City Of London, England, United Kingdom Hybrid / WFH Options
i3
experience: Extensive experience with cloud security architectures and best practices across Azure cloud platform. Deep understanding of cloud security controls, including IAM, network security, data protection, and security logging/monitoring. Deep understanding in cloud security tools and services, such as Azure Security Center. Knowledge of common security frameworks more »
london (city of london), south east england, United Kingdom Hybrid / WFH Options
i3
experience: Extensive experience with cloud security architectures and best practices across Azure cloud platform. Deep understanding of cloud security controls, including IAM, network security, data protection, and security logging/monitoring. Deep understanding in cloud security tools and services, such as Azure Security Center. Knowledge of common security frameworks more »
is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and … internal and external cybersecurity analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience … auditing security measures, security response, and incident management. Possess a working knowledge of Cisco network switches, routers, firewalls and VPN, network security, administration of DLP, antivirusantimalware, IDS/IPS, SIEM, SMTP, Email security, AD, Group Policy, DNS, DHCP, and VLANs. Experience with identity access management solutions, such as SAMLOATH Experience more »
monitoring Understanding of threat modelling Investigation experience into Information and Cyber security incidents Broad technical understanding covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware, SSL and others Experience and knowledge of NIST, COBIT, GCIA, GCIH, GCFA etc. This is an excellent opportunity to work more »
london, south east england, United Kingdom Hybrid / WFH Options
Hunter Bond
monitoring Understanding of threat modelling Investigation experience into Information and Cyber security incidents Broad technical understanding covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware, SSL and others Experience and knowledge of NIST, COBIT, GCIA, GCIH, GCFA etc. This is an excellent opportunity to work more »
EC3V, Walbrook, Greater London, United Kingdom Hybrid / WFH Options
Ignite Digital Search Limited
security. Some knowledge of GDPR & PCI-DSS Strong experience of AWS and ideally certified Forensic investigation techniques. Experience with security technologies (e.g., SIEM, DLP, IDS, IPS). Knowledge of Microsoft Security Centre and Sentinel. Understanding of ISO27001:22, NIST, and secure software development. Attributes: Excellent communication and stakeholder management more »
Harlow, London, United Kingdom Hybrid / WFH Options
Raytheon
the maintaining and recommending new tools, as well as updating the systems. You will be a key player across technology groups interfacing with Network, Data Centres and our internal Design Authority with a remit of driving cyber best practises into our operation. You will be responsible for the daily … to tune SIEM, IDS and associated tooling in an effective and timely manner. Working with threat management teams and liaising directly with Network and Data Centre teams to ensure Network architecture, Security Zone configuration and deployment of sensors and remediation platforms Is optimal and effective. Proficiency in use and … Arrange via change control all maintenance and changes. Maintain all related CIs in the CMDB. Report on availability, capacity, faults, risks and CSI. Forcepoint DLP, Forcepoint WEB Hygiene, Forcepoint Email Security, NEXPOSE, SIEM-QRadar, SEP Candidate Requirement Essential: Experience of creating small utilities or scripting in Powershell, Perl or Python. more »