Reading, England, United Kingdom Hybrid / WFH Options
Vallum Associates
Job: Security Architect Location: Reading, UK, Hybrid Job Type: Permanent Job Description We are seeking a highly skilled and experienced Security Architect to join our team who will be responsible for development of the SecurityArchitecture that ensures the appropriate protection of all aspects of security, (people, process, electronic, data, physical) in Spring Fibre. • You will be a subject matter expert and provide security guidance and recommendations to technology/business teams and contribute to Spring’s security policies, standards, and guidelines related to information and Network security. • This is a technical role … and suitable for someone who has hands on experience in Cybersecurity. Responsibilities Help develop an Enterprise SecurityArchitecture Framework, including patterns for identity & authentication, authorization and access control, cryptographic key and certificate management, auditing and security monitoring, data leakage prevention, privacy enhancement & protection and other standards in more »
Required: Mapping long-term business requirements to securityarchitecture frameworks such as NIST, CIS, etc. Experience delivering Hybrid Cloud and Internet-facing applications with a strong focus on cyber security. Broad hands-on knowledge of firewalls, intrusion detection systems, data encryption, and other industry-standard techniques and practices. … Strong knowledge of IT infrastructure, IP networking, security best practices, and automation technologies. Application security: including but not limited to authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure code development methodologies. … Infrastructure security includes but is not limited to, network security, host security, database security, device security, VPNs and SSLs, secure file transfers, security event monitoring, malware security, and cyber security. Operational security: including but not limited to incident management, change and patch more »
SAP Security Lead Reading based - ideally hybrid. £70K + benefits My client, a leading global manufacturer based in Reading are looking for an experienced SAP Security Consultant, with a deep understanding of SAP Securityarchitecture, GRC automation, security authorization design and the ability to apply … and remediation, SAP Access request reduction, Role Design simplification, and Business Role Management. Key Responsibilities: Broad Technical Knowledge: Demonstrate a comprehensive understanding of SAP Securityarchitecture, security authorization design, and integration across both on-premise and cloud SAP environments. SoD Review and Remediation: Conduct thorough Segregation of … and implement effective Business Role Management strategies that align with business processes. On-Premise and On-Cloud Expertise: Proficiently conceptualise, develop, and implement SAP Security models for both on-premise and cloud-based environments, ensuring a holistic approach to security. SAP Security Model: Develop and maintain a robust more »
Senior Security Engineer (IT/OT) Reading - ideally hybrid, however a degree of flexibility may be available for those based further afield. Salary - negotiable + 15% bonus scheme & benefits package My client, a leading global manufacturer based in Reading are actively recruiting for an experienced security engineer to … join their team. Working in a small team of 3, you will report directly into the Head of Cyber Security and will have a huge amount of involvement around driving forward the continuous improvement for their IT and OT security estate. The role You will be responsible for … maintaining existing security tools ensuring the security and resilience of our IT environment, whilst also building a good understanding of OT security tooling and principles. You will actively contribute to architecture review boards, provide expert advice for projects, and assess and implement IT security tooling more »