Skip to content

ComputerWork: Jobs for Technical People

 

Job Application

 
 
 

Please answer the following questions in order to process your application.

 
 
Email Address *
 
Select your working status in the UK *
 
 
 
File Attachments:
(2MB file maximum. doc, docx, pdf, rtf or txt files only)
 
Attach a CV * 
 
Optional covering letter 
OR
Clear covering letter
 
 
 * denotes required field
 
 
 
Additional Information:
 
First Name
 
Last Name
 
Address
 
Country
 
Home Telephone
 
Mobile/Cell
 
Availability/Notice
 
Hourly Rate GBP
 
Approximately how far are you willing to travel to work (in miles) ?
 
 
 

Key Privacy Information

When you apply for a job, ComputerWork will collect the information you provide in the application and disclose it to the advertiser of the job.

If the advertiser wishes to contact you they have agreed to use your information following data protection law.

ComputerWork will keep a copy of the application for 90 days.

More information about our Privacy Policy.

 

Job Details

 

IT Security Consultant - IDAM - Outside IR35 - Hybrid Working (Contract)

Location: London - Canary Wharf Country: UK Rate: £540 per day Outside IR35
 

IT Security Consultant - Outside IR35 - Hybrid Working

Security experience covering - -threat assessments, third party risk assessments, RFP security requirements and scoring, network security, IDAM projects, ransomware remediation, pen test scoping, hld/lld reviews.

Role Requirements and Demonstrable experience required as follows :

  1. Perform threat modelling
  2. Assess high and low level architectural designs and identify security risks. Make recommendations on how to mitigate them
  3. Provide security requirements for RFPs, score RFPs
  4. Perform assessments of third party security posture
  5. Create scope for pen testing, oranise pen tests, review results and oversee remediation
  6. Agree specific security controls with projects and gather evidence that these have been implemented
  7. Identify and articulate risks
  8. Input into testing strategy with specific security use cases
  9. Input into service acceptance criteria and warranty
  10. Identify use cases for security monitoring and alerting
  11. Understand security tooling and what handover needs to happen to operations

Posted Date: 15 May 2024 Reference: JS/PES/SECURITY IDAM Employment Business: Pesaro Limited Contact: Paul Deba