platforms. * Experience using host and network-based IDS/IPS * Experience using packet capture solutions. * Skill in developing and deploying signatures. * Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). * Ability to provide technical and service leadership to junior SOC more »
Telford, Shropshire, United Kingdom Hybrid / WFH Options
Stealth IT Recruitment
and compliance. Provide third-line support for escalated technical issues, collaborating with other teams to ensure timely resolutions. Apply a broad understanding of IT Cybersecurity principles to identify and mitigate potential security threats proactively. Enforce Change Control procedures to manage and document changes in the IT environment. Develop and maintain more »
architect proficient with high-performance Zonal Electrical and Electronic Architecture, familiar with cutting-edge technologies such as Ethernet backbone, Over-The-Air software update, Cybersecurity and AUTOSAR. The E/E Automotive architect oversees the successful delivery of the E/E hardware and software Architecture for PDSL Customers. Principal more »
Purple Teaming knowledge * Basic understanding of computer forensics * Use of Firewalls and IDS/IPS devices * Knowledge of SIEM technologies. * Networking, routing and switching * CyberSecurity Review (CSR) Compliant * Cybersecurity Frameworks and Standards: Knowledge of frameworks such as NIST, ISO 27001,MITRE ATT&CK and CIS. * Legal and Regulatory Understanding … Familiarity with laws and regulations related to cybersecurity, such as GDPR, CCPA, or HIPAA. Skills * Personnel Management * In house training of personnel. * Stakeholder engagement * Risk Management * Threat Hunting * Threat Analysis * Use of vulnerability management tools * Malware reverse engineering * Detection rule engineering * Incident Management * Alert Triage * Crisis management Experience * Extensive working more »
Birmingham, West Midlands (County), United Kingdom
Jumar Solutions
Unleash Your Cybersecurity Potential as a Senior SOC Analyst! Embark on an Extraordinary Journey: Position: Senior SOC Analyst Contract: Outside IR35 Shifts: Shift pattern including night shifts Location: Birmingham Onsite Must Hold Active Security Clearance Why Take the Plunge: Are you ready to transcend the ordinary and become a leading … force in cybersecurity? Prepare yourself for a role that surpasses expectations! Imagine a dynamic 24/7 shift schedule offering unparalleled flexibility and a thrilling on-site experience in the bustling heart of Birmingham. But that's just the beginning of what awaits! What's in Store for You: Cutting … engage with various network communication protocols with finesse. Unleash Action: Dive deep into incident response, log analysis, and PCAP analysis - your canvas for showcasing cybersecurity excellence. Digital Sleuth: Investigate Windows/Linux systems, uncovering signs of compromise with your digital magnifying glass. Communication Virtuoso: Translate cybersecurity risks into language that more »
West Midlands, Birmingham, West Midlands (County), United Kingdom
Jumar Solutions
Unleash Your Cybersecurity Potential as a Senior SOC Analyst! Embark on an Extraordinary Journey: Position: Team Leader SOC Analyst Contract: Outside IR35 Shifts: Monday - Friday 9-5 Location: Birmingham Onsite Must Hold Active Security Clearance Why Take the Plunge: Are you ready to transcend the ordinary and become a leading … force in cybersecurity? Prepare yourself for a role that surpasses expectations! Imagine a dynamic 24/7 shift schedule offering unparalleled flexibility and a thrilling on-site experience in the bustling heart of Birmingham. But that's just the beginning of what awaits! What's in Store for You: Cutting … engage with various network communication protocols with finesse. Unleash Action: Dive deep into incident response, log analysis, and PCAP analysis - your canvas for showcasing cybersecurity excellence. Digital Sleuth: Investigate Windows/Linux systems, uncovering signs of compromise with your digital magnifying glass. Communication Virtuoso: Translate cybersecurity risks into language that more »
of PKI and relevant infrastructure, LAN/WAN technologies, Patch management, Linux distros such as Ubuntu, RHEL, third-line support, broad understanding of IT CyberSecurity, Change Control, PowerShell, and Bash Scripting. Responsibilities: Design, deploy, and maintain Microsoft Windows Server environments to ensure optimal performance and reliability. Manage VMware vSphere infrastructure … and compliance. Provide third-line support for escalated technical issues, collaborating with other teams to ensure timely resolutions. Apply a broad understanding of IT Cybersecurity principles to identify and mitigate potential security threats proactively. Enforce Change Control procedures to manage and document changes in the IT environment. Develop and maintain more »
Telford, Shropshire, United Kingdom Hybrid / WFH Options
fortice
of PKI and relevant infrastructure, LAN/WAN technologies, Patch management, Linux distros such as Ubuntu, RHEL, third-line support, broad understanding of IT CyberSecurity, Change Control, PowerShell, and Bash Scripting. Responsibilities: Design, deploy, and maintain Microsoft Windows Server environments to ensure optimal performance and reliability. Manage VMware vSphere infrastructure … and compliance. Provide third-line support for escalated technical issues, collaborating with other teams to ensure timely resolutions. Apply a broad understanding of IT Cybersecurity principles to identify and mitigate potential security threats proactively. Enforce Change Control procedures to manage and document changes in the IT environment. Develop and maintain more »
Hereford, Herefordshire, West Midlands, United Kingdom
Henderson Scott
platforms. * Experience using host and network-based IDS/IPS * Experience using packet capture solutions. * Skill in developing and deploying signatures. * Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). * Ability to provide technical and service leadership to junior SOC more »