Sentinel, Swimlane) and their use in aggregating and analyzing security event data. Knowledge of EDR solutions such as Defender for Endpoint and Carbon Black. Proficiency with network analysis tools (Wireshark) to perform PCAP analysis. Desirable Certifications: CompTIA Network+ CompTIA Security+ CompTIA CySA+ Cisco CCNA Microsoft SC-200 Ways of working: Focusing on Clients and Customers. Working as One NCC. Always More ❯
network analyst with a strong understanding of protocols. They should have a proven track record of utilising a range of network analysis tools, including common external tools such as wireshark and tcpdump, and potentially tooling. DV Clearance is required for this role. Responsibilities Using their knowledge of network analysis, work towards advancing Research’s protocol analysis and digital currency efforts … these requirements, they will be required to work in a client environment, for a minimum of four days a week. Skills: Network analysis, including using common tools such as wireshark Protocol analysis and strong understanding of protocols Behavioural Strong analytical and problem-solving skills Excellent communication skills, highly enthusiastic team player If you are interested in hearing more, please apply. More ❯
the ESN Service. Performance root cause analysis using multiple sources of data primarily from: UE Application events/L1/L2/L3 information Drive Test UE logs/Wireshark covering OSI L1-L7. but also from: ENodeB and CN protocol analysis. 3rd Party OTT (Over The Top) protocol traces. Coverage data. Capacity data. OSS performance data Change logs. Outline … optimisation of 4G based RAN Macro network. Proven experience in defining and understanding KPI definitions, formula and measurements of radio networks Able to analyse in depth, drive test logs, wireshark traces and protocol analysers traces for 4G networks Good Knowledge of LTE parameters & timers. Familiarity with test software & devices (Nemo/TEMs/Accuver) & post processing tools (Actix). Experience More ❯
Have a working knowledge of vulnerability assessment or penetration-testing techniques. What we are looking for Familiarity with a variety of tools (e.g. IDEs, debuggers, source control, Ghidra, FRIDA, Wireshark, VMs) and techniques (e.g. fuzzing, scripting, code injection). Intermediate to advanced understanding of computing principles (e.g. stack/heap distinction, compiled/interpreted languages). Proficiency with at least More ❯