CrawlJobs Logo

Cyber Security Senior Expert

vodafone.com Logo

Vodafone

Location Icon

Location:
Türkiye , İstanbul

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

At Vodafone, we’re not just shaping the future of connectivity for our customers – we’re shaping the future for everyone who joins our team. When you work with us, you’re part of a global mission to connect people, solve complex challenges, and create a sustainable and more inclusive world. If you want to grow your career whilst finding the perfect balance between work and life, Vodafone offers the opportunities to help you belong and make a real impact.

Job Responsibility:

  • Follow technology to design and develop new security-based services taking care of cost and performance criteria
  • Search for new security equipment’s & systems for better performance of security services with new features
  • Design, setup and maintain log management, access management, database security etc. infrastructure & equipments
  • Take necessary actions to prevent possible problems in Security systems core equipment
  • Solve problems that might occur on these systems working in cooperation with vendors, outsource companies and other teams in Vodafone
  • Follow capacity of Security services equipments and take necessary actions to increase/decrease capacity when required
  • Maintain Log Management & SIEM solutions like particularly Arcsight & Splunk working in cooperation with security related teams in Vodafone
  • Plan and attend operations on the equipments for fixing issues and keeping updated with new features
  • Prepare/supports documentation of equipments and services according to company PCI-DSS, ISO 27001, ISO 27701, COBIT, KVKK, GDPR, SOX etc. policies
  • Attending internal and external audits and preparing evidence when required
  • Provide7/24, 3rd level customer needs
  • Use management tools and self-developed scripts to follow and report problems/capacity on the infrastructure develop proactive and reactive problem solution methods
  • Supporting CS Secure by Design and Cyber Defense teams for a better and more effective security process against evolving threats and requirements
  • Collaborates with 3rd party vendors for sourcing of skills required
  • Collaborates with 3rd party vendors for products and services provided, for production components as well as for pilots and prototypes
  • Watching further redundancy scenario’s in line with the effort to add value for the network
  • Prepare documentation, presentation and training about Security services to team members, other Vodafone teams, customers, partners and other 3rd parties when required

Requirements:

  • University degree (BSc./MSc.) in Engineering discipline (Electrical-Electronics, Computer Science or similar)
  • Fluent in English both written and spoken
  • At least 4 years of work and proven experience in Log Management domain tools in terms of architecture & design, integration, implementation, maintenance, troubleshooting, stakeholder management, company wide project management
  • Knowledge on Arcsight and preferably Splunk
  • Telecommunications industry experience is an advantage
  • Certification for related domains is highly preferable
  • Critical thinking with strong attention to details and follow up
  • Having low level security understanding but ability to present it in a high level
  • Strong analytical deduction
  • Being creative, problem solving and result oriented
  • Effective verbal and written communication skills and strong interpersonal skills, good in reporting
  • Demonstrated ability to work effectively with 3rd party suppliers and internal stakeholders
  • Male candidates should have completed or postponed military service

Nice to have:

  • Telecommunications industry experience is an advantage
  • Certification for related domains is highly preferable
What we offer:
  • Vflexy: Flexible Benefits Program
  • Hybrid working kit
  • Ergonomic kit allowance
  • Digital meal voucher
  • Flexible transportation allowance
  • Employee assistance hotline & counselling
  • Comprehensive and flexible private health insurance
  • Discounted price deals for wide range of products & services

Additional Information:

Job Posted:
February 21, 2026

Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Cyber Security Senior Expert

Senior Cyber Range Architect

Barbaricum is currently seeking a highly skilled and experienced Senior Cyber Ra...
Location
Location
United States , Muscatatuck
Salary
Salary:
Not provided
barbaricum.com Logo
Barbaricum
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must possess an DoD active TS/SCI Clearance
  • Bachelor’s degree required
  • Must meet DOD 8570.01-M IAT III Certification requirements
  • Minimum 7 years of experience in Cyber SME/Cyber Architect roles or similar, with at least 3 years in cyber range or computer test-bed environments
  • Expert knowledge in computer network design and configuration (routing, switching, firewalls, DNS, Active Directory, VPNs, VLANs, SANs) across both bare metal and virtualized systems
  • Proficiency in automation, provisioning, imaging, orchestration, and configuration management tools, including Ansible, Chef, FOG, Project, Python, and Bash scripting
  • Demonstrated expertise in cloud, physical, and virtual network architecture, engineering, and infrastructure monitoring
  • Extensive experience with hypervisors (VMware, KVM, Xen) and server operating systems (Windows Enterprise, Linux) including an understanding of network vulnerabilities, attack vectors, and mitigation techniques
  • Experience with a broad range of technology including camera systems, ICS/SCADA, IoT devices, and RF communications devices
Job Responsibility
Job Responsibility
  • Oversee all aspects of system integration, management, configuration, operation, testing, and scheduling of the CTEP platform
  • Develop and update event network designs, integrate hardware and software, and determine baseline configurations for training and exercises
  • Support Information Assurance requirements, develop and implement range reset procedures
  • Assist in the creation of training scenarios tailored to the needs of the partners utilizing the CTEP platform
  • Maintain and update local design documents and configurations, collaborating on the evolution of CTEP capabilities
  • Conduct training on CTEP usage and configuration, and assist in the implementation of training, exercise, and event virtual enclaves
  • Own the technical operations of the CTEP environment, managing multiple projects to ensure alignment with strategic objectives
Read More
Arrow Right

Senior Information Security Consultant (QSA)

PGI is a global consultancy that helps organisations build digital resilience. W...
Location
Location
United Kingdom , London
Salary
Salary:
Not provided
pgitl.com Logo
Protection Group International
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven relationship management skills and experience in Information Assurance consultancy
  • Qualified Security Assessor (QSA) experience with valid PCI-DSS QSA accreditation with a minimum of 2 years of experience performing PCI DSS compliance consultancy
  • Familiarity with PCI DSS and NIST CSF
  • Experience in conducting risk assessments, cyber security maturity evaluations, and remediation strategies
  • Strong communication skills, able to present to clients and senior stakeholders
  • A collaborative, solutions-oriented mindset with excellent time-management skills
Job Responsibility
Job Responsibility
  • Provide expert guidance to clients, supporting both pre-sales and delivery, and establishing trusted advisor relationships to drive compliance and security improvements
  • Lead and deliver hands-on PCI DSS compliance consultancy, performing assessments, gap analyses, and remediation strategies tailored to client needs
  • Act as a subject matter expert in PCI DSS compliance and Governance, Risk, and Compliance (GRC), advising clients on regulatory compliance, risk management, and information security best practices
  • Contribute to PGI’s consultancy growth by aligning services with emerging trends and industry standards. Drive PGI’s accreditations and assist with maintaining ISO 27001, PCI DSS and data protection compliance
  • Mentor junior team members, contribute to the recruitment process, and oversee third-party relationships to ensure project profitability and delivery quality
  • Stay ahead of industry trends, emerging security threats, and best practices to maintain professional growth and continuously improve PGI’s consultancy offerings
Read More
Arrow Right

Cyber-Security Technical Administrator

This position is for a Cybersecurity Technical Administrator supporting the ALTE...
Location
Location
United States , Alexandria
Salary
Salary:
Not provided
e-9corporation.com Logo
E9 Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Mid to senior level Cybersecurity Technical Administrator experience in a cloud environment
  • DoD 8570.01-M IAT level II certification is required
  • Resource must possess both Baseline and Computing Environment certification as defined in DoD Instruction 8570.01-M
  • Strong verbal and written communication skills
  • Understanding of DOD Risk Management Framework Assessment & Authorization (RMF A&A), FedRAMP, the DOD cloud provisional authorization (PA) process and the processes to successfully acquire and maintain an Authorization to Operate (ATO)
  • Working knowledge of the Federal Risk and Authorization Management Process (FedRAMP), cloud security information impact levels (IL), the differences between an ATO and P-ATO, the differences between a CSO and CSP, and the processes to successfully acquire, maintain and support DOD cloud accreditation
  • Experience automating routine administrative tasks desired
  • Understanding of network, storage, server and application technologies
  • Strong understanding of common cyber threat patterns, indicators of compromise and defenses
  • Working knowledge of DoD STIGs and IA Vulnerability Management (IAVM)
Job Responsibility
Job Responsibility
  • Serve as overall subject matter expert on Cybersecurity Technical Administrator technology and market capabilities/trends
  • Conduct security scans against the organization’s cloud-deployed infrastructure, produce and interpret compliance reports
  • Validate technical security controls are in place for operating systems, applications and network appliances, and recommend enhancements
  • Review proposed configuration changes for security impact
  • Operate endpoint-protection mechanisms, including high-level reporting and day-to-day administration activities
  • Work between technical and policy teams to implement, maintain and monitor technical security configuration controls, including: STIG’s, SRG’s and other industry security hardening guidance
  • Work between technical and policy teams to successfully implement and manage requirements for maintaining cloud P-ATO, ATO and security control inheritance capabilities
  • Collaborate with internal and external parties to transform high-level technical objectives into comprehensive technical requirements
  • Use results of vulnerability scans to determine vulnerabilities and develop operational plans to remediate or mitigate vulnerabilities as they are discovered
  • Install, operate and maintain Army Endpoint Security System
Read More
Arrow Right

Cyber-Security Policy Administrator

This position is for a Cybersecurity Policy Administrator supporting the ALTESS ...
Location
Location
United States
Salary
Salary:
Not provided
e-9corporation.com Logo
E9 Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • DoD 8570.01-M IAM level II certification
  • CompTIA Security+
  • Computing Environment (CE) Certification (i.e., MCSE, Server+, etc.) – can be waived for 30 days after project join date
  • Mid to senior level Cybersecurity Policy Administrator experience in a cloud environment
  • Strong verbal and written communication skills
  • Experience effectively managing multiple large-scale projects
  • Understanding of network, storage, server and application technologies
  • Working knowledge of DoD STIGs, and IA Vulnerability Management (IAVM)
  • Information Assurance Engineer – Senior: Masters +10yrs, or Bachelors +12yrs
  • Information Assurance Engineer – Intermediate: Bachelors +5yrs or Associates +7yrs
Job Responsibility
Job Responsibility
  • Serve as overall subject matter expert on Cybersecurity Policy Administration
  • Work between technical and policy teams to implement, maintain and monitor technical security configuration controls, including: STIGs, SRGs and other industry security hardening guidance
  • Work between technical and policy teams to successfully implement and manage requirements for maintaining cloud P-ATO, ATO and security control inheritance capabilities
  • Collaborate with internal and external parties to transform high-level technical objectives into comprehensive technical requirements
  • Act as the ISSO for hosted systems, assuming the responsibilities as outlined in AR 25-2
  • Assist hosted customers in obtaining and maintaining RMF for DOD IT and other certifications as required
  • Update and/or assist the hosted system’s personnel in updating artifacts of the accreditation package and store the artifacts in organizationally defined repository
  • i.e., system diagram (logical and physical) Hardware/Software/Firmware Inventory, Interface & Ports, Protocols and Services listing, etc.
  • Assist in the preparation of network infrastructure specifications or designs incorporating required information security features
  • Review and evaluate Information Systems Design Plans, Continuity of Operation Plans, Communication Plans, engineering change proposals and configuration changes for compliance with relevant security regulations, policies and best industry practice
Read More
Arrow Right

Senior Penetration Tester

The role involves conducting deep-dive vulnerability assessments on a variety of...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree with a minimum of 5 years of experience
  • Expertise in Java, JavaScript (React, Node.js), .NET (ASP.NET, C#, Webflow, MVC, WebAPI), Application Infrastructure (Web/Application Servers, Databases, Middleware Components), and Cloud Computing (Google Cloud Platform, AWS, Azure)
  • Expertise in application security, ethical hacking using security tools (Burp Suite, AppScan), knowledge of OWASP Top 10, CWE/SANS Top 25, Threat Modeling
  • Industry-accredited security certifications such as GIAC GWAPT, GPEN, GXPN, OSCP and/or CISSP
Job Responsibility
Job Responsibility
  • Act as a subject matter expert in offensive information security
  • Drive remediation by outlining a defense-in-depth approach
  • Report and articulate vulnerability assessment results
  • Contribute to the review of internal processes and activities
  • Fulltime
Read More
Arrow Right
New

Cyber Security Senior Expert

We are looking for a team member who will adopt a "Secure by Design" approach at...
Location
Location
Türkiye , İstanbul
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • University degree (BSc./MSc.) in Engineering discipline (Electrical-Electronics, Computer Science or similar)
  • At least 8 years of work experience in information security, network administration or IT security
  • Knowledge of common classes of vulnerabilities and how to mitigate the risks in applications and infrastructure
  • Broad security knowledge and practical experience in designing risk-oriented security solution
  • A diverse security background with knowledge in several areas, including layered security architecture, internet protocols, API security, mobile and web applications security, VPN, firewalls, WAF, IDPS risk and vulnerability assessments and compliance
  • Proven experience participating in multiple security programs, projects and initiatives
  • Experience working in complex operational ICT environments
  • Effective verbal and written communication skills and strong interpersonal skills, good in reporting
  • Demonstrated ability to work effectively with 3rd party suppliers and internal stakeholders
  • Fluent in English both written and spoken
Job Responsibility
Job Responsibility
  • Advise and introduce Cyber Security requirements in Vodafone internal and external systems, projects or products
  • Review system and application architectures (HLD/LLD) from a security perspective and provide guidance
  • Design and implement Security Solutions for the benefit of the systems with the relevant products and/or configurations and reduce the cyber security risks
  • Perform security reviews, identify gaps in cyber security architecture and develop cyber security risk management/mitigation plans
  • Able to take initiative and make architectural decisions through designing secure solutions to enable the business, especially in critical/high risk situations and reduce the company's cyber risks
  • Work closely with the business and technology architecture teams, operations teams and with the other cyber security teams (e.g Risk&Compliance, Security Operations and Corporate Security)
  • Attend internal & external audits and preparing evidence when required (e.g PCI-DSS, ISO 27001)
What we offer
What we offer
  • Vflexy: Flexible Benefits Program
  • Hybrid working kit
  • Ergonomic kit allowance
  • Digital meal voucher
  • Flexible transportation allowance
  • Employee assistance hotline & counselling
  • Comprehensive and flexible private health insurance
  • Discounted price deals for wide range of products & services
  • Fulltime
Read More
Arrow Right

Senior Cybersecurity Engineer

As a Senior Cybersecurity Engineer, you will be at the forefront of driving secu...
Location
Location
United States , Bellevue; Overland Park; Frisco; Herndon
Salary
Salary:
103400.00 - 186400.00 USD / Year
https://www.t-mobile.com Logo
T-Mobile
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's Degree Computer Science or Information Technology or equivalent work experience
  • 4-7 years Experience in info security technology or related field
  • Experience with incident handling for Security breaches
  • Expert in security subject areas
  • 2-4 years Technical Project Management
  • Experience with high level design architecture, security technologies, Networking, web services and SOA
  • Understanding of encryption, obfuscation, tokenization technologies
  • Medium to advance knowledge of Scripting tools (Python/Perl/Shell/HTML/PHP)
  • Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI
  • Familiarity with load balancers (ex – A10, F5), firewalls (ex – CheckPoint), Venafi, MDM (ex - Mobile Iron), Cloud (ex - AWS, Azure), Malware Protection (ex -FireEye), Advanced Persistent Threats (ex - Damballa), Privileged Accounts (ex – CyberArk), SIEM (ex – ArcSight), Log & Event (ex – Splunk), Intrusion IDS/IPS (ex – Symantec) , Cloud Platform (ex – PCF, Docker), Scanning (ex – Qualys), AppSec (ex - Veracode)
Job Responsibility
Job Responsibility
  • Leads security, compliance, and risk assessments on projects throughout project lifecycle
  • Improves process efficiency by creating and implementing creative and sustainable changes to existing deployment methodologies
  • Leads the identification of security needs & recommends plans/resolutions
  • Implements, tests & monitors info security improvements
  • Maintains transparency inside & outside of information security at the People management level
  • Communicate with groups such as application support, engineering ops, finance, privacy, risk management, etc
  • Leads information security policy lifecycle throughout, including intake, creation, review, approval, implementation, publishing, communication & maintenance
  • Implements security projects driven by groups both internal and external to info security
  • Mentors peers and junior team members in security technologies, enterprise solution design and facilitation and effective customer interaction
  • Experience with implementation of various threat modeling approaches pertaining to one or more of the following STRIDE, PASTA, TRIKE, ATTACK TREE, DREAD, KILL CHAIN, CAPEC, Mobile Application threat model, Cyber Threat Tree, and data flow diagram
What we offer
What we offer
  • Competitive base salary and compensation package
  • Annual stock grant
  • Employee stock purchase plan
  • 401(k)
  • Access to free, year-round money coaches
  • Medical, dental and vision insurance
  • Flexible spending account
  • Paid time off
  • Up to 12 paid holidays
  • Paid parental and family leave
  • Fulltime
Read More
Arrow Right

Cyber Thematics

Join us as a “Cyber Thematics" at Barclays, where you'll spearhead the evolution...
Location
Location
India , Pune
Salary
Salary:
Not provided
barclays.co.uk Logo
Barclays
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must be graduate/ must have bachelor’s degree
  • Support the VP in reviewing and challenging thematic assessments from the CISO organisation
  • Assist in the consolidation and communication of cyber risk themes across the CISO organisation
  • Work with Cyber Risk Reporting to incorporate thematic insights into ongoing risk analysis and framework updates
  • Engage with stakeholders to gather requirements and support responses to identified thematic risks
  • Deliver CF&O team’s issues management oversight processes, ensuring appropriate identification and escalation in compliance with relevant Standards
  • Contribute to continuous improvement initiatives within the team
  • Build and maintain trusted relationships with internal and external stakeholders
  • Solid understanding of cyber security and risk management principles
  • Experience in risk reporting or thematic analysis
Job Responsibility
Job Responsibility
  • Collaboration with stakeholders to understand their security requirements in business processes and IT projects, to enhance overall risk management
  • Execution of risk assessments to identify and prioritise potential cybersecurity threats that could impact the banks operations and data and guide the implementation of mitigation strategies and communicate findings to relevant findings to relevant senior stakeholders
  • Collaboration with business units to develop and implement security policies and procedures for the banks operations aligned to the risk management framework
  • Management of the implementation, testing and monitoring of security controls across the banks IT systems to ensure the effectiveness of controls and mitigation of risk
  • Execution of training content and sessions to educate employees, enhance cybersecurity awareness and provide guidance on safe online practices
  • Management of complex cybersecurity incidents by collaborating with IT teams and response experts to effectively resolve cases through analysis, expertise support and project supervision
  • Identification of emerging cybersecurity trends, threats, and new technologies to address potential risks by advocating the adoption of new security solutions
What we offer
What we offer
  • Competitive holiday allowance
  • Life assurance
  • Private medical care
  • Pension contribution
  • Fulltime
Read More
Arrow Right