Cyber Threat Management Consultant, London, Mindtree

Published 2022-08-07
Expires 2022-09-07
ID #1118058241
Cyber Threat Management Consultant, London, Mindtree
United Kingdom, London, London,
Published August 7, 2022

Job details:

Job type: Full time
Contract type: Permanent
Salary type: Per annum
Occupation: Cyber threat management consultant

⇐ Previous job

Next job ⇒     


The mission of Mindtree, a Larsen & Toubro Group Company, is to engineer meaningful technology solutions to help businesses and societies flourish. Our successful technology business serves over 2000 Global customers and now, we are in a process of expanding. Mindtree is extending its technology business with specific expansion plans in the UK. We are looking for an experienced professional to join our team in London as: Cyber Threat Management Consultant. Job Description : ·Looking for 10 years of experience in Vulnerability Management. Need someone at Architect level. Experience in handling large customers with complex application & processes. Working knowledge of relevant Security Assessment methodologies, (including Threat Modeling, Static and Dynamic analysis (SAST, DAST), Penetration Testing, vendor application security testing, software composition analysis, configuration review and Penetration Testing). Hands-on experience in performing security assessment with experience in tools such as HCL AppScan, Veracode, Checkmarx, NMap, Kali Linux, AppSpider, Net Sparker Enterprise, etc. Experience in the responsibility for the reviewing vulnerabilities' data from multiple sources (i.e. external / internal penetration testing, internal / external vulnerability scanning, etc.) across multiple technologies and a changing environment including infrastructure and applications to determine risk rating of vulnerabilities to business assets Experience in improving and automating existing vulnerability management lifecycle. Including but not limited, data ingestion & normalization, compliance metrics and detections on assets. Experience in performing threat modeling and Design Reviews using commercial and open source tools Experience with DevSecOps process and tool implementation Experience in automation & integration of security tools with CI/CD pipeline Experience of Infrastructure Security Scanning and Process Implementation Experience in developing proof of concept applications to demonstrate best practices Support practice enablement Experience in handling teams Understanding of industry trends, system and technology integration, IT standards, procedures and policies, and emerging technologies knowledge of application security standards (ISO/IEC 27002, ISO/IEC 27032, ISO/IEC 27034 and NIST SP 800-53, OWASP Application Security Verification Standard (ASVS) and Mobile Security Testing Guide (MSTG), etc.) and vulnerabilities Excellent communication and interpersonal skills Ability to work with multiple team and excellent at multi-tasking Should have the zeal to learn new technologies

⇐ Previous job

Next job ⇒     


Contact employer

    Employer's info

    Registered on October 7, 2017


    Quick search:


    Type city or region


    Category info:

    Information technology (IT) is the application of computers to store, study, retrieve, transmit, and manipulate data, or information, often in the context of a business or other enterprise. IT is considered a subset of information and communications technology (ICT). In 2012, Zuppo proposed an ICT hierarchy where each hierarchy level "contain[s] some degree of commonality in that they are related to technologies that facilitate the transfer of information and various types of electronically mediated communications". The term is commonly used as a synonym for computers and computer networks, but it also encompasses other information distribution technologies such as television and telephones. Several industries are associated with information technology, including computer hardware, software, electronics, semiconductors, internet, telecom equipment, and e-commerce. Humans have been storing, retrieving, manipulating, and communicating information since the Sumerians in Mesopotamia developed writing in about 3000 BC, but the term information technology in its modern sense first appeared in a 1958 article published in the Harvard Business Review; authors Harold J. Leavitt and Thomas L. Whisler commented that "the new technology does not yet have a single established name. We shall call it information technology (IT)." Their definition consists of three categories: techniques for processing, the application of statistical and mathematical methods to decision-making, and the simulation of higher-order thinking through computer programs.

    awaiting description

    Source: https://en.wikipedia.org/