Skip to content

JobNet: Jobs for Technical People

 

Job Application

 
 
 

Please answer the following questions in order to process your application.

 
 
Email Address *
 
Select your working status in the UK *
 
 
 
File Attachments:
(2MB file maximum. doc, docx, pdf, rtf or txt files only)
 
Attach a CV * 
 
Optional covering letter 
OR
Clear covering letter
 
 
 * denotes required field
 
 
 
Additional Information:
 
First Name
 
Last Name
 
Address
 
Country
 
Home Telephone
 
Mobile/Cell
 
Availability/Notice
 
Hourly Rate GBP
 
Approximately how far are you willing to travel to work (in miles) ?
 
 
 

Key Privacy Information

When you apply for a job, JobNet will collect the information you provide in the application and disclose it to the advertiser of the job.

If the advertiser wishes to contact you they have agreed to use your information following data protection law.

JobNet will keep a copy of the application for 90 days.

More information about our Privacy Policy.

 

Job Details

 

IT Cyber Security Consultant - London (Contract)

Location: London Country: UK Rate: £550 - £600 per day
 

IT Cyber Security Consultant - London
Outside IR35
Initial 6 months contract
Stott and May are seeking a highly skilled IT Security Consultant to join one of our Banking Clients.
The role sits within the IT Security Team, with 100% assignment to projects, and is responsible for protecting the Confidentiality, Integrity, and Availability of the Bank's information assets.

You will have:
Demonstrable experience in conducting security assessments and threat identification, mitigation, and remediation.
Ability to guide projects to apply appropriate security standards and policies.
Deep technical understanding of network security, security configuration and best practices for infrastructure services including Firewalls and penetration testing scoping.
Working knowledge of technologies and tools involved in infrastructure-as-code utilising tools such as: PowerShell, Terraform, Ansible, Azure DevOps
Working knowledge of technologies and tools to drive observability and infrastructure insight (monitoring/telemetry/logging)
Working knowledge of application security and development principles
Expert knowledge of IDAM security controls and tooling
Deep understanding of tooling integration/API management
Expert understanding of CISCO ISE and Secure Network Analytics
Good technical knowledge of the following is desirable: data encryption, data leakage controls, application integration, identity and access management, certificate management and database security.
Technical experience of some of the following applications: Security auditing tools, AV, Firewalls, Proxy, SIEM, PAM.
Ethical hacking background is advantageous.
Develop and maintain security policies that define how network resources can be accessed based on user identities, device attributes, and contextual information.
Collaborate with security analysts to investigate and respond to security incidents and breaches related to access control and network segmentation.
Investigate alerts and anomalies, working alongside the security team to mitigate threats and vulnerabilities.
Contribute to the development of incident response plans and playbooks
Generate regular reports on network security incidents, threat trends, and performance analysis.
Communicate findings and insights to technical and non-technical stakeholders.
Experience with Checkpoint technologies.

Sound good?
APPLY NOW!


Posted Date: 22 Apr 2024 Reference: JS-BBBH68767 Employment Business: Stott and May Contact: Jamie Stewart