technology vendors and stakeholders. Demonstrable experience in supporting large, complex Networks and Hosting Estates using multiple technologies including: Managing SIEM's - (Qradar Preferred) (e.g. ArcSight/AlienVault/Microsoft Sentinel/LogRhythm). Enterprise level Operating Systems RedHat Linux & Windows Server command line required. Vulnerability Management Technologies (e.g. Qualys More ❯
and coffee stations, and a subsidized café with free breakfast toast Responsibilities Security Monitoring & Incident Response: Use SIEM tools like Exabeam, LogRhythm, Splunk, or Arcsight to monitor security events, detect threats, and analyze data to address incidents swiftly. Vulnerability Management Tools: Conduct regular vulnerability assessments, prioritize and remediate issues More ❯
across any industry having large/complex infrastructure. • Proficiency in deploying, configuring, and managing Security Information and Event Management (SIEM) solutions, such as Splunk, ArcSight, Chronicle (Google Security Operations), ELK Stack. Familiarity with Cribl and regex • Experience integrating SIEM with various data sources, including firewalls, IDS/IPS, antivirus More ❯
and implement security rules and configurations. You have strong communication skills for reporting and collaboration. Added bonus Familiarity with SIEM tools (e.g., Splunk, QRadar, ArcSight) or scripting (Python, PowerShell). Certifications like CompTIA CySA+, Security+, or CEH. Training in incident response or network security. We're on the move More ❯
understanding of cybersecurity concepts, including malware, phishing, social engineering, and networking security infrastructure Hands-on experience with security tools such as SIEMs (Splunk, QRadar, ArcSight), firewalls, IDS/IPS, and endpoint security solutions Proficiency in scripting languages (Python, JavaScript) and API integrations (REST, JSON, Maltego) Excellent communication and presentation More ❯