Note: You must be based in Belgium, France or Netherlands and 8 days a month on site in Belgium is mandatory. We are not accepting UK based candidates for this role. Role: you will work closely with the Lead Data Architect working across multiple delivery Epics that are focussed on designing, developing, testing and launching data related features that support the entire IdAM 2.0 solution (eg Identify Fabric, Metrics & Dashboard, Privileged Technical Account Inventory). You will assist in creating and documenting an integrated end to end IdAM data model that ensures data consistency, integrity, timeliness, automation and enables operational efficiency via automation across the IdAM ecosystem. This hands on role includes building database objects and loading/extracting from SQL server via repeatable Scripting solutions (PowerShell) or ETL tooling (Azure data factory) and/or API calls for both bespoke applications and Commercial Off the Shelf applications. Required Skills & Experience A combination of several of the below should be covered: 5+ years awareness/experience of Data Architecture, Data Modelling & Data Engineering (including data modelling tools such as ERWIN) 5+ years' experience with PowerShell for automating tasks and processes in a Windows Operating System environment. 5+ years experience with SQL (on SQL Server) , especially in writing and maintaining Stored Procedures to extract, load & transform database objects. 5+ full software development life cycle product launches including warranty support and handover to operationalization team 1-2 Years Hands on experience of data dictionary, lineage and management tools & concepts - especially Collibra 3+ years hands on experience of ETL tools and concepts (experience with Azure data factory is a plus) Knowledge of other database technologies (eg Oracle) is a bonus Knowledge on one or more of following technology platforms: Windows, Unix, Network, Knowledge of scheduling tools and techniques for automating routine tasks. Awareness of Operational Production Support in a level 2/3 context interacting closely with L1 using ticketing technologies, like ServiceNow, for Incident Management. Familiarity with, or awareness of, security mechanisms in use across operating platforms and applications such as Windows, Linux, z/OS (RACF), Tandem, SQL Server, Oracle, DB2, CyberArk, PowerBroker (Beyond Trust), ServiceNow. Understanding of access control and management principles (eg segregation of duty, toxic pairs etc.) Professional certification in CISSP, CISM and CISA, or equivalent is a plus
06/07/2025
Project-based
Note: You must be based in Belgium, France or Netherlands and 8 days a month on site in Belgium is mandatory. We are not accepting UK based candidates for this role. Role: you will work closely with the Lead Data Architect working across multiple delivery Epics that are focussed on designing, developing, testing and launching data related features that support the entire IdAM 2.0 solution (eg Identify Fabric, Metrics & Dashboard, Privileged Technical Account Inventory). You will assist in creating and documenting an integrated end to end IdAM data model that ensures data consistency, integrity, timeliness, automation and enables operational efficiency via automation across the IdAM ecosystem. This hands on role includes building database objects and loading/extracting from SQL server via repeatable Scripting solutions (PowerShell) or ETL tooling (Azure data factory) and/or API calls for both bespoke applications and Commercial Off the Shelf applications. Required Skills & Experience A combination of several of the below should be covered: 5+ years awareness/experience of Data Architecture, Data Modelling & Data Engineering (including data modelling tools such as ERWIN) 5+ years' experience with PowerShell for automating tasks and processes in a Windows Operating System environment. 5+ years experience with SQL (on SQL Server) , especially in writing and maintaining Stored Procedures to extract, load & transform database objects. 5+ full software development life cycle product launches including warranty support and handover to operationalization team 1-2 Years Hands on experience of data dictionary, lineage and management tools & concepts - especially Collibra 3+ years hands on experience of ETL tools and concepts (experience with Azure data factory is a plus) Knowledge of other database technologies (eg Oracle) is a bonus Knowledge on one or more of following technology platforms: Windows, Unix, Network, Knowledge of scheduling tools and techniques for automating routine tasks. Awareness of Operational Production Support in a level 2/3 context interacting closely with L1 using ticketing technologies, like ServiceNow, for Incident Management. Familiarity with, or awareness of, security mechanisms in use across operating platforms and applications such as Windows, Linux, z/OS (RACF), Tandem, SQL Server, Oracle, DB2, CyberArk, PowerBroker (Beyond Trust), ServiceNow. Understanding of access control and management principles (eg segregation of duty, toxic pairs etc.) Professional certification in CISSP, CISM and CISA, or equivalent is a plus
*Hybrid, 3 days onsite, 2 days remote* *We are unable to sponsor as this is a permanent Full time role* A prestigious company is looking for a Senior Associate, Internal Audit IT & Security. This internal auditor will need 2+ years of experience conducting risk-based information technology and security audits. This is a highly regulated financial environment, and these audits will follow AICPA, IIA, IPPF, COBIT, NIST, and CSF standards/frameworks. Responsibilities: Support the team on delivery of assigned audits within the annual audit plan. Support the team confirming a professional auditee experience. Owning the audit quality, accuracy of results, and delivery in a timely manner. Proactively identify regulatory, operational, and/or strategic risks to the organization and bring them to your engagement team. Evaluate exceptions or inefficient practices for root causes and propose advice and recommendations for achievable solutions. Leading audits related to organization changes including business requirements definitions, technology implementations (eg, change management, security), engagement and alignment of change initiatives to business objectives. Maintaining an understanding of policies, procedures, standards, and supporting technologies, and educating staff accordingly, to effectively identify potential risks and alternatives to mitigate risk exposure leveraging leading practices. Ability to understand professional principles and standards (eg, AICPA, IIA IPPF, COBIT, NIST CSF) and the relevancy to risk management and impact on policies and procedures. In addition, leveraging these principles and standards to test and evaluate corporate risk management processes and control. Keeping current on best practices and emerging risks within the financial services industry and making recommendations for improvements as necessary. Qualifications Bachelor's degree (or equivalent) in Information Technology, Computer Science, Computer Engineering, Accounting, Finance, Business Administration, or related field. 2+ years of experience (audit-related) in conducting risk-based Information Technology and Security audits and projects, cyber security reviews, and internal audits. Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certification in Risk Management Assurance (CRMA), Certified Internal Auditor (CIA), Certified Public Accountant (CPA), or equivalent. Consulting and/or accounting firm experience. Experience in Financial Services/Security Industry and working with regulations such as Regulation Systems Compliance and Integrity (Reg SCI). Experience using the principles, practices, and techniques involved in conducting audits in accordance with the requirements set forth in the International Standards for the Professional Practice of Internal Auditing published by the Institute of Internal Auditors (IIA). Microsoft Office applications Proficiency using Archer or other audit or Governance Risk and Compliance (GRC) software
04/07/2025
Full time
*Hybrid, 3 days onsite, 2 days remote* *We are unable to sponsor as this is a permanent Full time role* A prestigious company is looking for a Senior Associate, Internal Audit IT & Security. This internal auditor will need 2+ years of experience conducting risk-based information technology and security audits. This is a highly regulated financial environment, and these audits will follow AICPA, IIA, IPPF, COBIT, NIST, and CSF standards/frameworks. Responsibilities: Support the team on delivery of assigned audits within the annual audit plan. Support the team confirming a professional auditee experience. Owning the audit quality, accuracy of results, and delivery in a timely manner. Proactively identify regulatory, operational, and/or strategic risks to the organization and bring them to your engagement team. Evaluate exceptions or inefficient practices for root causes and propose advice and recommendations for achievable solutions. Leading audits related to organization changes including business requirements definitions, technology implementations (eg, change management, security), engagement and alignment of change initiatives to business objectives. Maintaining an understanding of policies, procedures, standards, and supporting technologies, and educating staff accordingly, to effectively identify potential risks and alternatives to mitigate risk exposure leveraging leading practices. Ability to understand professional principles and standards (eg, AICPA, IIA IPPF, COBIT, NIST CSF) and the relevancy to risk management and impact on policies and procedures. In addition, leveraging these principles and standards to test and evaluate corporate risk management processes and control. Keeping current on best practices and emerging risks within the financial services industry and making recommendations for improvements as necessary. Qualifications Bachelor's degree (or equivalent) in Information Technology, Computer Science, Computer Engineering, Accounting, Finance, Business Administration, or related field. 2+ years of experience (audit-related) in conducting risk-based Information Technology and Security audits and projects, cyber security reviews, and internal audits. Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certification in Risk Management Assurance (CRMA), Certified Internal Auditor (CIA), Certified Public Accountant (CPA), or equivalent. Consulting and/or accounting firm experience. Experience in Financial Services/Security Industry and working with regulations such as Regulation Systems Compliance and Integrity (Reg SCI). Experience using the principles, practices, and techniques involved in conducting audits in accordance with the requirements set forth in the International Standards for the Professional Practice of Internal Auditing published by the Institute of Internal Auditors (IIA). Microsoft Office applications Proficiency using Archer or other audit or Governance Risk and Compliance (GRC) software
SCADA Cutover Engineer Warwick - Hybrid (2-3 days in office) 6-month contract Daily Rate: £500 inside umbrella Role Overview: Our client is seeking a skilled SCADA Cutover Engineer to join their team for a critical role in transitioning to a new SCADA system. This position is essential for ensuring a smooth cutover process by managing the technical aspects and developing a comprehensive Cutover Runbook. Your expertise will help coordinate all necessary components for a successful transition from the current system to the new SCADA platform. Key Responsibilities: Runbook Development: Design and create a detailed Cutover & Dress Rehearsal Runbook, including rollback scenario planning, task sequencing, dependencies, and timing. Collaboration: Work closely with engineering, infrastructure, infosec, and operations teams to validate readiness for the cutover and any necessary failback procedures. Requirement Management: Identify, document, and manage all technical cutover requirements, including data needs, system configurations, interface activations, and rollback procedures. Checkpoint Definition: Establish technical checkpoints, rollback plans, and contingency strategies to mitigate risks. Compliance Assurance: Ensure all activities align with change management processes, operational constraints, safety protocols, security standards, and regulatory requirements. Rehearsal Management: organise and manage cutover rehearsals, dry runs, and simulations to ensure the viability of cutover scenarios and the effectiveness of the runbook. Execution Leadership: Provide technical leadership during the cutover execution phase, ensuring adherence to the established plan and addressing Real Time issues as they arise. Post-Cutover Support: Assist with post-cutover activities, including verification, stabilisation, and incident resolution to ensure system integrity. Required Skills & Experience: Experience with SCADA platforms. Background in CNI cutovers and knowledge of industrial control systems. Strong understanding of industrial automation and CNI architecture. Proven experience as a Technical Solution Architect or Implementation Lead in large-scale technology deployments. Demonstrated expertise in developing and executing detailed cutover runbooks for complex, mission-critical systems. In-depth knowledge of system integration infrastructure readiness and network configuration within Operational Technology (OT) environments. Familiarity with cybersecurity requirements and operational risk management for Critical National Infrastructure (CNI). Strong problem-solving abilities, documentation skills, and coordination capabilities under high-pressure conditions. Excellent communication skills, with the capacity to lead cross-functional teams effectively. Qualifications: Degree level or equivalent experience as a Technical Solution Architect or Implementation Lead in large-scale technology deployment or transformation programmes. Pontoon is an employment consultancy. We put expertise, energy, and enthusiasm into improving everyone's chance of being part of the workplace. We respect and appreciate people of all ethnicities, generations, religious beliefs, sexual orientations, gender identities, and more. We do this by showcasing their talents, skills, and unique experience in an inclusive environment that helps them thrive. If you require reasonable adjustments at any stage, please let us know and we will be happy to support you.
04/07/2025
Project-based
SCADA Cutover Engineer Warwick - Hybrid (2-3 days in office) 6-month contract Daily Rate: £500 inside umbrella Role Overview: Our client is seeking a skilled SCADA Cutover Engineer to join their team for a critical role in transitioning to a new SCADA system. This position is essential for ensuring a smooth cutover process by managing the technical aspects and developing a comprehensive Cutover Runbook. Your expertise will help coordinate all necessary components for a successful transition from the current system to the new SCADA platform. Key Responsibilities: Runbook Development: Design and create a detailed Cutover & Dress Rehearsal Runbook, including rollback scenario planning, task sequencing, dependencies, and timing. Collaboration: Work closely with engineering, infrastructure, infosec, and operations teams to validate readiness for the cutover and any necessary failback procedures. Requirement Management: Identify, document, and manage all technical cutover requirements, including data needs, system configurations, interface activations, and rollback procedures. Checkpoint Definition: Establish technical checkpoints, rollback plans, and contingency strategies to mitigate risks. Compliance Assurance: Ensure all activities align with change management processes, operational constraints, safety protocols, security standards, and regulatory requirements. Rehearsal Management: organise and manage cutover rehearsals, dry runs, and simulations to ensure the viability of cutover scenarios and the effectiveness of the runbook. Execution Leadership: Provide technical leadership during the cutover execution phase, ensuring adherence to the established plan and addressing Real Time issues as they arise. Post-Cutover Support: Assist with post-cutover activities, including verification, stabilisation, and incident resolution to ensure system integrity. Required Skills & Experience: Experience with SCADA platforms. Background in CNI cutovers and knowledge of industrial control systems. Strong understanding of industrial automation and CNI architecture. Proven experience as a Technical Solution Architect or Implementation Lead in large-scale technology deployments. Demonstrated expertise in developing and executing detailed cutover runbooks for complex, mission-critical systems. In-depth knowledge of system integration infrastructure readiness and network configuration within Operational Technology (OT) environments. Familiarity with cybersecurity requirements and operational risk management for Critical National Infrastructure (CNI). Strong problem-solving abilities, documentation skills, and coordination capabilities under high-pressure conditions. Excellent communication skills, with the capacity to lead cross-functional teams effectively. Qualifications: Degree level or equivalent experience as a Technical Solution Architect or Implementation Lead in large-scale technology deployment or transformation programmes. Pontoon is an employment consultancy. We put expertise, energy, and enthusiasm into improving everyone's chance of being part of the workplace. We respect and appreciate people of all ethnicities, generations, religious beliefs, sexual orientations, gender identities, and more. We do this by showcasing their talents, skills, and unique experience in an inclusive environment that helps them thrive. If you require reasonable adjustments at any stage, please let us know and we will be happy to support you.
Cyber Threat Intelligence Analyst Akkodis are currently working in partnership with a leading service provider to recruit a Cyber Threat Intelligence Analyst to join a leading Cyber Defence Team and play a pivotal role in providing actionable technical intelligence to detection engineers, threat hunters and security operations. This role offers a highly competitive salary and the opportunity for remote working. The Role As a Cyber Threat Intelligence Analyst you will support the rest of the Cyber Defence engineering team in regard to the roadmap and what to focus on. You will share Intel to help them understand what's emerging as well as what advanced persistent threat actors are leveraging to compromise systems. You will work directly across all areas of Cyber Defence to produce bespoke and technical intelligence across Tactical, Strategic, and Operational intelligence. The Responsibilities Conduct in-depth analysis of threat groups, their capabilities, motivations, and tactics A strong understanding of threats posed Articulate complex concepts to various stakeholders across the business. Knowledge of tactics, techniques and procedures (TTPs) that involve cloud technology. Proficiency in relevant cyber threat intelligence tools and technologies. Self-motivated with strong problem-solving and critical thinking skills A strong attention to detail including being able to find new and emerging threats/malware that impact systems and technology. Consume new threat reports, extracting relevant and actionable intelligence including TTPs and behavioural indicators. Working closely with detection engineers and threat hunters to build bespoke detections to detect novel TTPs based on intelligence. Develop comprehensive threat intelligence reports detailing your findings, risk assessments, and recommended mitigation strategies. Monitor and gather threat intelligence from open sources, dark web forums, industry feeds, and other relevant data sources. The Requirements Strong analytical skills and attention for detail. Strong automation and Scripting skills. Strong stakeholder management skill set with a proven ability to get things done. High technical aptitude and a deep understanding of the current cyber threat landscapes including what threats are relevant to the business. Good public speaking and presentation skills. Subject matter expert in technical threat intelligence. If you are looking for an exciting new challenge to play a pivotal part in a leading organisation please apply now. Modis International Ltd acts as an employment agency for permanent recruitment and an employment business for the supply of temporary workers in the UK. Modis Europe Ltd provide a variety of international solutions that connect clients to the best talent in the world. For all positions based in Switzerland, Modis Europe Ltd works with its licensed Swiss partner Accurity GmbH to ensure that candidate applications are handled in accordance with Swiss law. Both Modis International Ltd and Modis Europe Ltd are Equal Opportunities Employers. By applying for this role your details will be submitted to Modis International Ltd and/or Modis Europe Ltd. Our Candidate Privacy Information Statement which explains how we will use your information is available on the Modis website.
04/07/2025
Full time
Cyber Threat Intelligence Analyst Akkodis are currently working in partnership with a leading service provider to recruit a Cyber Threat Intelligence Analyst to join a leading Cyber Defence Team and play a pivotal role in providing actionable technical intelligence to detection engineers, threat hunters and security operations. This role offers a highly competitive salary and the opportunity for remote working. The Role As a Cyber Threat Intelligence Analyst you will support the rest of the Cyber Defence engineering team in regard to the roadmap and what to focus on. You will share Intel to help them understand what's emerging as well as what advanced persistent threat actors are leveraging to compromise systems. You will work directly across all areas of Cyber Defence to produce bespoke and technical intelligence across Tactical, Strategic, and Operational intelligence. The Responsibilities Conduct in-depth analysis of threat groups, their capabilities, motivations, and tactics A strong understanding of threats posed Articulate complex concepts to various stakeholders across the business. Knowledge of tactics, techniques and procedures (TTPs) that involve cloud technology. Proficiency in relevant cyber threat intelligence tools and technologies. Self-motivated with strong problem-solving and critical thinking skills A strong attention to detail including being able to find new and emerging threats/malware that impact systems and technology. Consume new threat reports, extracting relevant and actionable intelligence including TTPs and behavioural indicators. Working closely with detection engineers and threat hunters to build bespoke detections to detect novel TTPs based on intelligence. Develop comprehensive threat intelligence reports detailing your findings, risk assessments, and recommended mitigation strategies. Monitor and gather threat intelligence from open sources, dark web forums, industry feeds, and other relevant data sources. The Requirements Strong analytical skills and attention for detail. Strong automation and Scripting skills. Strong stakeholder management skill set with a proven ability to get things done. High technical aptitude and a deep understanding of the current cyber threat landscapes including what threats are relevant to the business. Good public speaking and presentation skills. Subject matter expert in technical threat intelligence. If you are looking for an exciting new challenge to play a pivotal part in a leading organisation please apply now. Modis International Ltd acts as an employment agency for permanent recruitment and an employment business for the supply of temporary workers in the UK. Modis Europe Ltd provide a variety of international solutions that connect clients to the best talent in the world. For all positions based in Switzerland, Modis Europe Ltd works with its licensed Swiss partner Accurity GmbH to ensure that candidate applications are handled in accordance with Swiss law. Both Modis International Ltd and Modis Europe Ltd are Equal Opportunities Employers. By applying for this role your details will be submitted to Modis International Ltd and/or Modis Europe Ltd. Our Candidate Privacy Information Statement which explains how we will use your information is available on the Modis website.
Product Owner (AutoDesk Construction Cloud) Akkodis are currently working in partnership with a leading service provider to recruit a Product Owner with experience of implementing and optimising AutoDesk Construction Cloud. Please note this is a hybrid role with frequency of onsite presence varying from week to week but will exceed no more than 3 days a week in the office. The Role As the Product Owner for ACC you will be responsible for leading the implementation and optimisation of AutoDesk Construction Cloud. You will work closely with stakeholders across the business to define requirements, manage the product roadmap, and ensure successful adoption and integration of the platform to improve operational efficiency and project delivery. The Responsibilities Define and manage the product roadmap for AutoDesk Construction Cloud, aligning with business goals and user needs. Act as the primary point of contact for AutoDesk Construction Cloud, ensuring seamless integration and functionality. Subject Matter Expert (SME) on AutoDesk Construction Cloud. Collaborate with cross-functional teams, including IT, engineering, and project management, to gather and prioritise requirements. Lead system configuration, testing, and rollout of new features and enhancements. Ensure data integrity and governance within AutoDesk Construction Cloud to support compliance and reporting. Provide training and support to end users, driving adoption and best practices. Monitor system performance and work with vendors to resolve issues and improve capabilities. Stay updated on AutoDesk product developments and industry best practices to maximise value. The Requirements Deep understanding of AutoDesk Construction Cloud and related technologies. Strong project management skills, with experience in agile methodologies. Ability to translate business needs into technical requirements and user stories. Experience with data governance, compliance, and system integrations. Excellent stakeholder management and communication skills. Proficiency in AutoDesk Construction Cloud, including configuration, administration, and optimisation. Strong understanding of APIs and system integrations to connect AutoDesk Construction Cloud with other enterprise applications. Experience working with cloud-based platforms and software-as-a-service (SaaS) solutions. Knowledge of database management and querying (SQL preferred). Familiarity with Scripting languages (Python, PowerShell) for automation and data processing. Competency in Business Intelligence and reporting tools such as Power BI or Tableau. Understanding of cybersecurity principles related to cloud platforms and data security. Hands-on experience with agile project management tools such as Jira or Azure DevOps. If you are looking for an exciting new challenge to play a pivotal part in a leading organisation please apply now. Modis International Ltd acts as an employment agency for permanent recruitment and an employment business for the supply of temporary workers in the UK. Modis Europe Ltd provide a variety of international solutions that connect clients to the best talent in the world. For all positions based in Switzerland, Modis Europe Ltd works with its licensed Swiss partner Accurity GmbH to ensure that candidate applications are handled in accordance with Swiss law. Both Modis International Ltd and Modis Europe Ltd are Equal Opportunities Employers. By applying for this role your details will be submitted to Modis International Ltd and/or Modis Europe Ltd. Our Candidate Privacy Information Statement which explains how we will use your information is available on the Modis website.
04/07/2025
Full time
Product Owner (AutoDesk Construction Cloud) Akkodis are currently working in partnership with a leading service provider to recruit a Product Owner with experience of implementing and optimising AutoDesk Construction Cloud. Please note this is a hybrid role with frequency of onsite presence varying from week to week but will exceed no more than 3 days a week in the office. The Role As the Product Owner for ACC you will be responsible for leading the implementation and optimisation of AutoDesk Construction Cloud. You will work closely with stakeholders across the business to define requirements, manage the product roadmap, and ensure successful adoption and integration of the platform to improve operational efficiency and project delivery. The Responsibilities Define and manage the product roadmap for AutoDesk Construction Cloud, aligning with business goals and user needs. Act as the primary point of contact for AutoDesk Construction Cloud, ensuring seamless integration and functionality. Subject Matter Expert (SME) on AutoDesk Construction Cloud. Collaborate with cross-functional teams, including IT, engineering, and project management, to gather and prioritise requirements. Lead system configuration, testing, and rollout of new features and enhancements. Ensure data integrity and governance within AutoDesk Construction Cloud to support compliance and reporting. Provide training and support to end users, driving adoption and best practices. Monitor system performance and work with vendors to resolve issues and improve capabilities. Stay updated on AutoDesk product developments and industry best practices to maximise value. The Requirements Deep understanding of AutoDesk Construction Cloud and related technologies. Strong project management skills, with experience in agile methodologies. Ability to translate business needs into technical requirements and user stories. Experience with data governance, compliance, and system integrations. Excellent stakeholder management and communication skills. Proficiency in AutoDesk Construction Cloud, including configuration, administration, and optimisation. Strong understanding of APIs and system integrations to connect AutoDesk Construction Cloud with other enterprise applications. Experience working with cloud-based platforms and software-as-a-service (SaaS) solutions. Knowledge of database management and querying (SQL preferred). Familiarity with Scripting languages (Python, PowerShell) for automation and data processing. Competency in Business Intelligence and reporting tools such as Power BI or Tableau. Understanding of cybersecurity principles related to cloud platforms and data security. Hands-on experience with agile project management tools such as Jira or Azure DevOps. If you are looking for an exciting new challenge to play a pivotal part in a leading organisation please apply now. Modis International Ltd acts as an employment agency for permanent recruitment and an employment business for the supply of temporary workers in the UK. Modis Europe Ltd provide a variety of international solutions that connect clients to the best talent in the world. For all positions based in Switzerland, Modis Europe Ltd works with its licensed Swiss partner Accurity GmbH to ensure that candidate applications are handled in accordance with Swiss law. Both Modis International Ltd and Modis Europe Ltd are Equal Opportunities Employers. By applying for this role your details will be submitted to Modis International Ltd and/or Modis Europe Ltd. Our Candidate Privacy Information Statement which explains how we will use your information is available on the Modis website.
Description Our Global Market Leading Client is looking to recruit a Permanent ITSM Support Engineer- Remote. Paying upto £50k. Key Role Responsibilities Responsibilities: Platform Administration - Oversee the configuration, optimisation, and administration of the ITSM/Case Management tool, ensuring they are up to date, secure, and tailored to meet the organisations ever-evolving needs. Service Design - Scope requirements, implement and enforce best practices aligned with ITIL framework to create new service areas, and configure workflows and automation rules for process efficiencies. Incident and Problem Management - Implement and monitor robust incident and problem management practices, ensuring our teams have an effective response to cyber security issues, and minimising service disruptions. Change Management - Coordinate change management processes to manage risks associated with updates and modifications, enhancing the security posture and compliance. Process Improvement - Identify opportunities for process enhancement within the ITSM tool in adherence to the ITIL framework, applying best practices to boost operational efficiency, service quality, and end-user satisfaction and also conduct regular assessments for optimisation. Service Catalogue & Asset Management - Maintain and update the service catalogue and asset inventory, ensuring alignment with cyber security requirements and business priorities. Audit - continuous audit of processes, user groups & permissions, system stability and performance, including SLA monitoring and review and audit system logs and general user activity. Integrations - Implement and configure integrations with other business tools using API's/Webhooks/Plugins. Collaboration - Work with cross-functional teams including security operations and other business units to facilitate effective communication and align IT service delivery with strategic goals. Documentation and Reporting - Create and maintain detailed documentation for all ITSM processes and produce regular performance and compliance reports and develop the ITSM Knowledge Base. Develop custom reports and dashboards to support business decision-making. User Support and Training - Provide training and support to users of the ITSM platform, fostering a culture of self-service and knowledge-sharing. Essential skills required: Technical Expertise: o Prior exposure of configuring, developing and supporting ITSM tools such as ServiceNow, Halo (desirable) o Understanding of ITIL/ITSM best practice with implementing ITSM processes o Proficient knowledge of SQL and HTML Problem Solving - Analytical skills to troubleshoot and resolve complex system issue, to implement solutions effectively with a great overview of the system. Communication - Excellent written and verbal communication skills to articulate technical information clearly to various stakeholders. Collaboration - Strong Interpersonal skills for building relationships across teams and driving process improvements. Certifications: o ITIL Certification Job Title: ITSM Support Engineer Location: Birmingham, UK Rate/Salary: .00 GBP Yearly Job Type: Permanent Trading as TEKsystems. Allegis Group Limited, Bracknell, RG12 1RT, United Kingdom. No Allegis Group Limited operates as an Employment Business and Employment Agency as set out in the Conduct of Employment Agencies and Employment Businesses Regulations 2003. TEKsystems is a company within the Allegis Group network of companies (collectively referred to as "Allegis Group"). Aerotek, Aston Carter, EASi, Talentis Solutions, TEKsystems, Stamford Consultants and The Stamford Group are Allegis Group brands. If you apply, your personal data will be processed as described in the Allegis Group Online Privacy Notice available at our website. To access our Online Privacy Notice, which explains what information we may collect, use, share, and store about you, and describes your rights and choices about this, please go our website. We are part of a global network of companies and as a result, the personal data you provide will be shared within Allegis Group and transferred and processed outside the UK, Switzerland and European Economic Area subject to the protections described in the Allegis Group Online Privacy Notice. We store personal data in the UK, EEA, Switzerland and the USA. If you would like to exercise your privacy rights, please visit the "Contacting Us" section of our Online Privacy Notice on our website for details on how to contact us. To protect your privacy and security, we may take steps to verify your identity, such as a password and user ID if there is an account associated with your request, or identifying information such as your address or date of birth, before proceeding with your request. commitments under the UK Data Protection Act, EU-U.S. Privacy Shield or the Swiss-U.S. Privacy Shield.
04/07/2025
Full time
Description Our Global Market Leading Client is looking to recruit a Permanent ITSM Support Engineer- Remote. Paying upto £50k. Key Role Responsibilities Responsibilities: Platform Administration - Oversee the configuration, optimisation, and administration of the ITSM/Case Management tool, ensuring they are up to date, secure, and tailored to meet the organisations ever-evolving needs. Service Design - Scope requirements, implement and enforce best practices aligned with ITIL framework to create new service areas, and configure workflows and automation rules for process efficiencies. Incident and Problem Management - Implement and monitor robust incident and problem management practices, ensuring our teams have an effective response to cyber security issues, and minimising service disruptions. Change Management - Coordinate change management processes to manage risks associated with updates and modifications, enhancing the security posture and compliance. Process Improvement - Identify opportunities for process enhancement within the ITSM tool in adherence to the ITIL framework, applying best practices to boost operational efficiency, service quality, and end-user satisfaction and also conduct regular assessments for optimisation. Service Catalogue & Asset Management - Maintain and update the service catalogue and asset inventory, ensuring alignment with cyber security requirements and business priorities. Audit - continuous audit of processes, user groups & permissions, system stability and performance, including SLA monitoring and review and audit system logs and general user activity. Integrations - Implement and configure integrations with other business tools using API's/Webhooks/Plugins. Collaboration - Work with cross-functional teams including security operations and other business units to facilitate effective communication and align IT service delivery with strategic goals. Documentation and Reporting - Create and maintain detailed documentation for all ITSM processes and produce regular performance and compliance reports and develop the ITSM Knowledge Base. Develop custom reports and dashboards to support business decision-making. User Support and Training - Provide training and support to users of the ITSM platform, fostering a culture of self-service and knowledge-sharing. Essential skills required: Technical Expertise: o Prior exposure of configuring, developing and supporting ITSM tools such as ServiceNow, Halo (desirable) o Understanding of ITIL/ITSM best practice with implementing ITSM processes o Proficient knowledge of SQL and HTML Problem Solving - Analytical skills to troubleshoot and resolve complex system issue, to implement solutions effectively with a great overview of the system. Communication - Excellent written and verbal communication skills to articulate technical information clearly to various stakeholders. Collaboration - Strong Interpersonal skills for building relationships across teams and driving process improvements. Certifications: o ITIL Certification Job Title: ITSM Support Engineer Location: Birmingham, UK Rate/Salary: .00 GBP Yearly Job Type: Permanent Trading as TEKsystems. Allegis Group Limited, Bracknell, RG12 1RT, United Kingdom. No Allegis Group Limited operates as an Employment Business and Employment Agency as set out in the Conduct of Employment Agencies and Employment Businesses Regulations 2003. TEKsystems is a company within the Allegis Group network of companies (collectively referred to as "Allegis Group"). Aerotek, Aston Carter, EASi, Talentis Solutions, TEKsystems, Stamford Consultants and The Stamford Group are Allegis Group brands. If you apply, your personal data will be processed as described in the Allegis Group Online Privacy Notice available at our website. To access our Online Privacy Notice, which explains what information we may collect, use, share, and store about you, and describes your rights and choices about this, please go our website. We are part of a global network of companies and as a result, the personal data you provide will be shared within Allegis Group and transferred and processed outside the UK, Switzerland and European Economic Area subject to the protections described in the Allegis Group Online Privacy Notice. We store personal data in the UK, EEA, Switzerland and the USA. If you would like to exercise your privacy rights, please visit the "Contacting Us" section of our Online Privacy Notice on our website for details on how to contact us. To protect your privacy and security, we may take steps to verify your identity, such as a password and user ID if there is an account associated with your request, or identifying information such as your address or date of birth, before proceeding with your request. commitments under the UK Data Protection Act, EU-U.S. Privacy Shield or the Swiss-U.S. Privacy Shield.
Request Technology - Craig Johnson
Oakland, California
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Enterprise Company is currently seeking a Manager of Cyber Security Risk and Vulnerabilities. Candidate will be responsible for developing and leading a high-performing team focused on vulnerability management, including vulnerability discovery, risk-based prioritization, and enterprise remediation coordination. This role oversees the design, delivery, and continuous improvement of services that reduce technology risk through scalable vulnerability identification and tracking processes, platform ownership, and stakeholder collaboration. The successful candidate will build strong relationships with key enterprise partners - including architecture, engineering, infrastructure, and application teams - to ensure vulnerabilities are understood, prioritized appropriately, and addressed in alignment with business risk tolerance. Through technical expertise and operational leadership, the manager will advance the maturity of the organization's vulnerability management program and its integration with broader cyber risk functions. The ideal candidate will balance strong technical fluency with people leadership, operational execution, and the ability to inspire a high-performing team in a dynamic cybersecurity landscape. Responsibilities: Leads, coaches, and develops a team of engineers responsible for vulnerability discovery, assessment, risk-based prioritization, and remediation tracking across cloud, on-premises, and hybrid environments Envisions, defines, designs, builds, staffs, and delivers vulnerability management processes and capabilities Leads and supports the planning and execution of team goals and projects, including setting long-term strategy and making decisions about tools, technology, and staffing needs Partners closely with stakeholders across technology, including architecture, engineering, infrastructure, application development, and cyber risk management teams to facilitate vulnerability communications, support remediation activities, and provide continuous reporting. Collaborates with enterprise risk, compliance, and threat intelligence teams to ensure vulnerability management aligns with the organization's overall risk management strategy. Ensures all project deliverables meet high standards for accuracy, completeness, and impact, and are delivered on time to support team and organizational objectives Represents the vulnerability management program to senior leadership, delivering concise, risk-informed insights and recommendations Manages program metrics, reporting, and performance indicators to demonstrate business value, operational maturity, and continuous improvement Supports the organization's processes/methodologies, structure, culture, skills/experience, process support tools, knowledge resources, and other components Contributes to team culture by modelling integrity, inclusivity, accountability, and collaboration This list is not all-inclusive and you are expected to perform other duties as requested or assigned Qualifications: 8+ experience years with a Bachelor's degree; strong hands-on Supervisory/Management experience Industry certifications such as CISSP, GSEC, OSCP, or comparable security-related credentials are strongly preferred Proven experience managing enterprise-scale vulnerability management programs and tools Proven expertise in developing, mentoring, and retaining high-performing teams while fostering a mindful, inclusive, and trust-based team culture Strong ability to build trust, partnerships, and mutual support across many diverse teams Excellent communication and presentation skills, with the ability to convey technical concepts to diverse audiences and a strong emphasis on listening and understanding stakeholder needs Proven record of complex and creative problem-solving, and the desire to build, influence, and improve systems, programs, and processes Demonstrated background in strategic planning, service/program development, capability assessment, and building strong narratives to drive decision-making and create change Ability to understand how individual and team efforts align with broader organizational objectives, and to make decisions with enterprise-wide impact in mind Strong commitment to craftsmanship, with a focus on quality, accuracy, and clarity of work Technical & Domain Expertise: Deep understanding of risk-based vulnerability management. Knowledge of vulnerability scoring systems (CVSS), security benchmarks (CIS, NIST), and risk quantification techniques Proficiency in selecting, implementing, and managing vulnerability scanning tools (eg, SAST, SCA, IAST, DAST, Network/Infrastructure, Cloud, etc.) across the technology stack Experience designing and implementing automation for vulnerability management processes using generative AI, agent-based systems, large language models (LLMs), or machine learning to improve efficiency, effectiveness, and scalability Skilled in analysing business and technical requirements and translating them into effective solutions, technical plans, roadmaps, budgets, and proposals that support cyber program growth and align with cyber and organizational goals Commitment to continuous learning with the ability to research and enhance technical and domain-specific knowledge to support rapidly changing environments Skilled in coordinating multiple concurrent projects with a clear understanding of the project life cycle, prioritization frameworks, and delivery expectations
02/07/2025
Full time
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Enterprise Company is currently seeking a Manager of Cyber Security Risk and Vulnerabilities. Candidate will be responsible for developing and leading a high-performing team focused on vulnerability management, including vulnerability discovery, risk-based prioritization, and enterprise remediation coordination. This role oversees the design, delivery, and continuous improvement of services that reduce technology risk through scalable vulnerability identification and tracking processes, platform ownership, and stakeholder collaboration. The successful candidate will build strong relationships with key enterprise partners - including architecture, engineering, infrastructure, and application teams - to ensure vulnerabilities are understood, prioritized appropriately, and addressed in alignment with business risk tolerance. Through technical expertise and operational leadership, the manager will advance the maturity of the organization's vulnerability management program and its integration with broader cyber risk functions. The ideal candidate will balance strong technical fluency with people leadership, operational execution, and the ability to inspire a high-performing team in a dynamic cybersecurity landscape. Responsibilities: Leads, coaches, and develops a team of engineers responsible for vulnerability discovery, assessment, risk-based prioritization, and remediation tracking across cloud, on-premises, and hybrid environments Envisions, defines, designs, builds, staffs, and delivers vulnerability management processes and capabilities Leads and supports the planning and execution of team goals and projects, including setting long-term strategy and making decisions about tools, technology, and staffing needs Partners closely with stakeholders across technology, including architecture, engineering, infrastructure, application development, and cyber risk management teams to facilitate vulnerability communications, support remediation activities, and provide continuous reporting. Collaborates with enterprise risk, compliance, and threat intelligence teams to ensure vulnerability management aligns with the organization's overall risk management strategy. Ensures all project deliverables meet high standards for accuracy, completeness, and impact, and are delivered on time to support team and organizational objectives Represents the vulnerability management program to senior leadership, delivering concise, risk-informed insights and recommendations Manages program metrics, reporting, and performance indicators to demonstrate business value, operational maturity, and continuous improvement Supports the organization's processes/methodologies, structure, culture, skills/experience, process support tools, knowledge resources, and other components Contributes to team culture by modelling integrity, inclusivity, accountability, and collaboration This list is not all-inclusive and you are expected to perform other duties as requested or assigned Qualifications: 8+ experience years with a Bachelor's degree; strong hands-on Supervisory/Management experience Industry certifications such as CISSP, GSEC, OSCP, or comparable security-related credentials are strongly preferred Proven experience managing enterprise-scale vulnerability management programs and tools Proven expertise in developing, mentoring, and retaining high-performing teams while fostering a mindful, inclusive, and trust-based team culture Strong ability to build trust, partnerships, and mutual support across many diverse teams Excellent communication and presentation skills, with the ability to convey technical concepts to diverse audiences and a strong emphasis on listening and understanding stakeholder needs Proven record of complex and creative problem-solving, and the desire to build, influence, and improve systems, programs, and processes Demonstrated background in strategic planning, service/program development, capability assessment, and building strong narratives to drive decision-making and create change Ability to understand how individual and team efforts align with broader organizational objectives, and to make decisions with enterprise-wide impact in mind Strong commitment to craftsmanship, with a focus on quality, accuracy, and clarity of work Technical & Domain Expertise: Deep understanding of risk-based vulnerability management. Knowledge of vulnerability scoring systems (CVSS), security benchmarks (CIS, NIST), and risk quantification techniques Proficiency in selecting, implementing, and managing vulnerability scanning tools (eg, SAST, SCA, IAST, DAST, Network/Infrastructure, Cloud, etc.) across the technology stack Experience designing and implementing automation for vulnerability management processes using generative AI, agent-based systems, large language models (LLMs), or machine learning to improve efficiency, effectiveness, and scalability Skilled in analysing business and technical requirements and translating them into effective solutions, technical plans, roadmaps, budgets, and proposals that support cyber program growth and align with cyber and organizational goals Commitment to continuous learning with the ability to research and enhance technical and domain-specific knowledge to support rapidly changing environments Skilled in coordinating multiple concurrent projects with a clear understanding of the project life cycle, prioritization frameworks, and delivery expectations
NO SPONSORSHIP Internal Audit Information Technology & Security SALARY: $80k - $108k - $110 plus 10% bonus LOCATION: Chicago, IL 3 days onsite and 2 days remote Looking for a candidate with a BS Degree, 2 years audit related experience in conducting risk-based information, technology and security audits. Project cyber security review and internal audit standards AICPA, IIA IPPF COBIT NIST CSF This role will support independent assessments of the Information Technology and Security environment, risk management, and other objectives as needed. The role is responsible for determining the sufficiency of management's controls and activities related to the management of regulatory, operational, and strategic risks and presenting recommendations for improvements to the engagement team. Support the team on delivery of assigned audits within the annual audit plan. Support the team confirming a professional auditee experience. Owning the audit quality, accuracy of results, and delivery in a timely manner. Proactively identify regulatory, operational, and/or strategic risks to the organization and bring them to your engagement team. Evaluate exceptions or inefficient practices for root causes and propose advice and recommendations for achievable solutions. Leading audits related to organization changes including business requirements definitions, technology implementations Qualifications: Experience working in a complex, fast paced environment. [Preferred] Consulting and/or accounting firm experience. [Preferred] Experience in Financial Services/Security Industry and working with regulations such as Regulation Systems Compliance and Integrity (Reg SCI). [Preferred] Experience using the principles, practices, and techniques involved in conducting audits in accordance with the requirements set forth in the International Standards for the Professional Practice of Internal Auditing published by the Institute of Internal Auditors (IIA). Technical Skills: Microsoft Office applications [Preferred] Familiarity with security tools such as: CyberArk, Splunk, SailPoint [Preferred] Familiarity with change management tools such as: ServiceNow, Jira, Confluence, GitHub [Preferred] Familiarity with databases such as: Oracle, DB2, SQL [Preferred] Familiarity with cloud based solutions: AWS, Workday [Preferred] Proficiency using Archer or other audit or Governance Risk and Compliance (GRC) software Education and/or Experience: Bachelors degree (or equivalent) in Information Technology, Computer Science, Computer Engineering, Accounting, Finance, Business Administration, or related field. 2+ years of experience (audit-related) in conducting risk-based Information Technology and Security audits and projects, cyber security reviews, and internal audits.
02/07/2025
Full time
NO SPONSORSHIP Internal Audit Information Technology & Security SALARY: $80k - $108k - $110 plus 10% bonus LOCATION: Chicago, IL 3 days onsite and 2 days remote Looking for a candidate with a BS Degree, 2 years audit related experience in conducting risk-based information, technology and security audits. Project cyber security review and internal audit standards AICPA, IIA IPPF COBIT NIST CSF This role will support independent assessments of the Information Technology and Security environment, risk management, and other objectives as needed. The role is responsible for determining the sufficiency of management's controls and activities related to the management of regulatory, operational, and strategic risks and presenting recommendations for improvements to the engagement team. Support the team on delivery of assigned audits within the annual audit plan. Support the team confirming a professional auditee experience. Owning the audit quality, accuracy of results, and delivery in a timely manner. Proactively identify regulatory, operational, and/or strategic risks to the organization and bring them to your engagement team. Evaluate exceptions or inefficient practices for root causes and propose advice and recommendations for achievable solutions. Leading audits related to organization changes including business requirements definitions, technology implementations Qualifications: Experience working in a complex, fast paced environment. [Preferred] Consulting and/or accounting firm experience. [Preferred] Experience in Financial Services/Security Industry and working with regulations such as Regulation Systems Compliance and Integrity (Reg SCI). [Preferred] Experience using the principles, practices, and techniques involved in conducting audits in accordance with the requirements set forth in the International Standards for the Professional Practice of Internal Auditing published by the Institute of Internal Auditors (IIA). Technical Skills: Microsoft Office applications [Preferred] Familiarity with security tools such as: CyberArk, Splunk, SailPoint [Preferred] Familiarity with change management tools such as: ServiceNow, Jira, Confluence, GitHub [Preferred] Familiarity with databases such as: Oracle, DB2, SQL [Preferred] Familiarity with cloud based solutions: AWS, Workday [Preferred] Proficiency using Archer or other audit or Governance Risk and Compliance (GRC) software Education and/or Experience: Bachelors degree (or equivalent) in Information Technology, Computer Science, Computer Engineering, Accounting, Finance, Business Administration, or related field. 2+ years of experience (audit-related) in conducting risk-based Information Technology and Security audits and projects, cyber security reviews, and internal audits.
*Remote But not allowed in the following States: Alaska, North Dakota, Nebraska, Hawaii, Oklahoma, Vermont, Maine, West Virginia, Wyoming, New Hampshire, Puerto Rico.* A prestigious company is looking for a Manager, Cyber Risk Vulnerability. This manager will lead a team with focus on vulnerability management and discovery, risk based prioritization, cloud/on-prem vulnerability, CVSS, Vulnerability scanning, Automation, etc. Responsibilities: Leads, coaches, and develops a team of engineers responsible for vulnerability discovery, assessment, risk-based prioritization, and remediation tracking across cloud, on-premises, and hybrid environments Envisions, defines, designs, builds, staffs, and delivers vulnerability management processes and capabilities Leads and supports the planning and execution of team goals and projects, including setting long-term strategy and making decisions about tools, technology, and staffing needs Partners closely with stakeholders across technology, including architecture, engineering, infrastructure, application development, and cyber risk management teams to facilitate vulnerability communications, support remediation activities, and provide continuous reporting. Collaborates with enterprise risk, compliance, and threat intelligence teams to ensure vulnerability management aligns with the organization's overall risk management strategy. Ensures all project deliverables meet high standards for accuracy, completeness, and impact, and are delivered on time to support team and organizational objectives Represents the vulnerability management program to senior leadership, delivering concise, risk-informed insights and recommendations Manages program metrics, reporting, and performance indicators to demonstrate business value, operational maturity, and continuous improvement Qualifications 8+ years w/Bachelor's degree; 1+ years supervisory/management Industry certifications such as CISSP, GSEC, OSCP, or comparable security-related credentials are strongly preferred Proven experience managing enterprise-scale vulnerability management programs and tools Proven expertise in developing, mentoring, and retaining high-performing teams while fostering a mindful, inclusive, and trust-based team culture Demonstrated background in strategic planning, service/program development, capability assessment, and building strong narratives to drive decision-making and create change Deep understanding of risk-based vulnerability management. Knowledge of vulnerability scoring systems (CVSS), security benchmarks (CIS, NIST), and risk quantification techniques Proficiency in selecting, implementing, and managing vulnerability scanning tools (eg, SAST, SCA, IAST, DAST, Network/Infrastructure, Cloud, etc.) across the technology stack Experience designing and implementing automation for vulnerability management processes using generative AI, agent-based systems, large language models (LLMs), or machine learning to improve efficiency, effectiveness, and scalability Skilled in analysing business and technical requirements and translating them into effective solutions, technical plans, roadmaps, budgets, and proposals that support cyber program growth and align with cyber and organizational goals
02/07/2025
Full time
*Remote But not allowed in the following States: Alaska, North Dakota, Nebraska, Hawaii, Oklahoma, Vermont, Maine, West Virginia, Wyoming, New Hampshire, Puerto Rico.* A prestigious company is looking for a Manager, Cyber Risk Vulnerability. This manager will lead a team with focus on vulnerability management and discovery, risk based prioritization, cloud/on-prem vulnerability, CVSS, Vulnerability scanning, Automation, etc. Responsibilities: Leads, coaches, and develops a team of engineers responsible for vulnerability discovery, assessment, risk-based prioritization, and remediation tracking across cloud, on-premises, and hybrid environments Envisions, defines, designs, builds, staffs, and delivers vulnerability management processes and capabilities Leads and supports the planning and execution of team goals and projects, including setting long-term strategy and making decisions about tools, technology, and staffing needs Partners closely with stakeholders across technology, including architecture, engineering, infrastructure, application development, and cyber risk management teams to facilitate vulnerability communications, support remediation activities, and provide continuous reporting. Collaborates with enterprise risk, compliance, and threat intelligence teams to ensure vulnerability management aligns with the organization's overall risk management strategy. Ensures all project deliverables meet high standards for accuracy, completeness, and impact, and are delivered on time to support team and organizational objectives Represents the vulnerability management program to senior leadership, delivering concise, risk-informed insights and recommendations Manages program metrics, reporting, and performance indicators to demonstrate business value, operational maturity, and continuous improvement Qualifications 8+ years w/Bachelor's degree; 1+ years supervisory/management Industry certifications such as CISSP, GSEC, OSCP, or comparable security-related credentials are strongly preferred Proven experience managing enterprise-scale vulnerability management programs and tools Proven expertise in developing, mentoring, and retaining high-performing teams while fostering a mindful, inclusive, and trust-based team culture Demonstrated background in strategic planning, service/program development, capability assessment, and building strong narratives to drive decision-making and create change Deep understanding of risk-based vulnerability management. Knowledge of vulnerability scoring systems (CVSS), security benchmarks (CIS, NIST), and risk quantification techniques Proficiency in selecting, implementing, and managing vulnerability scanning tools (eg, SAST, SCA, IAST, DAST, Network/Infrastructure, Cloud, etc.) across the technology stack Experience designing and implementing automation for vulnerability management processes using generative AI, agent-based systems, large language models (LLMs), or machine learning to improve efficiency, effectiveness, and scalability Skilled in analysing business and technical requirements and translating them into effective solutions, technical plans, roadmaps, budgets, and proposals that support cyber program growth and align with cyber and organizational goals
*Hybrid, 3 days onsite, 2 days remote* *We are unable to sponsor as this is a permanent Full time role* A prestigious company is looking for a Senior Associate, Internal Audit IT & Security. This internal auditor will need 2+ years of experience conducting risk-based information technology and security audits. This is a highly regulated financial environment, and these audits will follow AICPA, IIA, IPPF, COBIT, NIST, and CSF standards/frameworks. Responsibilities: Support the team on delivery of assigned audits within the annual audit plan. Support the team confirming a professional auditee experience. Owning the audit quality, accuracy of results, and delivery in a timely manner. Proactively identify regulatory, operational, and/or strategic risks to the organization and bring them to your engagement team. Evaluate exceptions or inefficient practices for root causes and propose advice and recommendations for achievable solutions. Leading audits related to organization changes including business requirements definitions, technology implementations (eg, change management, security), engagement and alignment of change initiatives to business objectives. Maintaining an understanding of policies, procedures, standards, and supporting technologies, and educating staff accordingly, to effectively identify potential risks and alternatives to mitigate risk exposure leveraging leading practices. Ability to understand professional principles and standards (eg, AICPA, IIA IPPF, COBIT, NIST CSF) and the relevancy to risk management and impact on policies and procedures. In addition, leveraging these principles and standards to test and evaluate corporate risk management processes and control. Keeping current on best practices and emerging risks within the financial services industry and making recommendations for improvements as necessary. Qualifications Bachelor's degree (or equivalent) in Information Technology, Computer Science, Computer Engineering, Accounting, Finance, Business Administration, or related field. 2+ years of experience (audit-related) in conducting risk-based Information Technology and Security audits and projects, cyber security reviews, and internal audits. Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certification in Risk Management Assurance (CRMA), Certified Internal Auditor (CIA), Certified Public Accountant (CPA), or equivalent. Consulting and/or accounting firm experience. Experience in Financial Services/Security Industry and working with regulations such as Regulation Systems Compliance and Integrity (Reg SCI). Experience using the principles, practices, and techniques involved in conducting audits in accordance with the requirements set forth in the International Standards for the Professional Practice of Internal Auditing published by the Institute of Internal Auditors (IIA). Microsoft Office applications Proficiency using Archer or other audit or Governance Risk and Compliance (GRC) software
02/07/2025
Full time
*Hybrid, 3 days onsite, 2 days remote* *We are unable to sponsor as this is a permanent Full time role* A prestigious company is looking for a Senior Associate, Internal Audit IT & Security. This internal auditor will need 2+ years of experience conducting risk-based information technology and security audits. This is a highly regulated financial environment, and these audits will follow AICPA, IIA, IPPF, COBIT, NIST, and CSF standards/frameworks. Responsibilities: Support the team on delivery of assigned audits within the annual audit plan. Support the team confirming a professional auditee experience. Owning the audit quality, accuracy of results, and delivery in a timely manner. Proactively identify regulatory, operational, and/or strategic risks to the organization and bring them to your engagement team. Evaluate exceptions or inefficient practices for root causes and propose advice and recommendations for achievable solutions. Leading audits related to organization changes including business requirements definitions, technology implementations (eg, change management, security), engagement and alignment of change initiatives to business objectives. Maintaining an understanding of policies, procedures, standards, and supporting technologies, and educating staff accordingly, to effectively identify potential risks and alternatives to mitigate risk exposure leveraging leading practices. Ability to understand professional principles and standards (eg, AICPA, IIA IPPF, COBIT, NIST CSF) and the relevancy to risk management and impact on policies and procedures. In addition, leveraging these principles and standards to test and evaluate corporate risk management processes and control. Keeping current on best practices and emerging risks within the financial services industry and making recommendations for improvements as necessary. Qualifications Bachelor's degree (or equivalent) in Information Technology, Computer Science, Computer Engineering, Accounting, Finance, Business Administration, or related field. 2+ years of experience (audit-related) in conducting risk-based Information Technology and Security audits and projects, cyber security reviews, and internal audits. Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certification in Risk Management Assurance (CRMA), Certified Internal Auditor (CIA), Certified Public Accountant (CPA), or equivalent. Consulting and/or accounting firm experience. Experience in Financial Services/Security Industry and working with regulations such as Regulation Systems Compliance and Integrity (Reg SCI). Experience using the principles, practices, and techniques involved in conducting audits in accordance with the requirements set forth in the International Standards for the Professional Practice of Internal Auditing published by the Institute of Internal Auditors (IIA). Microsoft Office applications Proficiency using Archer or other audit or Governance Risk and Compliance (GRC) software
Job Title: Senior Developer Job Description The Senior Developer is accountable for providing Level 3 engineering and troubleshooting assistance to application developers using major software development language platforms. The role requires a comprehensive understanding of how applications and systems leverage the Microsoft Identity Platform, Entra ID, and the Microsoft Graph API. Candidates must be well-versed in Identity and Cybersecurity best practices, particularly in authentication, authorization, and identity management. The ideal candidate will enhance partnerships with vendors and internal business customers to recommend secure configurations of custom and commercial-off-the-shelf (COTS) software applications with Microsoft Entra ID (Azure AD). Responsibilities Design application authentication using centralized federated authentication with Entra ID. Serve as a cross-platform technical subject matter expert for SSO technologies and provide operational consulting support to design engineers in BTS IT, Division IT, and end-user organizations. Educate and mentor colleagues on authentication and authorization design best practices and design principles for OpenID Connect (OIDC) and OAuth. Create documentation for specific application configurations based on testing in test environments and work with the identity operations team to implement in Entra ID production according to security practices. Participate in multi-discipline design or problem resolution sessions with vendors and internal business customers to set up and troubleshoot SSO connections as a Level 3 technical expert. Essential Skills 3+ years of experience with application authentication with external identity providers (Azure, AWS, C#/.NET/Python/Java/Mobile). Certifications or equivalent experience in technology disciplines. Expertise in code signing and CI/CD pipelines for code deployment, with significant experience in DevOps practices. Experience with code repositories like Azure DevOps. Proficiency in Powershell Scripting and CI/CD pipeline implementations. Additional Skills & Qualifications Knowledge of Python, .NET, AWS, Azure, Java, Mobile development, C#, and DevOps methodologies. Experience with OIDC and OAuth protocols. Why Work Here? Engage in purposeful work by contributing to life-changing healthcare innovations. Be part of an innovation culture that encourages creativity and diverse thinking. Benefit from career growth opportunities through training, global prospects, and tuition support. Enjoy a focus on well-being with competitive pay, benefits, and flexible work options. Join an inclusive environment with a strong commitment to diversity. Work Environment The role involves working with advanced technologies, including Microsoft Entra ID, Azure AD, and various programming languages and platforms. The work environment supports flexibility and offers opportunities for engaging in innovative projects. Dress code is business casual, and the organisation promotes a collaborative and inclusive atmosphere. Job Type & Location This is a Contract position based and onsite 4 days per week in Cherrywood, Dublin, Ireland Location Dublin, Ireland Trading as TEKsystems. Allegis Group Limited. Level 1, The Chase, Carmanhall Road, Sandyford, Dublin 18, Ireland. No. 909257. TEKsystems is a company within the Allegis Group network of companies (collectively referred to as "Allegis Group"). Aerotek, Aston Carter, EASi, Talentis Solutions, TEKsystems, Stamford Consultants and The Stamford Group are Allegis Group brands. If you apply, your personal data will be processed as described in the Allegis Group Online Privacy Notice available at our website. To access our Online Privacy Notice, which explains what information we may collect, use, share, and store about you, and describes your rights and choices about this, please go our website. We are part of a global network of companies and as a result, the personal data you provide will be shared within Allegis Group and transferred and processed outside the UK, Switzerland and European Economic Area subject to the protections described in the Allegis Group Online Privacy Notice. We store personal data in the UK, EEA, Switzerland and the USA. If you would like to exercise your privacy rights, please visit the "Contacting Us" section of our Online Privacy Notice on our website for details on how to contact us. To protect your privacy and security, we may take steps to verify your identity, such as a password and user ID if there is an account associated with your request, or identifying information such as your address or date of birth, before proceeding with your request. commitments under the UK Data Protection Act, EU-U.S. Privacy Shield or the Swiss-U.S. Privacy Shield.
02/07/2025
Project-based
Job Title: Senior Developer Job Description The Senior Developer is accountable for providing Level 3 engineering and troubleshooting assistance to application developers using major software development language platforms. The role requires a comprehensive understanding of how applications and systems leverage the Microsoft Identity Platform, Entra ID, and the Microsoft Graph API. Candidates must be well-versed in Identity and Cybersecurity best practices, particularly in authentication, authorization, and identity management. The ideal candidate will enhance partnerships with vendors and internal business customers to recommend secure configurations of custom and commercial-off-the-shelf (COTS) software applications with Microsoft Entra ID (Azure AD). Responsibilities Design application authentication using centralized federated authentication with Entra ID. Serve as a cross-platform technical subject matter expert for SSO technologies and provide operational consulting support to design engineers in BTS IT, Division IT, and end-user organizations. Educate and mentor colleagues on authentication and authorization design best practices and design principles for OpenID Connect (OIDC) and OAuth. Create documentation for specific application configurations based on testing in test environments and work with the identity operations team to implement in Entra ID production according to security practices. Participate in multi-discipline design or problem resolution sessions with vendors and internal business customers to set up and troubleshoot SSO connections as a Level 3 technical expert. Essential Skills 3+ years of experience with application authentication with external identity providers (Azure, AWS, C#/.NET/Python/Java/Mobile). Certifications or equivalent experience in technology disciplines. Expertise in code signing and CI/CD pipelines for code deployment, with significant experience in DevOps practices. Experience with code repositories like Azure DevOps. Proficiency in Powershell Scripting and CI/CD pipeline implementations. Additional Skills & Qualifications Knowledge of Python, .NET, AWS, Azure, Java, Mobile development, C#, and DevOps methodologies. Experience with OIDC and OAuth protocols. Why Work Here? Engage in purposeful work by contributing to life-changing healthcare innovations. Be part of an innovation culture that encourages creativity and diverse thinking. Benefit from career growth opportunities through training, global prospects, and tuition support. Enjoy a focus on well-being with competitive pay, benefits, and flexible work options. Join an inclusive environment with a strong commitment to diversity. Work Environment The role involves working with advanced technologies, including Microsoft Entra ID, Azure AD, and various programming languages and platforms. The work environment supports flexibility and offers opportunities for engaging in innovative projects. Dress code is business casual, and the organisation promotes a collaborative and inclusive atmosphere. Job Type & Location This is a Contract position based and onsite 4 days per week in Cherrywood, Dublin, Ireland Location Dublin, Ireland Trading as TEKsystems. Allegis Group Limited. Level 1, The Chase, Carmanhall Road, Sandyford, Dublin 18, Ireland. No. 909257. TEKsystems is a company within the Allegis Group network of companies (collectively referred to as "Allegis Group"). Aerotek, Aston Carter, EASi, Talentis Solutions, TEKsystems, Stamford Consultants and The Stamford Group are Allegis Group brands. If you apply, your personal data will be processed as described in the Allegis Group Online Privacy Notice available at our website. To access our Online Privacy Notice, which explains what information we may collect, use, share, and store about you, and describes your rights and choices about this, please go our website. We are part of a global network of companies and as a result, the personal data you provide will be shared within Allegis Group and transferred and processed outside the UK, Switzerland and European Economic Area subject to the protections described in the Allegis Group Online Privacy Notice. We store personal data in the UK, EEA, Switzerland and the USA. If you would like to exercise your privacy rights, please visit the "Contacting Us" section of our Online Privacy Notice on our website for details on how to contact us. To protect your privacy and security, we may take steps to verify your identity, such as a password and user ID if there is an account associated with your request, or identifying information such as your address or date of birth, before proceeding with your request. commitments under the UK Data Protection Act, EU-U.S. Privacy Shield or the Swiss-U.S. Privacy Shield.
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Company is currently seeking an Information Technology Internal Auditor. Candidate will support independent assessments of the Information Technology and Security environment, risk management, and other objectives as needed. The role is responsible for determining the sufficiency of management's controls and activities related to the management of regulatory, operational, and strategic risks and presenting recommendations for improvements to the engagement team. Responsibilities: Support the team on delivery of assigned audits within the annual audit plan. Support the team confirming a professional auditee experience. Owning the audit quality, accuracy of results, and delivery in a timely manner. Proactively identify regulatory, operational, and/or strategic risks to the organization and bring them to your engagement team. Evaluate exceptions or inefficient practices for root causes and propose advice and recommendations for achievable solutions. Leading audits related to organization changes including business requirements definitions, technology implementations (eg, change management, security), engagement and alignment of change initiatives to business objectives. Maintaining an understanding of policies, procedures, standards, and supporting technologies, and educating staff accordingly, to effectively identify potential risks and alternatives to mitigate risk exposure leveraging leading practices. Ability to understand professional principles and standards (eg, AICPA, IIA IPPF, COBIT, NIST CSF) and the relevancy to risk management and impact on policies and procedures. In addition, leveraging these principles and standards to test and evaluate corporate risk management processes and control. Keeping current on best practices and emerging risks within the financial services industry and making recommendations for improvements as necessary. Qualifications Ability to communicate clearly and effectively, both orally and in writing, including the ability to handle potentially sensitive situations and discussions. Strong problem solving and analytical capabilities. Demonstrated ability to gather, analyze, and evaluate facts, and prepare and present concise oral and written reports. Ability to work independently or as part of a team, prioritizing multiple audit assignments to simultaneously complete each in a timely fashion. [Preferred] Experience working in a complex, fast paced environment. [Preferred] Consulting and/or accounting firm experience. [Preferred] Experience in Financial Services/Security Industry and working with regulations such as Regulation Systems Compliance and Integrity (Reg SCI). [Preferred] Experience using the principles, practices, and techniques involved in conducting audits in accordance with the requirements set forth in the International Standards for the Professional Practice of Internal Auditing published by the Institute of Internal Auditors (IIA). [Required] Microsoft Office applications [Preferred] Familiarity with security tools such as: CyberArk, Splunk, SailPoint [Preferred] Familiarity with change management tools such as: ServiceNow, Jira, Confluence, GitHub [Preferred] Familiarity with databases such as: Oracle, DB2, SQL [Preferred] Familiarity with cloud based solutions: AWS, Workday [Preferred] Proficiency using Archer or other audit or Governance Risk and Compliance (GRC) software Education: [Required] Bachelors degree (or equivalent) in Information Technology, Computer Science, Computer Engineering, Accounting, Finance, Business Administration, or related field. [Required] 2+ years of experience (audit-related) in conducting risk-based Information Technology and Security audits and projects, cyber security reviews, and internal audits. [Preferred] Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certification in Risk Management Assurance (CRMA), Certified Internal Auditor (CIA), Certified Public Accountant (CPA), or equivalent.
01/07/2025
Full time
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Company is currently seeking an Information Technology Internal Auditor. Candidate will support independent assessments of the Information Technology and Security environment, risk management, and other objectives as needed. The role is responsible for determining the sufficiency of management's controls and activities related to the management of regulatory, operational, and strategic risks and presenting recommendations for improvements to the engagement team. Responsibilities: Support the team on delivery of assigned audits within the annual audit plan. Support the team confirming a professional auditee experience. Owning the audit quality, accuracy of results, and delivery in a timely manner. Proactively identify regulatory, operational, and/or strategic risks to the organization and bring them to your engagement team. Evaluate exceptions or inefficient practices for root causes and propose advice and recommendations for achievable solutions. Leading audits related to organization changes including business requirements definitions, technology implementations (eg, change management, security), engagement and alignment of change initiatives to business objectives. Maintaining an understanding of policies, procedures, standards, and supporting technologies, and educating staff accordingly, to effectively identify potential risks and alternatives to mitigate risk exposure leveraging leading practices. Ability to understand professional principles and standards (eg, AICPA, IIA IPPF, COBIT, NIST CSF) and the relevancy to risk management and impact on policies and procedures. In addition, leveraging these principles and standards to test and evaluate corporate risk management processes and control. Keeping current on best practices and emerging risks within the financial services industry and making recommendations for improvements as necessary. Qualifications Ability to communicate clearly and effectively, both orally and in writing, including the ability to handle potentially sensitive situations and discussions. Strong problem solving and analytical capabilities. Demonstrated ability to gather, analyze, and evaluate facts, and prepare and present concise oral and written reports. Ability to work independently or as part of a team, prioritizing multiple audit assignments to simultaneously complete each in a timely fashion. [Preferred] Experience working in a complex, fast paced environment. [Preferred] Consulting and/or accounting firm experience. [Preferred] Experience in Financial Services/Security Industry and working with regulations such as Regulation Systems Compliance and Integrity (Reg SCI). [Preferred] Experience using the principles, practices, and techniques involved in conducting audits in accordance with the requirements set forth in the International Standards for the Professional Practice of Internal Auditing published by the Institute of Internal Auditors (IIA). [Required] Microsoft Office applications [Preferred] Familiarity with security tools such as: CyberArk, Splunk, SailPoint [Preferred] Familiarity with change management tools such as: ServiceNow, Jira, Confluence, GitHub [Preferred] Familiarity with databases such as: Oracle, DB2, SQL [Preferred] Familiarity with cloud based solutions: AWS, Workday [Preferred] Proficiency using Archer or other audit or Governance Risk and Compliance (GRC) software Education: [Required] Bachelors degree (or equivalent) in Information Technology, Computer Science, Computer Engineering, Accounting, Finance, Business Administration, or related field. [Required] 2+ years of experience (audit-related) in conducting risk-based Information Technology and Security audits and projects, cyber security reviews, and internal audits. [Preferred] Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certification in Risk Management Assurance (CRMA), Certified Internal Auditor (CIA), Certified Public Accountant (CPA), or equivalent.
Request Technology - Craig Johnson
Chicago, Illinois
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Company is currently seeking an Information Technology Internal Auditor. Candidate will support independent assessments of the Information Technology and Security environment, risk management, and other objectives as needed. The role is responsible for determining the sufficiency of management's controls and activities related to the management of regulatory, operational, and strategic risks and presenting recommendations for improvements to the engagement team. Responsibilities: Support the team on delivery of assigned audits within the annual audit plan. Support the team confirming a professional auditee experience. Owning the audit quality, accuracy of results, and delivery in a timely manner. Proactively identify regulatory, operational, and/or strategic risks to the organization and bring them to your engagement team. Evaluate exceptions or inefficient practices for root causes and propose advice and recommendations for achievable solutions. Leading audits related to organization changes including business requirements definitions, technology implementations (eg, change management, security), engagement and alignment of change initiatives to business objectives. Maintaining an understanding of policies, procedures, standards, and supporting technologies, and educating staff accordingly, to effectively identify potential risks and alternatives to mitigate risk exposure leveraging leading practices. Ability to understand professional principles and standards (eg, AICPA, IIA IPPF, COBIT, NIST CSF) and the relevancy to risk management and impact on policies and procedures. In addition, leveraging these principles and standards to test and evaluate corporate risk management processes and control. Keeping current on best practices and emerging risks within the financial services industry and making recommendations for improvements as necessary. Qualifications Ability to communicate clearly and effectively, both orally and in writing, including the ability to handle potentially sensitive situations and discussions. Strong problem solving and analytical capabilities. Demonstrated ability to gather, analyze, and evaluate facts, and prepare and present concise oral and written reports. Ability to work independently or as part of a team, prioritizing multiple audit assignments to simultaneously complete each in a timely fashion. [Preferred] Experience working in a complex, fast paced environment. [Preferred] Consulting and/or accounting firm experience. [Preferred] Experience in Financial Services/Security Industry and working with regulations such as Regulation Systems Compliance and Integrity (Reg SCI). [Preferred] Experience using the principles, practices, and techniques involved in conducting audits in accordance with the requirements set forth in the International Standards for the Professional Practice of Internal Auditing published by the Institute of Internal Auditors (IIA). [Required] Microsoft Office applications [Preferred] Familiarity with security tools such as: CyberArk, Splunk, SailPoint [Preferred] Familiarity with change management tools such as: ServiceNow, Jira, Confluence, GitHub [Preferred] Familiarity with databases such as: Oracle, DB2, SQL [Preferred] Familiarity with cloud based solutions: AWS, Workday [Preferred] Proficiency using Archer or other audit or Governance Risk and Compliance (GRC) software Education: [Required] Bachelors degree (or equivalent) in Information Technology, Computer Science, Computer Engineering, Accounting, Finance, Business Administration, or related field. [Required] 2+ years of experience (audit-related) in conducting risk-based Information Technology and Security audits and projects, cyber security reviews, and internal audits. [Preferred] Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certification in Risk Management Assurance (CRMA), Certified Internal Auditor (CIA), Certified Public Accountant (CPA), or equivalent.
30/06/2025
Full time
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Company is currently seeking an Information Technology Internal Auditor. Candidate will support independent assessments of the Information Technology and Security environment, risk management, and other objectives as needed. The role is responsible for determining the sufficiency of management's controls and activities related to the management of regulatory, operational, and strategic risks and presenting recommendations for improvements to the engagement team. Responsibilities: Support the team on delivery of assigned audits within the annual audit plan. Support the team confirming a professional auditee experience. Owning the audit quality, accuracy of results, and delivery in a timely manner. Proactively identify regulatory, operational, and/or strategic risks to the organization and bring them to your engagement team. Evaluate exceptions or inefficient practices for root causes and propose advice and recommendations for achievable solutions. Leading audits related to organization changes including business requirements definitions, technology implementations (eg, change management, security), engagement and alignment of change initiatives to business objectives. Maintaining an understanding of policies, procedures, standards, and supporting technologies, and educating staff accordingly, to effectively identify potential risks and alternatives to mitigate risk exposure leveraging leading practices. Ability to understand professional principles and standards (eg, AICPA, IIA IPPF, COBIT, NIST CSF) and the relevancy to risk management and impact on policies and procedures. In addition, leveraging these principles and standards to test and evaluate corporate risk management processes and control. Keeping current on best practices and emerging risks within the financial services industry and making recommendations for improvements as necessary. Qualifications Ability to communicate clearly and effectively, both orally and in writing, including the ability to handle potentially sensitive situations and discussions. Strong problem solving and analytical capabilities. Demonstrated ability to gather, analyze, and evaluate facts, and prepare and present concise oral and written reports. Ability to work independently or as part of a team, prioritizing multiple audit assignments to simultaneously complete each in a timely fashion. [Preferred] Experience working in a complex, fast paced environment. [Preferred] Consulting and/or accounting firm experience. [Preferred] Experience in Financial Services/Security Industry and working with regulations such as Regulation Systems Compliance and Integrity (Reg SCI). [Preferred] Experience using the principles, practices, and techniques involved in conducting audits in accordance with the requirements set forth in the International Standards for the Professional Practice of Internal Auditing published by the Institute of Internal Auditors (IIA). [Required] Microsoft Office applications [Preferred] Familiarity with security tools such as: CyberArk, Splunk, SailPoint [Preferred] Familiarity with change management tools such as: ServiceNow, Jira, Confluence, GitHub [Preferred] Familiarity with databases such as: Oracle, DB2, SQL [Preferred] Familiarity with cloud based solutions: AWS, Workday [Preferred] Proficiency using Archer or other audit or Governance Risk and Compliance (GRC) software Education: [Required] Bachelors degree (or equivalent) in Information Technology, Computer Science, Computer Engineering, Accounting, Finance, Business Administration, or related field. [Required] 2+ years of experience (audit-related) in conducting risk-based Information Technology and Security audits and projects, cyber security reviews, and internal audits. [Preferred] Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certification in Risk Management Assurance (CRMA), Certified Internal Auditor (CIA), Certified Public Accountant (CPA), or equivalent.