AWS Cloud and OT Security Analyst - Hampshire (Hybrid) - £50-65K My client is currently seeking a Senior Analyst to join their Global Information Systems & Security (GISCS) team. The successful analyst will play a key part in ensuring the security of cloud environments, operational tech(OT) systems, & digital transformation initiatives. Key Responsibilities: Develop & manage security controls within the digital development life cycle, enabling secure CI/CD practices. Ensure secure code updates through Static and Dynamic Application Security Testing (SAST and DAST) solutions. Analyze security control data to generate insights & timely reports. Collaborate to ensure compliance with OT security requirements. What We're Looking For: Essential: Extensive experience in information security or cloud services, including implementing control frameworks. Software development life cycle principles, CI/CD pipelines, SAST, and DAST. Familiarity with regulatory controls such as GDPR, PCI DSS, SOX, and IMO. Desirable: Knowledge of maritime operational technology systems. Experience with information security best practices, including identity management and third-party risk management. AWS Cloud and OT Security Analyst - Hampshire (Hybrid) - £50-65K
14/01/2025
Full time
AWS Cloud and OT Security Analyst - Hampshire (Hybrid) - £50-65K My client is currently seeking a Senior Analyst to join their Global Information Systems & Security (GISCS) team. The successful analyst will play a key part in ensuring the security of cloud environments, operational tech(OT) systems, & digital transformation initiatives. Key Responsibilities: Develop & manage security controls within the digital development life cycle, enabling secure CI/CD practices. Ensure secure code updates through Static and Dynamic Application Security Testing (SAST and DAST) solutions. Analyze security control data to generate insights & timely reports. Collaborate to ensure compliance with OT security requirements. What We're Looking For: Essential: Extensive experience in information security or cloud services, including implementing control frameworks. Software development life cycle principles, CI/CD pipelines, SAST, and DAST. Familiarity with regulatory controls such as GDPR, PCI DSS, SOX, and IMO. Desirable: Knowledge of maritime operational technology systems. Experience with information security best practices, including identity management and third-party risk management. AWS Cloud and OT Security Analyst - Hampshire (Hybrid) - £50-65K
NO SPONSORSHIP Associate Principal, Data Analytics Engineering SALARY: $110k flex plus 10% bonus LOCATION: Chicago, IL Hybrid 3 days in office and 2 days remote You will be expanding analytics capabilities to design and build internal analytics within data warehouse using on-premises and cloud-based tools. You will create dashboards or visualization using the tools tableau powerBI SQL Queries Alteryx Jira services now. GIT a big plus, AWS or loud data warehouse airflow bs degree masters preferred this is working for operational risk 5 years experience building dashboards any audit risk knowledge is a plus This role will drive a team responsible for expanding analytics capabilities by making internal corporate data accessible and usable to analysts throughout the organization. Primary Duties and Responsibilities: Work closely with data analyst and business stakeholders to understand their data needs and provide support in data access, data preparation, and ad hoc queries Automate data processes to reduce manual interventions, improve data processing efficiency and optimize data workflow for performance scalability Integrate data form multiple sources and ensure data consistency and quality Build data models to ensure information is available in our analytics warehouse for downstream uses, such as analysis and create dashboards or visualizations using Tableau, Power BI to present insights Maintain performance requirements of our analytics warehouse by tuning optimizations and processes Create documentation and testing to ensure data is accurate and easily understandable Promote self-service capabilities and data literacy for business users leveraging the platform through development of training presentations and resources Discover and share best practices for data and analytics engineering with members of the team Invest in your continued learning on data and analytics engineering best practices and evaluate them for fit in improving maintainability and reliability of analytics infrastructure Qualifications: Ability to collaborate with multiple partners (eg, Corporate Risk, Compliance, Audit, Production Operations, DBAs, Data Architecture, Security) to craft solutions that align business goals with internal security and development standards Ability to communicate technical concepts to audiences with varying levels of technical background and synthesize non-technical requests into technical output Comfortable supporting business analysts on high-priority projects. High attention to detail and ability to think structurally about a solution Experience working within an agile environment Technical Skills & Background Ability to write and optimize complex analytical (SELECT) SQL queries Experience with data viz/prep tools Tableau and Alteryx [Preferred] Experience with SaaS tools and their backends, such as Jira and ServiceNow [Preferred] Applied knowledge of Python for writing custom pipeline code (virtual environments, functional programming, and unit testing) [Preferred] Experience with a source code repository system (preferably Git) [Preferred] Familiarity with at least one cloud data platform, such as AWS or GCP [Preferred] Experience creating and/or maintaining a cloud data warehouse or database [Preferred] Exposure to data orchestration tools, such as Airflow [Preferred] Understanding of applied statistics and hands-on experience applying these concepts Bachelor's degree in quantitative discipline (eg, Statistics, Computer Science, Mathematics, Physics, Electrical Engineering, Industrial Engineering) or equivalent professional experience 5+ years of experience as a business analyst, data analyst, data engineer, research analyst, data engineer, analytics engineer, Business Intelligence analyst, data analyst, data scientist, or research analyst
13/01/2025
Full time
NO SPONSORSHIP Associate Principal, Data Analytics Engineering SALARY: $110k flex plus 10% bonus LOCATION: Chicago, IL Hybrid 3 days in office and 2 days remote You will be expanding analytics capabilities to design and build internal analytics within data warehouse using on-premises and cloud-based tools. You will create dashboards or visualization using the tools tableau powerBI SQL Queries Alteryx Jira services now. GIT a big plus, AWS or loud data warehouse airflow bs degree masters preferred this is working for operational risk 5 years experience building dashboards any audit risk knowledge is a plus This role will drive a team responsible for expanding analytics capabilities by making internal corporate data accessible and usable to analysts throughout the organization. Primary Duties and Responsibilities: Work closely with data analyst and business stakeholders to understand their data needs and provide support in data access, data preparation, and ad hoc queries Automate data processes to reduce manual interventions, improve data processing efficiency and optimize data workflow for performance scalability Integrate data form multiple sources and ensure data consistency and quality Build data models to ensure information is available in our analytics warehouse for downstream uses, such as analysis and create dashboards or visualizations using Tableau, Power BI to present insights Maintain performance requirements of our analytics warehouse by tuning optimizations and processes Create documentation and testing to ensure data is accurate and easily understandable Promote self-service capabilities and data literacy for business users leveraging the platform through development of training presentations and resources Discover and share best practices for data and analytics engineering with members of the team Invest in your continued learning on data and analytics engineering best practices and evaluate them for fit in improving maintainability and reliability of analytics infrastructure Qualifications: Ability to collaborate with multiple partners (eg, Corporate Risk, Compliance, Audit, Production Operations, DBAs, Data Architecture, Security) to craft solutions that align business goals with internal security and development standards Ability to communicate technical concepts to audiences with varying levels of technical background and synthesize non-technical requests into technical output Comfortable supporting business analysts on high-priority projects. High attention to detail and ability to think structurally about a solution Experience working within an agile environment Technical Skills & Background Ability to write and optimize complex analytical (SELECT) SQL queries Experience with data viz/prep tools Tableau and Alteryx [Preferred] Experience with SaaS tools and their backends, such as Jira and ServiceNow [Preferred] Applied knowledge of Python for writing custom pipeline code (virtual environments, functional programming, and unit testing) [Preferred] Experience with a source code repository system (preferably Git) [Preferred] Familiarity with at least one cloud data platform, such as AWS or GCP [Preferred] Experience creating and/or maintaining a cloud data warehouse or database [Preferred] Exposure to data orchestration tools, such as Airflow [Preferred] Understanding of applied statistics and hands-on experience applying these concepts Bachelor's degree in quantitative discipline (eg, Statistics, Computer Science, Mathematics, Physics, Electrical Engineering, Industrial Engineering) or equivalent professional experience 5+ years of experience as a business analyst, data analyst, data engineer, research analyst, data engineer, analytics engineer, Business Intelligence analyst, data analyst, data scientist, or research analyst
Request Technology - Craig Johnson
Chicago, Illinois
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Institution is currently seeking a Sr. Cyber Defense Threat Engineer. Candidate will be responsible for the in-depth analysis and response to security incidents escalated from Tier 1 analysts. This role involves investigating complex security events, identifying potential threats, and implementing measures to mitigate risks. The Tier 2 analyst plays a critical role in maintaining the security posture of the organization by leveraging advanced threat intelligence and incident response techniques. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Participate in post-incident reviews to identify areas for improvement. Stay current with the latest cybersecurity trends, threats, and technologies. Contribute to the development and enhancement of SOC processes and procedures. Qualifications: Proven team player will be working primarily with other staff members, on both long-term projects and rapid response under tight deadlines. Team Leadership experience, taking initiative; providing and following through on solutions across various skillsets. Knowledge and experience implementing controls based on security regulation (eg, NIST Cyber Security Framework) is a plus. Effective and excellent oral and written communication, analytical, judgment and consultation skills. Ability to effectively communicate in both formal and informal review settings with all levels of management. Ability to work with local and remote IT staff/management, vendors and consultants. Ability to work independently and possess strong project management skills. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Cloud based security tools and techniques (AWS, Azure, GCP, etc.) Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices. Education and Experience: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Industry knowledge of leading-edge security technologies and methods. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Previous people/project management experience is a plus. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+.
10/01/2025
Full time
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Institution is currently seeking a Sr. Cyber Defense Threat Engineer. Candidate will be responsible for the in-depth analysis and response to security incidents escalated from Tier 1 analysts. This role involves investigating complex security events, identifying potential threats, and implementing measures to mitigate risks. The Tier 2 analyst plays a critical role in maintaining the security posture of the organization by leveraging advanced threat intelligence and incident response techniques. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Participate in post-incident reviews to identify areas for improvement. Stay current with the latest cybersecurity trends, threats, and technologies. Contribute to the development and enhancement of SOC processes and procedures. Qualifications: Proven team player will be working primarily with other staff members, on both long-term projects and rapid response under tight deadlines. Team Leadership experience, taking initiative; providing and following through on solutions across various skillsets. Knowledge and experience implementing controls based on security regulation (eg, NIST Cyber Security Framework) is a plus. Effective and excellent oral and written communication, analytical, judgment and consultation skills. Ability to effectively communicate in both formal and informal review settings with all levels of management. Ability to work with local and remote IT staff/management, vendors and consultants. Ability to work independently and possess strong project management skills. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Cloud based security tools and techniques (AWS, Azure, GCP, etc.) Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices. Education and Experience: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Industry knowledge of leading-edge security technologies and methods. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Previous people/project management experience is a plus. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+.
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Institution is currently seeking a Sr. Cyber Defense Threat Engineer. Candidate will be responsible for the in-depth analysis and response to security incidents escalated from Tier 1 analysts. This role involves investigating complex security events, identifying potential threats, and implementing measures to mitigate risks. The Tier 2 analyst plays a critical role in maintaining the security posture of the organization by leveraging advanced threat intelligence and incident response techniques. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Participate in post-incident reviews to identify areas for improvement. Stay current with the latest cybersecurity trends, threats, and technologies. Contribute to the development and enhancement of SOC processes and procedures. Qualifications: Proven team player will be working primarily with other staff members, on both long-term projects and rapid response under tight deadlines. Team Leadership experience, taking initiative; providing and following through on solutions across various skillsets. Knowledge and experience implementing controls based on security regulation (eg, NIST Cyber Security Framework) is a plus. Effective and excellent oral and written communication, analytical, judgment and consultation skills. Ability to effectively communicate in both formal and informal review settings with all levels of management. Ability to work with local and remote IT staff/management, vendors and consultants. Ability to work independently and possess strong project management skills. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Cloud based security tools and techniques (AWS, Azure, GCP, etc.) Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices. Education and Experience: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Industry knowledge of leading-edge security technologies and methods. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Previous people/project management experience is a plus. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+.
10/01/2025
Full time
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Institution is currently seeking a Sr. Cyber Defense Threat Engineer. Candidate will be responsible for the in-depth analysis and response to security incidents escalated from Tier 1 analysts. This role involves investigating complex security events, identifying potential threats, and implementing measures to mitigate risks. The Tier 2 analyst plays a critical role in maintaining the security posture of the organization by leveraging advanced threat intelligence and incident response techniques. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Participate in post-incident reviews to identify areas for improvement. Stay current with the latest cybersecurity trends, threats, and technologies. Contribute to the development and enhancement of SOC processes and procedures. Qualifications: Proven team player will be working primarily with other staff members, on both long-term projects and rapid response under tight deadlines. Team Leadership experience, taking initiative; providing and following through on solutions across various skillsets. Knowledge and experience implementing controls based on security regulation (eg, NIST Cyber Security Framework) is a plus. Effective and excellent oral and written communication, analytical, judgment and consultation skills. Ability to effectively communicate in both formal and informal review settings with all levels of management. Ability to work with local and remote IT staff/management, vendors and consultants. Ability to work independently and possess strong project management skills. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Cloud based security tools and techniques (AWS, Azure, GCP, etc.) Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices. Education and Experience: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Industry knowledge of leading-edge security technologies and methods. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Previous people/project management experience is a plus. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+.
Senior Analyst - Cloud and Operational Tech Security - Hampshire (Hybrid) - £50-65K My client is currently seeking a Senior Analyst to join their Global Information Systems & Security (GISCS) team. The successful analyst will play a key part in ensuring the security of cloud environments, operational tech(OT) systems, & digital transformation initiatives. Key Responsibilities: Develop & manage security controls within the digital development life cycle, enabling secure CI/CD practices. Ensure secure code updates through Static and Dynamic Application Security Testing (SAST and DAST) solutions. Analyze security control data to generate insights & timely reports. Collaborate to ensure compliance with OT security requirements. What We're Looking For: Essential: Extensive experience in information security or cloud services, including implementing control frameworks. Software development life cycle principles, CI/CD pipelines, SAST, and DAST. Familiarity with regulatory controls such as GDPR, PCI DSS, SOX, and IMO. Desirable: Knowledge of maritime operational technology systems. Experience with information security best practices, including identity management and third-party risk management. Senior Analyst - Cloud and Operational Tech Security - Hampshire (Hybrid) - £50-65K
10/01/2025
Full time
Senior Analyst - Cloud and Operational Tech Security - Hampshire (Hybrid) - £50-65K My client is currently seeking a Senior Analyst to join their Global Information Systems & Security (GISCS) team. The successful analyst will play a key part in ensuring the security of cloud environments, operational tech(OT) systems, & digital transformation initiatives. Key Responsibilities: Develop & manage security controls within the digital development life cycle, enabling secure CI/CD practices. Ensure secure code updates through Static and Dynamic Application Security Testing (SAST and DAST) solutions. Analyze security control data to generate insights & timely reports. Collaborate to ensure compliance with OT security requirements. What We're Looking For: Essential: Extensive experience in information security or cloud services, including implementing control frameworks. Software development life cycle principles, CI/CD pipelines, SAST, and DAST. Familiarity with regulatory controls such as GDPR, PCI DSS, SOX, and IMO. Desirable: Knowledge of maritime operational technology systems. Experience with information security best practices, including identity management and third-party risk management. Senior Analyst - Cloud and Operational Tech Security - Hampshire (Hybrid) - £50-65K
My client in the Banking Industry is looking for a Senior Privileged Access Management Consultant. Job Description: A Senior Privileged Access Management (PAM) Consultant is being sought to join the PAM team within the Identity and Access Management (IAM) organization. This is an opportunity to be part of an international team, eager to support the mission to Protect the Bank: De-risked, Compliant, Secure & Protected. As a Senior IT Security Consultant, the role involves playing a key part in developing and maturing the PAM solution. The consultant will take part in risk and issue mitigation and management activities, contribute to developing a roadmap, identifying any gaps, and mitigating them within the PAM area. The consultant will join the PAM team together with roles such as Developer, Scrum Master, Product Owner, and Business Analyst. Responsibilities: Driving meetings with stakeholders in order to capture and document business requirements for new initiatives and potential improvements Work closely with Product Owner, Process Owner and IAM Architect to increase the maturity level of the PAM offering in company Collaborate with DevOps team for creation of effective PAM controls and processes within the organization Execute application risk assessments, manage potential and ensure mitigation of identified risks Location: The role is based in modern premises located in Gdansk area of Poland and requires 50% onsite work and 50% remote work is possible, candidates must already be based in Poland. To succeed in this role, we believe that you have: Several years of proven experience working with CyberArk or similar PAM solution Knowledge of IAM practices, for both on-premise and cloud environments Understanding of fundamental identity security principles (such as SoD, Least Privilege, Zero Trust) Previous experience of working with a DevOps team Understanding of IT processes and system development life cycle Familiarity with Cyber Security and IT frameworks/controls (such as CIS, NIST, ISO 2700x, COBIT, ITIL) Basic understanding of directory services, operating systems, databases and network devices Security certifications from relevant areas (IT/Cyber Security) are a plus Great collaboration and negotiation skills for working with various stakeholders within company Strong technical, analytical and documentation skills A structured and organized way of working with the ability to deliver results with high quality The ability to do conversion between business and technical context The willingness to take ownership A strong can-do attitude and self-driven approach Fluency in English (spoken and written) Language: Fluent in English, both written and spoken
09/01/2025
Project-based
My client in the Banking Industry is looking for a Senior Privileged Access Management Consultant. Job Description: A Senior Privileged Access Management (PAM) Consultant is being sought to join the PAM team within the Identity and Access Management (IAM) organization. This is an opportunity to be part of an international team, eager to support the mission to Protect the Bank: De-risked, Compliant, Secure & Protected. As a Senior IT Security Consultant, the role involves playing a key part in developing and maturing the PAM solution. The consultant will take part in risk and issue mitigation and management activities, contribute to developing a roadmap, identifying any gaps, and mitigating them within the PAM area. The consultant will join the PAM team together with roles such as Developer, Scrum Master, Product Owner, and Business Analyst. Responsibilities: Driving meetings with stakeholders in order to capture and document business requirements for new initiatives and potential improvements Work closely with Product Owner, Process Owner and IAM Architect to increase the maturity level of the PAM offering in company Collaborate with DevOps team for creation of effective PAM controls and processes within the organization Execute application risk assessments, manage potential and ensure mitigation of identified risks Location: The role is based in modern premises located in Gdansk area of Poland and requires 50% onsite work and 50% remote work is possible, candidates must already be based in Poland. To succeed in this role, we believe that you have: Several years of proven experience working with CyberArk or similar PAM solution Knowledge of IAM practices, for both on-premise and cloud environments Understanding of fundamental identity security principles (such as SoD, Least Privilege, Zero Trust) Previous experience of working with a DevOps team Understanding of IT processes and system development life cycle Familiarity with Cyber Security and IT frameworks/controls (such as CIS, NIST, ISO 2700x, COBIT, ITIL) Basic understanding of directory services, operating systems, databases and network devices Security certifications from relevant areas (IT/Cyber Security) are a plus Great collaboration and negotiation skills for working with various stakeholders within company Strong technical, analytical and documentation skills A structured and organized way of working with the ability to deliver results with high quality The ability to do conversion between business and technical context The willingness to take ownership A strong can-do attitude and self-driven approach Fluency in English (spoken and written) Language: Fluent in English, both written and spoken
Role: Cyber Security Analyst Location: Remote (Very Rare Meetup with Team in Bristol or London) Salary: Up to £50,000 (plus £1,000 Remote Setup Allowance) We are seeking an enthusiastic Cyber Security Analyst to join a forward-thinking and dynamic team at an organization with an exceptionally modern IT estate. This role offers significant opportunities for personal and professional growth, including training, certification building, and support from an experienced Cyber Security leader. Overview Our client is a significant player in their industry, with a modern IT estate that currently isn't being used to its full potential. The successful candidate will be coming in to support their Head of Cyber Security in the numerous projects that will both overhaul various elements of their environment. Example of upcoming projects include: Consolidation of their cloud suppliers. Significant expansion of their AWS and Azure estates. Increase analytical utilisation of their cutting-edge Cyber Security product portfolio, including Datadog, Cloudflare, M365 E3, Jira, Microsoft Defender. This organisation uses a "security by design" approach, putting Cyber Security at the forefront of everything they do in close collaboration with the wider IT function to ensure governance and compliance with numerous Cyber Security frameworks (ISO 27001, NIST, PCI-DSS). Ultimately, the company aims to grow by 300% over the next three years, and you will have the exciting opportunity to play a central role in shaping the environment to achieve that goal. Role Reporting to the Head of Cyber Security, you will become part of a small, close-knit security team, supporting the charge to improve their cybersecurity initiative. This role will require you to become a Cyber Security generalist, actively engaging at all levels of Cyber Security and contributing across a broad range of responsibilities, such as: Threat Management Endpoint Detection Security Assurance (Security by Design Controls) Framework Governance and Compliance (ISO 27001, NIST, PCI-DSS) Vulnerability Scanning Risk Analysis Cybersecurity Awareness Campaigns Phishing Campaigns Experience The ideal candidate will bring hands-on experience in the above Cyber Security responsibilities, coupled with a strong analytical mindset. The successful candidate will be driven by a curiosity to analyse data and reports, identifying trends and their impact to guide strategic decisions. We're looking for someone with a thirst for continuous learning, who has the drive to explore new areas, and is committed to professional development and staying ahead with the latest industry developments, who may already have some relevant industry certifications and will be supported by an experienced, Cyber Security professional. This role is ideal for someone eager to expand their expertise across all areas of Cyber Security. If you have solid experience as a SOC Analyst and are eager to continue their development in that space, while exploring the engineering side of Cyber Security, this opportunity is for you.
23/12/2024
Full time
Role: Cyber Security Analyst Location: Remote (Very Rare Meetup with Team in Bristol or London) Salary: Up to £50,000 (plus £1,000 Remote Setup Allowance) We are seeking an enthusiastic Cyber Security Analyst to join a forward-thinking and dynamic team at an organization with an exceptionally modern IT estate. This role offers significant opportunities for personal and professional growth, including training, certification building, and support from an experienced Cyber Security leader. Overview Our client is a significant player in their industry, with a modern IT estate that currently isn't being used to its full potential. The successful candidate will be coming in to support their Head of Cyber Security in the numerous projects that will both overhaul various elements of their environment. Example of upcoming projects include: Consolidation of their cloud suppliers. Significant expansion of their AWS and Azure estates. Increase analytical utilisation of their cutting-edge Cyber Security product portfolio, including Datadog, Cloudflare, M365 E3, Jira, Microsoft Defender. This organisation uses a "security by design" approach, putting Cyber Security at the forefront of everything they do in close collaboration with the wider IT function to ensure governance and compliance with numerous Cyber Security frameworks (ISO 27001, NIST, PCI-DSS). Ultimately, the company aims to grow by 300% over the next three years, and you will have the exciting opportunity to play a central role in shaping the environment to achieve that goal. Role Reporting to the Head of Cyber Security, you will become part of a small, close-knit security team, supporting the charge to improve their cybersecurity initiative. This role will require you to become a Cyber Security generalist, actively engaging at all levels of Cyber Security and contributing across a broad range of responsibilities, such as: Threat Management Endpoint Detection Security Assurance (Security by Design Controls) Framework Governance and Compliance (ISO 27001, NIST, PCI-DSS) Vulnerability Scanning Risk Analysis Cybersecurity Awareness Campaigns Phishing Campaigns Experience The ideal candidate will bring hands-on experience in the above Cyber Security responsibilities, coupled with a strong analytical mindset. The successful candidate will be driven by a curiosity to analyse data and reports, identifying trends and their impact to guide strategic decisions. We're looking for someone with a thirst for continuous learning, who has the drive to explore new areas, and is committed to professional development and staying ahead with the latest industry developments, who may already have some relevant industry certifications and will be supported by an experienced, Cyber Security professional. This role is ideal for someone eager to expand their expertise across all areas of Cyber Security. If you have solid experience as a SOC Analyst and are eager to continue their development in that space, while exploring the engineering side of Cyber Security, this opportunity is for you.