Clearance Experience working in a live SOC environment Working knowledge of various Operating Systems (Windows, Linux, OSX, IOS) Experience with Purple Teaming Understanding of computerforensics History with use of Firewalls and IDS/IPS devices Proven ability with SIEM (Security Information and Event Management) technologies Experience in more »
technology to increase security and compliance. Deputise, as required, for the Information Assurance and Security Manager Person Specification Qualifications Essential Degree, or equivalent, in Computer Networks, ComputerForensics, Engineering or related subject (modules in Cyber Security would be advantageous) plus specialist Its security knowledge and expertise in more »
provide integrated solutions to our clients’ most challenging problems. In this role you will have demonstrated skills in various elements of Incident Response, conducting computer intrusion investigations, and have a strong foundation in cyber security policy, operations and best practices, ideally in large enterprise environments. Ideally, you will have … travel, either within the country or internationally. Required Technical and Professional Expertise • Hands-on experience with hardware/software tools used in incident response, computerforensics, network security assessments, and/or application security. • Experience within incident response teams and handling tasks across all phases of an engagement. more »
hands on SOC experience >Shift work (5 Days on, 2 Off, 5 Nights on, 3 Off) Tech Stack across roles: Experience with Operating Systems & ComputerForensics Network, Routing & Switching experience with knowledge of SIEM Technologies Knowledge of Cybersecurity frameworks and standards If you are interested in any of more »
respond to that threat. Responsibilities Manage and co-ordinate cyber security incidents for our clients, working closely with the head of cyber response. Digital forensics of relevant incident data (disk, volatile memory, network packets, log files). Maintaining a current view of the cyber threat, and being able to … proficiency in at least one of these areas: network security/traffic/log analysis; Linux and/or Mac/Unix operating system forensics; Linux/Unix disk forensics (ext2/3/4, HFS+, and/or APFS file systems), advanced memory forensics, static and … dynamic malware analysis/reverse engineering, advanced mobile device forensics Advanced experience in industry computer forensic tools such as X-Ways, EnCase, FTK, Internet Evidence Finder (IEF)/AXIOM, TZWorks, and/or Cellebrite Advanced experience in preservation of digital evidence (including experience preserving cloud data and handling more »