Greater London, England, United Kingdom Hybrid / WFH Options
Hunter Bond
C#/.NET Proficiency in PowerShell · Understanding of enterprise security · Experience with office365 security controls · Strong knowledge and understanding of multiple security technologies e.g. SIEM, EDR · Good communication skills If you think that this could be a good fit for you, then please apply by submitting a copy of your more »
Firepower. Strong understanding of networking protocols, TCP/IP stack, routing, and switching technologies. Proficiency in security technologies such as VPNs, IDS/IPS, SIEM, and endpoint security solutions. Experience working within an ITIL framework. Hands-on experience with security tools and platforms for monitoring, analysis, and incident response. Excellent more »
seeking a Analyst that is able to demonstrate skills/knowledge such as; Ability to react to high pressure dynamic changing environments Demonstrable experience SIEM & Network technologies using Sentinel. Detailed experience of log analysis including KQL and SQL queries. An understanding of Threat and Vulnerability Management. Experience with Defender XDR more »
capability, especially using PowerShell Bash. Familiarity with tools like zScaler, Solarwinds, Crowdstrike, Splunk. Experience with batch automation tools, Linux, and Azure. Working knowledge of SIEM Tools. Experience in Event Analysis, Triage, Incident Handling, and Root-Cause identification. What can we do for you? 22 days holiday On-sire gym at more »
Dublin, City of Dublin, Republic of Ireland Hybrid / WFH Options
The Recruitment Company
knowledge of and proven experience in best practice InformationSecurity, e.g. Incident Response, Intrusion mgmt., Attack Monitoring, Network mgmt., Threat and Vulnerability Management, e.g. SIEM, XDR, Firewall, IPS, NAC, Server config controls Excellent knowledge of and proven experience in managing an array of IT Infrastructure: Servers, workstations, network switches, mobile more »
infrastructure, including Hyper-V and VMWare. Practical experience in Storage Solutions, Backup and Replication Services (DFS, VEEAM, ASR). Experienced with security controls including SIEM, Vulnerability Scanning, Server and Client Security, ZScaler and Microsoft Defender for Cloud. Demonstrable experience of similar position/role or working within established architecture practice. more »
methodology development; business process design for security compliance and assurance. • Specific technical expertise and background in infrastructure and network security, cyber security capabilities andSIEM/analytics. • In-depth subject matter expertise of application and data security, with thorough understanding of infrastructure and network security. • Very good knowledge and experience more »
commercial experience with the following technologies/systems: Check Point Firewall/NIDS/DLP/Anti-Virus/Identity Awareness/URL Filtering SIEM/Splunk Enterprise Desktop and Server Anti-Virus/Malware and endpoint protection technologies Vulnerability Security Scanning (e.g., Nessus) Microsoft Windows Server family of products more »
Greater London, England, United Kingdom Hybrid / WFH Options
Oliver Bernard
for new and existing products and ways of working. Requirements: Proven knowledge of informationand cyber security engineering Great experience with PCI DSS. Good SIEM knowledge (Splunk is ideal) Great understanding of logs and log events across Linux, Windows, AWS, AV and Vulnerability scanning etc Good experience of Security Operations more »
South West London, London, United Kingdom Hybrid / WFH Options
NATIONAL AUDIT OFFICE
the ISO 27001 ISMS or NIST CSF Experience delivering any informationsecurity tools/capabilities such as, but not limited to, Data Loss Prevention, SIEM, Identity and Access Management, EDR/XDR The deadline for applications is 11.55pm Sunday 28th April. Please apply with a CV and a covering letter more »
Cyber Security Experience of working in environments using ISO27001 or Cyber Essentials Plus would be beneficial Strong knowledge of security tooling and technologies including SIEM, vulnerability management, DLP etc Good knowledge and understanding of public Cloud platforms (e.g. AWS and Azure) Good understanding of the current threat landscape Excellent communication more »
andInformation Technology (IT) services. Proficient in Cyber Security practices for safeguarding IT, OT, and intellectual property networks, including expertise in IPSec VPNs, Firewalls, SIEM, IPS/IDS, AV/EDR solutions, LDAP/AD, etc. Advanced knowledge in Privileged Access Management (PAM) and associated tools. High proficiency in Vulnerability more »
Oversee incident response, threat detection, and mitigation efforts You'll be someone with: A good understanding of monitoring frameworks eg MITRE ATT&CK andSIEM technologies eg Microsoft Sentinel An interest in automation of Security operation function including artificial intelligence An understanding of Microsoft security product portfolio CISSP/CISM more »
with the following skills and experience; - Strong understanding of networking, operating systems and cyber security concepts - Strong knowledge of security pactices such as IAM, SIEM, Vulnerability management, Malware protection and Back up and Recovery - Strong experience with Microsoft security products such as Defender and Sentinel. - Experience mentoring teams or leading more »
broad understanding of OT and IT services Subject matter expertise in Cyber Security for protecting IT, OT, and IP networks, including IPSec VPNs, Firewalls, SIEM, IPS/IDS, AV/EDR solutions, LDAP/AD, etc. Expertise in Privileged Access Managementand related tools High level of expertise in Vulnerability more »
Security Monitoring and Incident Response Threat Intelligence Security Infrastructure Management Documentation and Reporting Candidates who can show hands on experience with security tools across SIEM/EDR and vulnerability Management will be successful, we are looking for someone who has proven experience in a security operations role, and in-depth more »
Extensive hands-on technical background in systems, cloud, and networking Expertise simulating adversary tactics and secure offensive operations Proficiency implementing security operations tools like SIEM, EDR, NDR, vulnerability management Coding abilities to develop scripts and custom security applications Passion for investigating the latest threats and resolving issues through ownership Apply more »
configuration, and implementation of security controls and services. Design, configure and manage an array of Cyber Security tools and technologies including anti-virus products, SIEM, EDR, XDR and CMDBs. Develop and deliver secure system profiles and maintain a view of compliance. Assist the development of granular Asset Management tooling andmore »
penetration tests. End to end threat and vulnerability management. Rolling out, managing, and configuring a range of network security tools and appliances. Key Skills: SIEM Tenable.io/Nessus IDS/IPS, MFA, Proxies, Cryptography Security assessments InformationSecurity best practices, policies, and procedures Penetration Testing/Ethical Hacking Solid understanding more »
security best practices and engagement across IT Services and the broader business functions. Support the enterprise IT Security functions. Technical: Proven experience with commercial SIEM platforms; Elastic Security SOC, preferred, or Splunk Incident response software: Thrive Incident Response & Remediation Anti Virus: Microsoft Defender Cyber Triage Practical experience in the Microsoft more »
or engineering experience. Strong understanding of networking fundamentals, TCP/IP, and core protocols. Familiarity with Windows & Linux operating systems. Experience in log monitoring, SIEM, log management, and vulnerability management. Awareness of common security vendors, products, and emerging technologies. Excellent verbal and written communication skills. Ability to work independently andmore »
Systems (OS) (MSWin, Linux, OSX, IOS) * Purple Teaming knowledge * Basic understanding of computer forensics * Use of Firewalls and IDS/IPS devices * Knowledge of SIEM technologies. * Networking, routing and switching * Cyber Security Review (CSR) Compliant * Cybersecurity Frameworks and Standards: Knowledge of frameworks such as NIST, ISO 27001,MITRE ATT&CK more »
Security framework maturity Deliver projects to improve Security compliance Conduct vulnerability scans/reviews and schedule pen tests Provide an understanding of Security tools (SIEM, EDR, IAM, Network devices etc) Handle and investigate incidents Conduct internal & external Security assurance reviews What skills do you need as an InformationSecurity Manager more »
Requirements : Hands-on experience in vulnerability management, and configurating and tuning vulnerability management tools e.g. Qualys, Microsoft Defender Hands-on experience configurating and tuning SIEM solutions e.g. Microsoft Sentinel Hands-on experience securing and hardening cloud-based services e.g. M365, Azure, Salesforce Experience working withing global standards and best practices more »
Requirements : Hands-on experience in vulnerability management, and configurating and tuning vulnerability management tools e.g. Qualys, Microsoft Defender Hands-on experience configurating and tuning SIEM solutions e.g. Microsoft Sentinel Hands-on experience securing and hardening cloud-based services e.g. M365, Azure, Salesforce Experience working withing global standards and best practices more »