forensic analysis tools. Knowledge of common cyber threats and attack vectors, including malware, phishing, and ransomware. Relevant certifications such as GIACCertifiedIncidentHandler (GCIH), Certified Information Systems Security Professional (CISSP), or equivalent are a plus. If you are interested, please apply with a CV! Thanks more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
analyses and follow-up measures. Qualifications Degree in Computer Science, or related experience. Professional certifications such as CSA, CompTIA Security+/CySA+, GIAC GSEC, GCIH or other comparable degree or other relevant experience. IT skills Network Security System Administration Malware Analysis Security Information and Event Management (SIEM) Incident Response Tools more »
analysis outcomes, and remediation efforts. Qualifications Degree in Computer Science, or related experience. Professional certifications such as CSA, CompTIA Security+/CySA+, GIAC GSEC, GCIH or other comparable degree or other relevant experience. Work Experience A minimum of 5 years’ experience in a related SOC Incident management/Analyst role more »
threat intelligence.Excellent written and verbal communication skills.Ability to work independently and as part of a team.Eligible to obtain Security Clearance.Desired Qualifications:Relevant certifications (e.g., GCIH, CISSP, Security+, CySA+).Experience with cloud security (AWS, Azure).Familiarity with industry security standards and frameworks (NIST, ISO 27001).What They Offer:Competitive salary and more »
and verbal communication skills. Ability to work independently and as part of a team. Eligible to obtain Security Clearance. Desired Qualifications: Relevant certifications (e.g., GCIH, CISSP, Security+, CySA+). Experience with cloud security (AWS, Azure). Familiarity with industry security standards and frameworks (NIST, ISO 27001). What They Offer more »
as GDPR, HIPPA, DORA and other data or privacy lawsFrameworks and governance such as NIST, SOCII, ISO27001 etc.Security certification such as CEH, CCNA, OSCP, GCIH etcSecurity tools/practices such as SIEM, EDR, NDR, OSINT etcSecurity clearance CommitmentAs a ‘bench’ Incident Manager you will be called whenever a suitable incidentmore »
London, England, United Kingdom Hybrid / WFH Options
OutBreach
engineering role (or demonstratable advanced technology knowledge). Strong knowledge of operational security across multiple platforms and all major cloud providers. Certifications such as GCIH, GCIA or GCFA/E. Huge passion for cyber security demonstrated by research, testing or other activities. Advanced knowledge of MITRE Att&ck framework and more »
landscapes, attack vectors, and threat actors, enabling informed decision-making and strategy development. Relevant Security Certifications: Possession of relevant security certifications, such as CISSP, GCIH, GCIA, or similar, is highly desirable, demonstrating a commitment to professional development and expertise in the field. Additional Information Discover the Unexpected Experian is the more »
covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware, SSL and others Experience and knowledge of NIST, COBIT, GCIA, GCIH, GCFA etc. This is an excellent opportunity to work in a large, enterprise level environment, where there is plenty of scope for growth. Please apply more »
with threat intelligence sources and the ability to translate intelligence into actionable responses. Proficiency in using forensic tools and methodologies. Certifications such as GCFA, GCIH, CISSP, Microsoft, Cisco or equivalent are preferred. Excellent communication skills with the ability to convey technical information to non-technical stakeholders. Strong problem-solving and more »
role in Cyber Security Operations (ideally managing a SOC team) Masters in Cyber Security, Information Technology, Computer Science or relevant experience CISSP, CEH, OSCP, GCIH or applicable security field Incident, change and problem process management experience Experience in SIEM (Splunk, Sentinel), IPS and SOAR tools a plus Experience with investigating more »
analysis, intrusion analysis, digital forensics, penetration testing, or related areas 2-3 years of hands-on SOC/TOC/NOC experience GCIA required. GCIH, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred Familiarity with tools such as IDA Pro, PEiD, PEview, Procmon, Snort more »
understanding covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware, SSL and othersExperience and knowledge of NIST, COBIT, GCIA, GCIH, GCFA etc.This is an excellent opportunity to work in a large, enterprise level environment, where there is plenty of scope for growth.Please apply ASAP for more »
host vulnerability analysis, intrusion analysis, digital forensics, penetration testing, or related areas2-3 years of hands-on SOC/TOC/NOC experienceGCIA required. GCIH, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferredFamiliarity with tools such as IDA Pro, PEiD, PEview, Procmon, Snort, Bro more »
Computer Science, or a related field. Desired: Master's degree in a related field or professional certifications such as CERT-CSIH, CISSP, GCFA, GCFE, GCIH, GCIA, GMON. Be prepared to participate in a rotating on-call schedule and collaborate across physical locations. Flexibility to work beyond standard hours for critical more »
malware analysis. In order to be successful in your application, you will need: At least 3 years cyber incident response experience. Certifications such as GCIH, GCIA or GCFA/E. Ideally, consultancy experience however, strong regulated exposure is also welcomed. Strong baseline threat hunting skills and ideally, an interest in more »
FMIs and CSD operations is an advantage Knowledge of Swift CSP framework is advantage. IT Security Certification such as CISSP, CSSLP, CCSP, CISM, CISMP, GCIH, CEH, etc. is an advantage. Email kieren@source-technology.com more »