SlideShare a Scribd company logo
1 of 1
Download to read offline
01491 411020
www.abrs.com info@abrs.com
My client is an amazing, very successful start-up. They have rocked the world with their product and
it is massively profitable and hugely talked about. Based in London my client requires an Operational
Security Engineer/Architect to take control of the entire Security environment and recommend what
needs to be improved etc. In this role it is equally important to be at the top of your game in
regulation and process management and implementation as much as the required technology.
You will be closely working with the developers and engineers across the organisation to better
understand the current security environment and then recommend new improved solutions
allowing them to take this into consideration when writing code. There will also be a review/ project
around PCI compliance.
You will be joining the infrastructure team, providing security advisory and policy for the production
and support teams. You must be able to work across different stakeholders throughout the business
to engage and execute policy improvements and implement best practice. This will require
ownership of the security incidents.
Responsibilities
 Responsible for keeping the infrastructure safe
 Experience of Mobile Application Security
 Responsible for Pen Testing, Security Incident Process and IDS setup and operation.
 Provide Advisory to Engineering on best coding practices.
 This role is a key stakeholder on all system architecture design decisions - experience of a
similar role is key.
 Focal point for business on all security concerns - both business process and user support.
 Self Starter capable of working with all levels of the organisation.
 Competent and experience at scripting with knowledge of major programming languages
such as JAVA, PHP, GO, Python
 Knowledge of Agile/Kanban
 Experience of being technical lead on compliance and regulatory (especially PCI but also
ISO27001).
 Familiarity with the following desirable JIRA, Jenkins, Google Apps, Onelogin, Puppet, SFDC,
Clickview, Zabbix, AWS, Mac/Win/Linux, Mysql, Cassandra
For more information on this role and to discuss your suitability please contact
neil@abrs.com

More Related Content

What's hot

How to transform developers into security people
How to transform developers into security peopleHow to transform developers into security people
How to transform developers into security peoplePriyanka Aash
 
SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...
SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...
SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...Dárcio Takara
 
6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling Misconceptions6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling MisconceptionsCigital
 
Machine learning scientist
Machine learning scientistMachine learning scientist
Machine learning scientistErtugrul Akbas
 
IPNEC - Security Services
IPNEC - Security ServicesIPNEC - Security Services
IPNEC - Security ServicesAbdus Saboor
 
Daily jobs for Talent Canberra - 9 October 2014
Daily jobs for Talent Canberra - 9 October 2014Daily jobs for Talent Canberra - 9 October 2014
Daily jobs for Talent Canberra - 9 October 2014Steve Jobson
 
Berezha Security
Berezha SecurityBerezha Security
Berezha SecurityVlad Styran
 
Information Security Life Cycle
Information Security Life CycleInformation Security Life Cycle
Information Security Life Cyclevulsec123
 
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018Adhitya Hartowo
 
Capability presentation app security Entersoft
Capability presentation app security EntersoftCapability presentation app security Entersoft
Capability presentation app security Entersoftmohangandhi_entersoft
 
Starting Involving Security In SDLC Process
Starting Involving Security  In SDLC Process Starting Involving Security  In SDLC Process
Starting Involving Security In SDLC Process Sandi Ardyansyah
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSSprintzeal
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..Sprintzeal
 
Integrating Security Across SDLC Phases
Integrating Security Across SDLC PhasesIntegrating Security Across SDLC Phases
Integrating Security Across SDLC PhasesIshrath Sultana
 
JDO 2019: Insights from integratig Software Security Activities in Continuous...
JDO 2019: Insights from integratig Software Security Activities in Continuous...JDO 2019: Insights from integratig Software Security Activities in Continuous...
JDO 2019: Insights from integratig Software Security Activities in Continuous...PROIDEA
 
Secure Software Development Lifecycle - Devoxx MA 2018
Secure Software Development Lifecycle - Devoxx MA 2018Secure Software Development Lifecycle - Devoxx MA 2018
Secure Software Development Lifecycle - Devoxx MA 2018Imola Informatica
 

What's hot (20)

How to transform developers into security people
How to transform developers into security peopleHow to transform developers into security people
How to transform developers into security people
 
SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...
SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...
SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...
 
Agile security
Agile securityAgile security
Agile security
 
6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling Misconceptions6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling Misconceptions
 
Machine learning scientist
Machine learning scientistMachine learning scientist
Machine learning scientist
 
IPNEC - Security Services
IPNEC - Security ServicesIPNEC - Security Services
IPNEC - Security Services
 
Daily jobs for Talent Canberra - 9 October 2014
Daily jobs for Talent Canberra - 9 October 2014Daily jobs for Talent Canberra - 9 October 2014
Daily jobs for Talent Canberra - 9 October 2014
 
Berezha Security
Berezha SecurityBerezha Security
Berezha Security
 
Imran Resume
Imran ResumeImran Resume
Imran Resume
 
Information Security Life Cycle
Information Security Life CycleInformation Security Life Cycle
Information Security Life Cycle
 
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
 
Capability presentation app security Entersoft
Capability presentation app security EntersoftCapability presentation app security Entersoft
Capability presentation app security Entersoft
 
Starting Involving Security In SDLC Process
Starting Involving Security  In SDLC Process Starting Involving Security  In SDLC Process
Starting Involving Security In SDLC Process
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
Integrating Security Across SDLC Phases
Integrating Security Across SDLC PhasesIntegrating Security Across SDLC Phases
Integrating Security Across SDLC Phases
 
Rudy-Roblero
Rudy-RobleroRudy-Roblero
Rudy-Roblero
 
JDO 2019: Insights from integratig Software Security Activities in Continuous...
JDO 2019: Insights from integratig Software Security Activities in Continuous...JDO 2019: Insights from integratig Software Security Activities in Continuous...
JDO 2019: Insights from integratig Software Security Activities in Continuous...
 
Basic of SSDLC
Basic of SSDLCBasic of SSDLC
Basic of SSDLC
 
Secure Software Development Lifecycle - Devoxx MA 2018
Secure Software Development Lifecycle - Devoxx MA 2018Secure Software Development Lifecycle - Devoxx MA 2018
Secure Software Development Lifecycle - Devoxx MA 2018
 

Similar to Operational security engineer architect

Specialist Security Engineer
Specialist Security EngineerSpecialist Security Engineer
Specialist Security EngineerMark Long
 
Top Cybersecurity Jobs to Apply for in March 2021:
Top Cybersecurity Jobs to Apply for in March 2021:Top Cybersecurity Jobs to Apply for in March 2021:
Top Cybersecurity Jobs to Apply for in March 2021:Analyticsinsight1
 
Specialist security enigneer
Specialist security enigneerSpecialist security enigneer
Specialist security enigneerMark Long
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesMighty Guides, Inc.
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperMohd Anwar Jamal Faiz
 
SanerNow a platform for Endpoint security and systems Management
SanerNow  a platform for Endpoint security and systems ManagementSanerNow  a platform for Endpoint security and systems Management
SanerNow a platform for Endpoint security and systems ManagementSecPod Technologies
 
Software risk management
Software risk managementSoftware risk management
Software risk managementJose Javier M
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.Aggregage
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...lior mazor
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfParishSummer
 
DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogDevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogStefan Streichsbier
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldArun Prabhakar
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITYRazorpoint Security
 

Similar to Operational security engineer architect (20)

Specialist Security Engineer
Specialist Security EngineerSpecialist Security Engineer
Specialist Security Engineer
 
Top Cybersecurity Jobs to Apply for in March 2021:
Top Cybersecurity Jobs to Apply for in March 2021:Top Cybersecurity Jobs to Apply for in March 2021:
Top Cybersecurity Jobs to Apply for in March 2021:
 
Specialist security enigneer
Specialist security enigneerSpecialist security enigneer
Specialist security enigneer
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT Practices
 
Resume
ResumeResume
Resume
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
SanerNow a platform for Endpoint security and systems Management
SanerNow  a platform for Endpoint security and systems ManagementSanerNow  a platform for Endpoint security and systems Management
SanerNow a platform for Endpoint security and systems Management
 
Irfan Ur Rehman
Irfan Ur RehmanIrfan Ur Rehman
Irfan Ur Rehman
 
Software risk management
Software risk managementSoftware risk management
Software risk management
 
Template 30
Template 30Template 30
Template 30
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogDevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together Log
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY
 
Product Security
Product SecurityProduct Security
Product Security
 
MEHBOOB QURESHI
MEHBOOB QURESHIMEHBOOB QURESHI
MEHBOOB QURESHI
 

More from Mark Long

Software developer in test (sdet) mobile company
Software developer in test (sdet) mobile companySoftware developer in test (sdet) mobile company
Software developer in test (sdet) mobile companyMark Long
 
Technical project manager permanent job in london
Technical project manager permanent job in londonTechnical project manager permanent job in london
Technical project manager permanent job in londonMark Long
 
Digital Project Manager
Digital Project ManagerDigital Project Manager
Digital Project ManagerMark Long
 
PHP Back-end Developer
PHP Back-end DeveloperPHP Back-end Developer
PHP Back-end DeveloperMark Long
 
Technical Project Manager
Technical Project ManagerTechnical Project Manager
Technical Project ManagerMark Long
 
Salesforce Business Analyst - Contract job in London
Salesforce Business Analyst - Contract job in LondonSalesforce Business Analyst - Contract job in London
Salesforce Business Analyst - Contract job in LondonMark Long
 
Technical engineer – Big Data systems
Technical engineer – Big Data systemsTechnical engineer – Big Data systems
Technical engineer – Big Data systemsMark Long
 
Technical Architect - Big Data systems
Technical Architect - Big Data systemsTechnical Architect - Big Data systems
Technical Architect - Big Data systemsMark Long
 
Live Sports Producer - Contract
Live Sports Producer - ContractLive Sports Producer - Contract
Live Sports Producer - ContractMark Long
 
Java Developer (digital journey)
Java Developer (digital journey)Java Developer (digital journey)
Java Developer (digital journey)Mark Long
 
Java Developer (Tech Lead)
Java Developer (Tech Lead)Java Developer (Tech Lead)
Java Developer (Tech Lead)Mark Long
 
SDET (Software Developer in Test) job in London from abrs
SDET (Software Developer in Test) job in London from abrsSDET (Software Developer in Test) job in London from abrs
SDET (Software Developer in Test) job in London from abrsMark Long
 
Java Developer job in London from abrs
Java Developer job in London from abrsJava Developer job in London from abrs
Java Developer job in London from abrsMark Long
 
Lead Front End Developer - Healthcare Start-up
Lead Front End Developer - Healthcare Start-upLead Front End Developer - Healthcare Start-up
Lead Front End Developer - Healthcare Start-upMark Long
 
Lead ux designer jobs
Lead ux designer jobsLead ux designer jobs
Lead ux designer jobsMark Long
 
BI Solution Architect
BI Solution ArchitectBI Solution Architect
BI Solution ArchitectMark Long
 
Director of System Operations job in London
Director of System Operations job in LondonDirector of System Operations job in London
Director of System Operations job in LondonMark Long
 
Software developer job in london, start up
Software developer job in london, start upSoftware developer job in london, start up
Software developer job in london, start upMark Long
 
Contract product manager job in london
Contract product manager job in londonContract product manager job in london
Contract product manager job in londonMark Long
 

More from Mark Long (20)

CEO at ABRS
CEO at ABRSCEO at ABRS
CEO at ABRS
 
Software developer in test (sdet) mobile company
Software developer in test (sdet) mobile companySoftware developer in test (sdet) mobile company
Software developer in test (sdet) mobile company
 
Technical project manager permanent job in london
Technical project manager permanent job in londonTechnical project manager permanent job in london
Technical project manager permanent job in london
 
Digital Project Manager
Digital Project ManagerDigital Project Manager
Digital Project Manager
 
PHP Back-end Developer
PHP Back-end DeveloperPHP Back-end Developer
PHP Back-end Developer
 
Technical Project Manager
Technical Project ManagerTechnical Project Manager
Technical Project Manager
 
Salesforce Business Analyst - Contract job in London
Salesforce Business Analyst - Contract job in LondonSalesforce Business Analyst - Contract job in London
Salesforce Business Analyst - Contract job in London
 
Technical engineer – Big Data systems
Technical engineer – Big Data systemsTechnical engineer – Big Data systems
Technical engineer – Big Data systems
 
Technical Architect - Big Data systems
Technical Architect - Big Data systemsTechnical Architect - Big Data systems
Technical Architect - Big Data systems
 
Live Sports Producer - Contract
Live Sports Producer - ContractLive Sports Producer - Contract
Live Sports Producer - Contract
 
Java Developer (digital journey)
Java Developer (digital journey)Java Developer (digital journey)
Java Developer (digital journey)
 
Java Developer (Tech Lead)
Java Developer (Tech Lead)Java Developer (Tech Lead)
Java Developer (Tech Lead)
 
SDET (Software Developer in Test) job in London from abrs
SDET (Software Developer in Test) job in London from abrsSDET (Software Developer in Test) job in London from abrs
SDET (Software Developer in Test) job in London from abrs
 
Java Developer job in London from abrs
Java Developer job in London from abrsJava Developer job in London from abrs
Java Developer job in London from abrs
 
Lead Front End Developer - Healthcare Start-up
Lead Front End Developer - Healthcare Start-upLead Front End Developer - Healthcare Start-up
Lead Front End Developer - Healthcare Start-up
 
Lead ux designer jobs
Lead ux designer jobsLead ux designer jobs
Lead ux designer jobs
 
BI Solution Architect
BI Solution ArchitectBI Solution Architect
BI Solution Architect
 
Director of System Operations job in London
Director of System Operations job in LondonDirector of System Operations job in London
Director of System Operations job in London
 
Software developer job in london, start up
Software developer job in london, start upSoftware developer job in london, start up
Software developer job in london, start up
 
Contract product manager job in london
Contract product manager job in londonContract product manager job in london
Contract product manager job in london
 

Operational security engineer architect

  • 1. 01491 411020 www.abrs.com info@abrs.com My client is an amazing, very successful start-up. They have rocked the world with their product and it is massively profitable and hugely talked about. Based in London my client requires an Operational Security Engineer/Architect to take control of the entire Security environment and recommend what needs to be improved etc. In this role it is equally important to be at the top of your game in regulation and process management and implementation as much as the required technology. You will be closely working with the developers and engineers across the organisation to better understand the current security environment and then recommend new improved solutions allowing them to take this into consideration when writing code. There will also be a review/ project around PCI compliance. You will be joining the infrastructure team, providing security advisory and policy for the production and support teams. You must be able to work across different stakeholders throughout the business to engage and execute policy improvements and implement best practice. This will require ownership of the security incidents. Responsibilities  Responsible for keeping the infrastructure safe  Experience of Mobile Application Security  Responsible for Pen Testing, Security Incident Process and IDS setup and operation.  Provide Advisory to Engineering on best coding practices.  This role is a key stakeholder on all system architecture design decisions - experience of a similar role is key.  Focal point for business on all security concerns - both business process and user support.  Self Starter capable of working with all levels of the organisation.  Competent and experience at scripting with knowledge of major programming languages such as JAVA, PHP, GO, Python  Knowledge of Agile/Kanban  Experience of being technical lead on compliance and regulatory (especially PCI but also ISO27001).  Familiarity with the following desirable JIRA, Jenkins, Google Apps, Onelogin, Puppet, SFDC, Clickview, Zabbix, AWS, Mac/Win/Linux, Mysql, Cassandra For more information on this role and to discuss your suitability please contact neil@abrs.com