This job is no longer available.
You can view related vacancies or set-up an email alert notification when similar jobs are added to the website using the buttons below.

Security Architect - IAM - FinTech

jk09011_1541787386
£70000 - £80000 per annum

Managing this Role

image

Josh Keeley

Manager - Cyber Specialist 0207 759 7878

With six years’ experience as an IT engineer within the Royal Marines, Josh has a strong network of ex-services CTI analysts and CCTIM qualified managers. Bringing sound technical knowledge and in-depth market expertise, Josh works with consultancies, defence, MSSPs and TIPs; from rapidly-growing start-ups to established global enterprises.

 

Roles recruited: CTI analysts, CCTIM managers

Seniority: Junior-Senior

Job Type: Permanent

Geographical coverage: London

Market: Cyber threat intelligence, TIP’s and Professional Services

Do you want to join an incredible FinTech team that is challenging the way the world pays!?

Our client has an important mission to change and connect the world. They value their teams and the tens of thousands of people that work for them by striving to make every effort to accommodate for every individuals needs.

Do you want to be apart of a top tier Security Architecture Team who live and breath Cyber Security. Without Cyber Security they would not be one of the leading financial giants today.

You will have the use of the latest tools and given every opportunity for self-development. As Security Architect, you will be working with a wide range of clients and professionals learning and growing everyday.

The Role

  • You'll work with your team of IAM Security Architects to help achieve the goals of the Security Architecture and IAM Programs.
  • Design and will assist with the implementation and optimization of Identity and Access Management solutions for systems and infrastructure used by internal staff.
  • Review and evaluate solutions for enterprise and business use.
  • You'll be working on an array of technologies that may include:
  • Web Access Management using standard solutions such as CA SSO/SiteMinder, Oracle Access Manager, ForgeRock, etc.
  • Single Sign-on and Federation using standard protocols and frameworks such as Kerberos, SPNEGO, SAML 2.0, ADFS, OpenID Connect, etc.
  • Privileged Access Management using solutions such as CA PAM/Xceedium Gatekeeper, BeyondTrust PowerBroker, Dell Privilege Manager, Managed sudo, etc.
  • Two-Factor Authentication
  • Adaptive Authentication
  • Device Authentication & Profiling
  • Identity Management (hiring, vetting, digital identity, lifecycle management)
  • Access Management (requesting, automated provisioning, de-provisioning, reconciliation, certification, etc.)
  • Public and Private Cloud IAM
  • Familiar with modern deployment - Docker, Mesos

If you want to be apart of a team who can fund and develop your ideas and provide you with industry recognised training then apply now!

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.


This job has now been filled but you may be interested in:

 

Palo Alto Engineer

 

Are you an experienced Palo Alto engineer looking to help drive my client from being a Palo Gold Partner to a Paulo Platinum partner?

 

This role will enable you to use your entire skill set from Installation and configuration to low level and technical design whilst playing an integral part of the Engineering team. You will be a passionate individual who is willing to help train other members of the team and to help keep my client on its impressive trajectory to success.

 

Job Role

  • Maintain the clients security devices and upgrade when necessary
  • Provide support to project managers on security deployments
  • Suggest and details design changes as and when needed
  • Documentation for the customers installations and provide continue service advice
  • Pro-actively review and maintain client infrastructure
  • To be able to troubleshoot during emergency situations
  • Providing support for other members of the team
  • To provide pre-sales support and design rollout

 

 

Skill Set

  • PA Networks Certified Network Security Engineer 7-8 and CCNA certified
  • Palo Alto security installation and support
  • Data knowledge,routing and Networking protocols (BGP, OSPF and EIGRP, MPLS, VRF, SIP, Traffic Shaping / QoS)
  • Palo Alto and Cisco Command line
  • Familiarity with Data Centre environment and hosted deployments/cloud
  • Client Support both remotely and face to face
  • Wireshark experience or similar product
  • A high level of Palo Alto expertise in design, configuration, migrations, tuning and customization of features
  • Thorough knowledge of Panorama, WildFire, Global Protect, and other Palo Alto features including and not limited to SSL decryption

 

Desirable

  • Knowledge of Avaya and/or Mitel phone solutions
  • Experience of the Python programming language

 

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.

Cyber Threat Analyst

Blackthorn Trace have partnered with a global leading financial services industry who are building a Cyber Threat team across the UK, US and Canada. With the financial services industry constantly under attack by sophisticated cyber adversaries that range from nation states to criminals. In response, my client is adding a Cyber Threat Center associate, charged with ensuring all equities are secure against all tiers of adversaries. 

You will work within the central hub for Computer Operations and be on the front lines of security incident response, threat hunting, and intelligence. Hours - 6am – 2.30pm, 2 days per week from home.

Responsibilities

  • Act a senior member of the Cyber Threat Center who handles security events and incidents on a daily basis in a fast-paced environment.
  • Acts as an Incident Handler who can handle minor and major security incidents within the defined Computer Security Incident Response process.
  • Role embodies Cyber Network Defense and a successful Cyber Threat Analyst will be able to quickly analyze threats, understand risk, deploy effective countermeasures, make business critical incident response decisions, and work as part of a team of individuals dedicated to protecting the firm.
  • Maintains situational awareness for cyber threats across the global firm and take action where necessary.
  • Countermeasure deployment across various technologies.
  • Malware and exploit analysis.
  • Assessing alerts and notifications of event activity from intrusion detection systems and responding accordingly to the threat.
  • Continuing content development of threat detection and prevention systems.

 

Experience and Skills

  • Systems administrator experience in Linux, Unix, Windows or OSX operating systems.
  • Knowledge of networking and the common network protocols.
  • Demonstrated ability to create scripts, develop tools, or automate processes
  • Knowledge of vulnerabilities and a comfort in manipulating exploit code for analysis.
  • Demonstrated ability to perform static and dynamic malware analysis.
  • Demonstrated ability to analyze large data sets and identify anomalies.
  • Demonstrated ability to quickly create and deploy countermeasures under pressure.
  • Familiarity with NIST framework for incident handling.
  • Understand OSINT techniques.
  • Experience leading and managing IR investigations.

 

One or more of the following certifications or the ability to obtain within 1 year:

  • CISSP: Certified Information Systems Security Professional
  • CCNA: Cisco Certified Network Associate
  • SANS: GCIH – Incident Handler
  • SANS: GCIA – Intrusion Analyst
  • CREST: Certified Incident Manager