procedures, guidelines and best practices to ensure efficient and effective incident response. You will collaborate with internal and external stakeholders to develop and enhance protectivemonitoring, protective and detective controls and work with cyber security teams, if this role sounds of interest and you are available ASAP More ❯
procedures, guidelines, and best practices to ensure efficient and effective incident response. You will collaborate with internal and external stakeholders to develop and enhance protectivemonitoring, protective and detective controls and work with cyber security teams, if this role sounds of interest and you are available ASAP More ❯
procedures, guidelines and best practices to ensure efficient and effective incident response. You will collaborate with internal and external stakeholders to develop and enhance protectivemonitoring, protective and detective controls and work with cyber security teams, if this role sounds of interest and you are available ASAP More ❯
in architecting security solutions based on customer requirements and industry frameworks such as NIST, NCSC, Mitre, Cyber Kill Chain. Experience developing security reporting and monitoring content such as alerts, reports, and dashboards. Effective Communication, including verbal, report writing & presentations experience to all levels in an organisation, customers, and sales … on gift/shopping vouchers. World-class training and development Keywords: 44768, LogRhythm, SIEM, EDR, SOC, NOC, Cyber Security, Cyber Threat Intelligence, Log Management, protectivemonitoring, Network Security. More ❯
Employment Type: Permanent
Salary: £50000 - £65000/annum Up to 20% bonus, 10% pension
in architecting security solutions based on customer requirements and industry frameworks such as NIST, NCSC, Mitre, Cyber Kill Chain. Experience developing security reporting and monitoring content such as alerts, reports, and dashboards. Effective Communication, including verbal, report writing & presentations experience to all levels in an organisation, customers, and sales … on gift/shopping vouchers. World-class training and development Keywords: 44768, LogRhythm, SIEM, EDR, SOC, NOC, Cyber Security, Cyber Threat Intelligence, Log Management, protectivemonitoring, Network Security. More ❯
in architecting security solutions based on customer requirements and industry frameworks such as NIST, NCSC, Mitre, Cyber Kill Chain. Experience developing security reporting and monitoring content such as alerts, reports, and dashboards. Effective Communication, including verbal, report writing & presentations experience to all levels in an organisation, customers, and sales … on gift/shopping vouchers. World-class training and development Keywords: 44768, LogRhythm, SIEM, EDR, SOC, NOC, Cyber Security, Cyber Threat Intelligence, Log Management, protectivemonitoring, Network Security. More ❯
in architecting security solutions based on customer requirements and industry frameworks such as NIST, NCSC, Mitre, Cyber Kill Chain. Experience developing security reporting and monitoring content such as alerts, reports, and dashboards. Effective Communication, including verbal, report writing & presentations experience to all levels in an organisation, customers, and sales … on gift/shopping vouchers. World-class training and development Keywords: 44768, LogRhythm, SIEM, EDR, SOC, NOC, Cyber Security, Cyber Threat Intelligence, Log Management, protectivemonitoring, Network Security. More ❯
Employment Type: Permanent
Salary: £50000 - £65000/annum Up to 20% bonus, 10% pension
in architecting security solutions based on customer requirements and industry frameworks such as NIST, NCSC, Mitre, Cyber Kill Chain. Experience developing security reporting and monitoring content such as alerts, reports, and dashboards. Effective Communication, including verbal, report writing & presentations experience to all levels in an organisation, customers, and sales … on gift/shopping vouchers. World-class training and development Keywords: 44768, LogRhythm, SIEM, EDR, SOC, NOC, Cyber Security, Cyber Threat Intelligence, Log Management, protectivemonitoring, Network Security. More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Apacheix
of MoD security process and practices (Relevant JSPs and Defcons) Technical understanding of IT security, Cloud Security, System Hardening, Boundary Controls, Crypto, PKI and ProtectiveMonitoring UK resident and right to work with (or ability to attain) SC vetting status (or higher) Experience utilising agile delivery methodologies and More ❯
a system. Provision of authoritative specialist security advice in: Risk and threat-based mitigation to system designs. Control frameworks such as NIST, ISO, CIS. Protectivemonitoring, Authentication and authorization best practices. Develop excellent working relationships with key stakeholders, peers and subordinates. Communicating effectively verbally and in writing, demonstrated More ❯
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Logiq
will include: Expertise in Defensive Cyber, Enterprise Architecture, Secure Systems, Network & Cloud Security, System Hardening, Cryptographic Controls (PKI, Data at Rest/In Transit), ProtectiveMonitoring, and Security Auditing. Strong understanding of the ISO 27000 series, NIST Cyber Security & Risk Management Frameworks, NCSC CAF, and other industry standards. More ❯
West Midlands, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
Implement SOC procedures, guidelines, and best practices to ensure efficient and effective incident response. Collaborate with internal and external stakeholders to develop and enhance protectivemonitoring and controls. Work with cyber security teams to enhance incident response capabilities. If this role sounds of interest and you are available More ❯
for multiple clients. Redefine internal and external processes for the implementation of the SOC. Collaborate with internal and external stakeholders to develop and enhance protectivemonitoring and controls. Ensure efficient and effective incident response through implementing SOC procedures, guidelines, and best practices. Qualifications: Proven background in implementing SOC More ❯