in Cyber Security/Computer Science or equivalent combination of related work experience desired. Must have a good Linux background, ideally Linux Sys Admin CISSP, CISM, GCIA, GCIH, GCFE, GCFA, GREM, Splunk Power User and/or similar certifications is preferred. Verifiable experience in Security Operations and Incident Response. Experience in performing analysis with SIEM technologies such as Splunk and More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
APM Terminals
experience in an Incident Management role, with a minimum of 3 years in a SOC or incident response leadership role. Relevant advanced certifications (e.g., GCIA, GSEC, CEH, GCDA, GCIH, GCFA, OSCP) are highly desirable but not essential. Proven self-learning abilities demonstrated through research, GitHub projects, bug hunting, active participation in public cybersecurity forums, or high scores on platforms like More ❯
Cyber Kill Chain. Proficient with Microsoft Azure and AWS cloud technologies. Relevant certifications such as Microsoft SC-200, AWS Certified Cloud Practitioner, Microsoft AZ-900, GIACCertifiedForensicAnalyst (GCFA), and GIACCertified Incident Handler (GCIH). Skilled in network and application protocols, and familiar with Windows, Linux, and macOS operating systems and their artifacts. Experience with security tools and More ❯
Cyber Kill Chain. Proficient with Microsoft Azure and AWS cloud technologies. Relevant certifications such as Microsoft SC-200, AWS Certified Cloud Practitioner, Microsoft AZ-900, GIACCertifiedForensicAnalyst (GCFA), and GIACCertified Incident Handler (GCIH). Skilled in network and application protocols, and familiar with Windows, Linux, and macOS operating systems and their artifacts. Experience with security tools and More ❯