Enable job alerts via email!

DevOps Engineer

GardPass Consulting

Farnborough

Hybrid

GBP 40,000 - 70,000

Full time

3 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Start fresh or import an existing resume

Job summary

An innovative consultancy is seeking a Cyber Security Engineer with a strong AWS background. Responsibilities include vulnerability scanning, incident management, and securing IT infrastructure. This role offers the opportunity to grow in Cyber Security, with training provided for candidates lacking specific experience.

Qualifications

  • Must have hands-on AWS experience.
  • Eligible for SC & DV Clearance.
  • Willingness to learn and adapt in Cyber Security.

Responsibilities

  • Perform vulnerability scanning and reporting.
  • Implement endpoint security and incident management.
  • Develop and maintain detailed security documentation.

Skills

AWS Experience
Cyber Security Knowledge
Incident Response
Vulnerability Scanning
Documentation Skills

Job description

Location: Hybrid to Farnborough, UK

Must be a sole UK national (eligible for SC & DV Clearance)

AWS hands on experience is mandatory for this position

We are looking for candidates who have experience with AWS/Cloud and ideally have AWS certifications

If you do not have experience within Cyber security the client is prepared to train you as the most important aspects will be AWS experience

Required Skills:

The Cyber Security Engineer plays a crucial role in protecting the IT infrastructure by using a blend of technical expertise and strategic planning to ensure that the digital infrastructure remains secure from various types of attacks and vulnerabilities. You will be responsible for planning and implementing appropriate security controls to ensure that the information within the client is kept secure.

Key functions/outputs:

1. Vulnerability Scanning & Reporting


2. Endpoint Security


3. Incident Management & Tickets


4. System Hardening


5. Change Work


6. Participation in Regular Meetings


7. Documentation

Main Objectives:

Vulnerability Scanning & Reporting

Perform regular vulnerability scans and generate reports utilising the below tool sets or similar. The process should be focused on ensuring that the below tool sets are kept up to date and ensure that scans are performed regularly to help assist the Vulnerability and Patch Manager with identifying weaknesses in the system.

• Code Scans: perform regular code scans to audit code quality metrics, potential bugs, and security vulnerabilities.

• Vulnerability Management Tooling: perform regular Vulnerability Management Scans and ensure that the warehouse and plugins are kept up to date to capture new vulnerabilities.

• Reporting: assist the Vulnerability and Patch Manager with generating regular vulnerability management reports, which are to be provided to the cyber security and IA lead.

Endpoint Security:

• Endpoint Protection: perform regular updates to Endpoints to ensure the latest packages are applied and policies are amended to keep up to date with new and emerging threats.

• Antivirus and Anti-malware Protection: perform compliance checks to ensure that antivirus and anti-malware protection is deployed successfully and being kept up to date by the relevant team.

• Network Controls: perform compliance checks and regular audits of network controls (i.e. firewall rules) to ensure that unauthorised access and threats are being blocked.

• Access Control: ensuring that access controls have been implemented correctly to only allow authorised users to gain access to certain data and systems.

Incident Management & Tickets:

• Incident Identification: help to recognise and confirm potential incidents through alerts, logs and user reports. This includes distinguishing between true threats and false positives.

• Incident Response: respond to potential security breaches or cyber-attacks. The main effort should focus on containment, mitigating the damage, investigation of the root cause of the incident and restoring to normal operations.

• Ticket Requests: respond to and resolve any tickets raised to the Security group on SD+ that require Cyber Security Engineering input.

System Hardening:

• Patch Updates to Security Products: ensure that the security tool sets are kept up to date with regular security patches and software updates to fix vulnerabilities and improve system security.

• System Compliance: perform regular system compliance audits and updates to ensure that the systems are compliant with industry best practices. This includes CIS, STIG, NIST etc.

• Security Enforcing Function Configuration: Assist in the design, reviews and updates to security enforcing functions (i.e. GPOs or System Policies) and system controls to ensure that they are compliant and fit for purpose.

• Vulnerability Assessments: conduct periodic assessments to identify and address potential vulnerabilities.
Change Work:

• Security Impact Triage Tool (SITT): Assist in evaluation and impact assessment of system change to security posture of the environments.

• Security Evaluation, Testing and Assurance (ST&V): perform Security, Evaluation, Testing and Assurance activities for any new changes that are planned in as part of PI Planning.

Participation in Regular Meetings:

Cyber Security Engineers are expected to lead or attend numerous meetings that require their input. This may include the following depending on work activity.

• Security Working Group (SWG

• Vulnerability Triage

• Security Workshop

• PI Planning

• Daily Standups (Blue/Green Team)

Documentation:

Cyber Security Engineers are responsible for creating, maintaining and reviewing detailed documentation. This includes High-Level & Low-Level Designs (HLD/LLD), Standard Operating Procedures (SOP) and compliance reports, and other ad-hoc security documentation, etc.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.