Job Archives
- Participate in global team environments, solving problems around the world.
- Define and ensure compliance with security policies, processes and standards to build a comprehensive Operational Technology security program
- Support Cloud Network Component in hybrid model with on-prem Network connectivity.
- Maintain expertise of industry standard and leading network security services and systems
- Maintain and create useful, accessible, network documentation that can be shared with internal users, other teams, and auditors.
- Continue to drive existing and establish new company wide security standards and practices
- Enable the business while maintaining a strong security posture within the industry best practices framework.
- Manage vendor relationships and proof of concept engagements.
- Experience with the creation and maintenance of DNS records, DNS zones, & DNSSEC.
- 7+ years of NetSec Architecture experience with NGFW, Proxies, VPNs, NSM, and LBs
- 5+ years of Network Engineering experience (Cloud or traditional)
- 5+ years of hands on Cloud Architecture and engineering experience (ie: AWS, GCP, or OCI)
- 3+ years in a dedicated security engineering role
- 3+ years of general python or golang scripting experience
- Working knowledge hybrid cloud attack vectors , Network protocols and packet analysis
- Working knowledge of Infrastructure as Code (IaC) and CI/CD
- Working knowledge of scalable and cross cloud provider secure and scalable solutioning
- Working knowledge of network routing, HTTP and API protocols security
- Working knowledge of networking securely with high bandwidth and availability requirements
- Working knowledge of project management and strong interpersonal skills
- Deep GCP and/or OCI network security experience
- Strong understanding of OSI layers
- Automation and Integration knowledge
- Red Team or Blue Team / Attack Analyst background
Job Features
About The Role The Sr Cloud Network Security Engineer serves as the security engineering subject matter expert for all cloud networks and reports to the Manager of Network Security. This role will pro...View more
- Understand and work with the business as well as with the Cyber Security team to identify, define and implement cyber security requirements for the organization
- Knowledge of cloud architecture to support the infrastructure and software engineering team in the design and implementation of secure architectures
- Support and further development our SOC
- Manage vulnerability assessment and work closely with stakeholders to fix detected vulnerabilities to maintain a high security standard
- Perform in-depth analysis of security related monitoring events and define follow up activities
- Engage in and coordinate cyber reviews and penetration tests
- Ensure that the company knows as much as possible, as quickly as possible about security threats and incidents (internal/ external)
- Perform maintenance, deployment and enhancement of the security infrastructure in line with best practices
- Knowledge of security governance frameworks for managing cyber risk and reporting
- Conduct and follow up for phishing campaigns
- Provide guidance to IT resources on secure configuration of systems, permissions, new projects, products & relationships
- Scripting and automation of common tasks/procedures
- Participation in industry led events and keeping up-to-date with industry trends
- Bachelor's degree in related field from red brick university
- Strong understanding of Information Security within an enterprise environment
- Responsive and adaptive in a dynamic, collaborative work environment
- Service oriented, accurate, effective and independent working style, even under pressure
- Driven and self-motivated person with the ability to maintain the highest level of confidentiality
-
- Knowledge of security systems including proxy servers, firewalls, intrusion detection systems, authentication systems, log management, content filtering, data leakage protection, endpoint tools, etc.
- Knowledge of coordinating responses to security incidents, or operating in a SOC environment
- Knowledge of IT infrastructure (virtualization, security and network services)
- Strong scripting/programming language experience (e.g. Python/Powershell)
- Conduct vulnerability assessment and remediation to a high security standard
- Strong understanding of identity management, supporting protocols and applied cryptography
- Intrusion analyst skills (traffic analysis, event correlation) and analysis/tuning of IPS/IDS/SIEM/DLP/EDR deployments
- Ability to analyse and interpret network, system, security and application logs in order to diagnose faults and spot abnormal behavior
- Excellent understanding of information security principles and practices
- The ability to express yourself clearly and logically both orally and in writing (English)
- The ability to produce high quality, written security documentation
- DevSecOps skills for reviewing and support Infrastructure as Code (IaC) or CI/CD piplelines is a plus Experience in DLP analysis and tuning
- Security related certifications is a plus
- Master's degree in Cyber Security
- Desire to work in a financial/regulated environment.
Job Features
Project Description: BAU/Project/Risk Assessment in the areas of information and cyber security across the business Responsibilities: Understand and work with the business as well as with the Cyber Se...View more
- Conduct proactive threat hunting exercises to identify advanced and persistent threats within the organization's network and systems.
- Collaborate with cross-functional teams to develop and refine threat hunting methodologies, leveraging both internal and external threat intelligence sources.
- Analyze threat data from various sources, including logs, network traffic, and endpoints, to identify indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) associated with cyber threats.
- Investigate and respond to security incidents, analyzing the scope and impact of breaches, and developing mitigation strategies.
- Provide expertise in analyzing malware and malicious artifacts to understand their functionality and potential impact.
- Create and maintain detailed documentation of threat hunting processes, findings, and incident response procedures.
- Produce timely and accurate reports on threat hunting activities, findings, and recommended actions to stakeholders and management.
- Contribute to the development of playbooks, standard operating procedures, and other documentation to enhance the incident response process.
- Strong understanding of common cyber-attack techniques, such as phishing, malware propagation, lateral movement, and data exfiltration.
- Collaborate with the incident response team to develop and enhance incident response playbooks, ensuring alignment with threat intelligence insights.
- Work closely with CSIRT team people & technology to detect, assess, and communicate cyber threats.
- Proactively monitoring and analyze logs via the SIEM for indicators of attack.
- Lead proactive threat hunting initiatives, utilizing both internal and external threat intelligence sources, to identify potential threats and vulnerabilities.
- Develop and refine threat hunting methodologies, leveraging indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs), and threat actor profiles.
- Collaborate closely with cross-functional teams to provide timely and relevant cyber threat intelligence updates, contributing to strategic security decisions.
- Perform in-depth analysis of threat data from various sources to identify patterns, correlations, and trends, and translate findings into actionable intelligence.
- Create and disseminate timely threat intelligence reports and alerts to stakeholders, enabling informed responses to emerging threats.
- Define SIEM use cases to collect, monitor and analyze data to discover and discern trends, threats, and security risks associated with BCG assets and information.
- Incorporating emerging threat intelligence and zero-day vulnerabilities into new detection content, as well as evaluating detection value and exposure throughout the entire detection lifecycle, including retirement and deprecation.
- Threat Hunting Frameworks & Methodologies
- Attacker methods and TTPs
- Standards, regulations, and legislation
- Technologies and solutions
- Industry best practices
- Threats and vulnerabilities
- Threat Hunting, Incident response and investigation
- Incident response management for client security incidents
- Work with IT Directors, Managers, Architects and staff to implement, monitor and maintain Confidentiality, Availability and Integrity of BCG information assets.
- Track and manage materials provided to external providers and clients.
- Maintain information security credentials and certifications as required to present a credible presence to internal and external audiences.
- Bachelor’s degree (or equivalent) in Computer Science, Cybersecurity, Information Security, or a related field.
- Minimum 10 years of information security experience, with a very strong technical background.
- Demonstrated Threat Hunting, Threat Intelligence and Incident Response experience.
- Strong experience with threat hunting methodologies and tools, including but not limited to SIEM platforms, EDR solutions, network traffic analysis tools, and threat intelligence feeds.
- Proficiency in analysing and interpreting security logs, network traffic, and endpoint data to identify and investigate potential security incidents.
- Ability to craft advanced SPL to fulfil detection criteria, with a background in fine-tuning and testing use cases, adjusting SPL logic accordingly for optimal performance will be a great value add.
- Strong analytical, problem-solving, and critical-thinking skills, with the ability to work effectively in high-pressure situations.
- Experience with threat intelligence frameworks and methodologies, including STIX/TAXII, MITRE ATT&CK framework, and other relevant standards.
- Expertise in analyzing malware and malicious artifacts, employing both static and dynamic analysis techniques.
- Security certification like GIAC Cyber Threat Intelligence (GCTI), GIAC Certified Intrusion Analyst (GCIA) or GIAC Certified Incident Handler (GCIH) or equivalent a plus.
- Requires an advanced level of professional knowledge in information technology and security developed through a combination of advanced degrees in information technology and hands on experience.
- Must have previous career development experience which has provided management skills, motivational skills, interpersonal skills, and outstanding organizational effectiveness.
- Knowledge of the legal and regulatory landscape related to security and privacy in an international environment.
- Very strong business sense with ability to relate technology issues to business.
- Requires strong analytical skills and abilities including an extensive knowledge of software, database, operating systems, client server architecture and voice and data communication services and facilities, security and privacy, in an international setting.
- Perform in-depth analysis of threat data from various sources to identify patterns, correlations, and trends, and translate findings into actionable intelligence.
- Communication, interpersonal and teaming skills
- Outstanding verbal and written communications skills are a must because of the requirement to represent BCG in communications with clients.
- Calm demeanour, grace under fire, outstanding listening skills
- High level of initiative and self-motivation, resourceful, and patient with an iterative process
- Ability to gain trust and commitment of others at different levels of the organization.
- Proven ability to challenge traditional way of operating and moving beyond the obvious
- Translates BCG’s broader strategic objectives and cascades these into own work plans, metrics and teamwork plans.
- Works effectively with significant ambiguity and fluctuating priorities and constrains.
- Ability to evaluate and prepare detailed project plans for technology projects that will be implemented across the business. Manage local and global technology problems and direct staff in resolution of such problems. Evaluate and advise on the technology and systems components associated with projects adopted by BCG corporate and offices.
- Ability to monitor projects and direct staffs to ensure projects are aligned with the strategic objectives of the business.
- Focuses on the most critical issues that have the highest impact on the organization and business needs • Working mode: “enabling”, “value adding” and “expanding” • Treats all others with respect; generate trust
- This position requires interaction with BCG Partners, BCG Case Team staff, client legal and security staff, Administrative Management, vendors, IT Management and Staff, Legal Department, Finance, Vendors, etc. Very strong relationship skills are essential. Excellent Leadership and teaming skills are required
- Strong sense of confidentiality and integrity
- Treats others with respect and generates trust
- Establish relationships based on respect, trust and integrity.
Job Features
POSITION SUMMARY: The Incident Responder/Threat – Cyber Security Sr. Manager (IR/TH) is an experienced position within the CSIRT and will play a pivotal role in identifying, analysing, and mitig...View more
- Define Security levels for each environment based on the criticality
- Define & Drive the mitigation/remediation thru the Ops Organization
- Provide the right visibility to the cybersecurity leader of the platform.
- Collaborate with the corporate security department to align on the policies
- 6+ years of relevant experience in cybersecurity, especially around
- Azure security services and operations
- Azure Policies and Guardrails
- Networking & Firewalling expertise
- Security operations management
- Familiar with Agile processes & continuous integration frameworks
- Experience with PaaS/IaaS environments in Microsoft Azure, an experience is Landing Zone is a plus.
- Experience in a small/medium organization delivering services inside a large ecosystem would be a plus.
- Certifications such as ethical hacking, Azure Security certification (AZ 500) would be a plus
- Clear communication in English – written and verbal – able to discuss with a wide range of different profiles/cultures/management levels.
- Team player able to find its place in our Ops community and to lead by influence
- Tech-savvy Information Security Professional able to think beyond classic IaaS-based security paradigms: a large part of the IoT offers and platforms is PaaS- or SaaS-based (Azure/AWS) and involves IoT technologies, thus making classic IT perimetric security approaches inefficient
- Autonomous and proactive Information Security professional able to propose and implement solution in our agile and fast-moving IoT environment.
Job Features
Job Purpose: The Cloud SecOps team operates following 4 streams: Incident management, Vulnerability management, External exposure & Cloud hardening. We are currently looking for a cybersecurity ex...View more
- Perform Threat Analysis and Risk Assessment – TARA as per ISO 21434. Work with Threat modeling tools and more.
- Act as an interface between the Project Cyber security Manager (PCSM) and Project SYS/HW/SW Architects.
- Produce/Designate cyber security work products required in cyber security concept phase (e.g. cyber security goal, cyber security concept, cyber security claim)
- Design Security Architectures and security controls
- Review cyber security goal and cyber security concept with SYS/HW/SW architects to produce verification reports
- Support the cyber security engineer to develop cyber security work products in development phase (e.g. cyber security specification, cyber security requirements for post-development)
- Review system architecture changes to re-evaluate the state of system cyber security.
- Bachelor’s degree in Computer Science Engineering / ECE / EEE or equivalent
- Atleast 8 yrs of Automotive or Embedded system experience with 5 yrs of experience in automotive cybersecurity architectures.
- Proven experience in conducting TARA according to ISO 21434
- Good understanding of the ISO 21434 standard.
- In-depth knowledge of Automotive cybersecurity concepts, including secure coding guidelines and Cryptographic algorithms.
- Good collaboration and communication skills.
- Knowledge and experience in the following standards : ISO 21434 and its certification, UNECE R155, A-SPICE
- CSMS (Cybersecurity management systems ) and related processes
- Risk Management Frameworks, NIST Cybersecurity Framework, NIST Risk Management Guidelines.
Job Features
About The Role As a Automotive Cyber security Architect will contribute to shape the future automotive security architectures by analysing the System architecture, designs, identifying the potential s...View more
Roles and Responsibilities:
Industry Experience:
- Previous experience in the field of cyber security with 8+ Years engagement experience
- Candidates with at least 10 Years of relevant experience, which may include roles such as security analyst, network administrator, or system administrator.
- Practical knowledge of industry best practices and compliance regulations is highly valued.
Leadership and Communication Skills:
- A cyber security manager is expected to lead and manage a team of security professionals.
- Strong leadership abilities with excellent communication and interpersonal skills are essential for collaborating with stakeholders across different departments, including IT, legal, and executive management.
Strategic Planning:
- Develop and execute the organization’s cyber security strategy.
- Align security initiatives with business goals and risk management.
Risk Management:
- Identify and assess cyber risks.
- Implement risk mitigation strategies and ensure compliance with regulations.
Budgeting and Resource Allocation:
- Allocate resources effectively to enhance cyber security.
- Manage the budget for security initiatives.
Stakeholder Communication:
- Collaborate with senior management, board members, and other executives.
- Provide regular updates on cyber security posture and incidents.
Incident Response and Crisis Management:
- Oversee incident response plans.
- Coordinate crisis management efforts during security incidents.
Job Features
Roles and Responsibilities: Industry Experience: Previous experience in the field of cyber security with 8+ Years engagement experience Candidates with at least 10 Years of relevant experience, which ...View more
Job Description:
You may be the ideal candidate if you have hands-on experience in:
· ISO 26262 Safety and Cyber Security with expertise on Software Design and Architecture
- Reviewing all the BSW modules configuration – OS, Communication Stack(J1939), vBase, vlink, Memmap, and Wdg
- Verifying if the configuration meets AUTOSAR & application requirements
- Performing third-party MCAL Integration using DaVinci
- BSW Integration & Workspace creation (Focus items – Linker, Startup, and Vector Table)
Job Features
Job Description: You may be the ideal candidate if you have hands-on experience in: · ISO 26262 Safety and Cyber Security with expertise on Software Design and Architecture