Current jobs related to Senior Application Security Specialist - Windsor, Windsor and Maidenhead - Cognizant


  • Windsor, Windsor and Maidenhead, United Kingdom Spectrum Security & Fire Ltd Full time

    About the Role:This is a fantastic opportunity for a skilled Engineer to join our team at Spectrum Security & Fire Ltd. As a Security Systems Installation Specialist, you will be responsible for the installation and commissioning of electronic security and fire systems for our corporate clients.Key Responsibilities:Installation and commissioning of security...


  • Windsor, Windsor and Maidenhead, United Kingdom NavitsPartners Full time

    Operating System Security ExpertiseAs a Senior Operating System Security Specialist at NavitsPartners, you will utilize advanced scanning tools to detect and remove malware from data files.Examine operating system startup routines to detect and eliminate persistence mechanisms.Key Responsibilities:Expertise in Dell and/or VMware technologies.Incident...


  • Windsor, Windsor and Maidenhead, United Kingdom InterSystems Full time

    Job Title: Application SpecialistAt InterSystems, we are seeking an experienced Application Specialist to join our team. As an Application Specialist, you will play a critical role in ensuring the successful implementation of our products in the healthcare industry.Key Responsibilities:Discovery: Analyze customer processes, identify gaps, and propose...


  • Windsor, Windsor and Maidenhead, United Kingdom InterSystems Full time

    Job Title: Application SpecialistWe are seeking an experienced Application Specialist to join our team at InterSystems. As an Application Specialist, you will play a critical role in ensuring the successful implementation of our products in the healthcare industry.Key Responsibilities:Discovery: Analyze customer processes, identify gaps, and propose...


  • Windsor, Windsor and Maidenhead, United Kingdom InterSystems Full time

    Job Title: Application SpecialistWe are seeking an experienced Application Specialist to join our team at InterSystems. As an Application Specialist, you will play a critical role in ensuring the successful implementation of our products in the healthcare industry.Key Responsibilities:Discovery: Analyze customer processes, identify gaps, and propose...


  • Windsor, Windsor and Maidenhead, United Kingdom InterSystems Full time

    Job SummaryWe are seeking a skilled Application Specialist to join our team at InterSystems. As an Application Specialist, you will play a critical role in ensuring the successful implementation of our products in the healthcare industry.Key ResponsibilitiesReview and analyze customer processes to identify areas for improvement.Develop and implement...


  • Windsor, Windsor and Maidenhead, United Kingdom InterSystems Full time

    Job SummaryThe Application Specialist will play a crucial role in ensuring the successful implementation of InterSystems products in the healthcare industry. This involves using their knowledge of healthcare, business, and InterSystems products to identify and implement solutions that meet customer needs.Key ResponsibilitiesDiscoveryReview proposal and...


  • Windsor, Windsor and Maidenhead, United Kingdom Rocket Mortgage Canada Full time

    As an Application Support Specialist at Rocket Mortgage Canada, you will play a critical role in ensuring the smooth operation of our internal and third-party application environments. Your responsibilities will include collaborating with stakeholders to identify and resolve software issues, managing application software licenses, and conducting root cause...


  • Windsor, Windsor and Maidenhead, United Kingdom NavitsPartners Full time

    Office 365 Security Configuration Engineer Role:We are seeking a highly skilled Office 365 Security Configuration Engineer to join our team at NavitsPartners.The ideal candidate will have expertise in implementing and managing security configurations for Office 365 and Azure environments.Responsibilities include providing security expertise in Azure Active...


  • Windsor, Windsor and Maidenhead, United Kingdom NavitsPartners Full time

    Office 365 Security Configuration Engineer Role:We are seeking a highly skilled Office 365 Security Configuration Engineer to join our team at NavitsPartners.The ideal candidate will have expertise in implementing and managing security configurations for Office 365 and Azure environments.Responsibilities include providing security expertise in Azure Active...


  • Windsor, Windsor and Maidenhead, United Kingdom NavitsPartners Full time

    NavitsPartners Operating System Threat Analyst RoleAs a key member of our team, you will utilize advanced scanning tools to detect and remove malware from data files, ensuring the security and integrity of our systems.Our ideal candidate will have expertise in Dell and/or VMware technologies, as well as strong incident response skills and a background in...


  • Windsor, Windsor and Maidenhead, United Kingdom ISBA Enterprises Limited Full time

    We are seeking a skilled Security Officer to join our team at ISBA Enterprises Limited. The ideal candidate will possess excellent communication skills, a good level of literacy, numeracy, and telephone skills, as well as a full UK driving license to drive manual vehicles.Main ResponsibilitiesSupport the security department in operating all functions in...


  • Windsor, Windsor and Maidenhead, United Kingdom Tata Consultancy Services Full time

    Job Title: Senior IFS ERP Implementation SpecialistAt Tata Consultancy Services, we are seeking a highly skilled Senior IFS ERP Implementation Specialist to join our team. As a key member of our implementation team, you will be responsible for leading the implementation of IFS Cloud across geographies, facilitating supply chain consulting for IFS ERP, and...


  • Windsor, Windsor and Maidenhead, United Kingdom Tata Consultancy Services Full time

    Job Title: Senior IFS ERP Implementation SpecialistAt Tata Consultancy Services, we are seeking a highly skilled Senior IFS ERP Implementation Specialist to join our team. As a key member of our implementation team, you will be responsible for leading the implementation of IFS Cloud across geographies, facilitating supply chain consulting for IFS ERP, and...


  • Windsor, Windsor and Maidenhead, United Kingdom Centrica Full time

    About the RoleWe are seeking a highly skilled Cyber Security Risk Manager to join our team at Centrica. As a key member of our Cyber and Information Security team, you will be responsible for identifying and managing Cyber Security risks across the organization.Key Responsibilities:Develop and implement Cyber Security risk management strategies to protect...


  • Windsor, Windsor and Maidenhead, United Kingdom Centrica Full time

    About the RoleWe are seeking a highly skilled Cyber and Information Security Risk Analyst to join our team at Centrica. As a key member of our Cyber and Information Security Risk Management function, you will play a critical role in identifying and managing risks to our customers, data, services, and systems.Key ResponsibilitiesSupport the implementation of...


  • Windsor, Windsor and Maidenhead, United Kingdom NavitsPartners Full time

    Office 365 Security Configuration Engineer Responsibilities:Implement and manage security configurations for Office 365 and Azure environments, ensuring seamless integration and optimal performance.Provide expertise in Azure Active Directory, Microsoft cloud security, and data protection, ensuring the highest level of security and compliance.Oversee security...


  • Windsor, Windsor and Maidenhead, United Kingdom NavitsPartners Full time

    Office 365 Security Configuration Engineer Role:We are seeking a highly skilled Office 365 Security Configuration Engineer to join our team at NavitsPartners.The ideal candidate will have expertise in implementing and managing security configurations for Office 365 and Azure environments.Responsibilities will include providing security expertise in Azure...


  • Windsor, Windsor and Maidenhead, United Kingdom NavitsPartners Full time

    Office 365 Security Configuration Engineer Role:We are seeking a highly skilled Office 365 Security Configuration Engineer to join our team at NavitsPartners.The ideal candidate will have expertise in implementing and managing security configurations for Office 365 and Azure environments.Responsibilities will include providing security expertise in Azure...


  • Windsor, Windsor and Maidenhead, United Kingdom Centrica Full time

    About the RoleWe are seeking a highly skilled Cyber and Information Security Risk Manager to join our team at Centrica. As a key member of our Digital Technology Services (DTS) function, you will play a critical role in identifying and managing Cyber and Information Security risks across the organization.Key ResponsibilitiesSupport the implementation of the...

Senior Application Security Specialist

2 months ago


Windsor, Windsor and Maidenhead, United Kingdom Cognizant Full time
About the Role

Cognizant is seeking an experienced Application Security Architect to join our team. As a key member of our security team, you will be responsible for designing and implementing security measures for applications built on Dynamics 365, Microsoft CRM, and Salesforce.

Key Responsibilities
  • Security Architecture: Lead the design and implementation of security measures for applications, ensuring compliance with industry standards.
  • Security Policy and Procedure Development: Oversee the development and maintenance of security policies, procedures, and guidelines to ensure compliance with industry standards.
  • Security Best Practices: Provide expert guidance on security best practices to development teams during the software development lifecycle.
  • Security Assessments and Vulnerability Testing: Conduct regular security assessments and vulnerability testing to identify and mitigate risks.
  • Security Integration: Collaborate with cross-functional teams to integrate security controls into application architectures.
  • Security Training and Awareness: Develop and deliver security training programs to enhance the security awareness of team members.
  • Incident Response: Monitor and respond to security incidents, ensuring timely resolution and documentation.
  • Security Tool Evaluation: Evaluate and recommend security tools and technologies to enhance the organization's security posture.
  • Security Requirements: Ensure that security requirements are met during the deployment and operation of applications.
  • Business Requirements Gathering: Work with customers to refine business requirements, ensuring that they cover functional and non-functional requirements, user volumetric growth projections, and business expansion roadmaps.
  • Requirements Roadmap Development: Support customers in defining the requirements roadmap and building a business case.
Requirements
  • Strong Background in Dynamics 365, Microsoft CRM, and Salesforce: Demonstrate experience in the Utilities domain, understanding its unique security challenges.
  • Application Security Experience: Show proficiency in conducting security assessments and vulnerability testing.
  • Excellent Communication Skills: Exhibit excellent communication skills to effectively collaborate with cross-functional teams.
  • Proactive Approach to Security: Display a proactive approach to identifying and mitigating security risks.
Design and Analysis
  • Architecture and Infrastructure Design: Responsible for architecture and infrastructure design.
  • POC Execution: Coordinate team members for POC execution to realize architecture implementation.
  • Security System Design: Responsible for security system design.
  • Capacity Planning and Sizing: Responsible for capacity planning and sizing.
  • Architecture Review: Participate in architecture review with customers and product vendors.
  • Reusable Components/Frameworks: Design reusable components/frameworks.
  • Usage Analysis: Perform usage analysis of existing reusable design components/frameworks.
  • Internal Technical Audit: Internal technical audit for IAM/Data Security projects.
Coding
  • Code Review and Recommendations: Code review and recommendations.
Testing
  • Unit Integration and Performance Testing: Oversee unit integration and performance testing.
  • Test Results Review: Review test results.
Documentation
  • Technical and SDLC Documentation Review: Technical and SDLC documentation review is expected.
Change Management
  • Adherence to Change Management Process: Adopt and enforce ensure adherence of change management process within projects.
Deployment
  • Software Engineering Processes: Setup and own software engineering processes such as build processes, source control systems, development practices to ensure high-quality delivery.
  • Automated Deployment Scripts: Design automated deployment scripts and data migration tools.
Defect Management
  • Defect Triage and Resolution: Participate in defect triage process and drive resolution process.
Coaching and Facilitating
  • Mentorship: Mentor the team on translating requirements to design.
  • Guidance and Best Practices: Provide guidance and share best practices for design and implementation.
  • Technology Selection and Solution Fitment: Provide guidance on technology selection and solution fitment approach for security requirements.
  • Recruitment: Participate in recruitment drives.
Project Estimation
  • Standard Estimation Templates: Define standard estimation templates.
  • Generic IAM/Data Security Questionnaire: Define generic IAM/Data security questionnaire for RFP/RFI/Assessment.
  • Project Estimation: Do project estimation (resource, timeline, cost) for RFP/RFI and customer projects.
Resource and Efforts Estimation and Monitoring
  • Effort Estimation Review: Review effort estimation of large-size projects.
  • Process Improvements and Adherence: Process improvements and adherence.
  • Architecture Review and Performance Improvement: Architecture review and performance improvement optimization suggestions.
  • Technical Audit Review: Technical audit review.
  • Service Improvement Areas: Suggest service improvement areas.
  • Architecture Consistency: Ensure that the developed system is consistent with the defined architecture: review design and code to meet architecture requirements.
  • Best Practices Adoption: Adopts/refines best practices based on project requirements.
Knowledge Management
  • Internal Competency Contribution: Contribution to IAM internal competency.
  • Reusable Assets Consolidation: Reusable assets consolidation.
  • Technology Point of View: Provide technology point of view. Share project implementation best practices.
  • On-Demand Technical Training: Conduct on-demand technical training and explore new products/new services.
  • Data Security Internal Competency: Contribution to Data Security internal competency.
  • Project Implementation Best Practices: Share project implementation best practices.
  • Data Protection Exploration: Explore new products and technologies on data protection.
People Management
  • Team Management: Manage a sizeable project team with 15-30 members.
  • People Recognition, Appraisals, and Feedback: Responsible for people recognition, appraisals, and feedback.
Business Development
  • Business Pre-Sales: Contribution to business pre-sales (RFP/RFC/Customer visit).
  • Customer Visit: Attend customer visit.
Thought Leadership, Process Improvements, and Delivery Excellence

Contribute to the initiatives triggered by the ERSS DE team.

Technology Advisory and Consulting
  • Technical Point of View: Provide technical point of view on IAM Data security requirements.
  • Technology Roadmap Creation: Support and contribute to creating technology roadmaps.
  • Optimal Technology Solutions: Recommend optimal technology solutions to the client using knowledge of technology and tools.
Technology Review for Projects
  • Cross-Project Technical Audit: Contribute to cross-project technical audits and review.
  • Optimal Technology Solutions: Recommend optimal technology solutions to the client using knowledge of technology and tools.
Capability Development
  • POCs in Lab Environment: Conduct POCs in lab environment.
  • Product Vendor Training: Attend product vendor training.
  • Knowledge Acquisition: Work with product vendors and acquire knowledge on new emerging areas.