security br solutions. br br This role also requires experience of key cybersecurity controls such as br Anti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, Vulnerability br Management, SOAR/automation . Additionally, you’ll have an understanding of br common cybersecurity threats and mitigation techniques More ❯
security br solutions. br br This role also requires experience of key cybersecurity controls such as br Anti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, Vulnerability br Management, SOAR/automation . Additionally, you’ll have an understanding of br common cybersecurity threats and mitigation techniques More ❯
security br solutions. br br This role also requires experience of key cybersecurity controls such as br Anti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, Vulnerability br Management, SOAR/automation . Additionally, you’ll have an understanding of br common cybersecurity threats and mitigation techniques More ❯
APIs (Application Programming Interfaces) for integrating securitysolutions. This role also requires experience of key cybersecurity controls such asAnti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, VulnerabilityManagement, SOAR/automation . Additionally, you’ll have an understanding ofcommon cybersecurity threats and mitigation techniques with a keen interest More ❯
tadcaster, yorkshire and the humber, united kingdom
Drax
APIs (Application Programming Interfaces) for integrating securitysolutions. This role also requires experience of key cybersecurity controls such asAnti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, VulnerabilityManagement, SOAR/automation . Additionally, you’ll have an understanding ofcommon cybersecurity threats and mitigation techniques with a keen interest More ❯
APIs (Application Programming Interfaces) for integrating securitysolutions. This role also requires experience of key cybersecurity controls such asAnti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, VulnerabilityManagement, SOAR/automation . Additionally, you’ll have an understanding ofcommon cybersecurity threats and mitigation techniques with a keen interest More ❯
You should have experience with incident management tools, APIs for security solutions, and cybersecurity controls such as Anti-malware, EDR/XDR/NDR, SIEM, and SOAR. An understanding of common threats and mitigation techniques is essential, along with a keen interest in staying current with security developments. Strong IT More ❯
Harrogate, North Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Redcentric
in a 3rd line or senior engineer role. CCNP or equivalent. ITILv3 qualified or experience within an ITIL environment. Experience in a SOC/SIEM environments, specifically Elastic. Experience with scripting, specifically Python. Experience with UNIX. Experience with cellular technologies - 3G, 4G, etc. Experience with public service networks - N3, HSCN More ❯
York, England, United Kingdom Hybrid / WFH Options
Investigo
operating companies, construction and sales sites. The role holder is required to continuously monitor and respond to alerts from cyber security systems such as SIEMand EDR. Categorise, prioritise and triage and respond to cyber security incidents in a timely and effective manner and inline with agreed SLAs, policies, processes … Manager. Operational Services Operational performance Ensure effective operation of the cyber security function, including, but not limited to the following: Monitor the Persimmon IT SIEM platform. Respond effectively to security incidents. Use analytical skills to undertake investigations into phishing emails and other security events. Use Endpoint Detection and Response (EDR More ❯