Event Management (SIEM), including tools such as Splunk, Defender, Sentinel, ELK, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Experience in ProtectiveMonitoring & SOC operation Experience in network security principles, firewalls, and access control mechanisms. Preferred Qualifications: - Industry certifications such as CompTIA Security+, CISSP, CISM, CEH, or GIAC are highly More ❯
consulting on a range of areas including Risk Assessments, Vulnerability Management, Accreditations (ISO27001, GDPR), GRC (Governance, Risk, Compliance), Security Architecture Design and Build (technical and Non-technical), Incident Response, ProtectiveMonitoring Services, Penetration Testing and much more. We take clients through a journey to improve their overall security posture and maturity to ensure they feel reassured in the More ❯
cheltenham, south west england, united kingdom Hybrid/Remote Options
Daintta
are applied during design and development to reduce risk. Developing and communicating corporate information security policy, standards and guidelines. Developing organisational strategies that address information control requirements. Identifying and monitoring environmental and market trends and proactively assessing impact on business strategies, benefits and risks. Performing threat modelling and risk assessments to develop a holistic picture of threat. Developing new … experience of programming, programming and scripting concepts. You have experience working with security controls within cloud-based infrastructure (e.g Azure, AWS, GCP). This may include design, configuration, or protective monitoring. You have experience working with security control frameworks e.g. ISO27001, NIST, CAF or others. You have demonstrable continuous personal development with relevant certifications and accreditations. You have strong More ❯