At a Glance
- Tasks: Join a global team to enhance cybersecurity tools and processes.
- Company: Be part of a leading organisation focused on information security worldwide.
- Benefits: Enjoy largely remote work with occasional office visits and flexible hours.
- Why this job: Make a real impact in cybersecurity while working with cutting-edge technology.
- Qualifications: Experience in IAM, security operations, and threat hunting is essential.
- Other info: This role requires one day per quarter in the Leeds office.
The predicted salary is between 48000 - 72000 £ per year.
Global Cyber Security Engineer Working Policy: Largely remote working but candidates must be prepared to do 1 day per quarter required in my clients Leeds office if required. Working as part of a globally distributed team, this role will be responsible for deploying, maintaining, supporting and improving tools and processes for Information Security globally. Responsibilities: – Support IAM technology stack by performing various identity, access and data protection activities including monitoring and enhancements to ensure that the security systems are operational and effective. – Design and enforce policies around least privilege access, identity governance, and periodic access reviews. – Implement and maintain network, intrusion detection and prevention systems as well as other security tools in a hybrid environment (both on-prem and cloud). – Be aware of the latest threats in cybersecurity to guide and advise the organization regarding the protection of systems. – Serve as a technical resource for the security operations team during active response efforts. – Manage user roles, permissions and authentication mechanisms (e.g., PAM, SSO, MFA, OAuth, etc.). – Monitor cloud security events, logs and alerts to detect and respond to potential threats Required Skills / Experience: – Identity and access management (IAM), security operations, cyber threat hunting, Endpoint Detection and Response (EDR) and detection analytics. – Practical experience with IAM technologies such as AD, Azure AD, access policies, authentication/authorization, strong authentication, and privileged access management. – Experience with open standards such as SAML, OAuth or Open ID. – Experience with SIEM content development, security monitoring, incident detection, incident response and forensics. – Experience in Threat hunting & IR experience in Windows and/or Linux environments, cloud/hybrid environments. – Experience of working within a global, highly regulated environment is important. Global Cyber Security Engineer In accordance with the Employment Agencies and Employment Businesses Regulations 2003, this position is advertised based upon DGH Recruitment Limited having first sought approval of its client to find candidates for this position. DGH Recruitment Limited acts as both an Employment Agency and Employment Business TPBN1_UKTJ
Global Cyber Security Engineer employer: DGH Recruitment
Contact Detail:
DGH Recruitment Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Global Cyber Security Engineer
✨Tip Number 1
Familiarise yourself with the latest trends and threats in cybersecurity. Being well-versed in current issues will not only help you during interviews but also demonstrate your proactive approach to staying informed in this rapidly evolving field.
✨Tip Number 2
Network with professionals in the cybersecurity field, especially those who work in IAM and security operations. Engaging with industry experts can provide valuable insights and potentially lead to referrals or recommendations for the role.
✨Tip Number 3
Showcase your practical experience with IAM technologies and security tools by discussing relevant projects or challenges you've tackled in previous roles. This will highlight your hands-on skills and make you a more attractive candidate.
✨Tip Number 4
Prepare for technical interviews by brushing up on your knowledge of open standards like SAML and OAuth. Being able to discuss these topics confidently will set you apart from other candidates and demonstrate your expertise.
We think you need these skills to ace Global Cyber Security Engineer
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in identity and access management, security operations, and cyber threat hunting. Use specific examples that demonstrate your skills with IAM technologies and security tools.
Craft a Strong Cover Letter: In your cover letter, express your enthusiasm for the role and the company. Mention your understanding of the latest cybersecurity threats and how your experience aligns with the responsibilities outlined in the job description.
Showcase Relevant Skills: Clearly list your practical experience with IAM technologies, SIEM content development, and incident response. Use bullet points to make it easy for the hiring team to see your qualifications at a glance.
Proofread Your Application: Before submitting, carefully proofread your application for any spelling or grammatical errors. A polished application reflects your attention to detail, which is crucial in a cybersecurity role.
How to prepare for a job interview at DGH Recruitment
✨Showcase Your Technical Expertise
Be prepared to discuss your experience with IAM technologies, security operations, and threat hunting. Highlight specific projects where you've implemented or improved security measures, especially in hybrid environments.
✨Stay Updated on Cybersecurity Trends
Demonstrate your knowledge of the latest threats and trends in cybersecurity. This shows that you are proactive and committed to staying informed, which is crucial for a role focused on protecting systems.
✨Prepare for Scenario-Based Questions
Expect questions that assess your problem-solving skills in real-world scenarios. Think about how you would respond to specific security incidents or challenges, particularly those involving IAM and access management.
✨Emphasise Team Collaboration
Since this role involves working within a globally distributed team, highlight your experience in collaborative environments. Share examples of how you've successfully worked with remote teams to achieve security objectives.