drive effective remediation activity. Accountabilities Allocation of the correct risk rating and remediation prioritisation to a vulnerability based on industry standards for assessment, available threatintelligence concerning exploitation, the reachability of the host (or asset) and the value of the service(s) running on the impacted host. Development … stakeholders, vendors, external security partners and affect business units using reports and dashboards and provide recommendations for improvement in vulnerability management practices. Collaboration with Threatintelligence and Cyber Operations teams to assess and contextualise exposure to latest threat trends and exploits and set appropriate remediation timescales. Definition More ❯
proficiency in writing KQL and SPL; log sources, ingestion patterns, and correlation rules). DevOps knowledge (Git/BitBucket/GitLab). Security Fundamentals (threat detection, incident response, threatintelligence; knowledge of the MITRE ATT&CK framework and security operations). Some other highly valued skills may More ❯
Warrington, Cheshire, United Kingdom Hybrid / WFH Options
Amentum
to the Security Service Manager. Key Responsibilities: Actioning alerts generated through SIEM Tools. Reviewing alerts and refining rulesets to tune SIEM Tools. Working with threatintelligence provider to assess the security posture of the system. Providing security consulting and expertise to the IT help team. Undertaking component/ More ❯
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate More ❯
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response, as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate More ❯
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate More ❯