
Search by job, company or skills
We are currently supporting our client with a Security Engineer opening to join their Information Security Operations, Cyber Threat Management Team.
This role is critical in defending the organization against Cyber threats through proactive threat detection, intelligence gathering, vulnerability and risk management.
The ideal candidate will bring deep technical expertise, strategic thinking, and leadership to drive continuous improvement in our security posture, with a strong understanding of the supply chain and logistics industry.
Key Responsibilities
As a seasoned professional your key responsibilities will entail leading and/or overseeing vital security intelligence and threat management initiatives, driving vulnerability and external attack surface management and remediation, mentor junior analysts.
Security Intelligence & Threat Management
Vulnerability Management
External Attack Surface Management
Operational Leadership
Reporting & Metrics
Qualifications
Preferred Skills
License No.22C1076 | EA Reg. No.: R25142215
Job ID: 147387011
Skills:
mimecast , security automation , Incident Response, Siem, threat intelligence platforms, network security protocols, SentinelOne, Tenable, vulnerability management solutions, EASM tools

Skills:
software defined network , Ipsec, Network Security, Siem, Tls, Pki, Devops, Owasp, Smart card technologies, Threat Risk Assessments, Commercial cloud services, Cryptographic primitives, Network security protocols, Security Protocols, Platform Infrastructure as Code, EDR, NDR, Applied cryptography, Threat Modelling, XDR, Zero trust network, Device Endpoint Management, key management, Hardware security modules, va, Post-quantum cryptography, STRIDE, HSMs, Public key infrastructure
Skills:
DevSecOps, Penetration Testing, Vulnerability Scanning, Security Testing, Source Code Review, Vulnerability Management, LLM security testing, Risk Assessment, AI-assisted tools
Skills:
security automation , DevSecOps, detection and response, identity security
Skills:
Security operations and incident response workflows, Troubleshooting capabilities across system and network security issues, Log monitoring and analysis tools
We don’t charge any money for job offers