IT Security Consultant (SecOps, Windows, Linux, Kubernetes, Openshift, Python, Perl, Bash)
Posted on Jul 3, 2021 by Octopus Computer Associates
IT Security Consultant (SecOps, Windows, Linux, Kubernetes, Openshift, Python, Perl, Bash) - Stockholm, Sweden - Swedish speaking
One of our Blue Chip Clients is urgently looking for an IT Security Consultant.
Please find some details below:
In this grouping you work with 2 other IT security specialists and will be referred to as "System Engineer" and with a System Architect in security and identity. You will belong to the Infrastructure & Operations section What you do as an IT security specialist at Security Operations (SecOps) Examples of tasks within SecOps are investigating both IT security incidents and IT security incidents, collaborating with Incident Managers, responsible teams and system owners to quickly and safely fix deficiencies or avert threats. There will also be a lot of contact with suppliers and their security functions, which places great demands on good communication skills in both Swedish and English.
It is a matter of course that you stay continuously updated with new threats, vulnerabilities, trends, new innovations and the technical development in the area and share your knowledge with others.
Part of the time you spend supporting design and implementations of solutions as well as solving technical problems together with architects, developers and teams. Together with the development teams and trains, you also work to strengthen their technical ability so that they can create more value in less time for the customer, for example by advising on configuration of solutions or developing architectural patterns.
As a specialist, you are responsible for the technical platforms, infrastructure and protection mechanisms in one or more technology areas. You are responsible for ensuring that the platforms and infrastructure are in line with the architectural vision and roadmap, and you ensure that the technology and platform work follows business initiatives and other common areas of relocation. Your responsibility also includes that the platforms and the technical solutions live up to non-functional requirements, such as requirements for availability, costs, continuity and security.
Security & Identity
Within Security & Identity, you work with the technology and platforms the customer has in this landscape (on-prem and in the public cloud), such as SIEM implementation, DNS, code scanning, protection against malicious code, Firewalls, intrusion detection and identity management support, but also surrounding tools for these to automate and optimize the use and management of these platforms.
You will work to support the remaining IT department in security issues, investigate alarms from security mechanisms as well as alarms from suppliers and also coordinate actions between different suppliers and teams. You need to have a broad technical understanding of both Windows and Linux as server operating systems, as well as for client platforms, networks and cloud services such as Azure and M365.
You need a great sense of order, and be able to translate requirements from internal regulations as well as external regulatory requirements into technical solutions and protective measures.
Are you the one we are looking for?
If you are the one we are looking for, you are motivated by working with technology, in depth. You can quickly adopt new technology and have a very broad technical competence required to be able to understand our existing landscapes. To succeed in the role, we see that you have:
Good experience of incident response and investigating security incidents Many years of experience in technology and platform work in large organizations according to standardized methods.
Very good understanding of Windows Server and Linux Good understanding of modern platforms (eg Kubernetes/Openshift) Good competence in any Scripting language (python/Perl/bash) for automation purposes.
Good knowledge in IT automation and tool support for this purpose.
Good knowledge of SIEM tools and log correlation Understanding of how to use APIs.
Design of robust and secure technical solutions according to regulatory requirements (privacy & security by design).
Good competence within ITIL
Experience in vulnerability management, and vulnerability scanning tools, and measures of associated deficiencies.
Knowledge of version-managed infrastructure code and supply chains. "Everything as code" setting.
Experience of working with and providing platform support for agile working methods ("Devops-ish") Experience of agile working methods and preferably experience of SAFe.
In your work, you take your own initiatives and feel an ownership of the activities you start. You show courage and act on the basis of your own convictions while having the ability to put yourself in the perspective of others and keep it in mind. Your ability to enthuse others in combination with your good leadership qualities contributes greatly to your ability to make things happen. You are outgoing and socially active in professional contexts and you continuously use your network. In communication with others, you are straightforward and clear and you know how to convey a message so that it is simple and easy to understand.
As an IT security specialist, you get the role "System Engineer" in the agile role structure the customer implements.
Please send CV for full details and immediate interviews. We are a preferred supplier to the client.