active or dormant indicators of compromise (IoCs) or evidence of unknown threats within an organisations digital environment Relevant industry certifications including GIAC Defensible Security Architect (GDSA), GIACIntrusionAnalyst (GCIA), GIAC Continuous Monitoring (GMON), CISSP Understanding of cyber risk frameworks or industry standards such as 800-53, ISO 27001/2, PCI, CIS 18, CMMC Principal Cloud Security: 4+ years More ❯
active or dormant indicators of compromise (IoCs) or evidence of unknown threats within an organisations digital environment Relevant industry certifications including GIAC Defensible Security Architect (GDSA), GIACIntrusionAnalyst (GCIA), GIAC Continuous Monitoring (GMON), CISSP Understanding of cyber risk frameworks or industry standards such as 800-53, ISO 27001/2, PCI, CIS 18, CMMC Principal Cloud Security: 4+ years More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Morson Talent
incident response and advanced threat hunting. A degree in Computer Science, Cybersecurity, IT, or a related discipline, or equivalent professional experience. Industry-recognised certifications such as CISSP, GIAC/GCIA/GCIH, AZ-500, CEH, CASP+, or SIEM-specific training. Strong knowledge of SIEM, SOAR, EDR, IDS/IPS, NAC, DLP, and related security technologies. Familiarity with frameworks such as More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
Morson Talent
incident response and advanced threat hunting. A degree in Computer Science, Cybersecurity, IT, or a related discipline, or equivalent professional experience. Industry-recognised certifications such as CISSP, GIAC/GCIA/GCIH, AZ-500, CEH, CASP+, or SIEM-specific training. Strong knowledge of SIEM, SOAR, EDR, IDS/IPS, NAC, DLP, and related security technologies. Familiarity with frameworks such as More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Reed
. Familiarity with OWASP Top 10, CWE, and remediation strategies. Hands-on experience with security testing tools and techniques. Excellent communication and documentation skills. Relevant certifications (e.g. CISSP, SANS GCIA, Security+, CCNA/CCNP). Solid understanding of IT infrastructure, protocols, and security design. Desirable: Background in threat modelling. Degree in Computer Science or equivalent experience. Knowledge of ISO27001, Cyber More ❯