This job is no longer available.
You can view related vacancies or set-up an email alert notification when similar jobs are added to the website using the buttons below.

IT Security Analyst - £45k-£55k - London

13307_1531500297
£45000 - £55000 per annum

Managing this Role

image

Josh Keeley

Manager - Cyber Specialist 0207 759 7878

With six years’ experience as an IT engineer within the Royal Marines, Josh has a strong network of ex-services CTI analysts and CCTIM qualified managers. Bringing sound technical knowledge and in-depth market expertise, Josh works with consultancies, defence, MSSPs and TIPs; from rapidly-growing start-ups to established global enterprises.

 

Roles recruited: CTI analysts, CCTIM managers

Seniority: Junior-Senior

Job Type: Permanent

Geographical coverage: London

Market: Cyber threat intelligence, TIP’s and Professional Services

IT Security Analyst - £55k - London

We have partnered with a global financial services firm to hire an IT Security Analyst. You will work alongside the Security Manager working Recommends process improvements for departmental and business unit processes and procedures to improve internal controls and mitigation strategies.

Responsibilities

  • Represent the business unit in development of policies and standards.
  • Supports ongoing risk and control consulting activities for assigned area of responsibility in accordance with internal standards, relevant government statutes and regulations.
  • Partners with colleagues, clients and control community members to evaluate the control environment and develop recommendations to strengthen internal controls and mitigation strategies.
  • Develops policies and procedures as part of the Information Security Framework.
  • Develops and maintains an in-depth understanding of business areas, its products, and supporting functions.
  • Coordinating contractors, employees, and vendors in conducting assessments, testing controls, and implementing remediation.
  • Assessing supplier security based on a review of site reports, SOC, and SSAE documentation.
  • Maintain vendor records, documentation, and design improvements.
  • Follows established vendor risk assessment processes at the direction of the IT GRC Manager.
  • Co-ordinates Vendor Risk Assessments with the appropriate team.

Skills

  • Bachelor of Science in Computer Science, Management Information System and/or other related degree/qualification.
  • Relative experience in Information Security, risk management and audit or an equivalent combination of education, training and experience.
  • Excellent verbal and written communication skills.
  • Previous experience in the financial services industry is a definite asset; Security and Control certifications (CISSP, CISM, CISA, CRISC and CTPRP).
  • Translating business drivers and priorities into security design.
  • Knowledge of government and other regulations related to Information Security Controls (examples - ISO, NIST, COBIT);

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.


This job has now been filled but you may be interested in:

 

IAM Specialist

Do you want to join an award winning FinTech team that is challenging the way the world pays!? We are looking for an IAM Specialist/Developer who is proficient in using Java Script.

Our client has an important mission to change and connect the world. They value their teams and the tens of thousands of people that work for them by striving to make every effort to accommodate for every individuals needs.

The Role

  • You'll work with and take direction from IAM Security Architects to help achieve the goals of the Security Architecture and IAM Programs.
  • Design and will assist with the implementation and optimization of Identity and Access Management solutions for systems and infrastructure used by internal staff.
  • Review and evaluate solutions for enterprise and business use.
  • You'll be working on an array of technologies that may include:
  • Web Access Management using standard solutions such as CA SSO/SiteMinder, Oracle Access Manager, ForgeRock, etc.
  • Single Sign-on and Federation using standard protocols and frameworks such as Kerberos, SPNEGO, SAML 2.0, ADFS, OpenID Connect, etc.
  • Privileged Access Management using solutions such as CA PAM/Xceedium Gatekeeper, BeyondTrust PowerBroker, Dell Privilege Manager, Managed sudo, etc.
  • Two-Factor Authentication
  • Familiar with modern deployment - Docker, Mesos
  • Strong technical competency and experience in the IAM domain
  • Gained good experience as a solid hands-on programmer/developer with specialization in Java and J2EE. Bean Shell, knowledge of SailPoint Java Objects exposed through application
  • Gained solid experience in developing and customising any of the IAM solutions such as Sailpoint IIQ, OIM, TIM, Forgerock, etc...
  • Strong experience in IT Security/IAM and thereby able to demonstrate a high level of technical ability in implementation and design of the IAM solutions
  • Database: SQL (Strong SQL Skills)
  • Experience with LDAP and AD
  • Experience with Unix Systems (Solaris, AIX, Linux)
  • Experience with web technologies: XML, SPML, SOAP, REST, HTML, Web and Application Servers.

If you want to be apart of a team who can fund and develop your ideas and provide you with industry recognised training then apply now!

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.

Senior Security Architect

Are you looking for a position of importance? My client is looking for a Senior Security Architect to help provide resilience across their Cyber teams to ensure they maintain operational capability in the current security landscape.

This role you will be reporting to the Director of Security Architecture and Engineering and you will be responsible for the growth and management of my client's architecture enterprise. You will use your expertise to help support the Architecture goals of the business.

The Role

  • You will work in close proximity to other security teams to help establish system boundaries and weaknesses, current or potential risks and their impact.
  • Ensure principles that support the current life Cycle
  • Support the development of risk management processes and program protection planning
  • Implement service management concepts for networks and related
  • Apply the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise information technology
  • Develop and apply cyber security, privacy principles, and organizational requirements.
  • Develop cross domain solutions for multi-level security systems that support confidentiality, integrity, and availability requirements.
  • Collaborate in the development of cloud service models and effectively communicate possible limitations for an incident response Network Security
  • Apply network security architecture concepts including topology, protocols, components, and principles
  • Collaborate with the appropriate entities to determine how a security system should work and how changes in conditions, operations, or the environment will affect these outcomes
  • Assist in the development of network design processes, to include communication of security objectives, with consideration to operational objectives, and trade-offs.
  • Perform capabilities and requirements analysis.
  • Develop information security rules and enterprise security requirements that describe baseline and target architectures.
  • Translate operational requirements into protection needs
  • Determine and communicate cyber threats and vulnerabilities, and any operational impacts of cyber security lapses
  • Implement vulnerability assessment tools
  • Apply Personally Identifiable Information data security standards in accordance with laws, regulations, policies, and ethics as they relate to cyber security and privacy.

This is a unique opportunity to be apart of a global organisation and help implement changes that will secure the future of not only the Architecture team but of the entire enterprise. If this sounds like you apply now!

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.