Portsmouth, Hampshire, United Kingdom Hybrid / WFH Options
J & C Associates Ltd
creation, their deployment and tuning. Experience as a mentor/coach to Junior Analysts Your profile Previous experience of utilising the MITREATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Skilled in using virtualisation software. Knowledge of key security frameworks more »
Networking, routing and switching * Cyber Security Review (CSR) Compliant * Cybersecurity Frameworks and Standards: Knowledge of frameworks such as NIST, ISO 27001,MITREATT&CK and CIS. * Legal and Regulatory Understanding: Familiarity with laws and regulations related to cybersecurity, such as GDPR, CCPA, or HIPAA. Skills more »
access management. Knowledge of common cyber security threats and application of countermeasures. Good knowledge of Tactics, Techniques and Procedures (TTP) e.g., MITREAtt&ck Framework. Superior knowledge of Cloud security principles, techniques and technologies. For more details, please reach out to Mary Pearson on - . more »
controls. * Knowledge of Enterprise security frameworks such as NIST Cybersecurity Framework. * Knowledge of Cyber-attack phases (e.g. Cyber Kill Chain and/or MitreAttack Framework). * Knowledge of a broad range of security capabilities, technologies and concepts (e.g. cryptography, data security, network security, endpoint security, security penetration more »
tools. Strong understanding of common security vulnerabilities and threats specific to AI/ML, including adversarial attacks, prompt injection, data poisoning and the MITRE ATLAS framework. Hands on experience using security assessment and threat modelling tools and techniques to evaluate AI/ML systems and identify potential security more »
tools. Strong understanding of common security vulnerabilities and threats specific to AI/ML, including adversarial attacks, prompt injection, data poisoning and the MITRE ATLAS framework. Hands on experience using security assessment and threat modelling tools and techniques to evaluate AI/ML systems and identify potential security more »