Cyber Security Engineer

Northern Trust
London
7 months ago
Applications closed

Related Jobs

View all jobs

Network Security Engineer

IT Network Security Engineer

Graduate Cyber Security Engineer

Technology Engineer / Cyber Security / IT Network Infrastructure

Director / Head of SOC - Greenfield SOC (Gov.)

SOC Analyst

About Northern Trust:

Northern Trust, a Fortune 500 company, is a globally recognized, award-winning financial institution that has been in continuous operation since 1889.

Northern Trust is proud to provide innovative financial services and guidance to the world's most successful individuals, families, and institutions by remaining true to our enduring principles of service, expertise, and integrity. With more than 130 years of financial experience and over 22,000 partners, we serve the world's most sophisticated clients using leading technology and exceptional service.

Role/Department

Seeking a dynamic engineer who is passionate for Privileged Identity and Access Management, Cloud and Security technologies to be part of a team that develops a product impacting tens of thousands of customers. As a senior lead in our PAM team, you will be responsible for designing, implementing, integrating, testing and deploying features and components in a large-scale system. We expect you to drive improvements to code quality, performance, and team processes while leveraging modern web technologies and tool. Should be able to debug problems arising as a result of implementing PAM technologies and be able to understand the implications of his implementations.

The key responsibilities of the role include:

Develops and administers the solutions that meet system expectations relative to scalability, performance, fault tolerance, usability, and data integrity. Delivers solutions that meet end user expectations relative to performance, usability and security for the PAM Engineering and Architecture function.

Uses specific knowledge of a discipline to achieve goals through own work. Has specific knowledge or expertise typically gained through formal education or equivalent experience. Uses expertise to provide guidance to others as a project manager or consultant. Requires in-depth conceptual and practical knowledge in own job discipline and basic knowledge of related job disciplines. Solves complex problems. Works independently; receives minimal guidance. Will lead projects or project steps within a broader project or may have accountability for on-going activities or objectives.

  • Perform CyberArk PAM installation and upgrades.
  • Develop and execute CyberArk Plugins
  • Develop and execute the CyberArk integrations implementation plans and deployment guides.
  • Deploy PSM and AIM/AAM/Secrets Manager/Conjur solutions.
  • Work with infrastructure teams (*nix/Windows/Network/Mainframe/ Databases/Applications) to gather information for platform and account onboarding.
  • Develop and unit test PSM connection components.
  • Develop and test AIM/AAM/Conjur SDKs for application integration.
  • Gather new CPM plugin development requirements.
  • Support, troubleshoot and fix CPM plug-in issues.
  • Develop PowerShell/Java scripts/codes to automate CyberArk jobs.
  • Review and analyze CyberArk EPM threat protection events using CyberArk threat intelligence Services such as Virus total, National software reference Library, CyberArk application and reputation analysis


Skills/ Qualifications:

  • Excellent teammate skills, effectiveness both in independent and collaborative work.
  • Ability to learn and use new technologies.
  • Proven hands-on CyberArk experience
  • Background in networking, data security and cloud-based applications.
  • Experience with distributed computing platforms for high-scale systems.
  • Experience with Azure services and eco-system.
  • Experience with Microsoft and Linux-based environments.
  • Experience with continuous integration and deployment tools.


Working with Us:

As a Northern Trust partner, greater achievements await. You will be part of a flexible and collaborative work culture in an organization where financial strength and stability is an asset that emboldens us to explore new ideas.

Movement within the organization is encouraged, senior leaders are accessible, and you can take pride in working for a company committed to assisting the communities we serve! Join a workplace with a greater purpose.

We'd love to learn more about how your interests and experience could be a fit with one of the world's most admired and sustainable companies! Build your career with us and apply today. #MadeForGreater

Reasonable accommodation

Northern Trust is committed to working with and providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation for any part of the employment process, please email our HR Service Center at .

We hope you're excited about the role and the opportunity to work with us. We value an inclusive workplace and understand flexibility means different things to different people.

Apply today and talk to us about your flexible working requirements and together we can achieve greater.
#J-18808-Ljbffr

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Jobs for Career Switchers in Their 30s, 40s & 50s (UK Reality Check)

If you’re thinking about switching into cyber security in your 30s, 40s or 50s, you’re in good company. Across the UK, organisations of all sizes are hiring people from diverse backgrounds to protect systems, data & customers. But with hype around “hackers” & quick-win courses, it’s hard to separate reality from fiction. This guide gives you a UK reality check: which roles genuinely exist, what employers actually want, how training really works, what to expect on salary & progression & whether age matters. Whether you come from finance, project management, operations, law, HR or customer service, there is a credible route into cyber security if you approach it strategically.

How to Write a Cyber Security Job Ad That Attracts the Right People

Cyber security is now a board-level priority for organisations across the UK. From financial services and healthcare to critical infrastructure, SaaS platforms and the public sector, demand for skilled cyber security professionals continues to grow. Yet despite this demand, many employers struggle to attract the right candidates. Cyber security job adverts often generate large volumes of applications, but few are a genuine match. Meanwhile, experienced security engineers, analysts and architects quietly ignore adverts that feel vague, unrealistic or disconnected from real security work. In most cases, the problem is not a lack of talent — it is the quality of the job advert. Cyber security professionals are trained to assess risk, spot weaknesses and question assumptions. A poorly written job ad signals organisational immaturity and weak security culture. A well-written one signals seriousness, competence and trust. This guide explains how to write a cyber security job ad that attracts the right people, improves applicant quality and positions your organisation as a credible security employer.

Maths for Cyber Security Jobs: The Only Topics You Actually Need (& How to Learn Them)

If you are applying for cyber security jobs in the UK it can feel like “real security people” must be brilliant at maths. The reality is simpler: most roles do not need degree-level pure maths. What they do need is confidence with a small set of practical topics that show up repeatedly in day-to-day work across SOC, incident response, cloud security, AppSec, threat detection, IAM & security engineering. This guide strips the maths down to what actually helps you get hired. It includes a 6-week learning plan plus portfolio projects you can publish to prove the skills. You will focus on: Number systems & bitwise thinking (binary, hex, bytes, XOR) Modular arithmetic basics (enough to understand how modern crypto “works”) Probability & statistics for detection, triage & risk Discrete maths for logic, sets, graphs & complexity Security maths habits: estimation, false positive control & evidence-led reporting You will not waste time on heavy theory that rarely appears in junior or mid-level cyber security roles.