Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
Crimson
multitask, prioritize workload, and manage competing demands. * Experience in analyzing IT logs and event sources is preferred. * Monitor and administer Security Information and Event Management (SIEM). * Malware analysis and forensics research. * Understanding/differentiation of intrusion attempts and false positives. * Investigation tracking and threat resolution. * Familiarity with data … UTMs. * Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing techniques. * Strong knowledge of cloud computing, network defence, identitymanagement, incident management, and network security. * Extensive experience in a Security Operations Centre (SOC) environment with a proven background in incident response. … multitask, prioritize workload, and manage competing demands. * Experience in analyzing IT logs and event sources is preferred. * Monitor and administer Security Information and Event Management (SIEM). * Malware analysis and forensics research. * Understanding/differentiation of intrusion attempts and false positives. * Investigation tracking and threat resolution. * Familiarity with data More ❯
Luton, England, United Kingdom Hybrid / WFH Options
Crimson
multitask, prioritize workload, and manage competing demands. • Experience in analyzing IT logs and event sources is preferred. • Monitor and administer Security Information and Event Management (SIEM). • Malware analysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data … UTMs. • Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing techniques. • Strong knowledge of cloud computing, network defence, identitymanagement, incident management, and network security. • Extensive experience in a Security Operations Centre (SOC) environment with a proven background in incident response. More ❯
Luton, south east england, United Kingdom Hybrid / WFH Options
Crimson
multitask, prioritize workload, and manage competing demands. • Experience in analyzing IT logs and event sources is preferred. • Monitor and administer Security Information and Event Management (SIEM). • Malware analysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data … UTMs. • Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing techniques. • Strong knowledge of cloud computing, network defence, identitymanagement, incident management, and network security. • Extensive experience in a Security Operations Centre (SOC) environment with a proven background in incident response. More ❯
Luton, south west england, United Kingdom Hybrid / WFH Options
Crimson
multitask, prioritize workload, and manage competing demands. • Experience in analyzing IT logs and event sources is preferred. • Monitor and administer Security Information and Event Management (SIEM). • Malware analysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data … UTMs. • Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing techniques. • Strong knowledge of cloud computing, network defence, identitymanagement, incident management, and network security. • Extensive experience in a Security Operations Centre (SOC) environment with a proven background in incident response. More ❯
luton, bedfordshire, east anglia, United Kingdom Hybrid / WFH Options
Crimson
multitask, prioritize workload, and manage competing demands. • Experience in analyzing IT logs and event sources is preferred. • Monitor and administer Security Information and Event Management (SIEM). • Malware analysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data … UTMs. • Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing techniques. • Strong knowledge of cloud computing, network defence, identitymanagement, incident management, and network security. • Extensive experience in a Security Operations Centre (SOC) environment with a proven background in incident response. More ❯