tooling, architecture, and implementation. Solid understanding of attacker TTPs and how to design effective, scalable defenses. Experience with ISO 27001, NIST CSF, SP800-53, Cyber Essentials, or similar frameworks. Deep knowledge of UK and global data protection and cybersecurity regulations. Certifications like CISSP , CISM , or More ❯
mitigation strategies. Collaborate on incident handling, reporting, and documentation. Enforce security policies in line with industry standards and regulations (GDPR, ISO, Cyber Essentials+, NIST800-171). Assist with audits and compliance reporting. Manage and configure network devices with a focus on security. Design and implement More ❯
mitigation strategies. Collaborate on incident handling, reporting, and documentation. Enforce security policies in line with industry standards and regulations (GDPR, ISO, Cyber Essentials+, NIST800-171). Assist with audits and compliance reporting. Manage and configure network devices with a focus on security. Design and implement More ❯
analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding of incident response following NIST800-61 guidelines incorporating containment, eradication and recovery phases. Experience with digital forensics and investigations, including evidence collection and chain-of-custody More ❯