At a Glance
- Tasks: Join us as a Security Engineer, safeguarding our systems and tackling cybersecurity threats daily.
- Company: The Maples Group is a leading financial and legal services firm with a global presence.
- Benefits: Enjoy comprehensive health coverage, competitive vacation, educational assistance, and wellness programmes.
- Why this job: Be part of a diverse team, grow your skills, and make a real impact in cybersecurity.
- Qualifications: Bachelor's degree in relevant fields and security certifications are essential; experience in cybersecurity is a plus.
- Other info: We value diversity and conduct background checks post-offer to ensure fairness.
The predicted salary is between 36000 - 60000 £ per year.
The Maples Group is a standard bearer in financial and legal services, trusted by many of the world's largest hedge fund managers, private equity firms and international corporations. Our distinction flows from our carefully curated team: 2,500+ professionals characterised by tenacity, ethics, and exacting excellence. Operating in key financial centres across the Americas, Asia, Europe and the Middle East, our international presence offers a unique springboard for career development and cross-cultural immersion.
The Maples Group looks to add a Leeds based Security Engineer to our team and invites eager and qualified candidates to apply. We are committed to diversity, inclusion, and equality of opportunity as we attract, retain, and develop world-class talent.
This role is responsible for deploying, maintaining, supporting and improving the tools and processes for Information Security at Maples. Primary responsibilities include:
- Implementing and maintaining network, intrusion detection and prevention systems as well as other security tools in a hybrid environment (both on-prem and cloud).
- Be aware of the latest threats in cybersecurity to guide and advise the organization regarding the protection of systems.
- Monitor and translate threat intelligence feeds into actionable detection and response actions.
- Monitor and analyze security logs for attacker tactics, techniques and procedures (TTPs), filtering through suspicious activities to determine their root cause and perform remediation activities as appropriate.
- Creating, testing and validating Maples security capabilities to identify vulnerabilities/gaps and build appropriate detection and response countermeasures.
- Serve as a technical resource for the security operations team during active response efforts.
- Track, record, and monitor identified security issues through to completion.
- Support IAM technology stack by performing various identity, access and data protection activities including monitoring and enhancements to ensure that the security systems are operational and effective.
- Manage user roles, permissions and authentication mechanisms (e.g., PAM, SSO, MFA, OAuth, etc.).
- Design and enforce policies around least privilege access, identity governance, and periodic access reviews.
- Assist with overseeing the lifecycle management of identities, including providing, de-provisioning, and access modifications.
- Monitor cloud security events, logs and alerts to detect and respond to potential threats.
- Create, configure and maintain automated security playbooks to respond to incidents.
- Identify and assist with remediation of security vulnerabilities and threats in cloud environment.
- Work with cross-functional teams to ensure secure architecture, policies, controls and practices in cloud environment that maintains a high level of security.
- Assist with implementation and management of data security policies including data loss prevention, privileged access management, insider risk management, etc.
- Assist with the design, engineering and management of automations to improve workflows and inefficiencies related to security processes.
- Assists in responding to audits, penetration tests and vulnerability assessments.
- Develop, manage, and measure KPIs, KRIs and additional metrics to understand the trends, quality, and insights from the vulnerability detection results to facilitate business decisions, automation development, and update of executive dashboards, reports and templates.
- Ensure that the company's sensitive information and IT equipment are kept safe by implementing the correct security measures.
In addition to indisputably high ethical standards and autonomy, the ideal candidate possesses the following:
- Bachelor's degree in computer science, information systems, cybersecurity, or a related field.
- Security certifications: GCIA, GCFA, GCFE, CISSP (Associate), CEH, or comps.
- Experience in one or more areas: identity and access management, security operations, cyber threat hunting, Endpoint Detection and Response (EDR), detection signatures and analytics.
- Experience with open standards such as SAML, OAuth or Open ID.
- Experience with encryption, logging, log aggregation and analytics domains.
- Practical experience with securing network architecture and cloud technologies.
- Practical experience with IAM technologies such as AD, Azure AD, access policies, authentication/authorization, strong authentication, and privileged access management.
- Experience with SIEM content development, security monitoring, incident detection, incident response and forensics.
- Experience in Threat hunting & IR experience in Windows and/or Linux environments, cloud/hybrid environments.
- Proficient in SIEM and log management configuration and analysis.
- Experience with Security Orchestration Automation and Response tools.
- Experience/familiarity with Cyber Intelligence, Threat Operations, Penetration Testing, Red Teaming, Incident Response and Threat Hunting methodologies.
- Experience with intrusion detection systems and intrusion prevention systems.
- Familiarity with managing Linux servers.
- Familiarity with Ruby, Python, PHP, PowerShell, SQL, API Development, Rest, and/or shell scripting.
- Ability to drive architectural design decisions, solve technical problems, and make improvements to our systems and processes.
- Ability to troubleshoot and perform root cause analysis of incidents to identify solutions, next steps, and issue mitigation.
The most enduring professional relationships are reciprocal relationships. The Maples Group prioritises employee health and wellbeing. Depending on your location, we offer a range of benefits, including:
- Comprehensive health coverage (medical, dental, and optical).
- Competitive vacation packages.
- Educational assistance and professional development programmes.
- Savings or pension plan.
- Life insurance.
- Travel insurance.
- Global mental wellness programme.
- Sports clubs and social events.
Over five decades, the Maples Group has grown from modest beginnings into one of the world's preeminent professional services firms, offering specialised fiduciary, fund administration, regulatory and compliance, entity formation and management and legal services on the laws of the British Virgin Islands, the Cayman Islands, Ireland, Jersey, and Luxembourg.
Security Engineer employer: Maples Group - Legal Services
Contact Detail:
Maples Group - Legal Services Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Engineer
✨Tip Number 1
Familiarise yourself with the latest cybersecurity threats and trends. Being able to discuss current issues in your interview will demonstrate your passion for the field and your proactive approach to staying informed.
✨Tip Number 2
Showcase your hands-on experience with security tools and technologies relevant to the role. Prepare specific examples of how you've implemented or improved security measures in previous positions, as this will highlight your practical skills.
✨Tip Number 3
Network with professionals in the cybersecurity field, especially those who work at Maples Group or similar companies. Engaging with them on platforms like LinkedIn can provide insights into the company culture and potentially lead to referrals.
✨Tip Number 4
Prepare to discuss your approach to incident response and threat hunting during the interview. Be ready to explain your methodologies and any tools you’ve used, as this will show your analytical thinking and problem-solving abilities.
We think you need these skills to ace Security Engineer
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience and skills that align with the Security Engineer role. Focus on your expertise in cybersecurity, identity and access management, and any specific tools or technologies mentioned in the job description.
Craft a Compelling Cover Letter: Write a cover letter that not only outlines your qualifications but also demonstrates your understanding of The Maples Group's values and culture. Mention how your background and ethics align with their commitment to diversity, inclusion, and excellence.
Showcase Relevant Certifications: If you hold any security certifications such as GCIA, CISSP, or CEH, make sure to prominently display them in your application. This will help establish your credibility and expertise in the field.
Highlight Problem-Solving Skills: In your application, provide examples of how you've successfully identified and remediated security vulnerabilities in past roles. Use specific metrics or outcomes to illustrate your impact and problem-solving abilities.
How to prepare for a job interview at Maples Group - Legal Services
✨Know Your Cybersecurity Fundamentals
Make sure you have a solid understanding of key cybersecurity concepts, especially those related to network security, intrusion detection, and prevention systems. Be prepared to discuss your experience with these tools and how you've implemented them in past roles.
✨Showcase Your Problem-Solving Skills
During the interview, be ready to share specific examples of how you've tackled security challenges in previous positions. Highlight your ability to perform root cause analysis and how you’ve developed solutions to mitigate risks.
✨Familiarise Yourself with Their Tech Stack
Research the technologies and tools that The Maples Group uses, particularly in IAM and cloud security. Being knowledgeable about their specific environment will demonstrate your genuine interest in the role and your readiness to contribute from day one.
✨Prepare for Scenario-Based Questions
Expect to face scenario-based questions that assess your response to potential security incidents. Practice articulating your thought process and decision-making steps clearly, as this will showcase your analytical skills and ability to work under pressure.