if you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (CarbonBlack, Microsoft Defender ATP, FireEye, CrowdStrike) Intrusion Detection/Prevention Systems (IDS/IPS) (Suricata, Snort, Bro, Cisco, Palo Alto) Web Proxies (Bluecoat More ❯
and Response (SOAR), Security Information and Event Management (SIEM, particularly Splunk and/or Splunk Cloud), firewalls, and other core security products. (e.g. Crowdstrike, CarbonBlack, Splunk, and/or the Microsoft security technologies) A solid working knowledge of Windows Azure Active Directory, Windows OS, Mac OS, Virtualization More ❯
and Response (SOAR), Security Information and Event Management (SIEM, particularly Splunk and/or Splunk Cloud), firewalls, and other core security products. (e.g. Crowdstrike, CarbonBlack, Splunk, and/or the Microsoft security technologies) A solid working knowledge of Windows Azure Active Directory, Windows OS, Mac OS, Virtualization More ❯
and Response (SOAR), Security Information and Event Management (SIEM, particularly Splunk and/or Splunk Cloud), firewalls, and other core security products. (e.g. Crowdstrike, CarbonBlack, Splunk, and/or the Microsoft security technologies) A solid working knowledge of Windows Azure Active Directory, Windows OS, Mac OS, Virtualization More ❯
and Response (SOAR), Security Information and Event Management (SIEM, particularly Splunk and/or Splunk Cloud), firewalls, and other core security products. (e.g. Crowdstrike, CarbonBlack, Splunk, and/or the Microsoft security technologies) A solid working knowledge of Windows Azure Active Directory, Windows OS, Mac OS, Virtualization More ❯
cloud environments, specifically AWS and Azure Knowledge of regular expressions and data normalization Experience configuring, integrating, and monitoring endpoint protection solutions such as Cylance, CarbonBlack, or CrowdStrike Understanding of network protocols coupled with experience with web proxies, web application firewalls, and vulnerability assessment tools. Experience working in More ❯
if you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (CarbonBlack, Microsoft Defender ATP, FireEye, CrowdStrike) Programming (Python, or other languages) What you can expect from us We won't just meet your More ❯
and infrastructure-as-code initiatives. Qualifications We're looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like CarbonBlack, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and More ❯
and infrastructure-as-code initiatives. Qualifications We're looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like CarbonBlack, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and More ❯
and infrastructure-as-code initiatives. Qualifications We're looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like CarbonBlack, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and More ❯
and infrastructure-as-code initiatives. Qualifications We're looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like CarbonBlack, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and More ❯
Logic Apps, ARM templates PowerShell, Python, REST APIs Log ingestion and parsing across multi platforms (Azure/AWS/GCP, M365, Defender, Entra, Copilot, CarbonBlack, Okta + Tier 1 Network vendors) MITRE ATT&CK, threat detection frameworks, IOC enrichment Ability to go and work things out is More ❯
Logic Apps, ARM templates PowerShell, Python, REST APIs Log ingestion and parsing across multi platforms (Azure/AWS/GCP, M365, Defender, Entra, Copilot, CarbonBlack, Okta + Tier 1 Network vendors) MITRE ATT&CK, threat detection frameworks, IOC enrichment Ability to go and work things out is More ❯
Threat Prevention and ATP, DLP Desirable: Knowledge/Experience of Microsoft Defender and its management tools Obsolescence solutions including Trellix Application Control and Bit9 (CarbonBlack) FireEye HX HIAB Vulnerability Management Knowledge and understanding of security toolsets Benefits: As well as a competitive pension scheme, BAE Systems also More ❯