Knowledge * Working knowledge of various Operating Systems (OS) (MSWin, Linux, OSX, IOS) * Purple Teaming knowledge * Basic understanding of computerforensics * Use of Firewalls and IDS/IPS devices * Knowledge of SIEM technologies. * Networking, routing and switching * Cyber Security Review (CSR) Compliant * Cybersecurity Frameworks and Standards: Knowledge of frameworks more »
certified qualification would be ideal but not essential Comfortable with packet analysis and ideally experienced with network detection and response tooling Experience of relevant computerforensics, incident response and e-discovery tools, including password recovery, EDR, NDR, UEBA, honeypots, data loss prevention, SIEM, and log managers Understanding of … regulatory processes in evidence-handling procedures Technical knowledge of anti-forensics, data hiding and obfuscation technologies including steganography, digital image capture and handling, log analysis and mobile device forensics As a precondition of employment for this role, you must be eligible and authorised to work in the United more »
certified qualification would be ideal but not essential Comfortable with packet analysis and ideally experienced with network detection and response tooling Experience of relevant computerforensics, incident response and e-discovery tools, including password recovery, EDR, NDR, UEBA, honeypots, data loss prevention, SIEM, and log managers Understanding of … regulatory processes in evidence-handling procedures Technical knowledge of anti-forensics, data hiding and obfuscation technologies including steganography, digital image capture and handling, log analysis and mobile device forensics As a precondition of employment for this role, you must be eligible and authorised to work in the United more »
certified qualification would be ideal but not essential Comfortable with packet analysis and ideally experienced with network detection and response tooling Experience of relevant computerforensics, incident response and e-discovery tools, including password recovery, EDR, NDR, UEBA, honeypots, data loss prevention, SIEM, and log managers Understanding of … regulatory processes in evidence-handling procedures Technical knowledge of anti-forensics, data hiding and obfuscation technologies including steganography, digital image capture and handling, log analysis and mobile device forensics As a precondition of employment for this role, you must be eligible and authorised to work in the United more »
certified qualification would be ideal but not essential Comfortable with packet analysis and ideally experienced with network detection and response tooling Experience of relevant computerforensics, incident response and e-discovery tools, including password recovery, EDR, NDR, UEBA, honeypots, data loss prevention, SIEM, and log managers Understanding of … regulatory processes in evidence-handling procedures Technical knowledge of anti-forensics, data hiding and obfuscation technologies including steganography, digital image capture and handling, log analysis and mobile device forensics As a precondition of employment for this role, you must be eligible and authorised to work in the United more »
certified qualification would be ideal but not essential Comfortable with packet analysis and ideally experienced with network detection and response tooling Experience of relevant computerforensics, incident response and e-discovery tools, including password recovery, EDR, NDR, UEBA, honeypots, data loss prevention, SIEM, and log managers Understanding of … regulatory processes in evidence-handling procedures Technical knowledge of anti-forensics, data hiding and obfuscation technologies including steganography, digital image capture and handling, log analysis and mobile device forensics As a precondition of employment for this role, you must be eligible and authorised to work in the United more »
certified qualification would be ideal but not essential Comfortable with packet analysis and ideally experienced with network detection and response tooling Experience of relevant computerforensics, incident response and e-discovery tools, including password recovery, EDR, NDR, UEBA, honeypots, data loss prevention, SIEM, and log managers Understanding of … regulatory processes in evidence-handling procedures Technical knowledge of anti-forensics, data hiding and obfuscation technologies including steganography, digital image capture and handling, log analysis and mobile device forensics As a precondition of employment for this role, you must be eligible and authorised to work in the United more »
certified qualification would be ideal but not essential Comfortable with packet analysis and ideally experienced with network detection and response tooling Experience of relevant computerforensics, incident response and e-discovery tools, including password recovery, EDR, NDR, UEBA, honeypots, data loss prevention, SIEM, and log managers Understanding of … regulatory processes in evidence-handling procedures Technical knowledge of anti-forensics, data hiding and obfuscation technologies including steganography, digital image capture and handling, log analysis and mobile device forensics As a precondition of employment for this role, you must be eligible and authorised to work in the United more »
responsibilities: Monitor for attacks, intrusions and unusual, Unauthorised or illegal activity Creating and executing strategies to secure and protect networks and data resources Planning computer and network security upgrades and testing hardware and software related to the upgrade Use advanced analytic tools to determine emerging threat patterns and vulnerabilities … i.e. SentinelOne Managing technical problems related to applications and production equipment Addressing intrusions using expertise in computerforensics Engage in 'ethical hacking', for example, simulating security breaches Foreseeing future problem areas by monitoring workflows and network traffic patterns Monitor identity and access management, including monitoring for abuse of more »
of SQL. Nice to have - Proficiency using SQL. - Experience conducting internal investigation in a corporate setting. - Experience in technical investigations and/or previous computerforensics exposure. more »
technical skills you can use across the network, and throughout your career. What you'll do You will work alongside industry-recognised specialists in computerforensics, electronic discovery, information governance and disclosure. Much of our work centres on the analysis of large volumes of electronic data. And because more »
technical skills you can use across the network, and throughout your career. What you'll do You will work alongside industry-recognised specialists in computerforensics, electronic discovery, information governance and disclosure. Much of our work centres on the analysis of large volumes of electronic data. And because more »
Greater London, England, United Kingdom Hybrid / WFH Options
Apollo Solutions
guidance throughout the project lifecycle. project budgets, timelines, and resource allocation to ensure efficiency and profitability. Must-Have: degree in a relevant field (e.g., Computer Science, Information Technology, Legal Studies) or equivalent practical experience. experience in eDiscovery, with a strong understanding of industry standards and best practices. in eDiscovery more »