The Maples Group is a standard bearer in financial and legal services, trusted by many of the worlds largest hedge fund managers, private equity firms and international corporations. Our distinction flows from our carefully curated team: 2,500 professionals characterised by tenacity, ethics and exacting excellence. Operating in key financial centres across the Americas, Asia, Europe and the Middle East, our international presence offers a unique springboard for career development and cross-cultural immersion. Our side-by-side financial and legal services are similarly ripe for interdisciplinary learning and growth. The Maples Group looks to add a Leeds based Security Engineer to our team and invites eager and qualified candidates to apply. We are committed to diversity, inclusion and equality of opportunity as we attract, retain and develop world-class talent. Who We Seek Our merit-based culture suits professionals in pursuit of boundless careers and lives. Beyond their acumen, team members are collaborative and conscientious, bringing a healthy sense of drive and purpose to each interaction and to all aspects of their work. About the Role The Security Engineer is responsible for deploying, maintaining, supporting and improving the tools and processes for Information Security at Maples. Primary responsibilities include: • Implementing and maintaining network, intrusion detection and prevention systems as well as other security tools in a hybrid cloud environment • Be aware of the latest threats in cybersecurity to guide and advise the organization regarding the protection of systems • Monitor and translate threat intelligence feeds into actionable detection and response actions • Monitor and analyze security logs for attacker tactics, techniques and procedures (TTPs), filtering through suspicious activities to determine their root cause and perform remediation activities as appropriate • Creating, testing and validating Maples security capabilities to identify vulnerabilities/gaps and build appropriate detection and response countermeasures • Serve as a technical resource for the security operations team during active response efforts • Track, record, and monitor identified security issues through to completion • Support Identity technology stack by performing various identity, access and data protection activities including monitoring and enhancements to ensure that the security systems are operational and effective • Assist with implementation and management of data security policies including data loss prevention, privileged access management, insider risk management • Assist with the design, engineering and management of automations to improve workflows and inefficiencies related to security processes • Assist in responding to audits, penetration tests and vulnerability assessments • Develop, manage, and measure KPIs, KRIs and additional metrics to understand the trends, quality, and insights from the vulnerability detection results to facilitate business decisions, automation development, and update of executive dashboards, reports and templates • Ensure that the companys sensitive information and IT equipment are kept safe by implementing the correct security measures What You Bring In addition to indisputably high ethical standards and autonomy, the ideal candidate possesses the following: • Bachelors degree in computer science, information systems, cybersecurity, or a related field • Security certifications: GCIA, GCFA, GCFE, CISSP (Associate), CEH, or comps • Experience in one or more areas: identity and access management, security operations, cyber threat hunting, Endpoint Detection and Response (EDR), detection signatures and analytics • Experience with open standards such as SAML, OAuth or Open ID • Experience with encryption, logging, log aggregation and analytics domains • Practical experience with secure network architecture and cloud technologies • Practical experience with IAM technologies such as AD, Azure AD, access policies, authentication/authorization, strong authentication, and privileged access management • Experience with SIEM content development, security monitoring, incident detection, incident response and forensics • Experience in threat hunting and incident response experience in Windows, Linux, and hybrid cloud environments • Proficient in SIEM and log management configuration and analysis • Experience with Security Orchestration Automation and Response tools • Experience/familiarity with Cyber Intelligence, Threat Operations, Penetration Testing, Red Teaming, Incident Response and Threat Hunting methodologies • Experience with intrusion detection systems and intrusion prevention systems • Proficient in or more of: PowerShell, SQL, bash/shell, or other modern programming language • Experienced in Security by Design or Privacy by Design concepts • Ability to drive architectural design decisions, solve technical problems, and make improvements to our systems and processes • Ability to troubleshoot and perform root cause analysis of incidents to identify solutions, next steps, and issue mitigation • Ability to interface with, and gain the respect of, stakeholders at all levels and roles in the company • Is a confident, energetic self-starter, with strong interpersonal skills and high sense of urgency and personal integrity BENEFITS & REWARDS The most enduring professional relationships are reciprocal relationships. The Maples Group prioritises employee health and wellbeing. Depending on your location, we offer a range of benefits, including: • Comprehensive health coverage (medical, dental and optical) • Competitive vacation packages • Educational assistance and professional development programmes • Savings or pension plan • Life insurance • Travel insurance • Global mental wellness programme • Sports clubs and social events