Glasgow, City of Glasgow, United Kingdom Hybrid / WFH Options
Hays Technology
Intune, Identity Management: Proficiency in Microsoft technologies. Cyber-Attack Techniques, Vulnerabilities, and Mitigation Strategies: Knowledge of attack vectors and effective defenses. MitreATT&CK and NIST Frameworks: Familiarity with industry frameworks. What you'll get in return -Salary £50,000 - £55,000-Hybrid working more »
Employment Type: Permanent
Salary: £50000 - £55000/annum £50,000-£55,000 per annum
with threat intelligence sources and incident prioritization. Understanding of cybersecurity regulations and standards (e.g., GDPR, NIST). Working knowledge of the MITREATT&CK framework. Understanding of relevant cybersecurity regulations and standards (e.g., GDPR, HIPAA, NIST) If you feel like this is a good match more »
Bristol, England, United Kingdom Hybrid / WFH Options
Computershare
purpose-built tools. Identify credible, new intelligence, and subject matter resources relative to current and emerging threats. Utilize knowledge of the MITREATT&CK framework to overlay researched threats to existing controls. Provide subject matter expertise on cyber threats to review triage and incident cases more »
with EDR tools such as MS Defender and Crowdstrike Familiarity with threat intelligence sources and incident prioritization. Working knowledge of the MITREATT&CK framework Desirable Qualifications: Bachelor's degree in computer science, business informatics, engineering/technology, or equivalent experience. Professional certifications in information more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
typical techniques used by attackers, ranging from E criminal to state affiliated groups. Preventing and detecting common attacker techniques and the MITREATT&CK framework. Tuning and configuring cyber security tools, for example SIEM and EDR tooling. How enterprise IT networks, Active Directory and Azure more »
EDR and DLP solutions. What You'll Be Doing: '€¢Creating of threat detection analytics '€¢Onboard log sources in alignment with the MITREATT&CK Framework '€¢Investigating and monitoring SIEM platform '€¢Tuning of alerts and event sources to ensure highest level of defence '€¢Ensuring all identified more »
Background working with host and network analysis. Good understanding of attacker techniques, tactics and procedures and associated frameworks – think Attack Lifecycle, Kill Chain, Mitre etc Ability to communicate IT, networking, and security concepts to personnel at all levels of experience and responsibility Industry recognised security certifications (GIAC, Cloud more »