incidents to Tier 2 Incident Response Teams Review and develop existing security controls in line with a constantly growing technical environment Triage and Review VulnerabilityScanning Reports, feeding results back into technical teams Review Secure Configurations, feeding back into technical teams for remediations of issues Generate recurring service … understanding of security as a discipline Experience (Essential) Previous experience in Security, SOC or related technical field with desired, specific focus on Incident Management Vulnerability Management Relevant qualification(s) in Cyber Security, or other related technical roles Examples Degree in Cyber Security, Computer Science, Networks etc. Professional Qualifications from … organisations such as CompTIA, ISACA etc. Technical qualifications in security and technology such as (but not limited to) cloud computing, SIEM, VulnerabilityScanning/Management etc. Understanding of some (or all) of the following: Key Concepts of Cloud Computing Security Incident Management Risk Management Information Security (CIA) Phishing More ❯
protection/management - VMware and guest OS and App integration. Security best practices, system and OS level security hardening (CISCAT benchmarking etc) using security vulnerabilityscanning tools such as Nessus. Creation of operating procedures and knowledge articles/process. Creation and on-going updates to detailed system design … Design, deploy, troubleshoot and manage to a 3rd line level. Security best practices, network, system and OS level security hardening (CISCAT benchmarking etc) security vulnerabilityscanning tools such as Nessus. Automation/Scripting (Aria Automation, GitLab CI/CD, Python, Shell Scripting, PowerShell). Enterprise Storage experience including More ❯
stakeholders to ensure secure integration and deployment processes. Deliver technical security documentation and support design reviews. Provide input into the design and rollout of vulnerabilityscanning solutions. Present and defend security design decisions to both technical peers and senior leadership. Required Skills & Experience: Proven experience in network infrastructure … design, development, and security integration. Strong background in designing and documenting security solutions for complex systems. Hands-on knowledge of vulnerabilityscanning tools and implementation strategies. Demonstrated ability to evaluate and adapt to new technologies under tight deadlines. Skilled in communicating complex security concepts effectively to diverse audiences. More ❯
stakeholders to ensure secure integration and deployment processes. Deliver technical security documentation and support design reviews. Provide input into the design and rollout of vulnerabilityscanning solutions. Present and defend security design decisions to both technical peers and senior leadership. Required Skills & Experience: Proven experience in network infrastructure … design, development, and security integration. Strong background in designing and documenting security solutions for complex systems. Hands-on knowledge of vulnerabilityscanning tools and implementation strategies. Demonstrated ability to evaluate and adapt to new technologies under tight deadlines. Skilled in communicating complex security concepts effectively to diverse audiences. More ❯
flow, system administration, OSI model, defense-in-depth, and security elements Experience analyzing logs, network data, and attack artifacts for incident investigations Experience with vulnerabilityscanning solutions Knowledge of enterprise SIEM platforms (e.g., Sentinel, Nitro, ArcSight, QRadar, Splunk) Understanding of mobile technology, OS (Android, iOS, Windows), and Cloud More ❯
Hands-on experience analysing high volumes of logs, network data (e.g. Netflow, FPC), and other attack artifacts in support of incident investigations Experience with vulnerabilityscanning solutions In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. Sentinel, Nitro/McAfee Enterprise More ❯
established playbooks Escalating complex incidents to Tier 2 Incident Response Teams Reviewing and developing security controls in a growing technical environment Triaging and reviewing vulnerabilityscanning reports, providing feedback to technical teams Reviewing secure configurations and feeding back for remediations Generating recurring security reports for stakeholders Providing feedback … a degree in Cyber Security, Computer Science, Networks, etc. Professional qualifications from organizations like CompTIA, ISACA, etc. Technical qualifications such as cloud computing, SIEM, vulnerability management, etc. Experience (Nice to have) Understanding of concepts like cloud computing, incident management, risk management, information security (CIA), phishing, ransomware, IDAM, JML processes … and skilled IT professionals, committed to digital innovation. We excel in areas like Secure-by-Design, cloud computing, network design, rapid application development, cyber vulnerability mitigation, and intelligence systems. We offer independent consultancy and champion open-source technologies. A word on UK Security Clearance Due to the secure nature More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
Corriculo Ltd
other security products Experience with Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don More ❯
of a team responsible for protecting IT infrastructure through technical expertise and strategic planning, ensuring security controls are properly implemented and maintained. Responsibilities include: VulnerabilityScanning & Reporting Endpoint Security Incident Management & Tickets System Hardening Change Work Participation in Regular Meetings Documentation Qualifications and skills required include experience with … security frameworks such as Government Functional Standard 007, vulnerability management, endpoint protection, incident response, system hardening, and compliance auditing. Clearance Requirements: Security Clearance to Start SC Security Clearance for Role DV What we offer: Contributory Pension Scheme Private Medical Insurance 33 days Annual Leave Flexible benefits including health schemes More ❯
for this role, you must be a Sole British with active MOD DV clearance or be eligible to obtain it. Key areas of expertise: Vulnerabilityscanning and reporting Endpoint security management Security incident response and ticket handling System hardening Change management support Active participation in team meetings Clear More ❯
for this role, you must be a Sole British with active MOD DV clearance or be eligible to obtain it. Key areas of expertise: Vulnerabilityscanning and reporting Endpoint security management Security incident response and ticket handling System hardening Change management support Active participation in team meetings Clear More ❯
external influences, weak adherence to security protocols and human error Proactively (and as a team) protect customer environments from vulnerabilities utilising tools such as vulnerabilityscanning Change control Complete understanding of the reasons underpinning change control, adhering to all required processes Support the team by creating CRQs, adhering More ❯
Portsmouth, Hampshire, Portchester, United Kingdom
ARM
external influences, weak adherence to security protocols and human error Proactively (and as a team) protect customer environments from vulnerabilities utilising tools such as vulnerabilityscanning Change control Complete understanding of the reasons underpinning change control, adhering to all required processes Support the team by creating CRQs, adhering More ❯