to our customers and streamline and automate our business processes. To help us manage our cybersecurity incidents, whilst performing forensic investigations and providing cyber threatintelligence services, we're looking for two talented individuals with strong analytical skills to join this growing team. At AXA we work smart … security analysts to provide recommendations on security mechanisms Support the maintenance, testing and execution of the AXA UK Security Incident Management framework Provide cyber threatintelligence to in scope UK entities Due to the number of applications we expect to receive for this role, we reserve the right … networking and common protocol behaviours Proven experience using a major scripting/programming language or search query language to support in security operations and threat detection GIAC certified qualification would be ideal but not essential Comfortable with packet analysis and ideally experienced with network detection and response tooling Experience more »
SC clearance with UK-eyes only caveat. Enterprise Security Architectures (SABSA, MODAF). Desirable: DV Clearance. Knowledge of Quantum Cryptography & Quantum Key management. Current threatintelligence awareness. Knowledge of NATO security policy, risk management and Accreditation. Understanding of the role of advisory boards within the UK Government or more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threatintelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate more »
Kanban. * Coordinate operational activities' forecasting engaging with Office of CSO finance lead. REFINE * Own/Update S&I landing page (intranet); work with CEA, intelligence & resilience to optimise comms outreach and engagement with the supply chain. * Develop and maintain supply chain security comms list/process for CTI for … security incident response. * Develop and maintain the monthly reporting schedule: KPIs; KRIs; Resilience; Threatintelligence; security integration. * Draft technical SoWs, JDs or commercial proposals (incl Business Cases). EXECUTE * Oversee onboarding and offboarding knowledge transfer * Run/oversee engagement with the DS/other governance and business process more »