Strong interpersonal and presentation skills. Strong analytical skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of VulnerabilityScanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of More ❯
in basic shell scripting, creating Snort rules, or other log-searching query languages and methods. Must be confident to handle common security incidents independently. Must have good understanding of VulnerabilityScanning and management as well as Ethical Hacking (Penetration Testing) Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of More ❯
systems (Windows, OS X, Linux). Proficiency in shell scripting, creating Snort rules, or other log-searching query languages. Confidence in handling common security incidents independently. Good understanding of VulnerabilityScanning, Management, and Ethical Hacking (Penetration Testing). Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work with minimal supervision. Willingness to work More ❯
SIEM tools. Strong verbal and written English communication skills. Excellent interpersonal and presentation skills. Strong analytical skills. Good understanding of network traffic flows, normal vs. suspicious activities. Knowledge of VulnerabilityScanning, Management, and Ethical Hacking (Penetration Testing). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines such as Incident, Problem, and Change More ❯
bottlenecks - e.g. Grafana, Datadog Networking Concepts - Knowledge in TCP/IP, DNS, VPN, load balancing, and firewalls Security Best Practices - Implementing security in DevOps (e.g., IAM policies, network security, vulnerabilityscanning, encryption) Security Protocols - Experience with modern security protocols and practices - e.g. Zero Trust, OAuth, OpenID, TLS/SSL Agile Methodologies - Experience with Agile, Scrum, and Kanban DevOps More ❯
Burton-on-Trent, Staffordshire, UK Hybrid / WFH Options
PHD Communications
hardware, and software. Technologies · Windows Server – 2019,2022 · Hyper V Manager · Failover Cluster Manager · Microsoft Azure/Office 365/Intune/MS Teams · Backup & Replication (Veeam) · SQL Server · Vulnerabilityscanning (Nessus) Essential Skills · Firewall management (Sophos advantageous) · Microsoft Multifactor Authentication · Demonstrable skills in both on-perm and cloud infrastructure · Network Configuration, Routers, Internet, VPN's, WiFi, Ethernet … range includes Healthcare, Waste Management, Pharmaceuticals, Electrical Wholesalers, Telecoms, Breweries, Retail...... PHD Communications team collectively can offer experience of consultancy services for document & print and mail management, electronic billing & scanning bureau services, and operational process improvement. Our mission is to provide the most cost effective, high quality services to all our clients, in a safe and rewarding environment for More ❯
brand/reputation of working with large police forces across the UK and assisting with Technical Cyber Security consulting side and offering services such as outsourced SOC, penetration testing, vulnerabilityscanning to name a few. All candidates should make sure to read the following job description and information carefully before applying. This role is to join the commercial More ❯
brand/reputation of working with large police forces across the UK and assisting with Technical Cyber Security consulting side and offering services such as outsourced SOC, penetration testing, vulnerabilityscanning to name a few. This role is to join the commercial team to leverage current client base and offer technical Cyber Security solutions but mainly to create More ❯