Skip to content

 

Job Application

 
 
 

Please answer the following questions in order to process your application.

 
 
Email Address *
 
Select your working status in the UK *
 
 
 
File Attachments:
(2MB file maximum. doc, docx, pdf, rtf or txt files only)
 
Attach a CV * 
 
Optional covering letter 
OR
Clear covering letter
 
 
 * denotes required field
 
 
 
Additional Information:
 
First Name
 
Last Name
 
Address
 
Country
 
Home Telephone
 
Mobile/Cell
 
Availability/Notice
 
Hourly Rate GBP
 
Approximately how far are you willing to travel to work (in miles) ?
 
 
 

Key Privacy Information

When you apply for a job, ComputerJobs will collect the information you provide in the application and disclose it to the advertiser of the job.

If the advertiser wishes to contact you they have agreed to use your information following data protection law.

ComputerJobs will keep a copy of the application for 90 days.

More information about our Privacy Policy.

 

Job Details

 

Security Consultant (Contract)

Location: London Country: UK Rate: £400 - £475 per day
 

Workstream One (Part 1)

  • Define strategic requirements aligned to the Strategy
  • Understand current and future technical and operational requirements
  • Understand traffic patterns and connectivity to cloud landing zones
  • Map traffic flows to use cases and assess required capabilities in existing technologies
  • Define target architecture to component level
  • Define the Target Operating Model, including Managed Services, In-Sourcing or other approaches
  • Perform a gap analysis to identify and prioritise the outcomes that will have the largest impact on the KPIs
  • Collaborate with other partners to assess the impact and dependencies on other initiatives
  • Provide high-level options for each technology or outcome
  • Define a roadmap based on prioritisation and capacity in collaboration with Enterprise Architect
  • Detail indicative steps and cost model for Consultancy Company to deliver initiatives and achieve outcomes
  • Agree on tactical and strategic next steps to meet risk mitigation deadlines

Workstream One (Part 2) - Firewall Audit & Recommendations (a tactical effort to mitigate risk around obsolete H/W and S/W in the existing estate - should feed into strategic deliverables)

  • Review with to determine Firewall configuration, use cases and application requirements
  • Analyse current & target state requirements to inform the no-regrets decisions
  • Analyse operating model, management & orchestration of Firewalls
  • Evaluate solution options to inform our recommendations
  • Define tactical and strategic options based on cost and implementation timescales
  • Align with Zero Trust Advisory strategy for tactical and strategic options
  • Define a cost and implementation plan to implement the new Firewall strategy
  • Collaborate with other partners in the ecosystem to align strategy
  • Define key dependencies with team

GCS is acting as an Employment Business in relation to this vacancy.


Posted Date: 15 Apr 2024 Reference: JS-SECURITY CONSULTANT Employment Business: GCS Contact: Tom Stapleton