capability, especially using PowerShell Bash. Familiarity with tools like zScaler, Solarwinds, Crowdstrike, Splunk. Experience with batch automation tools, Linux, and Azure. Working knowledge of SIEM Tools. Experience in Event Analysis, Triage, Incident Handling, and Root-Cause identification. What can we do for you? 22 days holiday On-sire gym at more »
to continuously enhance our defence mechanisms. Requirements: Proven experience in cyber threat detection, incident response, and vulnerability management. Proficiency in security tools such as SIEM, IDS/IPS, antivirus software, and penetration testing frameworks. Strong understanding of networking protocols, encryption techniques, and risk assessment methodologies. Excellent communication skills with the more »
Employment Type: Permanent
Salary: £35000 - £50000/annum hybrid working + excellent benefits
Security framework maturity Deliver projects to improve Security compliance Conduct vulnerability scans/reviews and schedule pen tests Provide an understanding of Security tools (SIEM, EDR, IAM, Network devices etc) Handle and investigate incidents Conduct internal & external Security assurance reviews What skills do you need as an InformationSecurity Manager more »
Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Hays Technology
experience of cyber security Extensive practical experience in managing Microsoft server systems, NGAV, Amazon Cloud services, AD, ADFS, M365, security, public clouds, Azure services, SIEM, vulnerability assessment, patch management, DLP, and endpoint protection. Substantial proven expertise in supporting large corporate systems and applications within a large enterprise networked environment. (Educational more »
Employment Type: Permanent
Salary: £54421 - £61228/annum £54,000 - 61,000 per annum
and response tooling Experience of relevant computer forensics, incident response and e-discovery tools, including password recovery, EDR, NDR, UEBA, honeypots, data loss prevention, SIEM, and log managers Understanding of regulatory processes in evidence-handling procedures Technical knowledge of anti-forensics, data hiding and obfuscation technologies including steganography, digital image more »