Job Description Summary Responsible for hunting, detecting and responding to digital security threats. Demonstrates technical leadership abilities and strong comprehension of malware, emerging threats and calculating risk. Job Description Essential Responsibilities In this role, you will: Specialize in network-centric analysis (NSM), host-centric analysis (live response, digitalforensics), malware analysis, and log-centric analysis (SIEM) Perform … management and support - Understanding of CND-based analytical models (Kill Chain, ATT&CK, Pyramid of Pain, etc.) - Understanding of APT, Cyber Crime and other associated tactics - Understanding of host forensics and network analysis techniques and tools - Understanding of malware and reverse engineering - Understanding of vulnerabilities. Vulnerability management, remediation and implementation techniques. - Understanding of responding to threats in cloud platforms More ❯
experiences. We are seeking an enthusiastic Cybersecurity Instructor to lead the delivery of our new Cybersecurity Bootcamp, tailored for individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethical hacking, incident response, and security operations, enabling them to secure new or …/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and DigitalForensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO 27001) Security More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Rolls-Royce plc
technical knowledge and providing technical direction as required throughout the product lifecycle: architecture, requirements, design, build, test, production, operations, and support. Frequently, these activities will be done in a digital environment using Model Based Engineering tools. Contribute to the development, implementation, documentation, and maintenance of policies, procedures, associated guidelines, tools and training. Contribute to the security life cycle activities … technical skills required to develop, implement, and secure such cyber-physical systems. Experience or interest in cybersecurity and cyber threats (ie - designing secure products, systems, and applications; intrusion detection; digitalforensics; system recovery; risk assessment tools and methods; security solutions, policies, standards, and procedures, etc.). Knowledge and/or experience in applying Product Security policies and standards More ❯