SlideShare a Scribd company logo
01491 411020
www.abrs.com info@abrs.com
Specialist Security Engineer.
Our client is a leading organisation in the Media sector; they specialise in media playout and
provide access to broadcast content across all media, from television to mobile phones.
They require a Security Specialist/ Engineer to join the team. The role requires the development of a
strong working relationship with Duty Managers, Solutions Managers and the IT and Delivery
Platform Managers, Project Managers, Technical Managers and Network Design Manager. You will
be reporting to the Head of Information Security.
You will be a vital asset in this movement and take responsibility in applying and enforcing systems
security processes, you will have technical sign off responsibility for Change Controls
Perform proactive reviews of the current architecture and configuration as well as managing the
security infrastructure including firewalls, remote access systems, intrusion prevention devices,
proxies and antivirus tools etc.
This role is not limited to the above and offers great potential in progression and earnings.
Technical Work:
 Apply and enforce systems security processes, policies and tools as defined by the
Information Security Manager, across the business to protect the integrity of systems and to
ensure full compliance with corporate and legal requirements
 Have technical sign off responsibility for Change Controls (where appropriate)
 Perform proactive reviews of the current architecture and configuration to ensure best
security practices and standards are applied at all times.
 Highlight areas of concern, and ideas for improvement, when there is belief that systems or
services could be impacted or improved.
 Carry out root cause analysis.
 Responsible for ensuring the live environment is available to the business and is not
compromised by project developments or routine BAU changes.
 Manage security infrastructure including firewalls, remote access systems, intrusion
prevention devices, proxies and antivirus tools etc.
 Perform firmware/software upgrades to all deployed security technologies on a regular basis
to ensure the most appropriate level of security and functionality is maintained at all times.
 Advise and support the Technical Support teams and business managers on security issues
 Record security data information and respond to an information security incident.
Recommend actions, and implement solutions defined by the Information Security Manager.
 Implement and maintain security policies as defined by the Information Security Manager.
 Assist in the development of current operational processes and documentation or creation if
they currently don’t exist.
 Carry out security reporting as requested by the Network and Security Platform Manager or
Information Security Manager. In conjunction with the Information Security Manager
implement monitoring controls, tracking and reporting
 When required, assist in the planning and execution of projects.
01491 411020
www.abrs.com info@abrs.com
Experience and Knowledge
A range of the following experience and knowledge areas is required:
 Hands on security experience in a large, structured, multi vendor enterprise environment
 Proven track record of customer liaison and fault management with experience in a support
and / or NOC environment.
 Experienced in the deployment of complex security solutions in demanding and mission
critical environments
 Good understanding of TCP/IP and networking technologies/protocols
 Good experience and strong knowledge of a wide range of security technologies
Including:
 Checkpoint firewall software and appliances
 Juniper SSG/ISG/SRX firewalls and SA SSL VPN
Juniper IDP and NSM
 Bluecoat Proxy SG and Proxy AV
 Nokia IP Security Platforms
 Fortinet firewalls
 Crossbeam X-Series
 Knowledge of Brocade or Cisco, Infoblox, StealthWatch, Nagios and SNMPc advantageous
 Working knowledge of Security Information and Event Management systems
 The ability to use and update formalised knowledge management systems
 Experience of working in a technical environment which follows strict change control policy
and procedures.
 Experience of ITIL Service Management principles
 Well developed team skills with the ability to organise and prioritise work to ensure
deadlines are met
 Good interpersonal skills with the ability to liaise effectively with different levels and
audiences.
 UNIX / Linux Operating Systems
 Perl scripting
 Microsoft Operating Systems
 Server, PC and Mac hardware and software
For more information or to apply please contact neil@abrs.com

More Related Content

What's hot

Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
EC-Council
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
Erik Taavila
 
edCeh brochure
edCeh brochureedCeh brochure
edCeh brochure
Knowledgehut
 
Abdulrahman c.v
Abdulrahman c.vAbdulrahman c.v
Abdulrahman c.v
abdulrahman alshehri
 
Soc
SocSoc
Health information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityHealth information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information security
Dr. Lasantha Ranwala
 
Security policies
Security policiesSecurity policies
Security policies
Nishant Pahad
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint Security
Ivanti
 
Outsourcing Security Management
Outsourcing Security ManagementOutsourcing Security Management
Outsourcing Security Management
Nick Krym
 
CV_Rohit Garg
CV_Rohit GargCV_Rohit Garg
CV_Rohit Garg
rohit garg
 
How To Secure MIS
How To Secure MISHow To Secure MIS
How To Secure MIS
AaDi Malik
 
Health information security session 4 risk management
Health information security session 4 risk managementHealth information security session 4 risk management
Health information security session 4 risk management
Dr. Lasantha Ranwala
 
Final ppt g08
Final ppt g08Final ppt g08
Final ppt g08
hetvi naik
 
Albert G Info systems resume
Albert G Info systems resumeAlbert G Info systems resume
Albert G Info systems resume
Albert Gonzales
 
Infosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSPInfosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSP
Huntsman Security
 
Ethical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu UbaidhullahEthical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu Ubaidhullah
pongada123
 
Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap
Anshu Gupta
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault
 
P3
P3P3
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
Sally's Special Services
 

What's hot (20)

Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
edCeh brochure
edCeh brochureedCeh brochure
edCeh brochure
 
Abdulrahman c.v
Abdulrahman c.vAbdulrahman c.v
Abdulrahman c.v
 
Soc
SocSoc
Soc
 
Health information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityHealth information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information security
 
Security policies
Security policiesSecurity policies
Security policies
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint Security
 
Outsourcing Security Management
Outsourcing Security ManagementOutsourcing Security Management
Outsourcing Security Management
 
CV_Rohit Garg
CV_Rohit GargCV_Rohit Garg
CV_Rohit Garg
 
How To Secure MIS
How To Secure MISHow To Secure MIS
How To Secure MIS
 
Health information security session 4 risk management
Health information security session 4 risk managementHealth information security session 4 risk management
Health information security session 4 risk management
 
Final ppt g08
Final ppt g08Final ppt g08
Final ppt g08
 
Albert G Info systems resume
Albert G Info systems resumeAlbert G Info systems resume
Albert G Info systems resume
 
Infosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSPInfosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSP
 
Ethical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu UbaidhullahEthical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu Ubaidhullah
 
Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
 
P3
P3P3
P3
 
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
 

Viewers also liked

Albinutele-2014
Albinutele-2014Albinutele-2014
Albinutele-2014
Ani Ciobanu-Simion
 
TÉRMINOS TECNOLÓGICOS EXPLICADO POR NIÑOS
TÉRMINOS TECNOLÓGICOS EXPLICADO POR NIÑOSTÉRMINOS TECNOLÓGICOS EXPLICADO POR NIÑOS
TÉRMINOS TECNOLÓGICOS EXPLICADO POR NIÑOS
Grupo Vere 85, S.A.
 
إمتحانات الديناميكا
إمتحانات الديناميكاإمتحانات الديناميكا
إمتحانات الديناميكا
Yassin Balja
 
Casino Antiguo Castellón 2
Casino Antiguo Castellón 2Casino Antiguo Castellón 2
Casino Antiguo Castellón 2
Monica Fernandez
 
секс шоп «Strast»
секс шоп «Strast»секс шоп «Strast»
Emergencias salud
Emergencias saludEmergencias salud
Emergencias salud
SusanAgurto
 
Dante-Sebregondi collection: Project Work with Christie's
Dante-Sebregondi collection: Project Work with Christie'sDante-Sebregondi collection: Project Work with Christie's
Dante-Sebregondi collection: Project Work with Christie's
Luca Del Piano
 
Cner - L'avenir de la prospection passe t-il par le web?
Cner - L'avenir de la prospection passe t-il par le web?Cner - L'avenir de la prospection passe t-il par le web?
Cner - L'avenir de la prospection passe t-il par le web?regionalpartner56
 
Death Due to Heart Attack Astrological article
Death Due to Heart Attack Astrological article Death Due to Heart Attack Astrological article
Death Due to Heart Attack Astrological article
Amit Desai
 
Ura1031
Ura1031Ura1031
Ura1031
himejisaty
 
Kanaler inn i arb.markedet
Kanaler inn i arb.markedetKanaler inn i arb.markedet
Kanaler inn i arb.markedet
Bjørn J. Bellaris
 
L &T Raintree Boulevard MKT By Zeal N Zest Realty + 91-77955-95777
L &T Raintree Boulevard MKT By Zeal N Zest Realty  + 91-77955-95777L &T Raintree Boulevard MKT By Zeal N Zest Realty  + 91-77955-95777
L &T Raintree Boulevard MKT By Zeal N Zest Realty + 91-77955-95777
ziaakhan123
 
Taller logotipo
Taller logotipoTaller logotipo
Taller logotipo
geraldin2122
 
Class 5b
Class 5bClass 5b
Class 5b
year5turnham
 
Catalogo
CatalogoCatalogo

Viewers also liked (15)

Albinutele-2014
Albinutele-2014Albinutele-2014
Albinutele-2014
 
TÉRMINOS TECNOLÓGICOS EXPLICADO POR NIÑOS
TÉRMINOS TECNOLÓGICOS EXPLICADO POR NIÑOSTÉRMINOS TECNOLÓGICOS EXPLICADO POR NIÑOS
TÉRMINOS TECNOLÓGICOS EXPLICADO POR NIÑOS
 
إمتحانات الديناميكا
إمتحانات الديناميكاإمتحانات الديناميكا
إمتحانات الديناميكا
 
Casino Antiguo Castellón 2
Casino Antiguo Castellón 2Casino Antiguo Castellón 2
Casino Antiguo Castellón 2
 
секс шоп «Strast»
секс шоп «Strast»секс шоп «Strast»
секс шоп «Strast»
 
Emergencias salud
Emergencias saludEmergencias salud
Emergencias salud
 
Dante-Sebregondi collection: Project Work with Christie's
Dante-Sebregondi collection: Project Work with Christie'sDante-Sebregondi collection: Project Work with Christie's
Dante-Sebregondi collection: Project Work with Christie's
 
Cner - L'avenir de la prospection passe t-il par le web?
Cner - L'avenir de la prospection passe t-il par le web?Cner - L'avenir de la prospection passe t-il par le web?
Cner - L'avenir de la prospection passe t-il par le web?
 
Death Due to Heart Attack Astrological article
Death Due to Heart Attack Astrological article Death Due to Heart Attack Astrological article
Death Due to Heart Attack Astrological article
 
Ura1031
Ura1031Ura1031
Ura1031
 
Kanaler inn i arb.markedet
Kanaler inn i arb.markedetKanaler inn i arb.markedet
Kanaler inn i arb.markedet
 
L &T Raintree Boulevard MKT By Zeal N Zest Realty + 91-77955-95777
L &T Raintree Boulevard MKT By Zeal N Zest Realty  + 91-77955-95777L &T Raintree Boulevard MKT By Zeal N Zest Realty  + 91-77955-95777
L &T Raintree Boulevard MKT By Zeal N Zest Realty + 91-77955-95777
 
Taller logotipo
Taller logotipoTaller logotipo
Taller logotipo
 
Class 5b
Class 5bClass 5b
Class 5b
 
Catalogo
CatalogoCatalogo
Catalogo
 

Similar to Specialist Security Engineer

Additional Skills
Additional SkillsAdditional Skills
Additional Skills
Ravi Bandekar
 
Operational security engineer architect
Operational security engineer architectOperational security engineer architect
Operational security engineer architect
Mark Long
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
Jonathan Fuller
 
Irfan Ur Rehman
Irfan Ur RehmanIrfan Ur Rehman
Irfan Ur Rehman
Irfan Ur Rehman
 
Template 30
Template 30Template 30
Template 30
scottsloan74
 
Resume
ResumeResume
Hayat resume 1
Hayat resume 1Hayat resume 1
Hayat resume 1
Hayat Azizi
 
How to create a secure network architecture.pdf
How to create a secure network architecture.pdfHow to create a secure network architecture.pdf
How to create a secure network architecture.pdf
itconsultancynj104
 
Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
Carlasha Jenkins
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
Vijay Νavgire
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
Muhammad Mudassar
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
Tesseract Consulting
 
2016 TNegrette - Information Technologist Presentation
2016 TNegrette - Information Technologist Presentation2016 TNegrette - Information Technologist Presentation
2016 TNegrette - Information Technologist Presentation
Thomas Negrette
 
Martin_Leroux_2014
Martin_Leroux_2014Martin_Leroux_2014
Martin_Leroux_2014
Martin Leroux
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin Carrow
 
Mash f43
Mash f43Mash f43
Secure Your Career Shift With Computer-Security Training
Secure Your Career Shift With Computer-Security TrainingSecure Your Career Shift With Computer-Security Training
Secure Your Career Shift With Computer-Security Training
CCI Training Center
 
Hayat Resume-1
Hayat Resume-1Hayat Resume-1
Hayat Resume-1
Hayat Azizi
 
SureLog SIEM Jobs
SureLog SIEM JobsSureLog SIEM Jobs
SureLog SIEM Jobs
Ertugrul Akbas
 

Similar to Specialist Security Engineer (20)

Additional Skills
Additional SkillsAdditional Skills
Additional Skills
 
Operational security engineer architect
Operational security engineer architectOperational security engineer architect
Operational security engineer architect
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
Irfan Ur Rehman
Irfan Ur RehmanIrfan Ur Rehman
Irfan Ur Rehman
 
Template 30
Template 30Template 30
Template 30
 
Resume
ResumeResume
Resume
 
Hayat resume 1
Hayat resume 1Hayat resume 1
Hayat resume 1
 
How to create a secure network architecture.pdf
How to create a secure network architecture.pdfHow to create a secure network architecture.pdf
How to create a secure network architecture.pdf
 
Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
 
2016 TNegrette - Information Technologist Presentation
2016 TNegrette - Information Technologist Presentation2016 TNegrette - Information Technologist Presentation
2016 TNegrette - Information Technologist Presentation
 
Martin_Leroux_2014
Martin_Leroux_2014Martin_Leroux_2014
Martin_Leroux_2014
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015
 
Mash f43
Mash f43Mash f43
Mash f43
 
Secure Your Career Shift With Computer-Security Training
Secure Your Career Shift With Computer-Security TrainingSecure Your Career Shift With Computer-Security Training
Secure Your Career Shift With Computer-Security Training
 
Hayat Resume-1
Hayat Resume-1Hayat Resume-1
Hayat Resume-1
 
SureLog SIEM Jobs
SureLog SIEM JobsSureLog SIEM Jobs
SureLog SIEM Jobs
 

More from Mark Long

CEO at ABRS
CEO at ABRSCEO at ABRS
CEO at ABRS
Mark Long
 
Software developer in test (sdet) mobile company
Software developer in test (sdet) mobile companySoftware developer in test (sdet) mobile company
Software developer in test (sdet) mobile company
Mark Long
 
Technical project manager permanent job in london
Technical project manager permanent job in londonTechnical project manager permanent job in london
Technical project manager permanent job in london
Mark Long
 
Digital Project Manager
Digital Project ManagerDigital Project Manager
Digital Project Manager
Mark Long
 
PHP Back-end Developer
PHP Back-end DeveloperPHP Back-end Developer
PHP Back-end Developer
Mark Long
 
Technical Project Manager
Technical Project ManagerTechnical Project Manager
Technical Project Manager
Mark Long
 
Salesforce Business Analyst - Contract job in London
Salesforce Business Analyst - Contract job in LondonSalesforce Business Analyst - Contract job in London
Salesforce Business Analyst - Contract job in London
Mark Long
 
Technical engineer – Big Data systems
Technical engineer – Big Data systemsTechnical engineer – Big Data systems
Technical engineer – Big Data systems
Mark Long
 
Technical Architect - Big Data systems
Technical Architect - Big Data systemsTechnical Architect - Big Data systems
Technical Architect - Big Data systems
Mark Long
 
Live Sports Producer - Contract
Live Sports Producer - ContractLive Sports Producer - Contract
Live Sports Producer - Contract
Mark Long
 
Java Developer (digital journey)
Java Developer (digital journey)Java Developer (digital journey)
Java Developer (digital journey)
Mark Long
 
Java Developer (Tech Lead)
Java Developer (Tech Lead)Java Developer (Tech Lead)
Java Developer (Tech Lead)
Mark Long
 
SDET (Software Developer in Test) job in London from abrs
SDET (Software Developer in Test) job in London from abrsSDET (Software Developer in Test) job in London from abrs
SDET (Software Developer in Test) job in London from abrs
Mark Long
 
Java Developer job in London from abrs
Java Developer job in London from abrsJava Developer job in London from abrs
Java Developer job in London from abrs
Mark Long
 
Lead Front End Developer - Healthcare Start-up
Lead Front End Developer - Healthcare Start-upLead Front End Developer - Healthcare Start-up
Lead Front End Developer - Healthcare Start-up
Mark Long
 
Lead ux designer jobs
Lead ux designer jobsLead ux designer jobs
Lead ux designer jobs
Mark Long
 
BI Solution Architect
BI Solution ArchitectBI Solution Architect
BI Solution Architect
Mark Long
 
Director of System Operations job in London
Director of System Operations job in LondonDirector of System Operations job in London
Director of System Operations job in London
Mark Long
 
Software developer job in london, start up
Software developer job in london, start upSoftware developer job in london, start up
Software developer job in london, start up
Mark Long
 
Contract product manager job in london
Contract product manager job in londonContract product manager job in london
Contract product manager job in london
Mark Long
 

More from Mark Long (20)

CEO at ABRS
CEO at ABRSCEO at ABRS
CEO at ABRS
 
Software developer in test (sdet) mobile company
Software developer in test (sdet) mobile companySoftware developer in test (sdet) mobile company
Software developer in test (sdet) mobile company
 
Technical project manager permanent job in london
Technical project manager permanent job in londonTechnical project manager permanent job in london
Technical project manager permanent job in london
 
Digital Project Manager
Digital Project ManagerDigital Project Manager
Digital Project Manager
 
PHP Back-end Developer
PHP Back-end DeveloperPHP Back-end Developer
PHP Back-end Developer
 
Technical Project Manager
Technical Project ManagerTechnical Project Manager
Technical Project Manager
 
Salesforce Business Analyst - Contract job in London
Salesforce Business Analyst - Contract job in LondonSalesforce Business Analyst - Contract job in London
Salesforce Business Analyst - Contract job in London
 
Technical engineer – Big Data systems
Technical engineer – Big Data systemsTechnical engineer – Big Data systems
Technical engineer – Big Data systems
 
Technical Architect - Big Data systems
Technical Architect - Big Data systemsTechnical Architect - Big Data systems
Technical Architect - Big Data systems
 
Live Sports Producer - Contract
Live Sports Producer - ContractLive Sports Producer - Contract
Live Sports Producer - Contract
 
Java Developer (digital journey)
Java Developer (digital journey)Java Developer (digital journey)
Java Developer (digital journey)
 
Java Developer (Tech Lead)
Java Developer (Tech Lead)Java Developer (Tech Lead)
Java Developer (Tech Lead)
 
SDET (Software Developer in Test) job in London from abrs
SDET (Software Developer in Test) job in London from abrsSDET (Software Developer in Test) job in London from abrs
SDET (Software Developer in Test) job in London from abrs
 
Java Developer job in London from abrs
Java Developer job in London from abrsJava Developer job in London from abrs
Java Developer job in London from abrs
 
Lead Front End Developer - Healthcare Start-up
Lead Front End Developer - Healthcare Start-upLead Front End Developer - Healthcare Start-up
Lead Front End Developer - Healthcare Start-up
 
Lead ux designer jobs
Lead ux designer jobsLead ux designer jobs
Lead ux designer jobs
 
BI Solution Architect
BI Solution ArchitectBI Solution Architect
BI Solution Architect
 
Director of System Operations job in London
Director of System Operations job in LondonDirector of System Operations job in London
Director of System Operations job in London
 
Software developer job in london, start up
Software developer job in london, start upSoftware developer job in london, start up
Software developer job in london, start up
 
Contract product manager job in london
Contract product manager job in londonContract product manager job in london
Contract product manager job in london
 

Recently uploaded

AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 

Recently uploaded (20)

AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 

Specialist Security Engineer

  • 1. 01491 411020 www.abrs.com info@abrs.com Specialist Security Engineer. Our client is a leading organisation in the Media sector; they specialise in media playout and provide access to broadcast content across all media, from television to mobile phones. They require a Security Specialist/ Engineer to join the team. The role requires the development of a strong working relationship with Duty Managers, Solutions Managers and the IT and Delivery Platform Managers, Project Managers, Technical Managers and Network Design Manager. You will be reporting to the Head of Information Security. You will be a vital asset in this movement and take responsibility in applying and enforcing systems security processes, you will have technical sign off responsibility for Change Controls Perform proactive reviews of the current architecture and configuration as well as managing the security infrastructure including firewalls, remote access systems, intrusion prevention devices, proxies and antivirus tools etc. This role is not limited to the above and offers great potential in progression and earnings. Technical Work:  Apply and enforce systems security processes, policies and tools as defined by the Information Security Manager, across the business to protect the integrity of systems and to ensure full compliance with corporate and legal requirements  Have technical sign off responsibility for Change Controls (where appropriate)  Perform proactive reviews of the current architecture and configuration to ensure best security practices and standards are applied at all times.  Highlight areas of concern, and ideas for improvement, when there is belief that systems or services could be impacted or improved.  Carry out root cause analysis.  Responsible for ensuring the live environment is available to the business and is not compromised by project developments or routine BAU changes.  Manage security infrastructure including firewalls, remote access systems, intrusion prevention devices, proxies and antivirus tools etc.  Perform firmware/software upgrades to all deployed security technologies on a regular basis to ensure the most appropriate level of security and functionality is maintained at all times.  Advise and support the Technical Support teams and business managers on security issues  Record security data information and respond to an information security incident. Recommend actions, and implement solutions defined by the Information Security Manager.  Implement and maintain security policies as defined by the Information Security Manager.  Assist in the development of current operational processes and documentation or creation if they currently don’t exist.  Carry out security reporting as requested by the Network and Security Platform Manager or Information Security Manager. In conjunction with the Information Security Manager implement monitoring controls, tracking and reporting  When required, assist in the planning and execution of projects.
  • 2. 01491 411020 www.abrs.com info@abrs.com Experience and Knowledge A range of the following experience and knowledge areas is required:  Hands on security experience in a large, structured, multi vendor enterprise environment  Proven track record of customer liaison and fault management with experience in a support and / or NOC environment.  Experienced in the deployment of complex security solutions in demanding and mission critical environments  Good understanding of TCP/IP and networking technologies/protocols  Good experience and strong knowledge of a wide range of security technologies Including:  Checkpoint firewall software and appliances  Juniper SSG/ISG/SRX firewalls and SA SSL VPN Juniper IDP and NSM  Bluecoat Proxy SG and Proxy AV  Nokia IP Security Platforms  Fortinet firewalls  Crossbeam X-Series  Knowledge of Brocade or Cisco, Infoblox, StealthWatch, Nagios and SNMPc advantageous  Working knowledge of Security Information and Event Management systems  The ability to use and update formalised knowledge management systems  Experience of working in a technical environment which follows strict change control policy and procedures.  Experience of ITIL Service Management principles  Well developed team skills with the ability to organise and prioritise work to ensure deadlines are met  Good interpersonal skills with the ability to liaise effectively with different levels and audiences.  UNIX / Linux Operating Systems  Perl scripting  Microsoft Operating Systems  Server, PC and Mac hardware and software For more information or to apply please contact neil@abrs.com