Degree Level qualification(s) in: Computer Science, Computer Security or Computer Forensics (or equivalent/extensive industry experience). Professional industry recognised certifications e.g. SANS, CEH, RHCE, CISSP, CISM etc. or equivalent experience. Good understanding of ITIL principles and able to apply them. More ❯
knowledge of internet protocols, firewalls, proxies, and intrusion detection/prevention systems. Familiarity/Knowledge of the Perdue Enterprise Reference Architecture (PERA) Certifications for SANS (SysAdmin, Audit, Network and Security) GIAC (Global Information Assurance Certification) Global Industrial Cyber Security Professional (GICSP), GIAC Response and Industrial Defense (GRID), Critical Infrastructure More ❯
knowledge of internet protocols, firewalls, proxies, and intrusion detection/prevention systems. Familiarity/Knowledge of the Perdue Enterprise Reference Architecture (PERA) Certifications for SANS (SysAdmin, Audit, Network and Security) GIAC (Global Information Assurance Certification) Global Industrial Cyber Security Professional (GICSP), GIAC Response and Industrial Defense (GRID), Critical Infrastructure More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Vantage Data Centers
knowledge of internet protocols, firewalls, proxies, and intrusion detection/prevention systems. Familiarity/Knowledge of the Perdue Enterprise Reference Architecture (PERA) Certifications for SANS (SysAdmin, Audit, Network and Security) GIAC (Global Information Assurance Certification) Global Industrial Cyber Security Professional (GICSP), GIAC Response and Industrial Defense (GRID), Critical Infrastructure More ❯
experience and knowledge with any combination of the following: Threat modelling and risk assessments Working knowledge of secure coding principles (OWASP and OWASP mobile, SANS ) Experience with designing and administering identity management (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2) Working knowledge of cryptography … security into existing SDLC processes Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP) Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps Excellent oral, written communication More ❯