Security Engineer Salary: $140k-$150k + bonus Location: Chicago, IL or Dallas, TX Hybrid: 3 days onsite, 2 days remote *We are unable to provide sponsorship for this role* Qualifications Bachelor's degree 3+ years of related experience Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Responsibilities Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned.
15/01/2025
Full time
Security Engineer Salary: $140k-$150k + bonus Location: Chicago, IL or Dallas, TX Hybrid: 3 days onsite, 2 days remote *We are unable to provide sponsorship for this role* Qualifications Bachelor's degree 3+ years of related experience Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Responsibilities Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned.
Security Engineer Salary: $140k-$150k + bonus Location: Chicago, IL or Dallas, TX Hybrid: 3 days onsite, 2 days remote *We are unable to provide sponsorship for this role* Qualifications Bachelor's degree 3+ years of related experience Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Responsibilities Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned.
14/01/2025
Full time
Security Engineer Salary: $140k-$150k + bonus Location: Chicago, IL or Dallas, TX Hybrid: 3 days onsite, 2 days remote *We are unable to provide sponsorship for this role* Qualifications Bachelor's degree 3+ years of related experience Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Responsibilities Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned.
*Hybrid, 3 days onsite, 2 days remote* *We are unable to sponsor as this is a permanent Full time role* A prestigious company is looking for an Associate Principal, Cyber Defense. This role is focused on threat intelligence, incident response, security alerts, events analysis, network traffic, etc. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Qualifications: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices.
14/01/2025
Full time
*Hybrid, 3 days onsite, 2 days remote* *We are unable to sponsor as this is a permanent Full time role* A prestigious company is looking for an Associate Principal, Cyber Defense. This role is focused on threat intelligence, incident response, security alerts, events analysis, network traffic, etc. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Qualifications: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices.
*Hybrid, 3 days onsite, 2 days remote* *We are unable to sponsor as this is a permanent Full time role* A prestigious company is looking for an Associate Principal, Cyber Defense. This role is focused on threat intelligence, incident response, security alerts, events analysis, network traffic, etc. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Qualifications: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices.
14/01/2025
Full time
*Hybrid, 3 days onsite, 2 days remote* *We are unable to sponsor as this is a permanent Full time role* A prestigious company is looking for an Associate Principal, Cyber Defense. This role is focused on threat intelligence, incident response, security alerts, events analysis, network traffic, etc. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Qualifications: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices.
My leading Investment Bank client are looking for a Murex Accounting Senior Business Analyst to work closely with Finance and Product Control departments to optimise current business processes in Mx3 and design new solutions, transitioning to take on responsibilities for all Back Office Murex operations. You'll also be heavily involved in a major Murex upgrade and be a key person in the business. This is a high profile role with lots of responsibility. An amazing opportunity! The following skills/experience is essential: Strong Murex Accounting background Business Analyst background End-to-end Murex Accounting Strong Financial Services experience Excellent communication skills Salary: Up to £115,000 + bonus + package Level: VP Location: London (good work from home options available) If you are interested in this position and meet the above requirements please apply immediately.
14/01/2025
Full time
My leading Investment Bank client are looking for a Murex Accounting Senior Business Analyst to work closely with Finance and Product Control departments to optimise current business processes in Mx3 and design new solutions, transitioning to take on responsibilities for all Back Office Murex operations. You'll also be heavily involved in a major Murex upgrade and be a key person in the business. This is a high profile role with lots of responsibility. An amazing opportunity! The following skills/experience is essential: Strong Murex Accounting background Business Analyst background End-to-end Murex Accounting Strong Financial Services experience Excellent communication skills Salary: Up to £115,000 + bonus + package Level: VP Location: London (good work from home options available) If you are interested in this position and meet the above requirements please apply immediately.
NO SPONSORSHIP Associate Principal, Data Analytics Engineering SALARY: $110k flex plus 10% bonus LOCATION: Chicago, IL Hybrid 3 days in office and 2 days remote You will be expanding analytics capabilities to design and build internal analytics within data warehouse using on-premises and cloud-based tools. You will create dashboards or visualization using the tools tableau powerBI SQL Queries Alteryx Jira services now. GIT a big plus, AWS or loud data warehouse airflow bs degree masters preferred this is working for operational risk 5 years experience building dashboards any audit risk knowledge is a plus This role will drive a team responsible for expanding analytics capabilities by making internal corporate data accessible and usable to analysts throughout the organization. Primary Duties and Responsibilities: Work closely with data analyst and business stakeholders to understand their data needs and provide support in data access, data preparation, and ad hoc queries Automate data processes to reduce manual interventions, improve data processing efficiency and optimize data workflow for performance scalability Integrate data form multiple sources and ensure data consistency and quality Build data models to ensure information is available in our analytics warehouse for downstream uses, such as analysis and create dashboards or visualizations using Tableau, Power BI to present insights Maintain performance requirements of our analytics warehouse by tuning optimizations and processes Create documentation and testing to ensure data is accurate and easily understandable Promote self-service capabilities and data literacy for business users leveraging the platform through development of training presentations and resources Discover and share best practices for data and analytics engineering with members of the team Invest in your continued learning on data and analytics engineering best practices and evaluate them for fit in improving maintainability and reliability of analytics infrastructure Qualifications: Ability to collaborate with multiple partners (eg, Corporate Risk, Compliance, Audit, Production Operations, DBAs, Data Architecture, Security) to craft solutions that align business goals with internal security and development standards Ability to communicate technical concepts to audiences with varying levels of technical background and synthesize non-technical requests into technical output Comfortable supporting business analysts on high-priority projects. High attention to detail and ability to think structurally about a solution Experience working within an agile environment Technical Skills & Background Ability to write and optimize complex analytical (SELECT) SQL queries Experience with data viz/prep tools Tableau and Alteryx [Preferred] Experience with SaaS tools and their backends, such as Jira and ServiceNow [Preferred] Applied knowledge of Python for writing custom pipeline code (virtual environments, functional programming, and unit testing) [Preferred] Experience with a source code repository system (preferably Git) [Preferred] Familiarity with at least one cloud data platform, such as AWS or GCP [Preferred] Experience creating and/or maintaining a cloud data warehouse or database [Preferred] Exposure to data orchestration tools, such as Airflow [Preferred] Understanding of applied statistics and hands-on experience applying these concepts Bachelor's degree in quantitative discipline (eg, Statistics, Computer Science, Mathematics, Physics, Electrical Engineering, Industrial Engineering) or equivalent professional experience 5+ years of experience as a business analyst, data analyst, data engineer, research analyst, data engineer, analytics engineer, Business Intelligence analyst, data analyst, data scientist, or research analyst
13/01/2025
Full time
NO SPONSORSHIP Associate Principal, Data Analytics Engineering SALARY: $110k flex plus 10% bonus LOCATION: Chicago, IL Hybrid 3 days in office and 2 days remote You will be expanding analytics capabilities to design and build internal analytics within data warehouse using on-premises and cloud-based tools. You will create dashboards or visualization using the tools tableau powerBI SQL Queries Alteryx Jira services now. GIT a big plus, AWS or loud data warehouse airflow bs degree masters preferred this is working for operational risk 5 years experience building dashboards any audit risk knowledge is a plus This role will drive a team responsible for expanding analytics capabilities by making internal corporate data accessible and usable to analysts throughout the organization. Primary Duties and Responsibilities: Work closely with data analyst and business stakeholders to understand their data needs and provide support in data access, data preparation, and ad hoc queries Automate data processes to reduce manual interventions, improve data processing efficiency and optimize data workflow for performance scalability Integrate data form multiple sources and ensure data consistency and quality Build data models to ensure information is available in our analytics warehouse for downstream uses, such as analysis and create dashboards or visualizations using Tableau, Power BI to present insights Maintain performance requirements of our analytics warehouse by tuning optimizations and processes Create documentation and testing to ensure data is accurate and easily understandable Promote self-service capabilities and data literacy for business users leveraging the platform through development of training presentations and resources Discover and share best practices for data and analytics engineering with members of the team Invest in your continued learning on data and analytics engineering best practices and evaluate them for fit in improving maintainability and reliability of analytics infrastructure Qualifications: Ability to collaborate with multiple partners (eg, Corporate Risk, Compliance, Audit, Production Operations, DBAs, Data Architecture, Security) to craft solutions that align business goals with internal security and development standards Ability to communicate technical concepts to audiences with varying levels of technical background and synthesize non-technical requests into technical output Comfortable supporting business analysts on high-priority projects. High attention to detail and ability to think structurally about a solution Experience working within an agile environment Technical Skills & Background Ability to write and optimize complex analytical (SELECT) SQL queries Experience with data viz/prep tools Tableau and Alteryx [Preferred] Experience with SaaS tools and their backends, such as Jira and ServiceNow [Preferred] Applied knowledge of Python for writing custom pipeline code (virtual environments, functional programming, and unit testing) [Preferred] Experience with a source code repository system (preferably Git) [Preferred] Familiarity with at least one cloud data platform, such as AWS or GCP [Preferred] Experience creating and/or maintaining a cloud data warehouse or database [Preferred] Exposure to data orchestration tools, such as Airflow [Preferred] Understanding of applied statistics and hands-on experience applying these concepts Bachelor's degree in quantitative discipline (eg, Statistics, Computer Science, Mathematics, Physics, Electrical Engineering, Industrial Engineering) or equivalent professional experience 5+ years of experience as a business analyst, data analyst, data engineer, research analyst, data engineer, analytics engineer, Business Intelligence analyst, data analyst, data scientist, or research analyst
Request Technology - Craig Johnson
Chicago, Illinois
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Institution is currently seeking a Sr. Cyber Defense Threat Engineer. Candidate will be responsible for the in-depth analysis and response to security incidents escalated from Tier 1 analysts. This role involves investigating complex security events, identifying potential threats, and implementing measures to mitigate risks. The Tier 2 analyst plays a critical role in maintaining the security posture of the organization by leveraging advanced threat intelligence and incident response techniques. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Participate in post-incident reviews to identify areas for improvement. Stay current with the latest cybersecurity trends, threats, and technologies. Contribute to the development and enhancement of SOC processes and procedures. Qualifications: Proven team player will be working primarily with other staff members, on both long-term projects and rapid response under tight deadlines. Team Leadership experience, taking initiative; providing and following through on solutions across various skillsets. Knowledge and experience implementing controls based on security regulation (eg, NIST Cyber Security Framework) is a plus. Effective and excellent oral and written communication, analytical, judgment and consultation skills. Ability to effectively communicate in both formal and informal review settings with all levels of management. Ability to work with local and remote IT staff/management, vendors and consultants. Ability to work independently and possess strong project management skills. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Cloud based security tools and techniques (AWS, Azure, GCP, etc.) Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices. Education and Experience: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Industry knowledge of leading-edge security technologies and methods. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Previous people/project management experience is a plus. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+.
10/01/2025
Full time
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Institution is currently seeking a Sr. Cyber Defense Threat Engineer. Candidate will be responsible for the in-depth analysis and response to security incidents escalated from Tier 1 analysts. This role involves investigating complex security events, identifying potential threats, and implementing measures to mitigate risks. The Tier 2 analyst plays a critical role in maintaining the security posture of the organization by leveraging advanced threat intelligence and incident response techniques. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Participate in post-incident reviews to identify areas for improvement. Stay current with the latest cybersecurity trends, threats, and technologies. Contribute to the development and enhancement of SOC processes and procedures. Qualifications: Proven team player will be working primarily with other staff members, on both long-term projects and rapid response under tight deadlines. Team Leadership experience, taking initiative; providing and following through on solutions across various skillsets. Knowledge and experience implementing controls based on security regulation (eg, NIST Cyber Security Framework) is a plus. Effective and excellent oral and written communication, analytical, judgment and consultation skills. Ability to effectively communicate in both formal and informal review settings with all levels of management. Ability to work with local and remote IT staff/management, vendors and consultants. Ability to work independently and possess strong project management skills. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Cloud based security tools and techniques (AWS, Azure, GCP, etc.) Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices. Education and Experience: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Industry knowledge of leading-edge security technologies and methods. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Previous people/project management experience is a plus. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+.
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Institution is currently seeking a Sr. Cyber Defense Threat Engineer. Candidate will be responsible for the in-depth analysis and response to security incidents escalated from Tier 1 analysts. This role involves investigating complex security events, identifying potential threats, and implementing measures to mitigate risks. The Tier 2 analyst plays a critical role in maintaining the security posture of the organization by leveraging advanced threat intelligence and incident response techniques. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Participate in post-incident reviews to identify areas for improvement. Stay current with the latest cybersecurity trends, threats, and technologies. Contribute to the development and enhancement of SOC processes and procedures. Qualifications: Proven team player will be working primarily with other staff members, on both long-term projects and rapid response under tight deadlines. Team Leadership experience, taking initiative; providing and following through on solutions across various skillsets. Knowledge and experience implementing controls based on security regulation (eg, NIST Cyber Security Framework) is a plus. Effective and excellent oral and written communication, analytical, judgment and consultation skills. Ability to effectively communicate in both formal and informal review settings with all levels of management. Ability to work with local and remote IT staff/management, vendors and consultants. Ability to work independently and possess strong project management skills. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Cloud based security tools and techniques (AWS, Azure, GCP, etc.) Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices. Education and Experience: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Industry knowledge of leading-edge security technologies and methods. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Previous people/project management experience is a plus. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+.
10/01/2025
Full time
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Institution is currently seeking a Sr. Cyber Defense Threat Engineer. Candidate will be responsible for the in-depth analysis and response to security incidents escalated from Tier 1 analysts. This role involves investigating complex security events, identifying potential threats, and implementing measures to mitigate risks. The Tier 2 analyst plays a critical role in maintaining the security posture of the organization by leveraging advanced threat intelligence and incident response techniques. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Participate in post-incident reviews to identify areas for improvement. Stay current with the latest cybersecurity trends, threats, and technologies. Contribute to the development and enhancement of SOC processes and procedures. Qualifications: Proven team player will be working primarily with other staff members, on both long-term projects and rapid response under tight deadlines. Team Leadership experience, taking initiative; providing and following through on solutions across various skillsets. Knowledge and experience implementing controls based on security regulation (eg, NIST Cyber Security Framework) is a plus. Effective and excellent oral and written communication, analytical, judgment and consultation skills. Ability to effectively communicate in both formal and informal review settings with all levels of management. Ability to work with local and remote IT staff/management, vendors and consultants. Ability to work independently and possess strong project management skills. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Cloud based security tools and techniques (AWS, Azure, GCP, etc.) Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices. Education and Experience: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Industry knowledge of leading-edge security technologies and methods. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Previous people/project management experience is a plus. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+.
Business/IT Analyst - MTMX We are urgently seeking a skilled Business Analyst/IT Analyst with expertise in payment systems and financial messaging standards (MTMX) to join our leading customer, a leading financial institution. In this role, you will play a crucial part in implementing and upgrading payment processing applications, ensuring smooth payment flows and efficient system operations. Your responsibilities will include coordinating with business stakeholders to define use cases, managing system upgrades and patches, and ensuring compliance with financial messaging standards like SWIFT and ISO 20022. You will act as the bridge between business needs and IT solutions, helping to troubleshoot issues and optimize payment flows. To succeed in this role, you should have strong knowledge of MT and MX messaging formats, experience with payment processing systems, and excellent communication skills to liaise between business and IT teams. This is an urgent position with interview slots available next week. Please apply immediately ff you are passionate about driving innovation in payment solutions.
10/01/2025
Project-based
Business/IT Analyst - MTMX We are urgently seeking a skilled Business Analyst/IT Analyst with expertise in payment systems and financial messaging standards (MTMX) to join our leading customer, a leading financial institution. In this role, you will play a crucial part in implementing and upgrading payment processing applications, ensuring smooth payment flows and efficient system operations. Your responsibilities will include coordinating with business stakeholders to define use cases, managing system upgrades and patches, and ensuring compliance with financial messaging standards like SWIFT and ISO 20022. You will act as the bridge between business needs and IT solutions, helping to troubleshoot issues and optimize payment flows. To succeed in this role, you should have strong knowledge of MT and MX messaging formats, experience with payment processing systems, and excellent communication skills to liaise between business and IT teams. This is an urgent position with interview slots available next week. Please apply immediately ff you are passionate about driving innovation in payment solutions.
Cyber Defense Operations (CDO) Analyst is required by a leading technology company for a 6 month Inside IR35 contract. The incoming Analyst will be responsible the identification and mitigation of Cyber threats using the Microsoft Suite of Cyber tools including Sentinel, Defender, Threat Explorer and Advanced Hunting. The successful candidate must also demonstrate experience in managing cyber incidents. The role represents an exciting opportunity for an experienced Cyber professional to join major player in the technology and communications industry.
10/01/2025
Full time
Cyber Defense Operations (CDO) Analyst is required by a leading technology company for a 6 month Inside IR35 contract. The incoming Analyst will be responsible the identification and mitigation of Cyber threats using the Microsoft Suite of Cyber tools including Sentinel, Defender, Threat Explorer and Advanced Hunting. The successful candidate must also demonstrate experience in managing cyber incidents. The role represents an exciting opportunity for an experienced Cyber professional to join major player in the technology and communications industry.
IT Support Team Lead - Birmingham Hybrid working Salary upto £50,000 EUC Team Lead required for a leading client based in Birmingham. My client is currently looking to hire a EUC Team Lead to come on board to oversee a team of up to 10 EUS analysts across multiple locations, ensuring the delivery of high-quality IT support for end users at all times. The EUS Team Lead will support the development, maintenance, and adherence to operational processes, tools, and procedures, while also managing escalations and collaborating with resolver teams to address major issues effectively. In addition to fulfilling line management duties, the EUS Team Lead will provide onsite IT support for colleagues, addressing technical incidents and service requests for a range of end-user devices, including iPhones, iPads, PCs, and laptops. This role requires strong technical expertise to resolve issues and where appropriate, serve as an interface for functions such as IT Service Desk, Major Incident Management, Asset Management, Change Management, and Problem Management. Key skills, * Previous EUC experience * Previous experience in an onsite 2nd line engineering role. * Strong knowledge of endpoint device hardware, including HP and Apple laptops, iPhones, iPads, office telephony, and Wi-Fi systems. * Proficiency in accessing and configuring firmware/BIOS to meet organizational standards. * Familiarity with operating systems, including installation, updates, and remediation for all supported versions of Microsoft Windows. * Expertise in endpoint software suites, including installation, updates, and remediation for all supported versions of Microsoft Office. * Enterprise Mobile Device Management experience, including device enrollment/un-enrollment and profile push on platforms such as MobileIron. * Knowledge of endpoint enterprise management systems, such as device updates and software installations via Microsoft SCCM and BitLocker. * Proficiency with enterprise deployment technologies, including pre-boot configuration and device build sequences using Microsoft SCCM and MDT. * Expertise in endpoint enterprise encryption systems, including device enrollment, encryption/decryption, and user/device management with tools like Microsoft MBAM and BitLocker. * Strong understanding of core application technologies, such as email, document management, and time recording systems. * Solid understanding of Group Policy operations. * Hands-on experience with PC device builds and post-build configuration. * Proficiency in iOS/iPhone/iPad device builds, post-build configuration, and support. * Experience in break/fix work from incident and request queues. * Maintenance of endpoint devices, including Windows updates, antivirus software, and encryption tools. * Device administration using SCCM, MDM, and Active Directory. * User administration in Microsoft Office 365 and Active Directory. Interested? Please submit your updated CV to Dean Parkes at Crimson or immediate consideration. Not interested? Do you know someone who might be a perfect fit for this role? Refer a friend and earn £250 worth of vouchers! Crimson is acting as an employment agency regarding this vacancy
09/01/2025
Full time
IT Support Team Lead - Birmingham Hybrid working Salary upto £50,000 EUC Team Lead required for a leading client based in Birmingham. My client is currently looking to hire a EUC Team Lead to come on board to oversee a team of up to 10 EUS analysts across multiple locations, ensuring the delivery of high-quality IT support for end users at all times. The EUS Team Lead will support the development, maintenance, and adherence to operational processes, tools, and procedures, while also managing escalations and collaborating with resolver teams to address major issues effectively. In addition to fulfilling line management duties, the EUS Team Lead will provide onsite IT support for colleagues, addressing technical incidents and service requests for a range of end-user devices, including iPhones, iPads, PCs, and laptops. This role requires strong technical expertise to resolve issues and where appropriate, serve as an interface for functions such as IT Service Desk, Major Incident Management, Asset Management, Change Management, and Problem Management. Key skills, * Previous EUC experience * Previous experience in an onsite 2nd line engineering role. * Strong knowledge of endpoint device hardware, including HP and Apple laptops, iPhones, iPads, office telephony, and Wi-Fi systems. * Proficiency in accessing and configuring firmware/BIOS to meet organizational standards. * Familiarity with operating systems, including installation, updates, and remediation for all supported versions of Microsoft Windows. * Expertise in endpoint software suites, including installation, updates, and remediation for all supported versions of Microsoft Office. * Enterprise Mobile Device Management experience, including device enrollment/un-enrollment and profile push on platforms such as MobileIron. * Knowledge of endpoint enterprise management systems, such as device updates and software installations via Microsoft SCCM and BitLocker. * Proficiency with enterprise deployment technologies, including pre-boot configuration and device build sequences using Microsoft SCCM and MDT. * Expertise in endpoint enterprise encryption systems, including device enrollment, encryption/decryption, and user/device management with tools like Microsoft MBAM and BitLocker. * Strong understanding of core application technologies, such as email, document management, and time recording systems. * Solid understanding of Group Policy operations. * Hands-on experience with PC device builds and post-build configuration. * Proficiency in iOS/iPhone/iPad device builds, post-build configuration, and support. * Experience in break/fix work from incident and request queues. * Maintenance of endpoint devices, including Windows updates, antivirus software, and encryption tools. * Device administration using SCCM, MDM, and Active Directory. * User administration in Microsoft Office 365 and Active Directory. Interested? Please submit your updated CV to Dean Parkes at Crimson or immediate consideration. Not interested? Do you know someone who might be a perfect fit for this role? Refer a friend and earn £250 worth of vouchers! Crimson is acting as an employment agency regarding this vacancy
EUC Team Lead - Birmingham Hybrid working Salary upto £50,000 EUC Team Lead required for a leading client based in Birmingham. My client is currently looking to hire a EUC Team Lead to come on board to oversee a team of up to 10 EUS analysts across multiple locations, ensuring the delivery of high-quality IT support for end users at all times. The EUS Team Lead will support the development, maintenance, and adherence to operational processes, tools, and procedures, while also managing escalations and collaborating with resolver teams to address major issues effectively. In addition to fulfilling line management duties, the EUS Team Lead will provide onsite IT support for colleagues, addressing technical incidents and service requests for a range of end-user devices, including iPhones, iPads, PCs, and laptops. This role requires strong technical expertise to resolve issues and where appropriate, serve as an interface for functions such as IT Service Desk, Major Incident Management, Asset Management, Change Management, and Problem Management. Key skills, Previous EUC experience Previous experience in an onsite 2nd line engineering role. Strong knowledge of endpoint device hardware, including HP and Apple laptops, iPhones, iPads, office telephony, and Wi-Fi systems. Proficiency in accessing and configuring firmware/BIOS to meet organizational standards. Familiarity with operating systems, including installation, updates, and remediation for all supported versions of Microsoft Windows. Expertise in endpoint software suites, including installation, updates, and remediation for all supported versions of Microsoft Office. Enterprise Mobile Device Management experience, including device enrollment/un-enrollment and profile push on platforms such as MobileIron. Knowledge of endpoint enterprise management systems, such as device updates and software installations via Microsoft SCCM and BitLocker. Proficiency with enterprise deployment technologies, including pre-boot configuration and device build sequences using Microsoft SCCM and MDT. Expertise in endpoint enterprise encryption systems, including device enrollment, encryption/decryption, and user/device management with tools like Microsoft MBAM and BitLocker. Strong understanding of core application technologies, such as email, document management, and time recording systems. Solid understanding of Group Policy operations. Hands-on experience with PC device builds and post-build configuration. Proficiency in iOS/iPhone/iPad device builds, post-build configuration, and support. Experience in break/fix work from incident and request queues. Maintenance of endpoint devices, including Windows updates, antivirus software, and encryption tools. Device administration using SCCM, MDM, and Active Directory. User administration in Microsoft Office 365 and Active Directory. Interested? Please submit your updated CV to Dean Parkes at Crimson or immediate consideration. Not interested? Do you know someone who might be a perfect fit for this role? Refer a friend and earn £250 worth of vouchers! Crimson is acting as an employment agency regarding this vacancy
09/01/2025
Full time
EUC Team Lead - Birmingham Hybrid working Salary upto £50,000 EUC Team Lead required for a leading client based in Birmingham. My client is currently looking to hire a EUC Team Lead to come on board to oversee a team of up to 10 EUS analysts across multiple locations, ensuring the delivery of high-quality IT support for end users at all times. The EUS Team Lead will support the development, maintenance, and adherence to operational processes, tools, and procedures, while also managing escalations and collaborating with resolver teams to address major issues effectively. In addition to fulfilling line management duties, the EUS Team Lead will provide onsite IT support for colleagues, addressing technical incidents and service requests for a range of end-user devices, including iPhones, iPads, PCs, and laptops. This role requires strong technical expertise to resolve issues and where appropriate, serve as an interface for functions such as IT Service Desk, Major Incident Management, Asset Management, Change Management, and Problem Management. Key skills, Previous EUC experience Previous experience in an onsite 2nd line engineering role. Strong knowledge of endpoint device hardware, including HP and Apple laptops, iPhones, iPads, office telephony, and Wi-Fi systems. Proficiency in accessing and configuring firmware/BIOS to meet organizational standards. Familiarity with operating systems, including installation, updates, and remediation for all supported versions of Microsoft Windows. Expertise in endpoint software suites, including installation, updates, and remediation for all supported versions of Microsoft Office. Enterprise Mobile Device Management experience, including device enrollment/un-enrollment and profile push on platforms such as MobileIron. Knowledge of endpoint enterprise management systems, such as device updates and software installations via Microsoft SCCM and BitLocker. Proficiency with enterprise deployment technologies, including pre-boot configuration and device build sequences using Microsoft SCCM and MDT. Expertise in endpoint enterprise encryption systems, including device enrollment, encryption/decryption, and user/device management with tools like Microsoft MBAM and BitLocker. Strong understanding of core application technologies, such as email, document management, and time recording systems. Solid understanding of Group Policy operations. Hands-on experience with PC device builds and post-build configuration. Proficiency in iOS/iPhone/iPad device builds, post-build configuration, and support. Experience in break/fix work from incident and request queues. Maintenance of endpoint devices, including Windows updates, antivirus software, and encryption tools. Device administration using SCCM, MDM, and Active Directory. User administration in Microsoft Office 365 and Active Directory. Interested? Please submit your updated CV to Dean Parkes at Crimson or immediate consideration. Not interested? Do you know someone who might be a perfect fit for this role? Refer a friend and earn £250 worth of vouchers! Crimson is acting as an employment agency regarding this vacancy
Request Technology - Craig Johnson
Chicago, Illinois
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Company is currently seeking a Strategic Sourcing Data Analytics Analyst. Candidate will play a crucial role in developing quantitative methods to govern the procurement process. This includes designing a scorecard for the Strategic Sourcing function, creating and maintaining reports for managing procurement activities, and designing processes for intake and resource allocation. This role offers extensive collaboration opportunities with cross-functional teams. By working closely with Strategic Sourcing, IT, Finance, Legal, PMO, Data Governance and Operations, you can represent the department across the company and drive data-driven decision-making for Strategic Sourcing. Responsibilities: Implement processes to collect, manage and analyze procurement data, ensuring the organization has the necessary infrastructure for effective data-driven decision making. Oversee KPIs and metrics that measure performance of the Strategic Sourcing function. Prepare regular reports for internal and external stakeholders. Generate and communicate regular performance and resource allocation reports that translate procurement process data into actionable insights for internal teams and external stakeholders. Represent the Strategic Sourcing function by thoroughly assessing and validating all new intake requests, incorporating feedback from diverse stakeholders and customers. Exercise strong judgment to determine the most suitable approach for each project and engage the necessary stakeholders for productive discussions. Maintain a deep understanding of the department scope and sourcing strategies to navigate ambiguous situations/requests and collaborate with the appropriate stakeholders to solve challenges. Integrate data and resulting insights into procurement processes: Collaborate with procurement team and IT to embed analytics tools into the procurement workflow (such as for spend analysis and forecasting, savings analysis, supplier information gathering and analysis for selection, pricing and contract analytics, benchmarking, compliance to sourcing strategies and bid analysis). Develop and delivertraining programs to empower procurement and cross-functional teams with the skills and knowledge needed to effectively utilize reports and tools, promoting a culture of data-driven decision-making. Liaise with IT on requirements and testing for dashboards and reports in various systems including Oracle, ServiceNow, Archer, Apptio, Power BI, Tableau and others Qualifications: . Strong understanding of business analytics with ample experience in procurement, IT contracts, and/or PMO. Knowledge of the sources of data that support the development and execution of sourcing strategies. Process analysis and improvement experience, with the ability to define and reinforce processes. Proven ability to collaborate and problem-solve effectively with cross-functional teams by developing partnerships with teams such as Strategic Sourcing, Legal, Finance, IT, Operations to understand, influence and obtain support to achieve objectives. Project management skills to manage data analytics projects that require frequent communication, organization and time management. Successful track record in discerning when and how to escalate and issue for resolution. Excellent communication and presentation skills with the ability to convey complex data findings and data-driven solutions to both technical and nontechnical stakeholders, the capability to create compelling presentations and reports, and to lead meetings. Attention to detail to ensure accuracy and completeness in reporting. Familiarity with relevant regulatory and industry requirements. Other functional experience particularly in IT, business strategy, business analysis or finance is an advantage 3+ years' experience using an ERP system, using data visualization tools, and administering Sharepoint sites. Familiarity with analytics capabilities built into procurement-specific software, such as Oracle Fusion. Prefer experience in one or more of the following: ServiceNow, Archer, Apptio, Power BI, and/or Tableau. Advanced knowledge of Microsoft Office products and applications (Excel, PowerPoint, Word, Visio, etc.) [Preferred] Procurement or Sourcing Professional Certification or in Data Analytics 3+ years preferred experience in procurement roles involving strategic sourcing, procure-to-pay, supplier performance measurement, or in supply chain management roles. 3+ years of experience working cross functionally with tech and non-tech teams 2+ years preferred in project management office, and/or developing, implementing, and evaluating new and revised methods, procedures, and performance standards. 3+ years preferred experience in the financial services industry. Bachelor's degree in business management, supply chain, data science, information technology or a related field, ORan equivalent combination of experience, skills, training and education. Optional: Certifications in data science, business analytics, or supply chain are beneficial.
09/01/2025
Full time
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Company is currently seeking a Strategic Sourcing Data Analytics Analyst. Candidate will play a crucial role in developing quantitative methods to govern the procurement process. This includes designing a scorecard for the Strategic Sourcing function, creating and maintaining reports for managing procurement activities, and designing processes for intake and resource allocation. This role offers extensive collaboration opportunities with cross-functional teams. By working closely with Strategic Sourcing, IT, Finance, Legal, PMO, Data Governance and Operations, you can represent the department across the company and drive data-driven decision-making for Strategic Sourcing. Responsibilities: Implement processes to collect, manage and analyze procurement data, ensuring the organization has the necessary infrastructure for effective data-driven decision making. Oversee KPIs and metrics that measure performance of the Strategic Sourcing function. Prepare regular reports for internal and external stakeholders. Generate and communicate regular performance and resource allocation reports that translate procurement process data into actionable insights for internal teams and external stakeholders. Represent the Strategic Sourcing function by thoroughly assessing and validating all new intake requests, incorporating feedback from diverse stakeholders and customers. Exercise strong judgment to determine the most suitable approach for each project and engage the necessary stakeholders for productive discussions. Maintain a deep understanding of the department scope and sourcing strategies to navigate ambiguous situations/requests and collaborate with the appropriate stakeholders to solve challenges. Integrate data and resulting insights into procurement processes: Collaborate with procurement team and IT to embed analytics tools into the procurement workflow (such as for spend analysis and forecasting, savings analysis, supplier information gathering and analysis for selection, pricing and contract analytics, benchmarking, compliance to sourcing strategies and bid analysis). Develop and delivertraining programs to empower procurement and cross-functional teams with the skills and knowledge needed to effectively utilize reports and tools, promoting a culture of data-driven decision-making. Liaise with IT on requirements and testing for dashboards and reports in various systems including Oracle, ServiceNow, Archer, Apptio, Power BI, Tableau and others Qualifications: . Strong understanding of business analytics with ample experience in procurement, IT contracts, and/or PMO. Knowledge of the sources of data that support the development and execution of sourcing strategies. Process analysis and improvement experience, with the ability to define and reinforce processes. Proven ability to collaborate and problem-solve effectively with cross-functional teams by developing partnerships with teams such as Strategic Sourcing, Legal, Finance, IT, Operations to understand, influence and obtain support to achieve objectives. Project management skills to manage data analytics projects that require frequent communication, organization and time management. Successful track record in discerning when and how to escalate and issue for resolution. Excellent communication and presentation skills with the ability to convey complex data findings and data-driven solutions to both technical and nontechnical stakeholders, the capability to create compelling presentations and reports, and to lead meetings. Attention to detail to ensure accuracy and completeness in reporting. Familiarity with relevant regulatory and industry requirements. Other functional experience particularly in IT, business strategy, business analysis or finance is an advantage 3+ years' experience using an ERP system, using data visualization tools, and administering Sharepoint sites. Familiarity with analytics capabilities built into procurement-specific software, such as Oracle Fusion. Prefer experience in one or more of the following: ServiceNow, Archer, Apptio, Power BI, and/or Tableau. Advanced knowledge of Microsoft Office products and applications (Excel, PowerPoint, Word, Visio, etc.) [Preferred] Procurement or Sourcing Professional Certification or in Data Analytics 3+ years preferred experience in procurement roles involving strategic sourcing, procure-to-pay, supplier performance measurement, or in supply chain management roles. 3+ years of experience working cross functionally with tech and non-tech teams 2+ years preferred in project management office, and/or developing, implementing, and evaluating new and revised methods, procedures, and performance standards. 3+ years preferred experience in the financial services industry. Bachelor's degree in business management, supply chain, data science, information technology or a related field, ORan equivalent combination of experience, skills, training and education. Optional: Certifications in data science, business analytics, or supply chain are beneficial.
NUCLEAR SAFETY HAZOP CHAIR NEW CONTRACT OPPORTUNITY AVAILABLE FOR A NUCLEAR SAFETY HAZOP CHAIR OFFICER IN THE NUCLEAR SECTOR Contract opportunity for an experienced Nuclear Safety HAZOP Chair to join a globally leading company. Mostly remote role with infrequent travel to Devonport Candidates must have active SC Clearance Up to £525 per day - Inside IR35 To apply please email (see below) or call WHAT WILL THE NUCLEAR SAFETY HAZOP CHAIR OFFICER BE DOING? Lead HAZOP Studies: Organize and facilitate HAZOP sessions, guiding teams through the identification and evaluation of hazards and operability issues related to nuclear operations. Team Coordination: Collaborate with engineers, safety analysts, and other stakeholders to gather relevant data and ensure thorough assessments. Documentation: Prepare and review comprehensive reports summarizing HAZOP findings, recommendations, and action items, ensuring compliance with regulatory standards. Risk Analysis: Conduct risk assessments based on HAZOP findings, helping to prioritize safety measures and mitigation strategies. Training and Mentorship: Provide training and mentorship to team members on HAZOP methodologies and safety practices. Regulatory Compliance: Ensure that all HAZOP studies meet local and international nuclear safety regulations and standards. Continuous Improvement: Stay updated on industry best practices and contribute to the continuous improvement of safety protocols and procedures. THE NUCLEAR SAFETY HAZOP CHAIR OFFICER SHOULD HAVE EXPERIENCE WITH: Experience in nuclear safety, risk assessment, or related fields, with specific experience in leading HAZOP studies. Certifications: Relevant certifications in safety management or risk assessment (eg, HAZOP, ISO 31000) are highly desirable. Technical Skills: Strong understanding of nuclear safety principles, HAZOP methodology, and risk management practices. Excellent verbal and written communication skills, with the ability to present complex information clearly to diverse audiences. Proven ability to lead and motivate cross-functional teams in high-stakes environments. DUE TO THE NATURE OF THIS POSITION, WE REQUIRE YOU TO HAVE ACTIVE SC CLEARANCE. TO BE CONSIDERED . Please either apply by clicking online or emailing me directly to (see below) If unavailable, please leave a message and either myself or one of my colleagues will respond. By applying for this role, you give express consent for us to process & submit (subject to required skills) your application to our client in conjunction with this vacancy only. I look forward to hearing from you. NUCLEAR SAFETY HAZOP CHAIR KEY SKILLS: NUCLEAR SAFETY/HAZOP/CHAIR/SAFETY/LEADERSHIP/NUCLEAR/NATIONAL SECURITY/CLEARANCE/SECURITY CLEARED/SECURITY CLEARANCE/NSD/DEFENCE
08/01/2025
Project-based
NUCLEAR SAFETY HAZOP CHAIR NEW CONTRACT OPPORTUNITY AVAILABLE FOR A NUCLEAR SAFETY HAZOP CHAIR OFFICER IN THE NUCLEAR SECTOR Contract opportunity for an experienced Nuclear Safety HAZOP Chair to join a globally leading company. Mostly remote role with infrequent travel to Devonport Candidates must have active SC Clearance Up to £525 per day - Inside IR35 To apply please email (see below) or call WHAT WILL THE NUCLEAR SAFETY HAZOP CHAIR OFFICER BE DOING? Lead HAZOP Studies: Organize and facilitate HAZOP sessions, guiding teams through the identification and evaluation of hazards and operability issues related to nuclear operations. Team Coordination: Collaborate with engineers, safety analysts, and other stakeholders to gather relevant data and ensure thorough assessments. Documentation: Prepare and review comprehensive reports summarizing HAZOP findings, recommendations, and action items, ensuring compliance with regulatory standards. Risk Analysis: Conduct risk assessments based on HAZOP findings, helping to prioritize safety measures and mitigation strategies. Training and Mentorship: Provide training and mentorship to team members on HAZOP methodologies and safety practices. Regulatory Compliance: Ensure that all HAZOP studies meet local and international nuclear safety regulations and standards. Continuous Improvement: Stay updated on industry best practices and contribute to the continuous improvement of safety protocols and procedures. THE NUCLEAR SAFETY HAZOP CHAIR OFFICER SHOULD HAVE EXPERIENCE WITH: Experience in nuclear safety, risk assessment, or related fields, with specific experience in leading HAZOP studies. Certifications: Relevant certifications in safety management or risk assessment (eg, HAZOP, ISO 31000) are highly desirable. Technical Skills: Strong understanding of nuclear safety principles, HAZOP methodology, and risk management practices. Excellent verbal and written communication skills, with the ability to present complex information clearly to diverse audiences. Proven ability to lead and motivate cross-functional teams in high-stakes environments. DUE TO THE NATURE OF THIS POSITION, WE REQUIRE YOU TO HAVE ACTIVE SC CLEARANCE. TO BE CONSIDERED . Please either apply by clicking online or emailing me directly to (see below) If unavailable, please leave a message and either myself or one of my colleagues will respond. By applying for this role, you give express consent for us to process & submit (subject to required skills) your application to our client in conjunction with this vacancy only. I look forward to hearing from you. NUCLEAR SAFETY HAZOP CHAIR KEY SKILLS: NUCLEAR SAFETY/HAZOP/CHAIR/SAFETY/LEADERSHIP/NUCLEAR/NATIONAL SECURITY/CLEARANCE/SECURITY CLEARED/SECURITY CLEARANCE/NSD/DEFENCE
Lead Research Analyst Railway | Transport £60,000 - £70,000 + Bonus and a very strong benefits package London | 2 days in the office - potential flex on this The Company: I'm currently working with a major player within the railway space that lead the industry's drive for innovation. They plays a key role in ensuring safety and improving performance across the UK railway network. The business collaborates with various stakeholders to develop and implement standards, facilitate research, and promote best practices. Operating as a non-profit, it provides guidance, tools, and resources to support safe and efficient operations, focusing on continuous improvement and innovation within the industry. They are looking for an experienced research analyst to join the business as the team continues to grow - This is a great opportunity to work with research that makes a tangible difference to the rail industry and you can really see and shape how things operate. As Lead Research Analyst you will: You will lead the reviews and assessments of research requests and cases and further develop and evaluate the case for research Utilise industry knowledge to work closely with internal stakeholders and Project Managers to review and steer the research Lead and contribute to shaping the overall strategy for evaluating, prioritising, and structuring research, while regularly reviewing processes, tools, and methods to ensure they remain effective, adaptable, and consistently applied Work with the senior research management team to identify opportunities to improve and update processes In this role you will be responsible for managing a team of 3 research analysts Requirements: 5 + years of research experience Experience working within the transport sector - ideally railway Experience leading a team Skilled in collecting, organising, and analysing both qualitative and quantitative data Experience in designing research frameworks, evaluating anticipated and actual benefits, and facilitating the transition from research completion to benefit realisation Has stakeholder manger experience If you're interested in this Lead Research Analyst opportunity please apply below *Rates depend on experience and client requirements
08/01/2025
Full time
Lead Research Analyst Railway | Transport £60,000 - £70,000 + Bonus and a very strong benefits package London | 2 days in the office - potential flex on this The Company: I'm currently working with a major player within the railway space that lead the industry's drive for innovation. They plays a key role in ensuring safety and improving performance across the UK railway network. The business collaborates with various stakeholders to develop and implement standards, facilitate research, and promote best practices. Operating as a non-profit, it provides guidance, tools, and resources to support safe and efficient operations, focusing on continuous improvement and innovation within the industry. They are looking for an experienced research analyst to join the business as the team continues to grow - This is a great opportunity to work with research that makes a tangible difference to the rail industry and you can really see and shape how things operate. As Lead Research Analyst you will: You will lead the reviews and assessments of research requests and cases and further develop and evaluate the case for research Utilise industry knowledge to work closely with internal stakeholders and Project Managers to review and steer the research Lead and contribute to shaping the overall strategy for evaluating, prioritising, and structuring research, while regularly reviewing processes, tools, and methods to ensure they remain effective, adaptable, and consistently applied Work with the senior research management team to identify opportunities to improve and update processes In this role you will be responsible for managing a team of 3 research analysts Requirements: 5 + years of research experience Experience working within the transport sector - ideally railway Experience leading a team Skilled in collecting, organising, and analysing both qualitative and quantitative data Experience in designing research frameworks, evaluating anticipated and actual benefits, and facilitating the transition from research completion to benefit realisation Has stakeholder manger experience If you're interested in this Lead Research Analyst opportunity please apply below *Rates depend on experience and client requirements