LDAP/AD, etc. Advanced knowledge in Privileged Access Management (PAM) and associated tools. High proficiency in Vulnerability and Compliance Management, as well as DDOS protection. Hands-on experience in engineering Cyber Security solutions for cloud platforms (e.g., AWS, Azure) utilizing open-source tools, DevOps, and automation (e.g., Zabbix, ELK more »
container platforms, and data solutions like Kafka is essential. Previous exposure to risks related to data exposure, privilege escalation, and denial-of-service attacks. Relevant experience in securing service mesh & container platforms implementations is essential. Be able to understand and assess the more »
skills related to the design and implementation of secure networking solutions. Experience with network security products including Firewalls, IDS/IPS, WAF, DDoS mitigation solutions. Akamai experience is desirable. In this role, you will be at the forefront of shaping secure connections that drive our global more »
London, England, United Kingdom Hybrid / WFH Options
Jisc
as quickly as possible, providing advice on a one-on-one basis as we do so, whether that is to do with malware, phishing, DDoS or any other network or system related incident. About the role: You will assist the Lead Incident Investigator (CTI) with the ongoing monitoring, optimising and … Systems & Cloud Platforms. • Familiarity with a range of security tools and systems such as SIEMs, EDR’s SOAR, IDS, WAF, DLP and DDoS mitigation systems • Good understanding of common threat scenarios and vulnerability and malware analysis. • Knowledge of vulnerability scanning systems, including the understanding more »