tactics, techniques, and procedures used by threat actors. *Security Incident Handling: Assisting with the containment, eradication, and recovery process in response to security incidents. *VulnerabilityAssessment: Participating in vulnerabilityassessment and management activities to identify and remediate security weaknesses. *Security Tool Management: Managing and configuring security more »
Alexander Mann Solutions - Public Sector Resourcing
principles, including firewalls, VPNs and network monitoring Proficiency in operating systems, especially in Linux Familiarity with tools such as SIEM system, antivirus software and vulnerabilityassessment tools Experience with incident detection and response procedures Understanding of cloud security principles Awareness of web application security vulnerabilities and testing methodologies. more »
SE1, Blackfriars, Greater London, United Kingdom Hybrid / WFH Options
Profile 29
upgrades. Implement and maintain backup and recovery strategies for Servers. Implement and enforce security measures to safeguard server infrastructure. Conduct regular security audits and vulnerability assessments. Ensure compliance with industry regulations and best practices. Other stuff; £’s: flexible – in the region of £300 per day (direct contract between you more »