IT Security Auditor
<p data-start="63" data-end="308">Robert Half Technology are assisting a leading IT service provider to recruit multiple experienced, hands-on Security IT Auditors on a contract basis. Remote working available, with the first 2 weeks on-site in the Netherlands.</p><h3 data-start="315" data-end="329"><strong data-start="319" data-end="327">Role</strong></h3><p data-start="330" data-end="563">The Security IT Auditor will be embedded in small, technical teams to directly execute critical security audits of network and infrastructure systems, focusing on practical, technical evaluation and remediation of real-world risks.</p><p data-start="565" data-end="596">Key responsibilities include:</p><ul data-end="1556" data-start="597"><li data-start="597" data-end="754"><p data-start="599" data-end="754">Lead and perform end-to-end cyber security audits across diverse network architectures, including on-premises data centres and public cloud environments.</p></li><li data-end="946" data-start="755"><p data-end="946" data-start="757">Evaluate technical security controls such as firewalls, IDS/IPS, security baselines, and access controls by directly interrogating systems, reviewing configurations, and testing controls.</p></li><li data-end="1102" data-start="947"><p data-start="949" data-end="1102">Conduct vulnerability scans, penetration testing, and protocol analysis using approved tools to validate the efficacy of implemented security measures.</p></li><li data-start="1103" data-end="1266"><p data-end="1266" data-start="1105">Collaborate closely with IT infrastructure, cloud engineering, and SOC teams to collect evidence, interpret technical documentation, and clarify audit results.</p></li><li data-end="1411" data-start="1267"><p data-end="1411" data-start="1269">Document and communicate audit findings in detailed technical reports, highlighting exploitable weaknesses and actionable remediation steps.</p></li><li data-start="1412" data-end="1556"><p data-start="1414" data-end="1556">Respond rapidly to audit issues, providing hands-on corrective input in real time, and supporting project delivery in a dynamic environment.</p></li></ul><h3 data-end="1580" data-start="1563"><strong data-end="1578" data-start="1567">Profile</strong></h3><p data-end="1613" data-start="1581">The ideal candidate will have:</p><ul data-end="2539" data-start="1614"><li data-end="1751" data-start="1614"><p data-start="1616" data-end="1751">Minimum 6 years' hands-on experience in technical IT audit, cyber security testing, penetration testing, or system security analysis.</p></li><li data-start="1752" data-end="1856"><p data-end="1856" data-start="1754">Strong background in technical audit execution within large, complex cloud and network environments.</p></li><li data-start="1857" data-end="1943"><p data-start="1859" data-end="1943">Experience directly configuring, reviewing, and testing network security controls.</p></li><li data-start="1944" data-end="2057"><p data-start="1946" data-end="2057">Preferably prior work in the technology sector, ideally involving technical reviews of carrier-grade systems.</p></li><li data-end="2141" data-start="2058"><p data-end="2141" data-start="2060">Proficiency in tools for technical controls testing and vulnerability analysis.</p></li><li data-start="2142" data-end="2215"><p data-start="2144" data-end="2215">Solid experience performing audit tasks and analysing system outputs.</p></li><li data-end="2312" data-start="2216"><p data-end="2312" data-start="2218">In-depth hands-on knowledge of cloud security frameworks and endpoint protection strategies.</p></li><li data-start="2313" data-end="2443"><p data-start="2315" data-end="2443">Ability to independently interpret logs, forensic artefacts, firewall rules, and endpoint configurations in live environments.</p></li><li data-end="2482" data-start="2444"><p data-start="2446" data-end="2482">Strong written and spoken English.</p></li><li data-end="2539" data-start="2483"><p data-end="2539" data-start="2485">Big Four or similar audit firm background is a plus.</p></li></ul><p data-start="2541" data-end="2574"><strong data-start="2541" data-end="2572">Certifications (preferred):</strong></p><ul data-start="2575" data-end="2725"><li data-end="2609" data-start="2575"><p data-start="2577" data-end="2609">Highly valued: CISSP, CISA, RE</p></li><li data-end="2725" data-start="2610"><p data-end="2725" data-start="2612">Additional plus: ISO 27001 Lead Auditor, CISM, CRISC, GIAC, AZ-500, or other relevant technical certifications.</p></li></ul><h3 data-end="2749" data-start="2732"><strong data-start="2736" data-end="2747">Company</strong></h3><ul data-end="2867" data-start="2750"><li data-end="2816" data-start="2750"><p data-start="2752" data-end="2816">IT service provider with operations in the Netherlands</p></li><li data-end="2867" data-start="2817"><p data-start="2819" data-end="2867">Remote working, with the first 2 weeks on-site</p></li></ul><h3 data-end="2901" data-start="2874"><strong data-end="2899" data-start="2878">Salary & Benefits</strong></h3><p data-start="2902" data-end="2997">The salary/rate of pay is dependent upon your experience, qualifications, and certifications.</p><p>Robert Half Ltd acts as an employment business for temporary positions and an employment agency for permanent positions. Robert Half is committed to diversity, equity and inclusion. Suitable candidates with equivalent qualifications and more or less experience can apply. Rates of pay and salary ranges are dependent upon your experience, qualifications and training. If you wish to apply, please read our Privacy Notice describing how we may process, disclose and store your personal data: roberthalf.com/gb/en/privacy-notice.</p><img src="https://counter.adcourier.com/QWxmaWUuUm93ZXR0LjI5NTM1LjEwOTIzQHJoaS5hcGxpdHJhay5jb20.gif">
- City of London, London
- remote
- Permanent
-
- GBP / Yearly
- <p data-start="63" data-end="308">Robert Half Technology are assisting a leading IT service provider to recruit multiple experienced, hands-on Security IT Auditors on a contract basis. Remote working available, with the first 2 weeks on-site in the Netherlands.</p><h3 data-start="315" data-end="329"><strong data-start="319" data-end="327">Role</strong></h3><p data-start="330" data-end="563">The Security IT Auditor will be embedded in small, technical teams to directly execute critical security audits of network and infrastructure systems, focusing on practical, technical evaluation and remediation of real-world risks.</p><p data-start="565" data-end="596">Key responsibilities include:</p><ul data-end="1556" data-start="597"><li data-start="597" data-end="754"><p data-start="599" data-end="754">Lead and perform end-to-end cyber security audits across diverse network architectures, including on-premises data centres and public cloud environments.</p></li><li data-end="946" data-start="755"><p data-end="946" data-start="757">Evaluate technical security controls such as firewalls, IDS/IPS, security baselines, and access controls by directly interrogating systems, reviewing configurations, and testing controls.</p></li><li data-end="1102" data-start="947"><p data-start="949" data-end="1102">Conduct vulnerability scans, penetration testing, and protocol analysis using approved tools to validate the efficacy of implemented security measures.</p></li><li data-start="1103" data-end="1266"><p data-end="1266" data-start="1105">Collaborate closely with IT infrastructure, cloud engineering, and SOC teams to collect evidence, interpret technical documentation, and clarify audit results.</p></li><li data-end="1411" data-start="1267"><p data-end="1411" data-start="1269">Document and communicate audit findings in detailed technical reports, highlighting exploitable weaknesses and actionable remediation steps.</p></li><li data-start="1412" data-end="1556"><p data-start="1414" data-end="1556">Respond rapidly to audit issues, providing hands-on corrective input in real time, and supporting project delivery in a dynamic environment.</p></li></ul><h3 data-end="1580" data-start="1563"><strong data-end="1578" data-start="1567">Profile</strong></h3><p data-end="1613" data-start="1581">The ideal candidate will have:</p><ul data-end="2539" data-start="1614"><li data-end="1751" data-start="1614"><p data-start="1616" data-end="1751">Minimum 6 years' hands-on experience in technical IT audit, cyber security testing, penetration testing, or system security analysis.</p></li><li data-start="1752" data-end="1856"><p data-end="1856" data-start="1754">Strong background in technical audit execution within large, complex cloud and network environments.</p></li><li data-start="1857" data-end="1943"><p data-start="1859" data-end="1943">Experience directly configuring, reviewing, and testing network security controls.</p></li><li data-start="1944" data-end="2057"><p data-start="1946" data-end="2057">Preferably prior work in the technology sector, ideally involving technical reviews of carrier-grade systems.</p></li><li data-end="2141" data-start="2058"><p data-end="2141" data-start="2060">Proficiency in tools for technical controls testing and vulnerability analysis.</p></li><li data-start="2142" data-end="2215"><p data-start="2144" data-end="2215">Solid experience performing audit tasks and analysing system outputs.</p></li><li data-end="2312" data-start="2216"><p data-end="2312" data-start="2218">In-depth hands-on knowledge of cloud security frameworks and endpoint protection strategies.</p></li><li data-start="2313" data-end="2443"><p data-start="2315" data-end="2443">Ability to independently interpret logs, forensic artefacts, firewall rules, and endpoint configurations in live environments.</p></li><li data-end="2482" data-start="2444"><p data-start="2446" data-end="2482">Strong written and spoken English.</p></li><li data-end="2539" data-start="2483"><p data-end="2539" data-start="2485">Big Four or similar audit firm background is a plus.</p></li></ul><p data-start="2541" data-end="2574"><strong data-start="2541" data-end="2572">Certifications (preferred):</strong></p><ul data-start="2575" data-end="2725"><li data-end="2609" data-start="2575"><p data-start="2577" data-end="2609">Highly valued: CISSP, CISA, RE</p></li><li data-end="2725" data-start="2610"><p data-end="2725" data-start="2612">Additional plus: ISO 27001 Lead Auditor, CISM, CRISC, GIAC, AZ-500, or other relevant technical certifications.</p></li></ul><h3 data-end="2749" data-start="2732"><strong data-start="2736" data-end="2747">Company</strong></h3><ul data-end="2867" data-start="2750"><li data-end="2816" data-start="2750"><p data-start="2752" data-end="2816">IT service provider with operations in the Netherlands</p></li><li data-end="2867" data-start="2817"><p data-start="2819" data-end="2867">Remote working, with the first 2 weeks on-site</p></li></ul><h3 data-end="2901" data-start="2874"><strong data-end="2899" data-start="2878">Salary & Benefits</strong></h3><p data-start="2902" data-end="2997">The salary/rate of pay is dependent upon your experience, qualifications, and certifications.</p><p>Robert Half Ltd acts as an employment business for temporary positions and an employment agency for permanent positions. Robert Half is committed to diversity, equity and inclusion. Suitable candidates with equivalent qualifications and more or less experience can apply. Rates of pay and salary ranges are dependent upon your experience, qualifications and training. If you wish to apply, please read our Privacy Notice describing how we may process, disclose and store your personal data: roberthalf.com/gb/en/privacy-notice.</p><img src="https://counter.adcourier.com/QWxmaWUuUm93ZXR0LjI5NTM1LjEwOTIzQHJoaS5hcGxpdHJhay5jb20.gif">
- 2025-12-01T21:20:11Z