Connecting to LinkedIn...

Connecting to LinkedIn...

W1siziisijiwmtqvmdkvmzavmtavndevmzevmzkxl3n0b2nrx3bob3rvx2pvynnfynv0dg9ux29ux2tlewjvyxjkxzgwmdu4mtgxlmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Technology Security & Compliance Manager

Job Title: Technology Security & Compliance Manager
Contract Type: Permanent
Location: London, London
Industry:
Salary: £75000 per annum + 12% bonus
REF: JH002
Contact Name: Jade Harris
Contact Email: jadeh@montash.com
Job Published: about 1 year ago

Job Description

Location: London

Contract Type: Permanent

Salary: Up to £75k (DOE) - plus bonus & benefits

An opportunity to join a growing online credit solutions provider, whose expertise will lead teams and the company into further growth.

About the role:

This role will involve monitoring system logs for unauthorised access or irregularities, coordinating the appropriate response and ensuring further preventative measures are in place. You will perform regular risk assessments, and report to the CTO on compliance with both PCI and ISO 27001 standards. The Technology Security & Compliance Manager will work with the Head of Compliance to ensure UK systems uphold best practice, while being responsible for leading security risk assessments and remediation efforts. The successful candidate will get to travel on a monthly basis, to experience operations within multiple sites.

The successful candidate will be:

Either CISSP, CISM or GIAC certified

Possess a strong background working with various security technologies (firewalls, intrusion detection, network traffic analysis etc.)

Knowledgeable on financial regulatory standards (E.g. FCA, PCI, SOX etc.)

Evolving from more technical IT experience

This is a rare and exciting opportunity to join an emerging company, which is heavily investing into finding the best talent out there.

To apply, please forward your CV's across to jadeh@montash.com and we will be in touch shortly.

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...