Security Engineer

United Kingdom

Maples Group

Advising on the laws of the British Virgin Islands, the Cayman Islands, Ireland, Jersey & Luxembourg. Provides legal and financial services.

View all jobs at Maples Group

Apply now Apply later

OVERVIEW

The Maples Group is a standard bearer in financial and legal services, trusted by many of the world’s largest hedge fund managers, private equity firms and international corporations.

Our distinction flows from our carefully curated team: 2,500+ professionals characterised by tenacity, ethics, and exacting excellence. Operating in key financial centres across the Americas, Asia, Europe and the Middle East, our international presence offers a unique springboard for career development and cross-cultural immersion. Our side-by-side financial and legal services are similarly ripe for interdisciplinary learning and growth.

The Maples Group looks to add a Leeds based Security Engineer to our team and invites eager and qualified candidates to apply. We are committed to diversity, inclusion, and equality of opportunity as we attract, retain, and develop world-class talent.

Who We Seek

Our merit-based culture suits professionals in pursuit of boundless careers and lives. Beyond their acumen, team members are collaborative and conscientious, bringing a healthy sense of drive and purpose to each interaction and to all aspects of their work.

About the Role

This role is responsible for deploying, maintaining, supporting and improving the tools and processes for Information Security at Maples. Primary responsibilities include: 

  • Implementing and maintaining network, intrusion detection and prevention systems as well as other security tools in a hybrid environment (both on-prem and cloud)
  • Be aware of the latest threats in cybersecurity to guide and advise the organization regarding the protection of systems
  • Monitor and translate threat intelligence feeds into actionable detection and response actions
  • Monitor and analyze security logs for attacker tactics, techniques and procedures (TTPs), filtering through suspicious activities to determine their root cause and perform remediation activities as appropriate
  • Creating, testing and validating Maples security capabilities to identify vulnerabilities/gaps and build appropriate detection and response countermeasures
  • Serve as a technical resource for the security operations team during active response efforts
  • Track, record, and monitor identified security issues through to completion
  • Support IAM technology stack by performing various identity, access and data protection activities including monitoring and enhancements to ensure that the security systems are operational and effective
  • Manage user roles, permissions and authentication mechanisms (e.g., PAM, SSO, MFA, OAuth, etc.)
  • Design and enforce policies around least privilege access, identity governance, and periodic access reviews
  • Assist with overseeing the lifecycle management of identities, including providing, de-provisioning, and access modifications
  • Monitor cloud security events, logs and alerts to detect and respond to potential threats
  • Create, configure and maintain automated security playbooks to respond to incidents
  • Identify and assist with remediation of security vulnerabilities and threats in cloud environment
  • Work with cross-functional teams to ensure secure architecture, policies, controls and practices in cloud environment that maintains a high level of security
  • Assist with implementation and management of data security policies including data loss prevention, privileged access management, insider risk management, etc
  • Assist with the design, engineering and management of automations to improve workflows and inefficiencies related to security processes
  • Assists in responding to audits, penetration tests and vulnerability assessments
  • Develop, manage, and measure KPIs, KRIs and additional metrics to understand the trends, quality, and insights from the vulnerability detection results to facilitate business decisions, automation development, and update of executive dashboards, reports and templates
  • Ensure that the company’s sensitive information and IT equipment are kept safe by implementing the correct security measures

EXPERIENCE

What You Bring

In addition to indisputably high ethical standards and autonomy, the ideal candidate possesses the following: 

  • Bachelor’s degree in computer science, information systems, cybersecurity, or a related field
  • Security certifications: GCIA, GCFA, GCFE, CISSP (Associate), CEH, or comps.
  • Experience in one or more areas: identity and access management, security operations, cyber threat hunting, Endpoint Detection and Response (EDR), detection signatures and analytics
  • Experience with open standards such as SAML, OAuth or Open ID
  • Experience with encryption, logging, log aggregation and analytics domains
  • Practical experience with securing network architecture and cloud technologies
  • Practical experience with IAM technologies such as AD, Azure AD, access policies, authentication/authorization, strong authentication, and privileged access management
  • Experience with SIEM content development, security monitoring, incident detection, incident response and forensics
  • Experience in Threat hunting & IR experience in Windows and/or Linux environments, cloud/hybrid environments
  • Proficient in SIEM and log management configuration and analysis
  • Experience with Security Orchestration Automation and Response tools
  • Experience/familiarity with Cyber Intelligence, Threat Operations, Penetration Testing, Red Teaming, Incident Response and Threat Hunting methodologies
  • Experience with intrusion detection systems and intrusion prevention systems
  • Familiarity with managing Linux servers
  • Familiarity with Ruby, Python, PHP, PowerShell, SQL, API Development, Rest, and/or shell scripting
  • Ability to drive architectural design decisions, solve technical problems, and make improvements to our systems and processes
  • Ability to troubleshoot and perform root cause analysis of incidents to identify solutions, next steps, and issue mitigation

 

BENEFITS & REWARDS 

The most enduring professional relationships are reciprocal relationships. The Maples Group prioritises employee health and wellbeing. Depending on your location, we offer a range of benefits, including: 

  • Comprehensive health coverage (medical, dental, and optical)
  • Competitive vacation packages
  • Educational assistance and professional development programmes
  • Savings or pension plan
  • Life insurance
  • Travel insurance
  • Global mental wellness programme
  • Sports clubs and social events

ABOUT MAPLES GROUP

Over five decades, the Maples Group has grown from modest beginnings into one of the world's preeminent professional services firms, offering specialised fiduciary, fund administration, regulatory and compliance, entity formation and management and legal services on the laws of the British Virgin Islands, the Cayman Islands, Ireland, Jersey, and Luxembourg.

You can learn more about the Maples Group on our corporate website. Experience our culture and our people on our Careers Page or on LinkedIn.

Maples’ standard policy to undertake various background screening checks, including criminal records checks, on all applicants to whom a conditional job offer is made. Maples will only ask applicants to disclose a past criminal conviction when a conditional job offer is made. If you have a criminal record, it does not mean that your job offer will be automatically withdrawn. Maples will make all job offer decisions on a case-by-case basis and will take a number of factors into account, such as the role that you are applying for and the nature and circumstances of the past offence. You will have the opportunity to discuss the matter with Maples before a decision is made. 

Disclaimer: All personal information collected during the application process will be used for recruitment-related purposes only. Please refer to our Job Applicant Privacy Notice at maples.com/privacy for details on how we handle personal information relating to job applicants.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Analytics APIs Audits Automation Azure CEH CISSP Cloud Compliance Computer Science EDR Encryption Forensics GCFA GCFE GCIA Governance IAM Incident response Intrusion detection Intrusion prevention KPIs Linux Monitoring Pentesting PHP PowerShell Privacy Python Red team Risk management Ruby SAML Scripting SIEM SQL SSO Threat intelligence TTPs Vulnerabilities Windows

Perks/benefits: Career development Flex vacation Health care Startup environment Team events Wellness

Region: Europe
Country: United Kingdom

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.