adversary tactics The role requires an intermediate knowledge and experience of Linux; Windows; Azure; AWS; Elastic Stack; Tennable; Threat Intel gathering; MitreAtt&ck Framework; Office 365 security centre; Endpoint manager as well as Carbon black Desirable Skills: Previous experience in energy sector more »
adversary tactics The role requires an intermediate knowledge and experience of Linux; Windows; Azure; AWS; Elastic Stack; Tennable; Threat Intel gathering; MitreAtt&ck Framework; Office 365 security centre; Endpoint manager as well as Carbon black Desirable Skills: Previous experience in energy sector more »
of networking LAN/WAN protocols particularly from a security aspect Extensive knowledge of Microsoft & Linux Operating Systems Be familiar with MitreATT&CK framework Be able to perform vulnerability analysis/testing and advise on remediation or mitigation. Have a good understanding of SIEM more »
and managing major/complex cyber security incidents end-to-end Knowledge of adversarial tactics, techniques, procedures (TTPs) & industry standard frameworks (MitreAtt&ck, ISO27000, ISO27001) Strong working knowledge of security technologies including but not limited to SIEM, EDR/EPP, AV, IDS, IPS, AD more »
organisation. Experience of threat modelling including the Microsoft STRIDE process and exposure to industry best practices for describing threat such as MITREATT&CKmore »
organisation. Experience of threat modelling including the Microsoft STRIDE process and exposure to industry best practices for describing threat such as MITREATT&CK What you'll get in return Security Architect/Security Consultant - 6 month contract - Hybrid (2 days P/W onsite more »
controls. * Knowledge of Enterprise security frameworks such as NIST Cybersecurity Framework. * Knowledge of Cyber-attack phases (e.g. Cyber Kill Chain and/or MitreAttack Framework). * Knowledge of a broad range of security capabilities, technologies and concepts (e.g. cryptography, data security, network security, endpoint security, security penetration more »
a SOC environment.Experience in writing detection rules in particular using SPL or KQL.Strong understanding of security technologies and frameworks such as MITREATT&CK.Experience of agile methodologies and associated toolsets and code repositoriesCoding experience using languages such as Python particularly in relation to security use cases, Splunk more »
organization. - Experience with threat modeling, including the Microsoft STRIDE process, and familiarity with industry best practices for describing threats such as MITREATT&CK. more »