Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
experience: Industry recognized security qualification (e.g., CISSP, CISM, CISMP, SSCP, CISA, ISACA, CEH, CompTIA Security+, etc.) Industry recognized technology certification (e.g., MCSE, CCDP, CCIE, RHCA, etc.) Knowledge and understanding of UK government protective marking standards; industry standards, including PCI-DSS, ISO/IEC 27001, etc. Awareness of common exploits and more »
testing, or related areas2-3 years of hands-on SOC/TOC/NOC experienceGCIA required. GCIH, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferredFamiliarity with tools such as IDA Pro, PEiD, PEview, Procmon, Snort, Bro, Kali Linux, Metasploit, NMAP, and NessusFamiliarity with GPO more »
related areas 2-3 years of hands-on SOC/TOC/NOC experience GCIA required. GCIH, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred Familiarity with tools such as IDA Pro, PEiD, PEview, Procmon, Snort, Bro, Kali Linux, Metasploit, NMAP, and Nessus Familiarity more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
experience: Industry recognized security qualification (e.g., CISSP, CISM, CISMP, SSCP, CISA, ISACA, CEH, CompTIA Security+, etc.) Industry recognized technology certification (e.g., MCSE, CCDP, CCIE, RHCA, etc.) Knowledge and understanding of UK government protective marking standards; industry standards, including PCI-DSS, ISO/IEC 27001, etc. Awareness of common exploits and more »
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
experience: Industry recognized security qualification (e.g., CISSP, CISM, CISMP, SSCP, CISA, ISACA, CEH, CompTIA Security+, etc.) Industry recognized technology certification (e.g., MCSE, CCDP, CCIE, RHCA, etc.) Knowledge and understanding of UK government protective marking standards; industry standards, including PCI-DSS, ISO/IEC 27001, etc. Awareness of common exploits and more »