LogRhythm Jobs in London

2 of 2 LogRhythm Jobs in London

Security Analyst

City of London, London, United Kingdom
Experis
and supporting cyber requests, using predefined playbooks and processes Supporting vulnerability identification, triage, and remediation, including follow-up with relevant technical teams. Monitoring and analysing alerts and logs from LogRhythm, CyberArk, Semperis and other security tools, but experience with other cyber tools would also suffice. Participating in the change management process to ensure proposed changes are reviewed for security risk. … infrastructure team undergoing change. Experience engaging across teams to investigate issues and improve controls. Technical Experience administrating PAM solutions, such as CyberArk. Hands-on experience with tools such as LogRhythm, Semperis. Understanding of NCSC cyber security principles and good practice. Familiarity with change and configuration management from a cyber perspective. Working knowledge of ISO 27001 or NIST standards. Relevant certifications More ❯
Employment Type: Contract
Rate: £400 - £401/day
Posted:

Attack Monitoring Analyst (GSOC) - London Stock Exchange Group

London, UK
London Stock Exchange Group
rotation. RESPONSIBILITIES: • Triage security events and employ a methodical and coherent response to security incidents adopting playbooks where necessary. • Competently operate a chosen SIEM (e.g. Splunk/QRadar/LogRhythm) for incident investigations, or for the development of monitoring dashboards. • Utilise playbooks, existing knowledge and accurate online resources for guidance when responding to incidents. • Utilise online resources for researching and … current vulnerabilities, attacks, and countermeasures. • Identify, respond and remediate cyber events generated through monitoring technologies. EXPERIENCE: • Preferred experience with operating or administrating a SIEM (e.g. Splunk/QRadar/LogRhythm). • Solid understanding of networks including the TCP/IP stack, typical organisation architectures, and common protocols abused by malware. • Experience in security event analysis & triage, incident handling and root More ❯
Employment Type: Full-time
Posted: