CyberDefence Analyst - DV Clearance Required! The CyberDefence Analyst will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/… Market rate - flexible 12-Month Contract with Likely Extensio Corsham What we're looking for: * Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks * Skilled in maintaining Microsoft directory services. * Experience using virtualisation software. * Excellent communication skills * Experience of writing Defence/Government documentation more »
CyberDefence Analyst - DV Clearance Required! The CyberDefence Analyst will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/ more »
CyberDefence Analyst - DV Clearance Required! If your skills, experience, and qualifications match those in this job overview, do not delay your application. The CyberDefence Analyst will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk … based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including th... JBLK1_UKTJ more »
Producing dashboards and reports, Vulnerability Management utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain (CKC), Intelligence Driven Defence (IDD), Unified Enterprise Defence (UED), Consultancy and communication Important Knowledge Cybersecurity Capability Maturity Model (C2M2) and … NIST Cyber Security Framework (CSF) Current awareness of the market for data analytics and SIEM platforms, including emerging leaders and Network security implementations (e.g host-based IDS, IPS), including their function and placement Cyberdefence and information security policies, procedures, and regulations, Network security architecture concepts including more »