covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware, SSL and others Experience and knowledge of NIST, COBIT, GCIA, GCIH, GCFA etc. This is an excellent opportunity to work in a large, enterprise level environment, where there is plenty of scope for growth. Please apply more »
london, south east england, United Kingdom Hybrid / WFH Options
Hunter Bond
covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware, SSL and others Experience and knowledge of NIST, COBIT, GCIA, GCIH, GCFA etc. This is an excellent opportunity to work in a large, enterprise level environment, where there is plenty of scope for growth. Please apply more »
analysis, intrusion analysis, digital forensics, penetration testing, or related areas 2-3 years of hands-on SOC/TOC/NOC experience GCIA required. GCIH, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred Familiarity with tools such as IDA Pro, PEiD, PEview, Procmon, Snort more »
and verbal communication skills. Ability to work independently and as part of a team. Eligible to obtain Security Clearance. Desired Qualifications: Relevant certifications (e.g., GCIH, CISSP, Security+, CySA+). Experience with cloud security (AWS, Azure). Familiarity with industry security standards and frameworks (NIST, ISO 27001). What They Offer more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
analyses and follow-up measures. Qualifications Degree in Computer Science, or related experience. Professional certifications such as CSA, CompTIA Security+/CySA+, GIAC GSEC, GCIH or other comparable degree or other relevant experience. IT skills Network Security System Administration Malware Analysis Security Information and Event Management (SIEM) Incident Response Tools more »
EC3V, Walbrook, Greater London, United Kingdom Hybrid / WFH Options
Ignite Digital Search Limited
generative AI usage. Key Skills & Experience: Degree/diploma in a tech-related field or relevant experience. Preferred certifications: PenTest+, Security+, OSCP, CCSP, CEH, GCIH, GMON. 3+ years in IT Security, preferably in fintech, SaaS or banking/financial services Strong experience of working closely with software engineering and product more »
understanding of performing technical level analysis and interpretation of information from SOC systems Solid understanding of computing protocols, authentication mechanisms and attacker TTPs GIAC, GCIH, GCIA, GCFA or equivalent certification Understanding or proven experience in securing Windows, Linux, Oracle and VM platforms Please note this role is on a more »
understanding of performing technical level analysis and interpretation of information from SOC systems Solid understanding of computing protocols, authentication mechanisms and attacker TTPs GIAC, GCIH, GCIA, GCFA or equivalent certification Understanding or proven experience in securing Windows, Linux, Oracle and VM platforms Please note this role is on a more »
Computer Science, or a related field. Desired: Master's degree in a related field or professional certifications such as CERT-CSIH, CISSP, GCFA, GCFE, GCIH, GCIA, GMON. Be prepared to participate in a rotating on-call schedule and collaborate across physical locations. Flexibility to work beyond standard hours for critical more »
exercises to test preparedness. Qualifications and Experience: Bachelor’s degree in a related technical area. One or more relevant certifications such as CISSP, CISM, GCIH, CEH, or OSCP. Proficiency in SIEM Platforms, vulnerability management tools, and incident management processes. Experience in managing security functions or SOC capabilities. Strong analytical skills more »
role in Cyber Security Operations (ideally managing a SOC team) Masters in Cyber Security, Information Technology, Computer Science or relevant experience CISSP, CEH, OSCP, GCIH or applicable security field Incident, change and problem process management experience Experience in SIEM (Splunk, Sentinel), IPS and SOAR tools a plus Experience with investigating more »
variety of audiences, including business stakeholders, officials and non-technical individuals. Strong understanding of network and system security principles. Relevant certifications (e.g., CISSP, CEH, GCIH) are a plus. Experience in threat intelligence and information sharing. Ability to work in a fast-paced, high-stakes environment. If you have the relevant more »
FMIs and CSD operations is an advantage Knowledge of Swift CSP framework is advantage. IT Security Certification such as CISSP, CSSLP, CCSP, CISM, CISMP, GCIH, CEH, etc. is an advantage. Email kieren@source-technology.com more »
malware analysis. In order to be successful in your application, you will need: At least 3 years cyber incident response experience. Certifications such as GCIH, GCIA or GCFA/E. Ideally, consultancy experience however, strong regulated exposure is also welcomed. Strong baseline threat hunting skills and ideally, an interest in more »
malware analysis. In order to be successful in your application, you will need: At least 3 years cyber incident response experience. Certifications such as GCIH, GCIA or GCFA/E. Ideally, consultancy experience however, strong regulated exposure is also welcomed. Strong baseline threat hunting skills and ideally, an interest in more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Experian Ltd
landscapes, attack vectors, and threat actors, enabling informed decision-making and strategy development. Relevant Security Certifications: Possession of relevant security certifications, such as CISSP, GCIH, GCIA, or similar, is highly desirable, demonstrating a commitment to professional development and expertise in the field. Additional Information Discover the Unexpected Experian is the more »