Nottingham, Nottinghamshire, East Midlands, United Kingdom
Experian Ltd
attack vectors, and threat actors, enabling informed decision-making and strategy development. Relevant Security Certifications: Possession of relevant security certifications, such as CISSP, GCIH, GCIA, or similar, is highly desirable, demonstrating a commitment to professional development and expertise in the field. Additional Information Discover the Unexpected Experian is the worlds more »
leeds, west yorkshire, yorkshire and the humber, United Kingdom
BlueVoyant
host vulnerability analysis, intrusion analysis, digital forensics, penetration testing, or related areas 2-3 years of hands-on SOC/TOC/NOC experience GCIA required. GCIH, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred Familiarity with tools such as IDA Pro, PEiD, PEview more »
understanding covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware, SSL and others Experience and knowledge of NIST, COBIT, GCIA, GCIH, GCFA etc. This is an excellent opportunity to work in a large, enterprise level environment, where there is plenty of scope for growth. Please more »
london, south east england, United Kingdom Hybrid / WFH Options
Hunter Bond
understanding covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware, SSL and others Experience and knowledge of NIST, COBIT, GCIA, GCIH, GCFA etc. This is an excellent opportunity to work in a large, enterprise level environment, where there is plenty of scope for growth. Please more »
with data protection regulations. Knowledge and experience in security technologies such as EDR, SIEM, and Vulnerability Management is a plus. Relevant security certifications (CISSP, GCIA, CISM, etc.) and/or product certifications (Azure, Windows, AD, etc.) are desirable. This role offers an exciting opportunity to contribute to the development and more »
with data protection regulations. Knowledge and experience in security technologies such as EDR, SIEM, and Vulnerability Management is a plus. Relevant security certifications (CISSP, GCIA, CISM, etc.) and/or product certifications (Azure, Windows, AD, etc.) are desirable. This role offers an exciting opportunity to contribute to the development and more »
intrusion detection/prevention platforms. Proficiency in Python, PowerShell scripting, and Shell scripts. Familiarity with SIEM platforms is preferred. Security certification such as CISSP, GCIA, or CISM is a plus. Our client is an equal opportunity employer who are committed to fostering an inclusive environment and encourage applications from all more »
intrusion detection/prevention platforms. Proficiency in Python, PowerShell scripting, and Shell scripts. Familiarity with SIEM platforms is preferred. Security certification such as CISSP, GCIA, or CISM is a plus. Our client is an equal opportunity employer who are committed to fostering an inclusive environment and encourage applications from all more »
analysis. In order to be successful in your application, you will need: At least 3 years cyber incident response experience. Certifications such as GCIH, GCIA or GCFA/E. Ideally, consultancy experience however, strong regulated exposure is also welcomed. Strong baseline threat hunting skills and ideally, an interest in research more »
experience in a Fortune 50 sized organization. Background in a large, well-known Incident Response services organizations. Relevant industry certifications (e.g. CISSP, GCIH, GCFA, GCIA) Employees at all levels are expected to: Understand our Operating Principles; make them the guidelines for how you do your job. Own the customer experience more »
experience in a Fortune 50 sized organization. Background in a large, well-known Incident Response services organizations. Relevant industry certifications (e.g. CISSP, GCIH, GCFA, GCIA) Employees at all levels are expected to: Understand our Operating Principles; make them the guidelines for how you do your job. Own the customer experience more »
Science, or a related field. Desired: Master's degree in a related field or professional certifications such as CERT-CSIH, CISSP, GCFA, GCFE, GCIH, GCIA, GMON. Be prepared to participate in a rotating on-call schedule and collaborate across physical locations. Flexibility to work beyond standard hours for critical incidents more »
analysis. In order to be successful in your application, you will need: At least 3 years cyber incident response experience. Certifications such as GCIH, GCIA or GCFA/E. Ideally, consultancy experience however, strong regulated exposure is also welcomed. Strong baseline threat hunting skills and ideally, an interest in research more »
a globally disbursed/follow the sun model. Knowledge of Digital Forensic Investigations best practices and processes Relevant industry certifications (e.g. CISSP, GCIH, GCFA, GCIA) Employees at all levels are expected to: Understand our Operating Principles; make them the guidelines for how you do your job. Own the customer experience more »
Data Bricks, Snowflake, etc. Knowledge of major cloud platforms and logging Experience in multiple platform vendor technologies. Relevant industry technical certifications (e.g. CISSP, GCDA, GCIA, GCSA) Previous experience in a Fortune 50 sized organization Employees at all levels are expected to: Understand our Operating Principles; make them the guidelines for more »
Data Bricks, Snowflake, etc. Knowledge of major cloud platforms and logging Experience in multiple platform vendor technologies. Relevant industry technical certifications (e.g. CISSP, GCDA, GCIA, GCSA) Previous experience in a Fortune 50 sized organization Employees at all levels are expected to: Understand our Operating Principles; make them the guidelines for more »
a globally disbursed/follow the sun model. Knowledge of Digital Forensic Investigations best practices and processes Relevant industry certifications (e.g. CISSP, GCIH, GCFA, GCIA) Employees at all levels are expected to: Understand our Operating Principles; make them the guidelines for how you do your job. Own the customer experience more »
Leaders at all levels. PREFERRED QUALIFICATIONS: IAM Level III Certification (GSLC, CISM, CISSP). At least one other IA certification completed, i.e., SSCP, CSIH, GCIA, GCIH or CEH. UNIX Administrative skills. Command Line Scripting skills (PERL, python, shell scripting) to automate analysis task. Knowledge of hacker tactics, techniques and procedures more »
and applicable analytic models such the Diamond Model. Strong written and oral communication skills. Certifications/Skills: Must have ONE of the following : GCED, GCIA, GCFA, GPEN, GWAPT, GCFE, GREM, GXPN, GMON, GCIH, CCFP, CCSP, CISSP, CSIH, CHFI, LPT, ECSA, OSCP, OSCE, OSWP, OSEE, EnCE Previous DOD, IC or Law more »
and applicable analytic models such the Diamond Model. Strong written and oral communication skills. Certifications/Skills: Must have ONE of the following : GCED, GCIA, GCFA, GPEN, GWAPT, GCFE, GREM, GXPN, GMON, GCIH, CCFP, CCSP, CISSP, CSIH, CHFI, LPT, ECSA, OSCP, OSCE, OSWP, OSEE, EnCE Previous DOD, IC or Law more »
lieu of degree Required certifications: The candidate should have at minimum ONE of the following certifications: Certified Information System Security Professional (CISSP). SANS - GCIA - IntrusionAnalyst SANS - GREM - Reverse Engineering Malware SANS - GISF - Security Fundamentals SANS - GXPN - Exploit Researcher and Advanced Penetration Tester SANS - GMON - Continuous Monitoring Certification OSCP more »
self-motivated Required certification s : The candidate should have at minimum ONE of the following certifications: Certified Information System Security Professional (CISSP). SANS - GCIA - IntrusionAnalyst SANS - GREM - Reverse Engineering Malware SANS - GISF - Security Fundamentals SANS - GXPN - Exploit Researcher and Advanced Penetration Tester SANS - GMON - Continuous Monitoring Certification OSCP more »
operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cyber-crime. Advanced Certifications such as SANS GIAC/GCIA/GCIH, CISSP or CASP. Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership. Working knowledge and more »
operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cyber-crime. Advanced Certifications such as SANS GIAC/GCIA/GCIH, CISSP or CASP. Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership. Working knowledge and more »
certification such as CompTIA Security+ CE, ISC2 SSCP, SANS GSEC prior to starting. DoD 8570 CSSP-A level Certification such as CEH, CySA +, GCIA or other certification is required . Hands-on experience with a variety of IDS, IPS, SIEM, and cybersecurity analytical tools. Familiarity or experience in Intelligence more »