MBR partners are working with a UK based Telecommunication client that offers digital identity solutions that allow enterprises, such as banks, to verify Mobile Service Provider information via an API, for the purpose of building up fraud scores for transactions. For example, companies would be able to understand location information about a subscriber's handset when a transaction is happening (i.e., is the person roaming). Other examples include information related to Sim-swaps and whether someone might be on an active call and potentially being coerced into making a transaction.
The client works on a revenue split with all the Mobile Network Operators in Germany and Austria and offers the solution to fraud platform companies/local channel partners that incorporate the data into their solutions (with the bank being the end customer). The role is with a fast-growing Fraud Prevention Services Business Unit of a 150 million USD revenue global solutions provider.
The Security Solution Architect works within the cybersecurity consultancy, risk and advisory unit which is part of the Global Solutions team. The role involves providing regular cybersecurity, risk and compliance services/assessments, reports, and prioritised recommendations as well as consultative support to their clients while partnering with internal leadership teams and colleagues in helping the clients protect their digital assets, information, and systems from cyber threats and vulnerabilities. A crucial function of the role includes designing and tailoring these services for inclusion in the clients' product/services portfolio. Ideally, you will be in presales or a technical solutions architect able to advise on the gap analysis of differing threat levels.
Responsibilities
Key responsibilities and accountabilities:
1. Design and recommend security architectures, solutions, and controls to protect client critical assets and data.
2. Develop and help customers implement incident response plans, which outline steps to take in case of a security breach.
3. Perform security assessments for customers, including penetration testing, to identify weaknesses in systems and networks and propose mitigation plans where required.
4. Recommend, design, and implement security tools and technologies such as firewalls, intrusion detection systems, endpoint protection, and distributed denial of service (DDoS) mitigation solutions.
5. Build strong relationships with customers, providing ongoing cybersecurity consultation and support. Communicate findings and recommendations effectively and develop strategies and roadmaps for improvement.
6. Ensure technical implementation and customers’ business requirements are aligned by ensuring that controls, processes, and procedures are documented for the business’s operational team.
7. Lead in risk advisory services to their customers which entails developing associated cybersecurity services for their service portfolio.
8. Ensure that the client delivers contractual security requirements for managed service customers by:
1. Acting as a point of contact between the sales and operational teams during contract negotiations.
2. Performing gap analysis and risk assessments on solutions in-flight and in future contractual commitments.
3. Identifying security deliverables, creating work packs, and ensuring handover into operational delivery.
9. Liaise and manage internal and 3rd party suppliers in the deployments of element or the total solution relating to cybersecurity.
Required
1. Degree or equivalent experience in Computing/IT Security/Cyber.
2. Experience in IT, Cyber, and Information Security technologies and products.
3. Excellent written and verbal communication skills.
4. Eagerness to develop their skills and understanding of all information security domains.
5. Ability to perform to tight deadlines.
6. Relevant risk and/or security industry certification(s) such as Certified in Risk and Information Systems Control (CRISC), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH).
7. Must possess the ability to follow and/or create/modify operational and technical procedures and/or best practice documents.
8. Experience in constructing comprehensive quotes and proposals.
9. Experience in consultative sales and communicating value propositions.
Please ignore salary details - this role is flexible.
#J-18808-Ljbffr