technologies such as SIEM, firewalls, intrusion detection/prevention systems, anti-virus software, authentication systems, and log management. knowledge of security approaches including ISMS, riskanalysis and assessments, the CIA triad, attack vectors (including social engineering), cryptography, confidentiality issues, and best practices for cyber security incident response (including more »
SIEM, firewalls, intrusion detection/prevention systems, anti-virus software, authentication systems, log management, and content filtering. Solid grasp of security approaches including ISMS, riskanalysis and assessments, the CIA triad, social engineering, cryptography, confidentiality issues, and incident response best practices. Operate within an ITIL V3 and ISO27001 more »
SQL 2012+, Linux appliances A demonstrated history of planning, development and implementation of Azure security related technologies An excellent understanding of security approaches: ISMS, riskanalysis and assessments, CIA triad, attack vectors including social engineering, confidentiality and cyber security The Cyber Security Lead should ideally have qualifications in more »
abreast of legislative changes which may impact the organisation, and amending information management practices. This will be done through following the right processes, information riskanalysis, compliance awareness, training requirements, information management advice and any others as appropriate. The post holder is responsible for deriving maximum value for more »
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Matchtech
security technologies such as SIEM, firewalls, intrusion detection/prevention systems, antivirus software, authentication systems, and log management. Strong knowledge of security approaches, including riskanalysis, attack vectors, cryptography, and cyber security incident response best practices. If the above role sounds like the right step in your career more »