Company Overview: McDermott is a premier, fully-integrated provider of technology, engineering and construction solutions to the energy industry. For more than a century, customers have trusted McDermott to design and build end-to-end infrastructure and technology solutions—from the wellhead to the storage tank—to transport and transform … oil and gas into the products the world needs today. Job Overview: IT Corporate Functions – Senior IT Pillar Specialist is responsible for being a strategic partner with Finance to help deliver IT solutions/projects that meet business objectives. This specialist will also be responsible for facilitation of quality systems … support for finance end-to-end process including the close cycles (month-end, quarter & year-end), support of all subledgers and the GL. Experience 5+ years of experience with threatandvulnerabilitymanagement (TVM) program and operations 3+ years of experience working with threat intelligence feeds and IOCs more »
We are working with a global organisation looking to bring an experienced Cyber ThreatandVulnerabilityManagement Lead to their team. As the Threat & VulnerabilityManagement Lead, you will build and oversee organization's threatandvulnerabilitymanagement program. KEY RESPONSIBILITIES: Develop and maintain … a comprehensive vulnerabilitymanagement program aligned with industry standards. Lead the identification and remediation of IT infrastructure vulnerabilities. Oversee vulnerability assessments and penetration tests, working with internal and external security teams. Analyze data to identify emerging cyber threats, assess risks, and determine mitigation strategies. Collaborate with regional … IT teams for timely remediation of vulnerabilities. Translate complex threatandvulnerability data into actionable insights. Develop and maintain policies and procedures for vulnerabilityandthreat intelligence management. Track and report on the program's effectiveness. Work set up: 1 time per week in their London Office if more »
City of London, London, United Kingdom Hybrid / WFH Options
Viqu Limited
you will play a crucial role in ensuring the on-going security posture of the organisation. You will be required to have expert knowledge and technical experience with Qualys as this is the main tool used within the business's security space. The Security Engineer (vulnerability) would have a … focus on vulnerabilityand patch management specifically utilising the capabilities within Qualys in a Microsoft estate. The ability to act as a “technical” project manager to manage these Security projects would be highly beneficial. Key responsibilities for the Security Engineer (Vulnerability) include: In-depth knowledge of vulnerability, and patch and risk management Experience working with Vulnerability tools – Qualys expertise are required. Experience leading vulnerability projects. VulnerabilityManagement - Conduct regular vulnerability assessments and recommend remedial actions. Threat Intelligence Management – Monitoring and analysing the threat landscape and providing updates to improve more »
for a Cyber Security Manager to join are client based in London. Suitable Cyber Security Manger will be responsible for ensuring the confidentiality, integrity and availability of computer systems and sensitive information. The primary responsibility of the Cyber Security manager is to lead the Cyber Security function in ensuring that … existing and new systems introduced into the business adhere to the Security controls mandated by the business. Responsible for Creation and maintaining policies and procedures as well as the Training and awareness activities required. You will support the IT and business teams in exploiting growth opportunities and managing threats in … an assured and optimal way, by creating and maintaining a positive security environment and culture. You will optimise security to add value and protect the brand, enabling the company to retain its trusted position with its investors, customers, employees and regulators. You will ensure the integrity of the company in more »
Company Overview: People power our future. That is why advancing a dynamic, inclusive environment, where everyone grows and thrives is critically important to us. Our ingenuity fuels daily life. Together, we’ve forged some of the most trusted partnerships across the energy value chain to make what was once just … an idea a reality: laying subsea infrastructure thousands of feet below sea level, installing offshore platforms hundreds of miles from shore, and using our expertise to design and build offshore wind infrastructure. For more than 100 years, we've been making the impossible possible. Today, we're driving the energy … of the brightest minds across 54 countries. Here, what you do matters Job Overview: As the local Cyber management presence, provide guidance and support for the area. Establish role as a local presence and focal point for business and IT contact. Create the relationships. As the local Cyber managementmore »
The role: • Provide guidance on advanced engineering methods to safeguard the network from security threats associated with various architectures, including web, mobile, and client/server. • Evaluate the security measures of third-party systems and applications to ensure compliance with bank policies and standards, including authentication, authorization, and error handling. … Collaborate with teams across different regions to address technology and cybersecurity regulations not covered by the global framework. • Lead the implementation of security measures across different platforms by collaborating with technology infrastructure teams, demonstrating expertise and leadership in information and cybersecurity. • Investigate potential security incidents to determine their severity and … whether they constitute a breach. • Work with stakeholders to enhance the cyber program, including refining detection tools and improving access to data sources. • Serve as a point of contact for stakeholders during security incidents and investigations, including those outside the technology team. • Respond to regulatory inquiries regarding security incidents andmore »
be centred on ensuring security is delivered into a wide range of projects. There will be a focus on working closely with DevOps teams and embedding security throughout a software development life cycle. Responsibilities: Act as the main security point of contact & SME for required projects Manage security risk for … the whole project life cycle Perform security activities, including but not limited to, security design reviews, risk assessments, threat modelling, andvulnerabilitymanagementand risk mitigation on internally & externally developed software Embedding security within DevOps (eg CI/CD pipelines), developing security requirements On-demand Security assessment of … various components like Web apps, Containers, Platforms etc Reviewing security assessment reports and create a remediation pipeline Experience in web application security assessments like SAST, DAST etc. Act as the Security subject matter expert within Agile/waterfall project planning, development, and execution Obtain and review all required artefacts as more »