Amsterdam - NL , Berlin – DE, or Stockholm Area - SE.
1 year contract
Pay rate: 420€ day
Start date: ASAP
Good to have:
Proven experience in the creation of IT security concepts and performing risk analyzes according to ISO27001
Proven experience in the performing IT security architecture assessments
Proven experience in Infrastructure security, such as network security, multi layered defensive security, infrastructure security by design, end point security and know how about tools like Firewalls, Proxies, anti-malware concepts etc.
Proven experience in application security and related concepts, such as but not limited to; OWASP, web application security principles, securing REST interfaces and APIs, different authentication and authorization concepts.
Strong communication skills as necessary for the management of the stakeholders within the projects involved.
Advanced level of spoken and written English is a must.
Assists and supports multiple Projects with security expertise as required.
7+ years of proven experience with information and IT security is required.
Proven experience with business projects for IT Security consultancy, support, review and assessments
Resource is asked to be available for 4 days (32 hours) per week for almost a year, starting from 1st of March 2023. (or latest 13th of March 2023)
Proof of competence through a current certification in the area IT security (CISSP, other technical certifications)
Preferably experience in Cloud Security, especially for Microsoft Azure
Who should be having a technical background in IT Security
Who has adequate level of know-how on all (ISO) domains so that he/she could select relevant controls applicable to the project scope and do perform security and compliance reviews for the projects.
Who has worked on assessing and handling the information security for the suppliers/3rd parties who are providing services or processing
Who could perform Threat Modelling Assessments towards System architecture, e.g. using MS STRIDE
Who can perform security reviews on system architecture –for technical diagrams – including infrastructure and application components
Who could perform risk assessment and properly document Impact, Likelihood, Threat, Vulnerability and Recommendations per risk
Who understands well what real Threats in IT Security and who could define what needs to be done to protect systems, applications and infrastructure against such cyberthreats.
(It would be bonus if:)
Who had an IT Security technical background, could possible did some pentesting or hands on managed some IT systems in the past .
Once we receive your CV and a covering letter we will review your application. Due to the high volume of applications, we will only contact you if you are shortlisted for the role.