london, south east england, United Kingdom Hybrid / WFH Options
Intaso
incident response, threat hunting, SLA management, and executive communication. Preferred Qualifications Degree in Computer Science, InfoSec, or related field. Certifications: CISSP, CISM, GIAC (e.g., GCFA, GNFA), or OT certs (e.g., GICSP, ISA/IEC 62443). Familiarity with cloud security tools, IT/OT integration, and threat modeling. More ❯
Management Security Tools: SIEM, IDS/IPS/WAF, Firewalls, and Endpoint Protection Cloud Security Concepts Relevant certifications (CISSP, CISM, CEH, OSCP, GIAC, GCIH, GCFA, or similar) preferred Tradition do not accept agency CV’s. Please do not forward CV’s to our employees or Talent team. Tradition are not More ❯
with standard security frameworks such as MITRE, cyber kill chain and APT campaign strategies. One or more cyber security certifications such as GCIA, GCIH, GCFA, GNFA, CEH, ECSA preferred ... More ❯
network Knowledge of network communications, routing protocols, compliance standards, and internet applications Knowledge of system and network policies Relevant certifications such as GIAC GREM, GCFA, GNFA, or Offensive Security certifications like OSCP and OSCE Commitment to Non-Discrimination: All qualified applicants will receive consideration for employment without regard to disability More ❯
or work toward any of the following is strongly desired: GIACCertified Incident Handler (GCIH) GIACCertified Intrusion Analyst (GCIA) GIACCertifiedForensicAnalyst (GCFA) GIACCertifiedForensic Examiner (GCFE) GIAC Network ForensicAnalyst (GNFA) Cisco Certified Network Associate (CCNA) Microsoft Certified Solutions Associate (MCSA) CompTIA Security+ More ❯
GCP. They will be comfortable presenting findings to stakeholders and documenting methodologies, they are also committed to continuous learning, with certifications such as GCTI, GCFA, or OSCP highlighting their depth and breadth of knowledge. They would be a self-starter with strong autonomy and analytical acumen; they thrive in dynamic … with data science and machine learning techniques in security analysis. Background in building automated hunting pipelines and/or detection-as-code. Desirable Certifications GCFA OSCP GDAT GCIH Or similar certifications, not required but certainly desirable. Ways of working Focusing on Clients and Customers. Working as One NCC. Always Learning. More ❯