LS1, Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Picture More Ltd
authentication systems, log management, content filtering, etc. An excellent understanding of security approaches: ISMS, risk analysis and assessments, the CIA triad, attack vectors including socialengineering, cryptography, confidentiality issues and cyber security incident response best practices, including triage and chain of custody Security certifications are highly advantageous more »
development and implementation of Azure security related technologies An excellent understanding of security approaches: ISMS, risk analysis and assessments, CIA triad, attack vectors including socialengineering, confidentiality and cyber security Dedicated and responsible with a strong commitment to the assigned task with the ability to work under pressure more »
Hands-on with programming languages, databases and IoT Knowledge of containerisation technologies (such as Docker) Experience with Attack & Threat Modelling Red Team testing and socialengineering attack methodologies Working knowledge of CobaltStrike Experience with bug bounty programs and vulnerability disclosure policies The preferred candicate should also posess a more »
out! https://www.nccgroup.com/uk/The Opportunity The successful candidate will be involved in each aspect of the attack chain from socialengineering and initial access, evading best-in-class EDR products, through lateral movement and achieving objectives set by the client. Operational Security and more »
Guide your team to do the same through regular coaching, brainstorming and maintaining of best practice documentation Collaborating with wider teams. These include Product, Engineering, Sales and Marketing to help shape and improve our products and external messaging Demonstrating a professional and customer-centric persona when interacting directly with … Show a keen eye for detail and good critical thinking skills Show a deep curiosity that drives your investigations into fraud. Account takeover, scams, socialengineering, Card Not Present (CNP) fraud, money laundering, money mules, synthetic identity etc Experience with fraud system managements such as ThreatMetrix, Featurespace, Hunter more »