This job is no longer available.
You can view related vacancies or set-up an email alert notification when similar jobs are added to the website using the buttons below.

Information Security Analyst - CONTRACT

jk2405_1527155689
Negotiable
UK

Managing this Role

image

Josh Keeley

Manager - Cyber Specialist 0207 759 7878

With six years’ experience as an IT engineer within the Royal Marines, Josh has a strong network of ex-services CTI analysts and CCTIM qualified managers. Bringing sound technical knowledge and in-depth market expertise, Josh works with consultancies, defence, MSSPs and TIPs; from rapidly-growing start-ups to established global enterprises.

 

Roles recruited: CTI analysts, CCTIM managers

Seniority: Junior-Senior

Job Type: Permanent

Geographical coverage: London

Market: Cyber threat intelligence, TIP’s and Professional Services

Information Security Analyst - Contract

12 month contract - Hertfordshire

We have been tasked by a world leading pharmaceutical organisation to search for an experienced Information Security Analyst on a 12 month contract to start immediately. You will work alongside senior management in helping them achieve ISO 27001 status, continue with GDPR compliance and implement internal procedures/processes.

Experience required:

  • A minimum of 3 years' experience in an IT Governance, Risk and Compliance based role.
  • Experience of information security management and/or security awareness.
  • Good understanding and application of data classification standards.
  • Experience of working to, implementing and maintaining compliance with ISO/IEC-27001 and other relevant frameworks.
  • Knowledge & experience of developing and conducting risk assessments/business impact assessments.
  • Knowledge & experience of developing and performing information security due diligence assessments of third party organisations based on IT control frameworks such as ISO 27001.
  • Practical experience of developing and executing remediation plans to address vulnerabilities/security risks and to achieve compliance with Information Security standards/IT control frameworks such as ISO 27001.
  • Experience of audit work to achieve compliance with Information Security standards.
  • Experience in implementing and managing effective ISMS tools for Data Loss Prevention (DLP).
  • Experience of implementing and operating Security Information and Event Management (SIEM) tools.
  • Experience of working with external service providers within an Information Security role.
  • Stakeholder management experience to Executive level.

.

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.


This job has now been filled but you may be interested in:

 

Cyber Security Analyst

Cyber Security Analyst 30-35k

We have partnered up with a UK, top 60, Law firm that are looking to increase their Cyber Security functions. You will utilise your security credentials as you will monitor for security issues, carry out incident investigations as well as liaising with third-parties and colleagues to assure good security practices are implemented. You will be reporting to the IT Security and Development Manager.

The main responsibilities include, but are not limited to:

  • Undertaking monthly and ad-hoc scanning of the entire network using agreed tools to ensure a secure and supported environment is maintained and providing reports on the results to the IT Security and Development Manager.
  • Undertaking/organising with other teams, any remedial work identified as necessary arising from the results of the network scanning.
  • Monitoring the firm's network to identify any policy violations and/or security breaches that need to be resolved.
  • Deliver a timely and proportionate response to any such breaches with the assistance of the relevant members of the IT team.
  • Maintaining appropriate records of any data/security breaches and remedial action taken
  • Escalate to the IT Security and Development Manager and Head of IT any major or ongoing problems that might affect business operations.
  • Adhere to Incident, Problem, Request, Configuration and Change Management procedures.
  • Utilizing software, such as firewalls and data encryption programs, to help protect the company's data and sensitive information.
  • Preparing regular reports to document any process implementation, improvements made, and security breaches that caused damage to the company.
  • Keeping policies and procedures up to date and compliant with appropriate legislation.

If this sounds like something you could help go ahead and apply now!

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.

IAM Specialist

Do you want to join an award winning FinTech team that is challenging the way the world pays!? We are looking for an IAM Specialist/Developer who is proficient in using Java Script.

Our client has an important mission to change and connect the world. They value their teams and the tens of thousands of people that work for them by striving to make every effort to accommodate for every individuals needs.

The Role

  • You'll work with and take direction from IAM Security Architects to help achieve the goals of the Security Architecture and IAM Programs.
  • Design and will assist with the implementation and optimization of Identity and Access Management solutions for systems and infrastructure used by internal staff.
  • Review and evaluate solutions for enterprise and business use.
  • You'll be working on an array of technologies that may include:
  • Web Access Management using standard solutions such as CA SSO/SiteMinder, Oracle Access Manager, ForgeRock, etc.
  • Single Sign-on and Federation using standard protocols and frameworks such as Kerberos, SPNEGO, SAML 2.0, ADFS, OpenID Connect, etc.
  • Privileged Access Management using solutions such as CA PAM/Xceedium Gatekeeper, BeyondTrust PowerBroker, Dell Privilege Manager, Managed sudo, etc.
  • Two-Factor Authentication
  • Familiar with modern deployment - Docker, Mesos
  • Strong technical competency and experience in the IAM domain
  • Gained good experience as a solid hands-on programmer/developer with specialization in Java and J2EE. Bean Shell, knowledge of SailPoint Java Objects exposed through application
  • Gained solid experience in developing and customising any of the IAM solutions such as Sailpoint IIQ, OIM, TIM, Forgerock, etc...
  • Strong experience in IT Security/IAM and thereby able to demonstrate a high level of technical ability in implementation and design of the IAM solutions
  • Database: SQL (Strong SQL Skills)
  • Experience with LDAP and AD
  • Experience with Unix Systems (Solaris, AIX, Linux)
  • Experience with web technologies: XML, SPML, SOAP, REST, HTML, Web and Application Servers.

If you want to be apart of a team who can fund and develop your ideas and provide you with industry recognised training then apply now!

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.

Senior Security Architect

Are you looking for a position of importance? My client is looking for a Senior Security Architect to help provide resilience across their Cyber teams to ensure they maintain operational capability in the current security landscape.

This role you will be reporting to the Director of Security Architecture and Engineering and you will be responsible for the growth and management of my client's architecture enterprise. You will use your expertise to help support the Architecture goals of the business.

The Role

  • You will work in close proximity to other security teams to help establish system boundaries and weaknesses, current or potential risks and their impact.
  • Ensure principles that support the current life Cycle
  • Support the development of risk management processes and program protection planning
  • Implement service management concepts for networks and related
  • Apply the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise information technology
  • Develop and apply cyber security, privacy principles, and organizational requirements.
  • Develop cross domain solutions for multi-level security systems that support confidentiality, integrity, and availability requirements.
  • Collaborate in the development of cloud service models and effectively communicate possible limitations for an incident response Network Security
  • Apply network security architecture concepts including topology, protocols, components, and principles
  • Collaborate with the appropriate entities to determine how a security system should work and how changes in conditions, operations, or the environment will affect these outcomes
  • Assist in the development of network design processes, to include communication of security objectives, with consideration to operational objectives, and trade-offs.
  • Perform capabilities and requirements analysis.
  • Develop information security rules and enterprise security requirements that describe baseline and target architectures.
  • Translate operational requirements into protection needs
  • Determine and communicate cyber threats and vulnerabilities, and any operational impacts of cyber security lapses
  • Implement vulnerability assessment tools
  • Apply Personally Identifiable Information data security standards in accordance with laws, regulations, policies, and ethics as they relate to cyber security and privacy.

This is a unique opportunity to be apart of a global organisation and help implement changes that will secure the future of not only the Architecture team but of the entire enterprise. If this sounds like you apply now!

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.