IT Cyber Security Consultant – Outside IR35

Posted 24 June 2024
Salary Competitive
Job type Contract
Discipline Cyber Security
Contact NameJamie Stewart
Remote working Hybrid/Flexible

Job description

IT Cyber Security Consultant – London
Outside IR35     
Initial 6 Months contract
Stott and May are seeking a highly skilled IT Security Consultant to join one of our Banking Clients.
The role sits within the IT Security Team, with 100% assignment to projects, and is responsible for protecting the Confidentiality, Integrity, and Availability of the Bank’s information assets.  

You will have:
  • Demonstrable experience in conducting security assessments and threat identification, mitigation, and remediation.
  • Ability to guide projects to apply appropriate security standards and policies.
  • Deep technical understanding of network security, security configuration and best practices for infrastructure services including Firewalls and penetration testing scoping.
  • Working knowledge of technologies and tools involved in infrastructure-as-code utilising tools such as: PowerShell, Terraform, Ansible, Azure DevOps
  • Working knowledge of technologies and tools to drive observability and infrastructure insight (monitoring / telemetry / logging)
  • Working knowledge of application security and development principles
  • Expert knowledge of IDAM security controls and tooling
  • Deep understanding of tooling integration/API management
  • Expert understanding of CISCO ISE and Secure Network Analytics
  • Good technical knowledge of the following is desirable: data encryption, data leakage controls, application integration, identity and access management, certificate management and database security.
  • Technical experience of some of the following applications: Security auditing tools, AV, Firewalls, Proxy, SIEM, PAM.
  • Ethical hacking background is advantageous.
  • Develop and maintain security policies that define how network resources can be accessed based on user identities, device attributes, and contextual information.
  • Collaborate with security analysts to investigate and respond to security incidents and breaches related to access control and network segmentation.
  • Investigate alerts and anomalies, working alongside the security team to mitigate threats and vulnerabilities.
  • Contribute to the development of incident response plans and playbooks
  • Generate regular reports on network security incidents, threat trends, and performance analysis.
  • Communicate findings and insights to technical and non-technical stakeholders.
  • Experience with Checkpoint technologies.

Sound good?