Security Architect SC/DV Cleared Hybrid Working £70,000 - £90,000 per annum We have an exciting opportunity for a Security Architect, to join the Cyber & Security Solutions Division. You will be helping our customers deliver and secure their digital transformation. Our Cyber Consulting practice works across a diverse array of sectors including Defence, Telecommunications, Energy and Finance to help secure national infrastructure in the UK and beyond. Our Practice is certified by the UK NCSC in the provision of advice and guidance to our customers across both enterprise and operational technology across all of the NCSC defined security domains of Governance and Risk Management, Security Architecture and Compliance. This is a highly rewarding and hands one role with exposure across both traditional and cutting edge enterprise IT as well as bespoke Operational Technology systems with a clear and defined Pathway to achieve chartership, NCSC certification and greater responsibility. Your work will see you inspire and lead in solving customer problems in an agile, innovative and team centric manner. We are after creative, passionate, technically savvy and personable people to help grow our practice and solve some of the most challenging, exciting and critical security challenges to the UK's digital landscape. What you will do as a Security Architect: Relate - Our customers and their problem are at the heart of what we do, as a Consultant you will help to actively listen and empathise with our customers to build intimacy. Understand - We add value by solving problems, as a Consultant you will help define potential solutions to these problems with only limited information based on your experience and technical knowledge. We adopt a risk based approach to any security problem, as a Consultant you will need to identify, measure and analyse the risks attracted by a given digital system and its information assets through the completion of risk assessments and defining and implementing the enabling governance structures that support this process. Threat - Resolving risks is the technical core of our offering, as a Consultant you will assist in defining appropriate and proportionate security solutions right the way across people, process and technology aligned to the identified risk picture through the creation of security architecture visions, patterns and designs. Assure - Giving our customers confidence that security is where it needs to be is a key requirement across heavily regulated industries. As a Consultant you will assist in defining, implementing and performing assessments of our customer's environment against a given set of criteria spanning people, process and technology. Develop - All our offerings are based on a core set of products. As a consultant you will assist in building a viable offering as part of the business winning process for a customer as well as help in the technical development of our products to be used across our customer sectors. Skills, Qualification & Knowledge Required A complete understanding of TCP/IP based networking concepts across the OSI model layer as well as the common protocols in use and their risks. At least 2-3 Recognised professional certifications in Cyber Security such as CISM, CISSP, CRISC, CASP, CEH. Good experience of directly managing a project delivery and working to associated metrics such as time, cost and quality. Experience of and ability to manage multiple stakeholders and their needs with empathy, finding an appropriate balance of listening and speaking. An ambitious and creative drive to help safeguard UK national infrastructure and become a recognised cyber expert. Extensive experience in the development and mentoring of junior team members. UK SC Clearance or the ability obtain it as well as other more in depth security clearances. Extensive ability in deriving security requirements from functional objectives with limited knowledge of the underlying solution and customer/team direction. Extensive ability in inspiring and leading in the breaking down, at pace of complex functional solutions into simpler constituent parts. Expert ability in communicating why a complex functional system requires a given security wrapper in a way best suited to a given stakeholder. Extensive experience and technical depth in either network, application or system security controls in their design and the risks they mitigate. Line manage a team of cyber security consultants, provide pastoral care and guidance, conduct reviews and appraisals, help to identify and determine personal objectives and training and development needs and provide mentoring where required.
26/06/2024
Full time
Security Architect SC/DV Cleared Hybrid Working £70,000 - £90,000 per annum We have an exciting opportunity for a Security Architect, to join the Cyber & Security Solutions Division. You will be helping our customers deliver and secure their digital transformation. Our Cyber Consulting practice works across a diverse array of sectors including Defence, Telecommunications, Energy and Finance to help secure national infrastructure in the UK and beyond. Our Practice is certified by the UK NCSC in the provision of advice and guidance to our customers across both enterprise and operational technology across all of the NCSC defined security domains of Governance and Risk Management, Security Architecture and Compliance. This is a highly rewarding and hands one role with exposure across both traditional and cutting edge enterprise IT as well as bespoke Operational Technology systems with a clear and defined Pathway to achieve chartership, NCSC certification and greater responsibility. Your work will see you inspire and lead in solving customer problems in an agile, innovative and team centric manner. We are after creative, passionate, technically savvy and personable people to help grow our practice and solve some of the most challenging, exciting and critical security challenges to the UK's digital landscape. What you will do as a Security Architect: Relate - Our customers and their problem are at the heart of what we do, as a Consultant you will help to actively listen and empathise with our customers to build intimacy. Understand - We add value by solving problems, as a Consultant you will help define potential solutions to these problems with only limited information based on your experience and technical knowledge. We adopt a risk based approach to any security problem, as a Consultant you will need to identify, measure and analyse the risks attracted by a given digital system and its information assets through the completion of risk assessments and defining and implementing the enabling governance structures that support this process. Threat - Resolving risks is the technical core of our offering, as a Consultant you will assist in defining appropriate and proportionate security solutions right the way across people, process and technology aligned to the identified risk picture through the creation of security architecture visions, patterns and designs. Assure - Giving our customers confidence that security is where it needs to be is a key requirement across heavily regulated industries. As a Consultant you will assist in defining, implementing and performing assessments of our customer's environment against a given set of criteria spanning people, process and technology. Develop - All our offerings are based on a core set of products. As a consultant you will assist in building a viable offering as part of the business winning process for a customer as well as help in the technical development of our products to be used across our customer sectors. Skills, Qualification & Knowledge Required A complete understanding of TCP/IP based networking concepts across the OSI model layer as well as the common protocols in use and their risks. At least 2-3 Recognised professional certifications in Cyber Security such as CISM, CISSP, CRISC, CASP, CEH. Good experience of directly managing a project delivery and working to associated metrics such as time, cost and quality. Experience of and ability to manage multiple stakeholders and their needs with empathy, finding an appropriate balance of listening and speaking. An ambitious and creative drive to help safeguard UK national infrastructure and become a recognised cyber expert. Extensive experience in the development and mentoring of junior team members. UK SC Clearance or the ability obtain it as well as other more in depth security clearances. Extensive ability in deriving security requirements from functional objectives with limited knowledge of the underlying solution and customer/team direction. Extensive ability in inspiring and leading in the breaking down, at pace of complex functional solutions into simpler constituent parts. Expert ability in communicating why a complex functional system requires a given security wrapper in a way best suited to a given stakeholder. Extensive experience and technical depth in either network, application or system security controls in their design and the risks they mitigate. Line manage a team of cyber security consultants, provide pastoral care and guidance, conduct reviews and appraisals, help to identify and determine personal objectives and training and development needs and provide mentoring where required.
We are heading up a recruitment drive for a global consultancy that require a Cyber Security Consultant to join them on a major project that's based in Corsham. Job Title - Cyber Security Consultant Location - Corsham Applicants MUST hold Active DV Clearance to be eligible for consideration Important considerations for the role: Proven experience of working on Agile delivery programmes. Experience in work, to strengthen and transform Security Operations Centers Demonstrable experience in providing senior-level supervision and direction on technical matters Knowledge of the Cybersecurity Capability Maturity Model (C2M2) & NIST Cybersecurity Framework (CSF) Experience of Security Operations Centers operating within the Military domain Main tasks: Providing the authoritative technical subject matter expertise needed to mature SOC services Engaging effectively with a broad range of stakeholders in technical matters and taking a leading role in documenting processes and ways of working to enable relevant TTP Important skills and experience: SOC operations and transformation, Developing security operating procedures and processes, Producing dashboards and reports, Vulnerability Management utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain (CKC), Intelligence Driven Defence (IDD), Unified Enterprise Defence (UED), Consultancy and communication Important Knowledge Cybersecurity Capability Maturity Model (C2M2) and NIST Cyber Security Framework (CSF) Current awareness of the market for data analytics and SIEM platforms, including emerging leaders and Network security implementations (eg host-based IDS, IPS), including their function and placement Cyber defence and information security policies, procedures, and regulations, Network security architecture concepts including topology, protocols, components, and principles
26/06/2024
Full time
We are heading up a recruitment drive for a global consultancy that require a Cyber Security Consultant to join them on a major project that's based in Corsham. Job Title - Cyber Security Consultant Location - Corsham Applicants MUST hold Active DV Clearance to be eligible for consideration Important considerations for the role: Proven experience of working on Agile delivery programmes. Experience in work, to strengthen and transform Security Operations Centers Demonstrable experience in providing senior-level supervision and direction on technical matters Knowledge of the Cybersecurity Capability Maturity Model (C2M2) & NIST Cybersecurity Framework (CSF) Experience of Security Operations Centers operating within the Military domain Main tasks: Providing the authoritative technical subject matter expertise needed to mature SOC services Engaging effectively with a broad range of stakeholders in technical matters and taking a leading role in documenting processes and ways of working to enable relevant TTP Important skills and experience: SOC operations and transformation, Developing security operating procedures and processes, Producing dashboards and reports, Vulnerability Management utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain (CKC), Intelligence Driven Defence (IDD), Unified Enterprise Defence (UED), Consultancy and communication Important Knowledge Cybersecurity Capability Maturity Model (C2M2) and NIST Cyber Security Framework (CSF) Current awareness of the market for data analytics and SIEM platforms, including emerging leaders and Network security implementations (eg host-based IDS, IPS), including their function and placement Cyber defence and information security policies, procedures, and regulations, Network security architecture concepts including topology, protocols, components, and principles
Are you captivated by the potential of cloud technologies and motivated to shape the future of IT infrastructure? As a Cloud Solutions Specialist, you will be a key player in an Azure and Microsoft 365 environment. Your expertise will not only influence cloud architecture but also contribute to creating a secure and efficient environment. Utilise your skills in Azure, PowerShell, and M365 to automate processes, bolster security, and provide seamless experiences. Embrace the opportunity to be a vital part of the journey towards a cloud-centric future. Join a team where innovation, agility, and collaboration are more than just buzzwords, they're a way of life. Our client is asking us to advertise anonymously. However, they are an esteemed third sector organisation. This is an exciting opportunity to become part of a great team that not only influences the business but also significantly contributes to the cause that the organisation passionately supports. The Ideal Candidate: Will be a technologically adept problem solver, proficient in both Azure and Microsoft 365 environments Posses robust PowerShell Scripting abilities, especially within Azure and M365 frameworks. Will be an efficient communicator capable of traversing both technical and non-technical terrains. Committed to being on-site when required (East Glasgow) The Core Responsibilities: Architect, implement, and sustain Azure-based solutions with an emphasis on scalability, performance, and security. Advocate for Microsoft 365 solutions, including SharePoint, PowerApps, and associated technologies. Utilise Azure Logic Apps to automate workflows and unify applications, data, services, and systems throughout our organisation. Employ Azure Automation for the orchestration and automation of tasks. Offer 3rd line support for intricate queries related to infrastructure and M365 issues, working in Tandem with our service desk and third-party suppliers for prompt resolutions. Act as the technical lead on complex technology projects, steering them from conception to completion. You will be tasked with integrating third-party systems and applications with our Azure cloud environment. This includes ensuring smooth and secure integration that is in line with our operational objectives and technical prerequisites. Assume a crucial role in ensuring that various external systems operate in sync with our internal cloud infrastructure, boosting the overall functionality and efficiency of our organisational processes. Desired Skill Set: Practical experience with Azure Log Analytics, Logic Apps, and API integrations within the M365/Azure ecosystem. Experience of utilising Azure Logic Apps for automating processes. Expertise in using Azure Automation for task management and orchestration. Knowledge of Purview within M365, encompassing Information Protection, Sensitivity Labels, E-discovery, and Reporting. Awareness of cybersecurity intricacies, with a preference for experience with Sophos and Microsoft Defender. Familiarity with Microsoft Dynamics 365 Business Central or comparable ERP systems If you feel you have the relevant skills to do this job and are interested in hearing more about the position, please email a copy of your CV Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found on our website.
26/06/2024
Full time
Are you captivated by the potential of cloud technologies and motivated to shape the future of IT infrastructure? As a Cloud Solutions Specialist, you will be a key player in an Azure and Microsoft 365 environment. Your expertise will not only influence cloud architecture but also contribute to creating a secure and efficient environment. Utilise your skills in Azure, PowerShell, and M365 to automate processes, bolster security, and provide seamless experiences. Embrace the opportunity to be a vital part of the journey towards a cloud-centric future. Join a team where innovation, agility, and collaboration are more than just buzzwords, they're a way of life. Our client is asking us to advertise anonymously. However, they are an esteemed third sector organisation. This is an exciting opportunity to become part of a great team that not only influences the business but also significantly contributes to the cause that the organisation passionately supports. The Ideal Candidate: Will be a technologically adept problem solver, proficient in both Azure and Microsoft 365 environments Posses robust PowerShell Scripting abilities, especially within Azure and M365 frameworks. Will be an efficient communicator capable of traversing both technical and non-technical terrains. Committed to being on-site when required (East Glasgow) The Core Responsibilities: Architect, implement, and sustain Azure-based solutions with an emphasis on scalability, performance, and security. Advocate for Microsoft 365 solutions, including SharePoint, PowerApps, and associated technologies. Utilise Azure Logic Apps to automate workflows and unify applications, data, services, and systems throughout our organisation. Employ Azure Automation for the orchestration and automation of tasks. Offer 3rd line support for intricate queries related to infrastructure and M365 issues, working in Tandem with our service desk and third-party suppliers for prompt resolutions. Act as the technical lead on complex technology projects, steering them from conception to completion. You will be tasked with integrating third-party systems and applications with our Azure cloud environment. This includes ensuring smooth and secure integration that is in line with our operational objectives and technical prerequisites. Assume a crucial role in ensuring that various external systems operate in sync with our internal cloud infrastructure, boosting the overall functionality and efficiency of our organisational processes. Desired Skill Set: Practical experience with Azure Log Analytics, Logic Apps, and API integrations within the M365/Azure ecosystem. Experience of utilising Azure Logic Apps for automating processes. Expertise in using Azure Automation for task management and orchestration. Knowledge of Purview within M365, encompassing Information Protection, Sensitivity Labels, E-discovery, and Reporting. Awareness of cybersecurity intricacies, with a preference for experience with Sophos and Microsoft Defender. Familiarity with Microsoft Dynamics 365 Business Central or comparable ERP systems If you feel you have the relevant skills to do this job and are interested in hearing more about the position, please email a copy of your CV Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found on our website.
Job Title: Security Engineer Salary: £80,000 to £90,000 + Benefits We are seeking a Security Engineer, for a fast-growing FinTech firm, specialising in Wealth Management and Financial Advisory. As the first dedicated cybersecurity professional you'll play a pivotal role in establishing and fortifying the firm's cybersecurity infrastructure (Greenfield). The focus here is on application security/DevSecOps, we seek someone adept in AWS cloud computing and how to apply security controls in cloud applications and databases as well as experience with Docker containerisation and how it works under Kubernetes. Reporting directly to the CTO and collaborating closely with key stakeholders, including Engineering, Head of Platforms, and Head of Compliance, you'll be the go-to expert for all security matters. Required Experience: 5+ years of experience as a professional cybersecurity engineer. Proficiency in programming/Scripting languages such as Python, PowerShell, etc. Familiarity with industry-recognized frameworks (eg, CIS, ISO) and regulatory guidelines (eg, GDPR). Strong understanding of cloud computing and application of security controls in cloud architectures. Familiarity with distributed event stores such as Apache Kafka. Proficiency with operating systems (eg, Linux) and command-line interfaces. Experience with network security, incident management, and penetration testing. Familiarity with automated cloud-based CI/CD pipelines and secure software design principles. Responsibilities: Lead the implementation of cybersecurity measures, serving as the primary point of contact for all security-related matters. Collaborate closely with engineering teams to embed security-by-design principles into development processes. Conduct thorough reviews of existing tools and processes, identifying gaps and implementing enhancements to strengthen our security posture. Perform security scanning and vulnerability management, taking proactive measures to reduce operational risks. Monitor security alerts and implement mitigations to safeguard against potential threats and attacks. Develop and deploy tools and automation to streamline common security operations tasks. Introduce and integrate tools to enhance internal capabilities for routine security testing activities. Drive the development and enhancement of our cybersecurity strategy, with a focus on achieving industry certifications. Provide cybersecurity education and coaching to technology and business groups, fostering a culture of heightened awareness and responsibility. In addition to your technical prowess, we require strong communication skills and a collaborative mindset. You'll have the unique opportunity to shape and implement security measures from the ground up in a rapidly growing organisation. You'll have the opportunity to educate and coach both technology and business groups on cybersecurity best practices, fostering a culture of heightened awareness and responsibility across the organisation. If you're passionate about cybersecurity, eager to make a tangible impact and thrive in a fast-paced, innovative environment, we'd love to hear from you.
26/06/2024
Full time
Job Title: Security Engineer Salary: £80,000 to £90,000 + Benefits We are seeking a Security Engineer, for a fast-growing FinTech firm, specialising in Wealth Management and Financial Advisory. As the first dedicated cybersecurity professional you'll play a pivotal role in establishing and fortifying the firm's cybersecurity infrastructure (Greenfield). The focus here is on application security/DevSecOps, we seek someone adept in AWS cloud computing and how to apply security controls in cloud applications and databases as well as experience with Docker containerisation and how it works under Kubernetes. Reporting directly to the CTO and collaborating closely with key stakeholders, including Engineering, Head of Platforms, and Head of Compliance, you'll be the go-to expert for all security matters. Required Experience: 5+ years of experience as a professional cybersecurity engineer. Proficiency in programming/Scripting languages such as Python, PowerShell, etc. Familiarity with industry-recognized frameworks (eg, CIS, ISO) and regulatory guidelines (eg, GDPR). Strong understanding of cloud computing and application of security controls in cloud architectures. Familiarity with distributed event stores such as Apache Kafka. Proficiency with operating systems (eg, Linux) and command-line interfaces. Experience with network security, incident management, and penetration testing. Familiarity with automated cloud-based CI/CD pipelines and secure software design principles. Responsibilities: Lead the implementation of cybersecurity measures, serving as the primary point of contact for all security-related matters. Collaborate closely with engineering teams to embed security-by-design principles into development processes. Conduct thorough reviews of existing tools and processes, identifying gaps and implementing enhancements to strengthen our security posture. Perform security scanning and vulnerability management, taking proactive measures to reduce operational risks. Monitor security alerts and implement mitigations to safeguard against potential threats and attacks. Develop and deploy tools and automation to streamline common security operations tasks. Introduce and integrate tools to enhance internal capabilities for routine security testing activities. Drive the development and enhancement of our cybersecurity strategy, with a focus on achieving industry certifications. Provide cybersecurity education and coaching to technology and business groups, fostering a culture of heightened awareness and responsibility. In addition to your technical prowess, we require strong communication skills and a collaborative mindset. You'll have the unique opportunity to shape and implement security measures from the ground up in a rapidly growing organisation. You'll have the opportunity to educate and coach both technology and business groups on cybersecurity best practices, fostering a culture of heightened awareness and responsibility across the organisation. If you're passionate about cybersecurity, eager to make a tangible impact and thrive in a fast-paced, innovative environment, we'd love to hear from you.
Key Responsibilities: Define Penetration Test Strategy Support the development of security testing within the Hardware in The Loop, (HiLs), test rigs supporting Product Engineering to develop further capability in this area Governance and Assurance of the 1LoD Pen Testing Squad within DPP in line with Regulations and Vehicle Type Approval Build and Run a Certified Forensic Pen Test Lab Develop cutting edge Vulnerability and Pen Test Techniques which can be flowed into the 1LoD Pen Test Service and HiLS and ViLS functional testing Work with Management to ensure information security risk findings are reviewed and solutions are implemented, and risks are properly managed Monitor and measure company compliance with its Security Penetration Policies and Procedures as well as worldwide standards and laws to ensure organizational compliance Lead and build an Automotive Certified Forensic Pen Test Lab Development of common attacks and vulnerabilities to develop Penetration Testing scopes for ECUs, Vehicle and Connected Offboard Systems Uses threat intelligence such as updated rules and Indicators of Compromise (IOCs) to pinpoint affected systems and revision of Penetration Testing scope Your Profile Key skills/knowledge/experience: Proven Penetration Testing experience and track record of delivery in a field relevant to the role, eg In-Vehicle Network, (CAN, FLexray etc.), Embedded systems security, threats and attacks within Infotainment, Telematics, Power Train etc. Good experience in EMBEDDED AUTOMOTIVE SECURITY PEN TESTING Experience of security assessment and Penetration Testing Tools within Vehicle Electrical Architecture and external interfaces such as Bluetooth, WiFi, Mobile Communications, etc. Technical understanding of Automotive cyber security controls at both ECU and Vehicle level Previous experience of Autosar Architecture, RTE integration and SecOC Knowledge of ASpice, ISO21434, R155, R156, R157 Good understanding of automotive communication busses (CAN and Ethernet mandatory, Flexray and LIN desirable) Git experience required
25/06/2024
Full time
Key Responsibilities: Define Penetration Test Strategy Support the development of security testing within the Hardware in The Loop, (HiLs), test rigs supporting Product Engineering to develop further capability in this area Governance and Assurance of the 1LoD Pen Testing Squad within DPP in line with Regulations and Vehicle Type Approval Build and Run a Certified Forensic Pen Test Lab Develop cutting edge Vulnerability and Pen Test Techniques which can be flowed into the 1LoD Pen Test Service and HiLS and ViLS functional testing Work with Management to ensure information security risk findings are reviewed and solutions are implemented, and risks are properly managed Monitor and measure company compliance with its Security Penetration Policies and Procedures as well as worldwide standards and laws to ensure organizational compliance Lead and build an Automotive Certified Forensic Pen Test Lab Development of common attacks and vulnerabilities to develop Penetration Testing scopes for ECUs, Vehicle and Connected Offboard Systems Uses threat intelligence such as updated rules and Indicators of Compromise (IOCs) to pinpoint affected systems and revision of Penetration Testing scope Your Profile Key skills/knowledge/experience: Proven Penetration Testing experience and track record of delivery in a field relevant to the role, eg In-Vehicle Network, (CAN, FLexray etc.), Embedded systems security, threats and attacks within Infotainment, Telematics, Power Train etc. Good experience in EMBEDDED AUTOMOTIVE SECURITY PEN TESTING Experience of security assessment and Penetration Testing Tools within Vehicle Electrical Architecture and external interfaces such as Bluetooth, WiFi, Mobile Communications, etc. Technical understanding of Automotive cyber security controls at both ECU and Vehicle level Previous experience of Autosar Architecture, RTE integration and SecOC Knowledge of ASpice, ISO21434, R155, R156, R157 Good understanding of automotive communication busses (CAN and Ethernet mandatory, Flexray and LIN desirable) Git experience required
We are currently looking on behalf of one of our important clients for an IAM Systems Engineer. This role is permanent position based in Zürich Canton & comes with good home office allowance. Your Role: As an Identity Access Management Systems Engineer; hold responsibility for the planning, implementation & operation of IAM solutions. Support an IAM Product Owner in the strategic development of an IAM product & hold responsibility for the identity life cycle management process. Develop IAM solutions based on product backlog requirements. Integrate IAM solutions into an existing application landscape & implement the necessary technical security solutions. Ensure smooth functionality & comply with security guidelines & legal requirements. Create & update technical documentation of IAM solutions & processes. Carry out topic-specific projects if necessary. Your Skills: At least 3 years of professional experience in IT System Engineering in IAM environments. A very good knowledge of IAM Concepts, Architectures & Technologies. A good understanding in the field of Identity Management (SSO, identity encouragement, role-based access control, etc.). Experienced in IAM tools such as Identity Management, Access Management, Directory Services & Federations. Your Profile: Completed University Degree in the area of Computer Science or similar, ideally with focus on Cyber Security/IAM. High self-motivated, analytical, methodical, structured & quality, solution & goal-oriented. Fluent in English & very good German language skills (to at least B2 Level) are mandatory requirements.
24/06/2024
Full time
We are currently looking on behalf of one of our important clients for an IAM Systems Engineer. This role is permanent position based in Zürich Canton & comes with good home office allowance. Your Role: As an Identity Access Management Systems Engineer; hold responsibility for the planning, implementation & operation of IAM solutions. Support an IAM Product Owner in the strategic development of an IAM product & hold responsibility for the identity life cycle management process. Develop IAM solutions based on product backlog requirements. Integrate IAM solutions into an existing application landscape & implement the necessary technical security solutions. Ensure smooth functionality & comply with security guidelines & legal requirements. Create & update technical documentation of IAM solutions & processes. Carry out topic-specific projects if necessary. Your Skills: At least 3 years of professional experience in IT System Engineering in IAM environments. A very good knowledge of IAM Concepts, Architectures & Technologies. A good understanding in the field of Identity Management (SSO, identity encouragement, role-based access control, etc.). Experienced in IAM tools such as Identity Management, Access Management, Directory Services & Federations. Your Profile: Completed University Degree in the area of Computer Science or similar, ideally with focus on Cyber Security/IAM. High self-motivated, analytical, methodical, structured & quality, solution & goal-oriented. Fluent in English & very good German language skills (to at least B2 Level) are mandatory requirements.
We are currently looking on behalf of one of our important clients for an IAM Product Owner. This role is permanent position based in Zürich Canton & comes with good home office allowance. Your Role: Work closely with customers, lead a development team & prioritize & manage a product backlog. Create & communicate the long-term strategy & further development of the product. Collect, analyze & prioritize the requirements of customers & stakeholders & combine them into a comprehensive product backlog. Monitor product quality & commission troubleshooting measures. Evaluate existing & new technologies & tools regarding the selection of an IAM service offering. Plan & coordinate product releases & ensure the smooth introduction of new features. Your Skills: At least 3 years of professional experience as a Product Owner or Team Leader in IAM environments. Strong experience in Agile Development Methods including Scrum. A very good knowledge of IAM Concepts, Architectures & Technologies. A good understanding in the field of Identity Management (SSO, identity encouragement, role-based access control, etc.). Your Profile: Completed University Degree in the area of Computer Science or similar, ideally with focus on Cyber Security/IAM. High self-motivated, analytical, methodical, structured & quality, solution & goal-oriented. Fluent in English & very good German language skills (to at least B2 Level) are mandatory requirements.
21/06/2024
Full time
We are currently looking on behalf of one of our important clients for an IAM Product Owner. This role is permanent position based in Zürich Canton & comes with good home office allowance. Your Role: Work closely with customers, lead a development team & prioritize & manage a product backlog. Create & communicate the long-term strategy & further development of the product. Collect, analyze & prioritize the requirements of customers & stakeholders & combine them into a comprehensive product backlog. Monitor product quality & commission troubleshooting measures. Evaluate existing & new technologies & tools regarding the selection of an IAM service offering. Plan & coordinate product releases & ensure the smooth introduction of new features. Your Skills: At least 3 years of professional experience as a Product Owner or Team Leader in IAM environments. Strong experience in Agile Development Methods including Scrum. A very good knowledge of IAM Concepts, Architectures & Technologies. A good understanding in the field of Identity Management (SSO, identity encouragement, role-based access control, etc.). Your Profile: Completed University Degree in the area of Computer Science or similar, ideally with focus on Cyber Security/IAM. High self-motivated, analytical, methodical, structured & quality, solution & goal-oriented. Fluent in English & very good German language skills (to at least B2 Level) are mandatory requirements.