pipeline practices Familiarity with telemetry and logging tools: Cribl, Elastic, Splunk, Fluentd, and Syslog Deep understanding of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS More ❯
pipeline practices Familiarity with telemetry and logging tools: Cribl, Elastic, Splunk, Fluentd, and Syslog Deep understanding of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS More ❯
industry (financial services). Demonstrable experience in designing, implementing and managing security solutions tailored for cloud environments and aligned to industry-standard cybersecurity frameworks such as NCSC CAF/NIST/CIS. This includes proficiency in securing cloud platforms such as AWS, Azure, understanding cloud-native security services, and expertise in configuring security groups, IAM policies, and network access controls. More ❯
Provide expert guidance to support risk management, audit requests, regulatory assessments, and third-party capability reviews . What we’re looking for Deep expertise in cyber security governance frameworks (NIST, COBIT, CIS Controls). Strong understanding of cyber risk management principles and practices . Awareness of emerging cyber security trends, threats, and technologies . Nice to have (but not essential More ❯