional principles and standards (eg, AICPA, IIA IPPF, COBIT, NIST CSF) and the relevancy to risk management and impact on policies and procedures. In addition, leveraging these principles and standards to test and evaluate corporate risk management processes and control. Keeping current on best practices and emerging risks within the financial services industry and making recommendations for improvements as necessary. Qualifications Ability to communicate clearly and effectively, both orally and in writing, including the ability to handle potentially sensitive situations and discussions. Strong problem solving and analytical capabilities. Demonstrated ability to gather, analyze, and evaluate facts, and prepare and present concise oral and written reports. Ability to work independently or as part of a team, prioritizing multiple audit assignments to simultaneously complete each in a timely fashion. [Preferred] Experience working in a complex, fast paced environment. [Preferred] Consulting and/or accounting firm experience. [Preferred] Experience in Financial Services/Security Industry and working with regulations such as Regulation Systems Compliance and Integrity (Reg SCI). [Preferred] Experience using the principles, practices, and techniques involved in conducting audits in accordance with the requirements set forth in the International Standards for the Professional Practice of Internal Auditing published by the Institute of Internal Auditors (IIA). [Required] Microsoft Office applications [Preferred] Familiarity with security tools such as: CyberArk, Splunk, SailPoint [Preferred] Familiarity with change management tools such as: ServiceNow, Jira, Confluence, GitHub [Preferred] Familiarity with databases such as: Oracle, DB2, SQL [Preferred] Familiarity with cloud based solutions: AWS, Workday [Preferred] Proficiency using Archer or other audit or Governance Risk and Compliance (GRC) software Education: [Required] Bachelors degree (or equivalent) in Information Technology, Computer Science, Computer Engineering, Accounting, Finance, Business Administration, or related field. [Required] 2+ years of experience (audit-related) in conducting risk-based Information Technology and Security audits and projects, cyber security reviews, and internal audits. [Preferred] Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certification in Risk Management Assurance (CRMA), Certified Internal Auditor (CIA), Certified Public Accountant (CPA), or equivalent.
14/01/2025
Full time
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Company is currently seeking an Information Technology Internal Auditor. Candidate will support independent assessments of the Information Technology and Security environment, risk management, and other objectives as needed. The role is responsible for determining the sufficiency of management's controls and activities related to the management of regulatory, operational, and strategic risks and presenting recommendations for improvements to the engagement team. Responsibilities: Support the team on delivery of assigned audits within the annual audit plan. Support the team confirming a professional auditee experience. Owning the audit quality, accuracy of results, and delivery in a timely manner. Proactively identify regulatory, operational, and/or strategic risks to the organization and bring them to your engagement team. Evaluate exceptions or inefficient practices for root causes and propose advice and recommendations for achievable solutions. Leading audits related to organization changes including business requirements definitions, technology implementations (eg, change management, security), engagement and alignment of change initiatives to business objectives. Maintaining an understanding of policies, procedures, standards, and supporting technologies, and educating staff accordingly, to effectively identify potential risks and alternatives to mitigate risk exposure leveraging leading practices. Ability to understand professional principles and standards (eg, AICPA, IIA IPPF, COBIT, NIST CSF) and the relevancy to risk management and impact on policies and procedures. In addition, leveraging these principles and standards to test and evaluate corporate risk management processes and control. Keeping current on best practices and emerging risks within the financial services industry and making recommendations for improvements as necessary. Qualifications Ability to communicate clearly and effectively, both orally and in writing, including the ability to handle potentially sensitive situations and discussions. Strong problem solving and analytical capabilities. Demonstrated ability to gather, analyze, and evaluate facts, and prepare and present concise oral and written reports. Ability to work independently or as part of a team, prioritizing multiple audit assignments to simultaneously complete each in a timely fashion. [Preferred] Experience working in a complex, fast paced environment. [Preferred] Consulting and/or accounting firm experience. [Preferred] Experience in Financial Services/Security Industry and working with regulations such as Regulation Systems Compliance and Integrity (Reg SCI). [Preferred] Experience using the principles, practices, and techniques involved in conducting audits in accordance with the requirements set forth in the International Standards for the Professional Practice of Internal Auditing published by the Institute of Internal Auditors (IIA). [Required] Microsoft Office applications [Preferred] Familiarity with security tools such as: CyberArk, Splunk, SailPoint [Preferred] Familiarity with change management tools such as: ServiceNow, Jira, Confluence, GitHub [Preferred] Familiarity with databases such as: Oracle, DB2, SQL [Preferred] Familiarity with cloud based solutions: AWS, Workday [Preferred] Proficiency using Archer or other audit or Governance Risk and Compliance (GRC) software Education: [Required] Bachelors degree (or equivalent) in Information Technology, Computer Science, Computer Engineering, Accounting, Finance, Business Administration, or related field. [Required] 2+ years of experience (audit-related) in conducting risk-based Information Technology and Security audits and projects, cyber security reviews, and internal audits. [Preferred] Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certification in Risk Management Assurance (CRMA), Certified Internal Auditor (CIA), Certified Public Accountant (CPA), or equivalent.
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Company is currently seeking an Information Technology Internal Auditor. Candidate will support independent assessments of the Information Technology and Security environment, risk management, and other objectives as needed. The role is responsible for determining the sufficiency of management's controls and activities related to the management of regulatory, operational, and strategic risks and presenting recommendations for improvements to the engagement team. Responsibilities: Support the team on delivery of assigned audits within the annual audit plan. Support the team confirming a professional auditee experience. Owning the audit quality, accuracy of results, and delivery in a timely manner. Proactively identify regulatory, operational, and/or strategic risks to the organization and bring them to your engagement team. Evaluate exceptions or inefficient practices for root causes and propose advice and recommendations for achievable solutions. Leading audits related to organization changes including business requirements definitions, technology implementations (eg, change management, security), engagement and alignment of change initiatives to business objectives. Maintaining an understanding of policies, procedures, standards, and supporting technologies, and educating staff accordingly, to effectively identify potential risks and alternatives to mitigate risk exposure leveraging leading practices. Ability to understand professional principles and standards (eg, AICPA, IIA IPPF, COBIT, NIST CSF) and the relevancy to risk management and impact on policies and procedures. In addition, leveraging these principles and standards to test and evaluate corporate risk management processes and control. Keeping current on best practices and emerging risks within the financial services industry and making recommendations for improvements as necessary. Qualifications Ability to communicate clearly and effectively, both orally and in writing, including the ability to handle potentially sensitive situations and discussions. Strong problem solving and analytical capabilities. Demonstrated ability to gather, analyze, and evaluate facts, and prepare and present concise oral and written reports. Ability to work independently or as part of a team, prioritizing multiple audit assignments to simultaneously complete each in a timely fashion. [Preferred] Experience working in a complex, fast paced environment. [Preferred] Consulting and/or accounting firm experience. [Preferred] Experience in Financial Services/Security Industry and working with regulations such as Regulation Systems Compliance and Integrity (Reg SCI). [Preferred] Experience using the principles, practices, and techniques involved in conducting audits in accordance with the requirements set forth in the International Standards for the Professional Practice of Internal Auditing published by the Institute of Internal Auditors (IIA). [Required] Microsoft Office applications [Preferred] Familiarity with security tools such as: CyberArk, Splunk, SailPoint [Preferred] Familiarity with change management tools such as: ServiceNow, Jira, Confluence, GitHub [Preferred] Familiarity with databases such as: Oracle, DB2, SQL [Preferred] Familiarity with cloud based solutions: AWS, Workday [Preferred] Proficiency using Archer or other audit or Governance Risk and Compliance (GRC) software Education: [Required] Bachelors degree (or equivalent) in Information Technology, Computer Science, Computer Engineering, Accounting, Finance, Business Administration, or related field. [Required] 2+ years of experience (audit-related) in conducting risk-based Information Technology and Security audits and projects, cyber security reviews, and internal audits. [Preferred] Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certification in Risk Management Assurance (CRMA), Certified Internal Auditor (CIA), Certified Public Accountant (CPA), or equivalent.
13/01/2025
Full time
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Company is currently seeking an Information Technology Internal Auditor. Candidate will support independent assessments of the Information Technology and Security environment, risk management, and other objectives as needed. The role is responsible for determining the sufficiency of management's controls and activities related to the management of regulatory, operational, and strategic risks and presenting recommendations for improvements to the engagement team. Responsibilities: Support the team on delivery of assigned audits within the annual audit plan. Support the team confirming a professional auditee experience. Owning the audit quality, accuracy of results, and delivery in a timely manner. Proactively identify regulatory, operational, and/or strategic risks to the organization and bring them to your engagement team. Evaluate exceptions or inefficient practices for root causes and propose advice and recommendations for achievable solutions. Leading audits related to organization changes including business requirements definitions, technology implementations (eg, change management, security), engagement and alignment of change initiatives to business objectives. Maintaining an understanding of policies, procedures, standards, and supporting technologies, and educating staff accordingly, to effectively identify potential risks and alternatives to mitigate risk exposure leveraging leading practices. Ability to understand professional principles and standards (eg, AICPA, IIA IPPF, COBIT, NIST CSF) and the relevancy to risk management and impact on policies and procedures. In addition, leveraging these principles and standards to test and evaluate corporate risk management processes and control. Keeping current on best practices and emerging risks within the financial services industry and making recommendations for improvements as necessary. Qualifications Ability to communicate clearly and effectively, both orally and in writing, including the ability to handle potentially sensitive situations and discussions. Strong problem solving and analytical capabilities. Demonstrated ability to gather, analyze, and evaluate facts, and prepare and present concise oral and written reports. Ability to work independently or as part of a team, prioritizing multiple audit assignments to simultaneously complete each in a timely fashion. [Preferred] Experience working in a complex, fast paced environment. [Preferred] Consulting and/or accounting firm experience. [Preferred] Experience in Financial Services/Security Industry and working with regulations such as Regulation Systems Compliance and Integrity (Reg SCI). [Preferred] Experience using the principles, practices, and techniques involved in conducting audits in accordance with the requirements set forth in the International Standards for the Professional Practice of Internal Auditing published by the Institute of Internal Auditors (IIA). [Required] Microsoft Office applications [Preferred] Familiarity with security tools such as: CyberArk, Splunk, SailPoint [Preferred] Familiarity with change management tools such as: ServiceNow, Jira, Confluence, GitHub [Preferred] Familiarity with databases such as: Oracle, DB2, SQL [Preferred] Familiarity with cloud based solutions: AWS, Workday [Preferred] Proficiency using Archer or other audit or Governance Risk and Compliance (GRC) software Education: [Required] Bachelors degree (or equivalent) in Information Technology, Computer Science, Computer Engineering, Accounting, Finance, Business Administration, or related field. [Required] 2+ years of experience (audit-related) in conducting risk-based Information Technology and Security audits and projects, cyber security reviews, and internal audits. [Preferred] Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certification in Risk Management Assurance (CRMA), Certified Internal Auditor (CIA), Certified Public Accountant (CPA), or equivalent.
Request Technology - Craig Johnson
Chicago, Illinois
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Institution is currently seeking a Sr. Cyber Defense Threat Engineer. Candidate will be responsible for the in-depth analysis and response to security incidents escalated from Tier 1 analysts. This role involves investigating complex security events, identifying potential threats, and implementing measures to mitigate risks. The Tier 2 analyst plays a critical role in maintaining the security posture of the organization by leveraging advanced threat intelligence and incident response techniques. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Participate in post-incident reviews to identify areas for improvement. Stay current with the latest cybersecurity trends, threats, and technologies. Contribute to the development and enhancement of SOC processes and procedures. Qualifications: Proven team player will be working primarily with other staff members, on both long-term projects and rapid response under tight deadlines. Team Leadership experience, taking initiative; providing and following through on solutions across various skillsets. Knowledge and experience implementing controls based on security regulation (eg, NIST Cyber Security Framework) is a plus. Effective and excellent oral and written communication, analytical, judgment and consultation skills. Ability to effectively communicate in both formal and informal review settings with all levels of management. Ability to work with local and remote IT staff/management, vendors and consultants. Ability to work independently and possess strong project management skills. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Cloud based security tools and techniques (AWS, Azure, GCP, etc.) Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices. Education and Experience: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Industry knowledge of leading-edge security technologies and methods. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Previous people/project management experience is a plus. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+.
10/01/2025
Full time
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Institution is currently seeking a Sr. Cyber Defense Threat Engineer. Candidate will be responsible for the in-depth analysis and response to security incidents escalated from Tier 1 analysts. This role involves investigating complex security events, identifying potential threats, and implementing measures to mitigate risks. The Tier 2 analyst plays a critical role in maintaining the security posture of the organization by leveraging advanced threat intelligence and incident response techniques. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Participate in post-incident reviews to identify areas for improvement. Stay current with the latest cybersecurity trends, threats, and technologies. Contribute to the development and enhancement of SOC processes and procedures. Qualifications: Proven team player will be working primarily with other staff members, on both long-term projects and rapid response under tight deadlines. Team Leadership experience, taking initiative; providing and following through on solutions across various skillsets. Knowledge and experience implementing controls based on security regulation (eg, NIST Cyber Security Framework) is a plus. Effective and excellent oral and written communication, analytical, judgment and consultation skills. Ability to effectively communicate in both formal and informal review settings with all levels of management. Ability to work with local and remote IT staff/management, vendors and consultants. Ability to work independently and possess strong project management skills. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Cloud based security tools and techniques (AWS, Azure, GCP, etc.) Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices. Education and Experience: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Industry knowledge of leading-edge security technologies and methods. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Previous people/project management experience is a plus. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+.
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Institution is currently seeking a Sr. Cyber Defense Threat Engineer. Candidate will be responsible for the in-depth analysis and response to security incidents escalated from Tier 1 analysts. This role involves investigating complex security events, identifying potential threats, and implementing measures to mitigate risks. The Tier 2 analyst plays a critical role in maintaining the security posture of the organization by leveraging advanced threat intelligence and incident response techniques. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Participate in post-incident reviews to identify areas for improvement. Stay current with the latest cybersecurity trends, threats, and technologies. Contribute to the development and enhancement of SOC processes and procedures. Qualifications: Proven team player will be working primarily with other staff members, on both long-term projects and rapid response under tight deadlines. Team Leadership experience, taking initiative; providing and following through on solutions across various skillsets. Knowledge and experience implementing controls based on security regulation (eg, NIST Cyber Security Framework) is a plus. Effective and excellent oral and written communication, analytical, judgment and consultation skills. Ability to effectively communicate in both formal and informal review settings with all levels of management. Ability to work with local and remote IT staff/management, vendors and consultants. Ability to work independently and possess strong project management skills. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Cloud based security tools and techniques (AWS, Azure, GCP, etc.) Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices. Education and Experience: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Industry knowledge of leading-edge security technologies and methods. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Previous people/project management experience is a plus. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+.
10/01/2025
Full time
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Institution is currently seeking a Sr. Cyber Defense Threat Engineer. Candidate will be responsible for the in-depth analysis and response to security incidents escalated from Tier 1 analysts. This role involves investigating complex security events, identifying potential threats, and implementing measures to mitigate risks. The Tier 2 analyst plays a critical role in maintaining the security posture of the organization by leveraging advanced threat intelligence and incident response techniques. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Participate in post-incident reviews to identify areas for improvement. Stay current with the latest cybersecurity trends, threats, and technologies. Contribute to the development and enhancement of SOC processes and procedures. Qualifications: Proven team player will be working primarily with other staff members, on both long-term projects and rapid response under tight deadlines. Team Leadership experience, taking initiative; providing and following through on solutions across various skillsets. Knowledge and experience implementing controls based on security regulation (eg, NIST Cyber Security Framework) is a plus. Effective and excellent oral and written communication, analytical, judgment and consultation skills. Ability to effectively communicate in both formal and informal review settings with all levels of management. Ability to work with local and remote IT staff/management, vendors and consultants. Ability to work independently and possess strong project management skills. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Cloud based security tools and techniques (AWS, Azure, GCP, etc.) Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices. Education and Experience: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Industry knowledge of leading-edge security technologies and methods. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Previous people/project management experience is a plus. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+.
Role Overview: As the CI/CD Senoir Engineer, you will lead the CI/CD stream, managing a team of three CI/CD engineers. You will be responsible for creating and executing a 12-month delivery roadmap, ensuring robust and scalable CI/CD pipelines that support development and deployment processes. The role requires a strong focus on Azure Kubernetes Service (AKS), integration with OpenShift, and leadership within the CI/CD domain. You will also play a pivotal role in transitioning the organisation's CI/CD pipelines from Jenkins to GitHub Actions + Implementing Disaster Recovery processes in future. Key Responsibilities: Team Leadership : Manage and mentor a team of three CI/CD engineers, fostering skill development and ensuring alignment with the 12-month roadmap. Pipeline Management : Design, implement, and maintain Jenkins pipelines in Azure Kubernetes, optimised for deployment to on-premises OpenShift solutions. Migration Planning : Lead the migration from Jenkins to GitHub Actions, ensuring a seamless transition while maintaining pipeline efficiency and reliability. Kubernetes and OpenShift Integration : Manage and troubleshoot Kubernetes clusters (AKS) and ensure seamless integration with OpenShift for deployment workflows. Version Control Processes : Enforce GitFlow branching strategy and maintain repository health, including PR management, tagging, and automated repository creation. Monitoring and Observability : Integrate and maintain monitoring solutions with Splunk to enhance pipeline observability and ensure operational reliability. Containerisation : Manage container life cycle using Docker, Helm, and Azure Container Registry (ACR). Service Mesh : Work with Istio for Kubernetes service-to-service communications. Security and Artifact Management : Leverage Nexus for artifact repository management and Trivy for container vulnerability scanning and security assessments. Operational Support : Provide troubleshooting expertise for CI/CD pipelines, Kubernetes, and OpenShift deployments. Roadmap Execution : Define, communicate, and deliver a 12-month CI/CD roadmap aligned with business objectives. Key Requirements: Leadership Skills : Proven ability to lead a small team, manage priorities, and deliver against a roadmap. Kubernetes Expertise : Advanced knowledge of AKS and kubectl CLI. Pipeline Development : Strong Groovy Scripting skills for Jenkins pipeline development and optimisation. GitHub Actions : Experience with GitHub Actions, including workflow creation and migration strategies. Azure Expertise : Hands-on experience with Azure Kubernetes and Azure Container Registry (ACR). OpenShift Knowledge : Understanding of RedHat OpenShift for deployment workflows and troubleshooting. Version Control : Proficiency in GitFlow branching strategy. Monitoring Tools : Experience with Splunk or other observability platforms (preferred). DevOps Tools : Hands-on experience with Istio, Nexus, Trivy, and Helm. Troubleshooting : Strong operational support skills for resolving pipeline, Kubernetes, and OpenShift issues. Additional: Must be able to read, write and speak English (mandatory) Should be located within Europe (including the UK) Would be nice if able to speak Swedish (not mandatory)
10/01/2025
Full time
Role Overview: As the CI/CD Senoir Engineer, you will lead the CI/CD stream, managing a team of three CI/CD engineers. You will be responsible for creating and executing a 12-month delivery roadmap, ensuring robust and scalable CI/CD pipelines that support development and deployment processes. The role requires a strong focus on Azure Kubernetes Service (AKS), integration with OpenShift, and leadership within the CI/CD domain. You will also play a pivotal role in transitioning the organisation's CI/CD pipelines from Jenkins to GitHub Actions + Implementing Disaster Recovery processes in future. Key Responsibilities: Team Leadership : Manage and mentor a team of three CI/CD engineers, fostering skill development and ensuring alignment with the 12-month roadmap. Pipeline Management : Design, implement, and maintain Jenkins pipelines in Azure Kubernetes, optimised for deployment to on-premises OpenShift solutions. Migration Planning : Lead the migration from Jenkins to GitHub Actions, ensuring a seamless transition while maintaining pipeline efficiency and reliability. Kubernetes and OpenShift Integration : Manage and troubleshoot Kubernetes clusters (AKS) and ensure seamless integration with OpenShift for deployment workflows. Version Control Processes : Enforce GitFlow branching strategy and maintain repository health, including PR management, tagging, and automated repository creation. Monitoring and Observability : Integrate and maintain monitoring solutions with Splunk to enhance pipeline observability and ensure operational reliability. Containerisation : Manage container life cycle using Docker, Helm, and Azure Container Registry (ACR). Service Mesh : Work with Istio for Kubernetes service-to-service communications. Security and Artifact Management : Leverage Nexus for artifact repository management and Trivy for container vulnerability scanning and security assessments. Operational Support : Provide troubleshooting expertise for CI/CD pipelines, Kubernetes, and OpenShift deployments. Roadmap Execution : Define, communicate, and deliver a 12-month CI/CD roadmap aligned with business objectives. Key Requirements: Leadership Skills : Proven ability to lead a small team, manage priorities, and deliver against a roadmap. Kubernetes Expertise : Advanced knowledge of AKS and kubectl CLI. Pipeline Development : Strong Groovy Scripting skills for Jenkins pipeline development and optimisation. GitHub Actions : Experience with GitHub Actions, including workflow creation and migration strategies. Azure Expertise : Hands-on experience with Azure Kubernetes and Azure Container Registry (ACR). OpenShift Knowledge : Understanding of RedHat OpenShift for deployment workflows and troubleshooting. Version Control : Proficiency in GitFlow branching strategy. Monitoring Tools : Experience with Splunk or other observability platforms (preferred). DevOps Tools : Hands-on experience with Istio, Nexus, Trivy, and Helm. Troubleshooting : Strong operational support skills for resolving pipeline, Kubernetes, and OpenShift issues. Additional: Must be able to read, write and speak English (mandatory) Should be located within Europe (including the UK) Would be nice if able to speak Swedish (not mandatory)
Westhouse is one of the leading international recruitment agencies for the procurement of highly qualified experts in fields such as IT life cycle management, SAP, engineering, commerce and specialist consultancy. For our client we are currently looking for a Senior DevOps for mobile Payment Systems (m/f/d) General information Reference: 172121 Location: Limerick Start: 01.01.2025 (ASAP) Volume: Full time (100%) Duration: 31.12.2025 + Option Languages: English Your Skills - Track record in Service and Incident Management - Cloud Platforms: Proficiency in AWS, Azure, or Google Cloud. (AWS preferred) - Continuous Integration/Continuous Deployment (CI/CD): Expertise in tools like Jenkins, GitLab CI, or CircleCI. - Infrastructure as Code (IaC): Experience with Terraform, Ansible, or CloudFormation. - Scripting Languages: Competence in Python, Bash, or PowerShell. - Containerisation: Knowledge of Docker and orchestration tools like Kubernetes. - Monitoring and Logging: Familiarity with tools such as Prometheus, Grafana, ELK Stack, or Splunk. - Version Control Systems: Proficient in using Git and understanding branching strategies. - Security Best Practices: Implementing security measures in cloud and deployment pipelines. Your Tasks - Leadership: Ability to guide and mentor team members, ensuring alignment with technical goals. - Problem-Solving: Aptitude for diagnosing and resolving complex issues efficiently. - Collaboration: Strong teamwork skills to work effectively with other departments. - Adaptability: Flexibility to adjust to changing project requirements and new technologies. - Attention to Detail: Meticulous in configuring environments and automating processes. - Communication: Clear and effective verbal and written communication skills. - Proactiveness: Initiative to identify areas for improvement and drive changes proactively. - Customer Focus: Understanding the end-user needs and ensuring the delivery of high-quality solutions. Interested? We look forward to receiving your application documents in electronic form. Your Contact: Tobias Gollmann
08/01/2025
Project-based
Westhouse is one of the leading international recruitment agencies for the procurement of highly qualified experts in fields such as IT life cycle management, SAP, engineering, commerce and specialist consultancy. For our client we are currently looking for a Senior DevOps for mobile Payment Systems (m/f/d) General information Reference: 172121 Location: Limerick Start: 01.01.2025 (ASAP) Volume: Full time (100%) Duration: 31.12.2025 + Option Languages: English Your Skills - Track record in Service and Incident Management - Cloud Platforms: Proficiency in AWS, Azure, or Google Cloud. (AWS preferred) - Continuous Integration/Continuous Deployment (CI/CD): Expertise in tools like Jenkins, GitLab CI, or CircleCI. - Infrastructure as Code (IaC): Experience with Terraform, Ansible, or CloudFormation. - Scripting Languages: Competence in Python, Bash, or PowerShell. - Containerisation: Knowledge of Docker and orchestration tools like Kubernetes. - Monitoring and Logging: Familiarity with tools such as Prometheus, Grafana, ELK Stack, or Splunk. - Version Control Systems: Proficient in using Git and understanding branching strategies. - Security Best Practices: Implementing security measures in cloud and deployment pipelines. Your Tasks - Leadership: Ability to guide and mentor team members, ensuring alignment with technical goals. - Problem-Solving: Aptitude for diagnosing and resolving complex issues efficiently. - Collaboration: Strong teamwork skills to work effectively with other departments. - Adaptability: Flexibility to adjust to changing project requirements and new technologies. - Attention to Detail: Meticulous in configuring environments and automating processes. - Communication: Clear and effective verbal and written communication skills. - Proactiveness: Initiative to identify areas for improvement and drive changes proactively. - Customer Focus: Understanding the end-user needs and ensuring the delivery of high-quality solutions. Interested? We look forward to receiving your application documents in electronic form. Your Contact: Tobias Gollmann