CrawlJobs Logo

Cyber Security Senior Expert

vodafone.com Logo

Vodafone

Location Icon

Location:
Türkiye , İstanbul

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

At Vodafone, we’re not just shaping the future of connectivity for our customers – we’re shaping the future for everyone who joins our team. When you work with us, you’re part of a global mission to connect people, solve complex challenges, and create a sustainable and more inclusive world. If you want to grow your career whilst finding the perfect balance between work and life, Vodafone offers the opportunities to help you belong and make a real impact.

Job Responsibility:

  • Follow technology to design and develop new security-based services taking care of cost and performance criteria
  • Search for new security equipment’s & systems for better performance of security services with new features
  • Design, setup and maintain log management, access management, database security etc. infrastructure & equipments
  • Take necessary actions to prevent possible problems in Security systems core equipment
  • Solve problems that might occur on these systems working in cooperation with vendors, outsource companies and other teams in Vodafone
  • Follow capacity of Security services equipments and take necessary actions to increase/decrease capacity when required
  • Maintain Log Management & SIEM solutions like particularly Arcsight & Splunk working in cooperation with security related teams in Vodafone
  • Plan and attend operations on the equipments for fixing issues and keeping updated with new features
  • Prepare/supports documentation of equipments and services according to company PCI-DSS, ISO 27001, ISO 27701, COBIT, KVKK, GDPR, SOX etc. policies
  • Attending internal and external audits and preparing evidence when required
  • Provide7/24, 3rd level customer needs
  • Use management tools and self-developed scripts to follow and report problems/capacity on the infrastructure develop proactive and reactive problem solution methods
  • Supporting CS Secure by Design and Cyber Defense teams for a better and more effective security process against evolving threats and requirements
  • Collaborates with 3rd party vendors for sourcing of skills required
  • Collaborates with 3rd party vendors for products and services provided, for production components as well as for pilots and prototypes
  • Watching further redundancy scenario’s in line with the effort to add value for the network
  • Prepare documentation, presentation and training about Security services to team members, other Vodafone teams, customers, partners and other 3rd parties when required

Requirements:

  • University degree (BSc./MSc.) in Engineering discipline (Electrical-Electronics, Computer Science or similar)
  • Fluent in English both written and spoken
  • At least 4 years of work and proven experience in Log Management domain tools in terms of architecture & design, integration, implementation, maintenance, troubleshooting, stakeholder management, company wide project management
  • Knowledge on Arcsight and preferably Splunk
  • Telecommunications industry experience is an advantage
  • Certification for related domains is highly preferable
  • Critical thinking with strong attention to details and follow up
  • Having low level security understanding but ability to present it in a high level
  • Strong analytical deduction
  • Being creative, problem solving and result oriented
  • Effective verbal and written communication skills and strong interpersonal skills, good in reporting
  • Demonstrated ability to work effectively with 3rd party suppliers and internal stakeholders
  • Male candidates should have completed or postponed military service

Nice to have:

  • Telecommunications industry experience is an advantage
  • Certification for related domains is highly preferable
What we offer:
  • Vflexy: Flexible Benefits Program
  • Hybrid working kit
  • Ergonomic kit allowance
  • Digital meal voucher
  • Flexible transportation allowance
  • Employee assistance hotline & counselling
  • Comprehensive and flexible private health insurance
  • Discounted price deals for wide range of products & services

Additional Information:

Job Posted:
February 21, 2026

Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Cyber Security Senior Expert

Senior Cyber Range Architect

Barbaricum is currently seeking a highly skilled and experienced Senior Cyber Ra...
Location
Location
United States , Muscatatuck
Salary
Salary:
Not provided
barbaricum.com Logo
Barbaricum
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must possess an DoD active TS/SCI Clearance
  • Bachelor’s degree required
  • Must meet DOD 8570.01-M IAT III Certification requirements
  • Minimum 7 years of experience in Cyber SME/Cyber Architect roles or similar, with at least 3 years in cyber range or computer test-bed environments
  • Expert knowledge in computer network design and configuration (routing, switching, firewalls, DNS, Active Directory, VPNs, VLANs, SANs) across both bare metal and virtualized systems
  • Proficiency in automation, provisioning, imaging, orchestration, and configuration management tools, including Ansible, Chef, FOG, Project, Python, and Bash scripting
  • Demonstrated expertise in cloud, physical, and virtual network architecture, engineering, and infrastructure monitoring
  • Extensive experience with hypervisors (VMware, KVM, Xen) and server operating systems (Windows Enterprise, Linux) including an understanding of network vulnerabilities, attack vectors, and mitigation techniques
  • Experience with a broad range of technology including camera systems, ICS/SCADA, IoT devices, and RF communications devices
Job Responsibility
Job Responsibility
  • Oversee all aspects of system integration, management, configuration, operation, testing, and scheduling of the CTEP platform
  • Develop and update event network designs, integrate hardware and software, and determine baseline configurations for training and exercises
  • Support Information Assurance requirements, develop and implement range reset procedures
  • Assist in the creation of training scenarios tailored to the needs of the partners utilizing the CTEP platform
  • Maintain and update local design documents and configurations, collaborating on the evolution of CTEP capabilities
  • Conduct training on CTEP usage and configuration, and assist in the implementation of training, exercise, and event virtual enclaves
  • Own the technical operations of the CTEP environment, managing multiple projects to ensure alignment with strategic objectives
Read More
Arrow Right

Senior Information Security Consultant (QSA)

PGI is a global consultancy that helps organisations build digital resilience. W...
Location
Location
United Kingdom , London
Salary
Salary:
Not provided
pgitl.com Logo
Protection Group International
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven relationship management skills and experience in Information Assurance consultancy
  • Qualified Security Assessor (QSA) experience with valid PCI-DSS QSA accreditation with a minimum of 2 years of experience performing PCI DSS compliance consultancy
  • Familiarity with PCI DSS and NIST CSF
  • Experience in conducting risk assessments, cyber security maturity evaluations, and remediation strategies
  • Strong communication skills, able to present to clients and senior stakeholders
  • A collaborative, solutions-oriented mindset with excellent time-management skills
Job Responsibility
Job Responsibility
  • Provide expert guidance to clients, supporting both pre-sales and delivery, and establishing trusted advisor relationships to drive compliance and security improvements
  • Lead and deliver hands-on PCI DSS compliance consultancy, performing assessments, gap analyses, and remediation strategies tailored to client needs
  • Act as a subject matter expert in PCI DSS compliance and Governance, Risk, and Compliance (GRC), advising clients on regulatory compliance, risk management, and information security best practices
  • Contribute to PGI’s consultancy growth by aligning services with emerging trends and industry standards. Drive PGI’s accreditations and assist with maintaining ISO 27001, PCI DSS and data protection compliance
  • Mentor junior team members, contribute to the recruitment process, and oversee third-party relationships to ensure project profitability and delivery quality
  • Stay ahead of industry trends, emerging security threats, and best practices to maintain professional growth and continuously improve PGI’s consultancy offerings
Read More
Arrow Right

Cyber-Security Technical Administrator

This position is for a Cybersecurity Technical Administrator supporting the ALTE...
Location
Location
United States , Alexandria
Salary
Salary:
Not provided
e-9corporation.com Logo
E9 Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Mid to senior level Cybersecurity Technical Administrator experience in a cloud environment
  • DoD 8570.01-M IAT level II certification is required
  • Resource must possess both Baseline and Computing Environment certification as defined in DoD Instruction 8570.01-M
  • Strong verbal and written communication skills
  • Understanding of DOD Risk Management Framework Assessment & Authorization (RMF A&A), FedRAMP, the DOD cloud provisional authorization (PA) process and the processes to successfully acquire and maintain an Authorization to Operate (ATO)
  • Working knowledge of the Federal Risk and Authorization Management Process (FedRAMP), cloud security information impact levels (IL), the differences between an ATO and P-ATO, the differences between a CSO and CSP, and the processes to successfully acquire, maintain and support DOD cloud accreditation
  • Experience automating routine administrative tasks desired
  • Understanding of network, storage, server and application technologies
  • Strong understanding of common cyber threat patterns, indicators of compromise and defenses
  • Working knowledge of DoD STIGs and IA Vulnerability Management (IAVM)
Job Responsibility
Job Responsibility
  • Serve as overall subject matter expert on Cybersecurity Technical Administrator technology and market capabilities/trends
  • Conduct security scans against the organization’s cloud-deployed infrastructure, produce and interpret compliance reports
  • Validate technical security controls are in place for operating systems, applications and network appliances, and recommend enhancements
  • Review proposed configuration changes for security impact
  • Operate endpoint-protection mechanisms, including high-level reporting and day-to-day administration activities
  • Work between technical and policy teams to implement, maintain and monitor technical security configuration controls, including: STIG’s, SRG’s and other industry security hardening guidance
  • Work between technical and policy teams to successfully implement and manage requirements for maintaining cloud P-ATO, ATO and security control inheritance capabilities
  • Collaborate with internal and external parties to transform high-level technical objectives into comprehensive technical requirements
  • Use results of vulnerability scans to determine vulnerabilities and develop operational plans to remediate or mitigate vulnerabilities as they are discovered
  • Install, operate and maintain Army Endpoint Security System
Read More
Arrow Right

Cyber-Security Policy Administrator

This position is for a Cybersecurity Policy Administrator supporting the ALTESS ...
Location
Location
United States
Salary
Salary:
Not provided
e-9corporation.com Logo
E9 Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • DoD 8570.01-M IAM level II certification
  • CompTIA Security+
  • Computing Environment (CE) Certification (i.e., MCSE, Server+, etc.) – can be waived for 30 days after project join date
  • Mid to senior level Cybersecurity Policy Administrator experience in a cloud environment
  • Strong verbal and written communication skills
  • Experience effectively managing multiple large-scale projects
  • Understanding of network, storage, server and application technologies
  • Working knowledge of DoD STIGs, and IA Vulnerability Management (IAVM)
  • Information Assurance Engineer – Senior: Masters +10yrs, or Bachelors +12yrs
  • Information Assurance Engineer – Intermediate: Bachelors +5yrs or Associates +7yrs
Job Responsibility
Job Responsibility
  • Serve as overall subject matter expert on Cybersecurity Policy Administration
  • Work between technical and policy teams to implement, maintain and monitor technical security configuration controls, including: STIGs, SRGs and other industry security hardening guidance
  • Work between technical and policy teams to successfully implement and manage requirements for maintaining cloud P-ATO, ATO and security control inheritance capabilities
  • Collaborate with internal and external parties to transform high-level technical objectives into comprehensive technical requirements
  • Act as the ISSO for hosted systems, assuming the responsibilities as outlined in AR 25-2
  • Assist hosted customers in obtaining and maintaining RMF for DOD IT and other certifications as required
  • Update and/or assist the hosted system’s personnel in updating artifacts of the accreditation package and store the artifacts in organizationally defined repository
  • i.e., system diagram (logical and physical) Hardware/Software/Firmware Inventory, Interface & Ports, Protocols and Services listing, etc.
  • Assist in the preparation of network infrastructure specifications or designs incorporating required information security features
  • Review and evaluate Information Systems Design Plans, Continuity of Operation Plans, Communication Plans, engineering change proposals and configuration changes for compliance with relevant security regulations, policies and best industry practice
Read More
Arrow Right

Senior Penetration Tester

The role involves conducting deep-dive vulnerability assessments on a variety of...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree with a minimum of 5 years of experience
  • Expertise in Java, JavaScript (React, Node.js), .NET (ASP.NET, C#, Webflow, MVC, WebAPI), Application Infrastructure (Web/Application Servers, Databases, Middleware Components), and Cloud Computing (Google Cloud Platform, AWS, Azure)
  • Expertise in application security, ethical hacking using security tools (Burp Suite, AppScan), knowledge of OWASP Top 10, CWE/SANS Top 25, Threat Modeling
  • Industry-accredited security certifications such as GIAC GWAPT, GPEN, GXPN, OSCP and/or CISSP
Job Responsibility
Job Responsibility
  • Act as a subject matter expert in offensive information security
  • Drive remediation by outlining a defense-in-depth approach
  • Report and articulate vulnerability assessment results
  • Contribute to the review of internal processes and activities
  • Fulltime
Read More
Arrow Right

Senior Cybersecurity Engineer

As a Senior Cybersecurity Engineer, you will be at the forefront of driving secu...
Location
Location
United States , Bellevue; Overland Park; Frisco; Herndon
Salary
Salary:
103400.00 - 186400.00 USD / Year
https://www.t-mobile.com Logo
T-Mobile
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's Degree Computer Science or Information Technology or equivalent work experience
  • 4-7 years Experience in info security technology or related field
  • Experience with incident handling for Security breaches
  • Expert in security subject areas
  • 2-4 years Technical Project Management
  • Experience with high level design architecture, security technologies, Networking, web services and SOA
  • Understanding of encryption, obfuscation, tokenization technologies
  • Medium to advance knowledge of Scripting tools (Python/Perl/Shell/HTML/PHP)
  • Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI
  • Familiarity with load balancers (ex – A10, F5), firewalls (ex – CheckPoint), Venafi, MDM (ex - Mobile Iron), Cloud (ex - AWS, Azure), Malware Protection (ex -FireEye), Advanced Persistent Threats (ex - Damballa), Privileged Accounts (ex – CyberArk), SIEM (ex – ArcSight), Log & Event (ex – Splunk), Intrusion IDS/IPS (ex – Symantec) , Cloud Platform (ex – PCF, Docker), Scanning (ex – Qualys), AppSec (ex - Veracode)
Job Responsibility
Job Responsibility
  • Leads security, compliance, and risk assessments on projects throughout project lifecycle
  • Improves process efficiency by creating and implementing creative and sustainable changes to existing deployment methodologies
  • Leads the identification of security needs & recommends plans/resolutions
  • Implements, tests & monitors info security improvements
  • Maintains transparency inside & outside of information security at the People management level
  • Communicate with groups such as application support, engineering ops, finance, privacy, risk management, etc
  • Leads information security policy lifecycle throughout, including intake, creation, review, approval, implementation, publishing, communication & maintenance
  • Implements security projects driven by groups both internal and external to info security
  • Mentors peers and junior team members in security technologies, enterprise solution design and facilitation and effective customer interaction
  • Experience with implementation of various threat modeling approaches pertaining to one or more of the following STRIDE, PASTA, TRIKE, ATTACK TREE, DREAD, KILL CHAIN, CAPEC, Mobile Application threat model, Cyber Threat Tree, and data flow diagram
What we offer
What we offer
  • Competitive base salary and compensation package
  • Annual stock grant
  • Employee stock purchase plan
  • 401(k)
  • Access to free, year-round money coaches
  • Medical, dental and vision insurance
  • Flexible spending account
  • Paid time off
  • Up to 12 paid holidays
  • Paid parental and family leave
  • Fulltime
Read More
Arrow Right

Cyber Thematics

Join us as a “Cyber Thematics" at Barclays, where you'll spearhead the evolution...
Location
Location
India , Pune
Salary
Salary:
Not provided
barclays.co.uk Logo
Barclays
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must be graduate/ must have bachelor’s degree
  • Support the VP in reviewing and challenging thematic assessments from the CISO organisation
  • Assist in the consolidation and communication of cyber risk themes across the CISO organisation
  • Work with Cyber Risk Reporting to incorporate thematic insights into ongoing risk analysis and framework updates
  • Engage with stakeholders to gather requirements and support responses to identified thematic risks
  • Deliver CF&O team’s issues management oversight processes, ensuring appropriate identification and escalation in compliance with relevant Standards
  • Contribute to continuous improvement initiatives within the team
  • Build and maintain trusted relationships with internal and external stakeholders
  • Solid understanding of cyber security and risk management principles
  • Experience in risk reporting or thematic analysis
Job Responsibility
Job Responsibility
  • Collaboration with stakeholders to understand their security requirements in business processes and IT projects, to enhance overall risk management
  • Execution of risk assessments to identify and prioritise potential cybersecurity threats that could impact the banks operations and data and guide the implementation of mitigation strategies and communicate findings to relevant findings to relevant senior stakeholders
  • Collaboration with business units to develop and implement security policies and procedures for the banks operations aligned to the risk management framework
  • Management of the implementation, testing and monitoring of security controls across the banks IT systems to ensure the effectiveness of controls and mitigation of risk
  • Execution of training content and sessions to educate employees, enhance cybersecurity awareness and provide guidance on safe online practices
  • Management of complex cybersecurity incidents by collaborating with IT teams and response experts to effectively resolve cases through analysis, expertise support and project supervision
  • Identification of emerging cybersecurity trends, threats, and new technologies to address potential risks by advocating the adoption of new security solutions
What we offer
What we offer
  • Competitive holiday allowance
  • Life assurance
  • Private medical care
  • Pension contribution
  • Fulltime
Read More
Arrow Right
New

Associate Cyber Security Advisor

As an Associate Cyber Security Advisor in Bengaluru you will report to the Team ...
Location
Location
India , Bengaluru
Salary
Salary:
Not provided
https://www.randstad.com Logo
Randstad
Expiration Date
March 14, 2026
Flip Icon
Requirements
Requirements
  • Relevant Cyber Security or Computer Science tertiary degree (or equivalent qualification)
  • 4-6 years+ combined experience in cyber security, solution architecture, systems engineering, or related cyber security roles
  • Strong written and verbal communication skills
  • Ability to collaborate effectively with engineers, project teams, business stakeholders, and senior architects
  • Strong requirements-gathering skills
  • Foundational understanding of industry cyber security frameworks such as ISO 27001 and NIST CSF
  • Foundational understanding of key security concepts such as Zero Trust, RBAC, least privilege, network segmentation, and secure egress principles
  • Exposure to security architecture activities such as requirements analysis, design reviews, threat modelling, and participating in secure-by-design processes, IT change management, and design governance processes
  • Experience working with enterprise security tools and platforms, such as Microsoft E5 security capabilities (Defender, Purview, Intune, Conditional Access) and Identity & Access Management tools (Entra ID/Azure AD, Saviynt, Zscaler)
Job Responsibility
Job Responsibility
  • Engage early with projects to ensure secure-by-design principles are embedded and risks are managed in accordance with Woodside’s risk management processes
  • Provide guidance to new technology initiatives, ensuring threats and risks are understood, security patterns are applied, and gaps are identified and transparently managed
  • Champion cyber security to inform and influence service line managers and stakeholders to understand, own and manage cyber threats applicable to their platforms
  • Support delivery and continuous improvement of global Cyber Risk and Compliance capabilities (People, Process, and Technology)
  • Apply Woodside’s Engineering Standard for Information Security (and other relevant standards) to system architecture and design
  • Drive continuous improvement including adoption of new technical solutions to security challenges and achieve operational efficacy and efficiency
  • Contribute to the ongoing development of standards, processes, patterns and guidelines that uplift the organisation’s security posture
  • Provide quality assurance and advice on security designs, patterns, and technology decisions
  • Contribute to developing a cyber security team that is seen as experts in meeting the mission of protecting Woodside’s people, brand and reputation
What we offer
What we offer
  • Commitment to your ongoing development, including on the job opportunities and formal programs
  • Inclusive parental leave entitlements for both parents
  • Values led culture
  • Flexible work options
  • Generous annual leave, sick leave and casual leave
  • Cultural and religious leave with flexible public holiday opportunities
  • A competitive remuneration package featuring performance based incentives with uncapped Employer Provident Fund
  • Fulltime
Read More
Arrow Right