Information Security Jobs in Corsham

1 to 5 of 5 Information Security Jobs in Corsham

Cyber Security Consultant - DV Cleared

Corsham, Wiltshire, South West, United Kingdom
83zero Limited
Your role Important considerations for the role: Proven experience of working on Agile delivery programmes. Experience in work, to strengthen and transform Security Operations Centers Demonstrable experience in providing senior-level supervision and direction on technical matters, Knowledge of the Cybersecurity Capability Maturity Model (C2M2) & NIST Cybersecurity Framework (CSF … Experience of Security Operations Centers operating within the Military domain Main tasks: Providing the authoritative technical subject matter expertise needed to mature SOC services Engaging effectively with a broad range of stakeholders in technical matters and taking a leading role in documenting processes and ways of working to enable … relevant TTP Your skills and experience Important skills and experience: SOC operations and transformation, Developing security operating procedures and processes, Producing dashboards and reports, Vulnerability Management utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain (CKC more »
Employment Type: Permanent
Posted:

DV Cleared SIEM/ Incident SME Analyst 00254732 Corsham

Corsham, Wiltshire, South West
Computer Futures
Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external … broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and … to assist with playbook automation and case management capabilities to streamline team processes and tools. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system more »
Employment Type: Contract
Rate: £650 - £670
Posted:

SIEM / Incident SME

Corsham, Wiltshire, South West
LA International Computer Consultants Ltd
DV clearance required Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify … broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. Your role * Develop and integrate security event monitoring and incident management services. * Respond to security incidents as they occur as part of an incident response team. * Implement metrics and … to assist with playbook automation and case management capabilities to streamline team processes and tools. * Produce documentation to ensure the repeatability and standardisation of security operating procedures. * Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. * Maintain a baseline of system more »
Employment Type: Contract
Rate: £1
Posted:

SIEM/Incident SME

Corsham, Wiltshire, United Kingdom
Hybrid / WFH Options
eTeam Inc
HOLD DV CLEARANCE Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify … broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and … to assist with playbook automation and case management capabilities to streamline team processes and tools. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC s software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system more »
Employment Type: Contract
Rate: GBP 720 Daily
Posted:

SIEM / Incident SME(Need Active DV Clearance)

corsham, south west england, United Kingdom
Hybrid / WFH Options
J&C Associates Ltd
Duration: 6 Months Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify … broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. Your role • Develop and integrate security event monitoring and incident management services. • Respond to security incidents as they occur as part of an incident response team. • Implement metrics and … to assist with playbook automation and case management capabilities to streamline team processes and tools. • Produce documentation to ensure the repeatability and standardisation of security operating procedures. • Develop additional investigative methods using the SOC’s software toolsets to enhance recognition opportunities for specific analysis. • Maintain a baseline of system more »
Posted: