City of London, London, United Kingdom Hybrid / WFH Options
Matchtech
EC2, S3, SQS, etc.) Desirable Skills & Experience Experience with SIEM convergence from legacy platforms Familiarity with tools such as JIRA, Confluence, Git Background in EthicalHacking, IDAM, PKI, or broader information security disciplines A team-oriented, adaptable mindset with a problem-solving approach Required Qualifications Splunk Cloud Administrator … Splunk SOAR Administrator Splunk Certified Cybersecurity Defence Analyst Cloud Security Architecture (CSA) Microsoft Azure Infrastructure Solutions Desirable Certifications Certified Information Systems Security Professional (CISSP) EthicalHacking & Intrusion Prevention Information Security Management Systems (ISMS) Identity Access & Management (IDAM More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
Pentester ) with extensive hands-on experience to join an IT consultancy for a 6-month contract role. The role will involve you leading in ethicalhacking processes, analysing and identifying vulnerabilities, and reporting on opportunities to increase defence strength, and actionable recommendations. Key Responsibilities Threat modelling and simulation … Vulnerability assessments Ethicalhacking of networks, operating systems, and web application Utilise tools for SIEM, Data Loss Prevention, and endpoint detection Collaborate with third-party vendors The role is open for applications from 19/05 and the application period will close on 02/06. Interviews will More ❯
london (west end), south east england, united kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
Pentester ) with extensive hands-on experience to join an IT consultancy for a 6-month contract role. The role will involve you leading in ethicalhacking processes, analysing and identifying vulnerabilities, and reporting on opportunities to increase defence strength, and actionable recommendations. Key Responsibilities Threat modelling and simulation … Vulnerability assessments Ethicalhacking of networks, operating systems, and web application Utilise tools for SIEM, Data Loss Prevention, and endpoint detection Collaborate with third-party vendors The role is open for applications from 19/05 and the application period will close on 02/06. Interviews will More ❯