This job is no longer available.
You can view related vacancies or set-up an email alert notification when similar jobs are added to the website using the buttons below.

Cyber Security Analyst

18/10/18/2_1539848457
Up to £45000 per annum

Managing this Role

image

Charlee Ryman

Consultant - Cyber Specialist 0207 759 7878

Spending seven years in the Royal Navy as a warfare technician, Charlee uses his comprehensive military network and his deep technical expertise to quickly pinpoint the best cyber security professionals for leading employers of all shapes and sizes.

 

Roles recruited: SOC managers/analysts and cyber security analysts/consultants

Seniority: Junior-Senior

Job Type: Permanent

Geographical coverage: London

Market: Cyber security operations within MSSPs

This is your chance to secure my clients EMEA network and infrastructure. You will carry out vulnerability assessments and use a wide array of tools to gather security event data, looking for attack indicators and potential security breaches. You will have exposure to Threat Analysis and Intelligence to further protect my client's security infrastructure.

Role:

  • Work across a range of technologies (IAM, PAM, DLP, CASB, IDS/IPS, AV);
  • Configuration management of SIEM
  • PAM (Privileged Account Management)
  • IAM (Identity Access Management)
  • Monitor and report on performance to highlight improvements to security practices & processes
  • Analyse vulnerability scans and manage patch processes
  • Conduct risk assessments and report on the results for business critical applications
  • The candidate will be required to work with SOC Service Providers to ensure a higher level of security.
  • Maintain an awareness of current and emerging threats to the organisation and be able to suggest ways that they can be addressed
  • Provide monthly Periodic Reports
  • Ensure that IT incidents, problems, service and change requests are completed within business agreed Service Level Management Frameworks
  • Ensure on-going Security and Network compliance in accordance
  • Perform security administration tasks.
  • Investigate, analyse and resolve any security issues/concerns.
  • Perform regular reviews and audits of systems, system logs, security logs and account management to ensure compliance with Policies and SOPs.
  • Notify ICT Business Solutions management of any security related incidents.
  • Maintain all network and security diagrams, inventories and documentation.
  • Use Problem Management tools and techniques to identify the root cause of problems and select appropriate means of resolution.
  • Monitor resolution of problems to ensure that Operating Level Agreements (OLA's) are met and escalate to the Technical Support Manager when this is not the case.
  • Provide customer focused IT support to the region, ensuring the delivery of high quality IT operational services

Tools used:

  • Security Analysis, trouble-shooting and Monitoring Utilities
  • IT Service Management Tool.
  • Microsoft Office.
  • Microsoft Project/Visio.
  • Microsoft Sever
  • MCAS, Azure Data Loss prevention, Azure Active Directory, AD Audit, Thycotic, DarkTrace, MimeCast and SIEM tools & FIM tools (Beneficial)
  • Cisco Prime,

This is a unique opportunity to be apart of my clients ever growing security function. If you think you have the skills needed for this opportunity then do not hesitate to apply!

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.


This job has now been filled but you may be interested in:

 

IAM Specialist

Do you want to join an award winning FinTech team that is challenging the way the world pays!? We are looking for an IAM Specialist/Developer who is proficient in using Java Script.

Our client has an important mission to change and connect the world. They value their teams and the tens of thousands of people that work for them by striving to make every effort to accommodate for every individuals needs.

The Role

  • You'll work with and take direction from IAM Security Architects to help achieve the goals of the Security Architecture and IAM Programs.
  • Design and will assist with the implementation and optimization of Identity and Access Management solutions for systems and infrastructure used by internal staff.
  • Review and evaluate solutions for enterprise and business use.
  • You'll be working on an array of technologies that may include:
  • Web Access Management using standard solutions such as CA SSO/SiteMinder, Oracle Access Manager, ForgeRock, etc.
  • Single Sign-on and Federation using standard protocols and frameworks such as Kerberos, SPNEGO, SAML 2.0, ADFS, OpenID Connect, etc.
  • Privileged Access Management using solutions such as CA PAM/Xceedium Gatekeeper, BeyondTrust PowerBroker, Dell Privilege Manager, Managed sudo, etc.
  • Two-Factor Authentication
  • Familiar with modern deployment - Docker, Mesos
  • Strong technical competency and experience in the IAM domain
  • Gained good experience as a solid hands-on programmer/developer with specialization in Java and J2EE. Bean Shell, knowledge of SailPoint Java Objects exposed through application
  • Gained solid experience in developing and customising any of the IAM solutions such as Sailpoint IIQ, OIM, TIM, Forgerock, etc...
  • Strong experience in IT Security/IAM and thereby able to demonstrate a high level of technical ability in implementation and design of the IAM solutions
  • Database: SQL (Strong SQL Skills)
  • Experience with LDAP and AD
  • Experience with Unix Systems (Solaris, AIX, Linux)
  • Experience with web technologies: XML, SPML, SOAP, REST, HTML, Web and Application Servers.

If you want to be apart of a team who can fund and develop your ideas and provide you with industry recognised training then apply now!

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.

Senior Security Architect

Are you looking for a position of importance? My client is looking for a Senior Security Architect to help provide resilience across their Cyber teams to ensure they maintain operational capability in the current security landscape.

This role you will be reporting to the Director of Security Architecture and Engineering and you will be responsible for the growth and management of my client's architecture enterprise. You will use your expertise to help support the Architecture goals of the business.

The Role

  • You will work in close proximity to other security teams to help establish system boundaries and weaknesses, current or potential risks and their impact.
  • Ensure principles that support the current life Cycle
  • Support the development of risk management processes and program protection planning
  • Implement service management concepts for networks and related
  • Apply the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise information technology
  • Develop and apply cyber security, privacy principles, and organizational requirements.
  • Develop cross domain solutions for multi-level security systems that support confidentiality, integrity, and availability requirements.
  • Collaborate in the development of cloud service models and effectively communicate possible limitations for an incident response Network Security
  • Apply network security architecture concepts including topology, protocols, components, and principles
  • Collaborate with the appropriate entities to determine how a security system should work and how changes in conditions, operations, or the environment will affect these outcomes
  • Assist in the development of network design processes, to include communication of security objectives, with consideration to operational objectives, and trade-offs.
  • Perform capabilities and requirements analysis.
  • Develop information security rules and enterprise security requirements that describe baseline and target architectures.
  • Translate operational requirements into protection needs
  • Determine and communicate cyber threats and vulnerabilities, and any operational impacts of cyber security lapses
  • Implement vulnerability assessment tools
  • Apply Personally Identifiable Information data security standards in accordance with laws, regulations, policies, and ethics as they relate to cyber security and privacy.

This is a unique opportunity to be apart of a global organisation and help implement changes that will secure the future of not only the Architecture team but of the entire enterprise. If this sounds like you apply now!

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.