Global music events company requires a ThreatDetection Engineer to join their global cyber defence team basaed in the UK but with the option to work fully remote. Key skills needed: SIEM, IDS/IPS, Firewalls and antivirus software; full DevSecOps skillset with demonstrable skills in building threatdetection systems in the cloud; scripting skillset in Python or PowerShell; understanding of CI/CD pipeline. My client is a global music and event provider and has a large and complex technology estate that is constantly under cyber attack due to its promincance in the public domain. … The client is on the hunt for a Senior ThreatDetection Engineer to join an expanding Cyber Defence team focused on the ongoing protection of its customers, clients, employees and partners. This is a fully remote opportunity reporting into the Senior Manager of Cyber Defence the role will more »
Layer Security (TLS) cryptographic protocol Terraform SAML and OIDC Azure data security Security auditing, compliance, modelling and risk scoring platforms Proxy security Vulnerability and Threatdetection/Endpoint detection and response (EDR) Intrusion detection and prevention, such as Darktrace Ethical Hacker, Cyber Security SANS, CISSP certification more »
approach to building, deploying, and operating our Cyber capabilities to fortify our defenses, employing innovative and cutting-edge cyber technologies. Our duties span cyber threat management, real-time attack detection and prevention, and swift remediation, integrated with advanced artificial intelligence and machine learning. Additionally, we leverage Cyber DevOps … automations to facilitate rapid deployment and threat mitigation, ensuring the resilience of our Operational Technology (OT), IT, and digital infrastructure in the face of emerging challenges. We are responsible for defining and setting the Cyber framework and Security compliance policies across the company, including the development of robust Business … regulatory landscapes, such as NERC CIP, NIST, NIS2, GDPR, EPCIP, etc. Virtualization technology, including containerization (e.g., Docker, Kubernetes, Linux, etc.) Host-based security products (threatdetection, mitigations, end-user detection and response, micro-segmentation, zero trust) Experience working within an ITIL environment or structured platform management, particularly more »
business. Responsibilities: Strategic Security Design : Develop comprehensive security architectures, integrating advanced security practices, to safeguard against emerging threats. Focus on cloud security, AI-driven threatdetection, and the adoption of zero-trust principles. Standards and Frameworks : Define and update technical security standards and principles, incorporating industry best practices … and compliance requirements from frameworks such as NIST, ISO, and GDPR. Security Reviews and Threat Modeling : Conduct rigorous security assessments and threat modeling for ongoing and new projects, ensuring designs meet stringent security standards. Implement continuous improvement practices for threat identification and mitigation. Cross-functional Leadership : Lead more »
CIP, NIST, NIS2, GDPR, EPCIP, etc. Knowledge of virtualization technologies including Docker, Kubernetes, Linux, etc. Experience with host-based security products and methodologies (e.g., threatdetection, end-user detection and response, micro-segmentation, zero trust). Exposure to ITIL environments or structured platform management. Possession of professional … in Cyber Security. Design and deploy security tools for new and existing infrastructure and digital deployments. Continuously adjust cyber capabilities based on evolving cyber threat landscapes. Support and potentially lead NOC/SOC operational teams. Oversee Cyber incident response, conduct post-incident reviews (PIRs), root-cause-analysis (RCAs), and … and data mining in support of cyber goals and the company's digitization transformation. Develop and execute the cyber roadmap for platform development and threat mitigation, in alignment with the unit’s cyber vision and strategy. Continuously enhance professional cyber skills and awareness to stay ahead of cyber threats. more »
The ideal candidate will have a strong background in Cyber Analysis, with expertise in SOC environments, SIEM & Incident Management, Vulnerability Management, and Endpoints or Threat Analysis. Key Responsibilities: - Conduct thorough Cyber Analysis to identify and respond to security incidents. - Monitor and manage Security Operations Center (SOC) environments to ensure … utilizing SIEM tools. - Strong knowledge of Incident Management processes and procedures. - Experience in Vulnerability Management to address potential security vulnerabilities. - Expertise in Endpoints or Threat Analysis to enhance threatdetection and response. Requirements: - Bachelor's degree in Computer Science, Information Security, or related field. - Relevant certifications such more »
Docker, Kubernetes and more. What You'll Do Architect and automate sophisticated, scalable security systems, processes and controls Oversee and evolve comprehensive security monitoring, threatdetection and intrusion prevention/response Proactively assess risks and threats to develop strategic cybersecurity controls Function as a security force multiplier through more »
would suit an experienced engineer with deep knowledge of security principles in line with the CISSP CBK domains such as security monitoring, intrusion prevention & detection, network security, endpoint management & protection, identity management, threatdetection, vulnerability management. Whilst the position entails significant exposure to vendor products and tooling more »
packet analysis and reporting analysis. You will require a basic understanding of networking and infrastructure design which will be built upon to along with detection and monitoring tooling identify vulnerabilities and areas of compromise. As a Junior Cyber Security Analyst, you will learn the skills and techniques enabling you … also support the Implementation, Operation and Management of the new technologies including PAM, EDR and DLP solutions. What You'll Be Doing: '€¢Creating of threatdetection analytics '€¢Onboard log sources in alignment with the MITRE ATT&CK Framework '€¢Investigating and monitoring SIEM platform '€¢Tuning of alerts and event … level of defence '€¢Ensuring all identified events are investigated thoroughly '€¢Working with Senior Analysts (Level 3) to improve and simplify processes '€¢Working with the Threat Hunters to identify and assist in the remediation of advance security threats What we're looking for: '€¢Cyber security degree or equivalent experience '€¢Experience more »
audit requirements. Contribute to the development of a Cybersecurity Operations Resource and Capacity planner managed through BDO's Azure DevOps environment. Oversee incident response, threatdetection, and mitigation efforts You'll be someone with: A good understanding of monitoring frameworks eg MITRE ATT&CK and SIEM technologies eg more »
maintain incident response plans, ensuring they align with industry best practices. Escalation management in the event of a security incident. Follow major incident process. Threat Intelligence: Stay abreast of the latest cybersecurity threats and vulnerabilities, integrating threat intelligence into security monitoring processes. Contribute to the development of threat intelligence feeds to enhance proactive threat detection. Security Tool Management: Manage and optimise SIEM tools, ensuring they are properly configured and updated to maximize effectiveness. Evaluate new security technologies and recommend enhancements to the security infrastructure. Collaboration: Collaborate with cross-functional teams, including IT, legal, and management, to more »
number of robust controls. Requirements: Deep understanding of security engineering and implementing security controls Hands on experience of SecOps and security systems Understanding of threatdetection, Vulnerability management Cloud & network security Scripting experience - Preferably Python Ability to lead projects and resolve complex issues Please note you will need more »
the software development lifecycle. Conduct Code Reviews and utilize Static Code Analysis to identify and mitigate security risks in software code. Implement monitoring and threatdetection tools and practices to proactively identify and resolve performance issues and bottlenecks. Troubleshoot issues until root causes are understood on high traffic more »
one in their specialist area and currently rebuilding their entire pricing & risk management platform from scratch. Responsibilities: Evaluate new security technologies and tools. Improve threatdetection and response capabilities with a code-first approach Automation of manual process utilising IAC Collaborate and co-develop with external suppliers and … internal engineering teams to ensure data sources and detection rules are well enriched. Required: Strong understanding of the latest security threats, threat actors, and the tactics and techniques adopted. Proven experience with programming - Python, Rust, C++ or other major languages Knowledge of SecOps tooling (SIEM, SOAR, TI). more »
in either cloud infrastructure, applications or 3rd party SaaS. Provide expert advice and prepare remediation actions to address identified issues, utilizing security tooling for threat mitigation. Procurement of Hardware, Software and Services: Coordinate the procurement of IT hardware, software licenses, and services. Staff and Contractor Onboarding/Offboarding: Manage … SOC2, and other industry-specific requirements. Disaster Recovery: Develop and maintain a comprehensive disaster recovery plan for critical internal services, incorporating security tooling for threatdetection and response. Conduct regular testing and updates of the DR plan, ensuring security measures are aligned with business continuity goals. The skills more »
opportunities for training and technical development. Day to day responsibilities will include: Incident triage and investigation. Analysis of all suspicious email activity. Participating in threat hunt and offensive security exercises. Analysis of all SIEM logs, and the opportunity to get involved in some threat detection. Working with technical … incidents Demonstrable business facing skills Experience of working with a SIEM platform – Splunk, QRadar, Elastic Security certifications highly desirable Experience of scripting/automation, threat hunting and offensive security highly desirable Please send your CV for immediate consideration. more »