-
Client > Management Consulting Company
-
Ideal Candidate > Ideal Candidates are analytical, detail-oriented professional with strong technical expertise in IT security, risk management frameworks, and compliance standards, able to balance hands-on threat defense with strategic governance
-
Tasks/Responsibilities > Example of activities > Identify potential cyber threats (internal and external); Map and evaluate risks associated with IT systems, networks, and applications; Develop risk management frameworks and methodologies; Support business continuity and disaster recovery planning; Implement access controls, authentication mechanisms, and identity management; Continuously monitor network traffic, systems, and applications for threats; Investigate security alerts and anomalies.
-
Roles available> IoT Security; OT Security; VAPT/Testing; Security Risk Assessments; GRC Compliance; Security Awareness; Security Reporting; Security PMO; Incident Responder; DevSecops engineers; Threat Hunters; GRC Specialist; Red Teamer; Security Architects
-
Workload/Location> Remote-working
-
Start-date > Immediate need
-
Period of engagement > 1 year-contract
-
Rate > able to attract more qualified candidates