Redscan (a trading name of Redscan Cyber Security Limited)
experience and knowledge Experience working with SIEM systems Industry standard certifications such as: CompTIA Security+, CompTIA Network+, CompTIACySa+, Cisco CCNA, EC-Council CEH, and/or relevant specialized degree in Cyber Forensics or Computer Science. Kroll is the world's premier provider More ❯
and Professional Experience: University Degree/Diploma in Cyber Security or Equivalent experience. Other IT certifications or experience such as CISSP, COMPTIACySA+, GCIA, GCIH Desirable. IT certifications such as CASP or ITIL. Experience in a SOC or SOC equivalent. SC/DV clearance. Other Requirements: Full More ❯
Barton upon Humber, England, United Kingdom Hybrid / WFH Options
Wren Kitchens
communication, and project management skills. Knowledge of security frameworks such as ISO 27001 and NIST CSF. Cybersecurity certifications like Security+, CSA, SC-900, CC, CySA+, GSEC are beneficial but not mandatory. Familiarity with tools like Zscaler, Mimecast, CrowdStrike, SIEM, Cisco, Microsoft Defender, Azure, AWS, Cloudflare, Jamf. About The Company More ❯
Attack, Lockheed Martin kill chain or Diamond model. Should be able to perform dynamic malware analysis. Qualifications: Certifications such as ECIH, Security +, BTL1, Cysa+, SC-200 are good to have Knowledge of open-source IR tools, such as Velociraptor, Eric Zimmerman Tools, Chainsaw, Volatility, SOF-elk, DFIR IRIS. More ❯
Relevant education or industry-recognised certifications in computing-related subjects suited to a senior role in Cybersecurity (MSc, BSc, GIAC, CISSP, CISM, CRISC, CASP+, CySA+, Security+, CC) Essential skills Industrial Control Systems (ICS) Knowledge: Understanding of SCADA systems, PLCs, DCS, and other ICS components used in industrial environments. Network More ❯
Attack, Lockheed Martin kill chain or Diamond model. Should be able to perform dynamic malware analysis. Qualifications: Certifications such as ECIH, Security +, BTL1, Cysa+, SC-200 are good to have Knowledge of open-source IR tools, such as Velociraptor, Eric Zimmerman Tools, Chainsaw, Volatility, SOF-elk, DFIR IRIS. More ❯
Attack, Lockheed Martin kill chain or Diamond model. Should be able to perform dynamic malware analysis. Qualifications: Certifications such as ECIH, Security +, BTL1, Cysa+, SC-200 are good to have Knowledge of open-source IR tools, such as Velociraptor, Eric Zimmerman Tools, Chainsaw, Volatility, SOF-elk, DFIR IRIS. More ❯
Attack, Lockheed Martin kill chain or Diamond model. Should be able to perform dynamic malware analysis. Qualifications: Certifications such as ECIH, Security +, BTL1, Cysa+, SC-200 are good to have Knowledge of open-source IR tools, such as Velociraptor, Eric Zimmerman Tools, Chainsaw, Volatility, SOF-elk, DFIR IRIS. More ❯