CAIA's Career Center is an easy-to-use, comprehensive resource connecting job seekers with employers in the growing AI field. Use your knowledge and credibility to advance your career or build a talented team for your organization. Opportunities targeted to CAIA Charterholders are prioritized.
In order to search for jobs specifically for CAIA Charterholders or those pursuing the CAIA Charter please enter “CAIA” in the search panel.
This will enable you to search for CAIA specific roles globally.
London Based Financial Services firm seek an Information Security Engineer, be responsible for the transition into AWS, you will assist in implementing cloud centric tools (Dome9, Twistlock, HashiCorp, etc) and setting policies. You will have experience of working in an Information Security department. Application Developer with strong knowledge of AWS. Ability to develop AWS Cloud Formation Templates. Knowledge of TCP/IP and network administration/protocols. Vulnerability management tools, Cloud monitoring tools. SIEM technologies. Application Program Interfaces. AWS Security Certification. Strong knowledge of Python. This role is to ensure the firm maintains its Strong Security Posture, compliance with regulations and safeguard their customer's data. This includes checking server and firewall logs, scrutinizing network traffic, establishing and updating vulnerability scans. This person will also analyse and resolve security breaches and vulnerability issues in a timely and accurate fashion, and conduct user activity audits where required. Conduct research on emerging products, services, protocols, and standards in support of security enhancement and development efforts. Assist with the monitoring of all security systems and their corresponding or associated software, including firewalls, intrusion detection systems, cryptography systems, and anti-virus software. Manage and ensure the security of databases and data transferred both internally and externally. Oversee penetration testing of all systems in order to identify system vulnerabilities. Design, implement, and report on security system and end user activity audits.