Although not essential, the following skills are desired by the client: Understanding of authentication protocols (SAML, OAuth, etc.) Familiarity with regulatory frameworks (SOX, GDPR, HIPAA) Knowledge of directory services (LDAP, Active Directory) Business analysis certification (CBAP, PMI-PBA) Experience with JIRA, Confluence, ServiceNow Exposure to cloud IAM (AWS, Azure AD) If you are interested in this opportunity, please apply now More ❯
Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong More ❯
of IT Security standard methodologies Understanding of the OSI Reference Model and network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S Experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools Hands-on experience with IDS/IPS technologies and threat hunting activities Strong analytical More ❯
of IT Security standard methodologies Understanding of the OSI Reference Model and network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S Experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools Hands-on experience with IDS/IPS technologies and threat hunting activities Strong analytical More ❯
Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong More ❯
Security standard methodologies. * Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. * Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. * Hands on experience with IDS/IPS technologies and threat hunting activities. * Strong More ❯
Systems, and Applications. Proficient in IT Security best practices. Strong understanding of the OSI Reference Model and network communication protocols (DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S). Experienced with Security Information Event Monitoring Tools and Network Packet Capture tools. Hands-on experience with IDS/IPS technologies and threat hunting. Strong analytical skills and More ❯
Employment Type: Contract
Rate: £45.00 - £85.00/hour In IR35 (PAYE & Umbrella) available
Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong More ❯
Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong More ❯
Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong More ❯
Gloucestershire, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
systems for security events and anomalies. Maintain comprehensive documentation of IAM configurations. Strong understanding of IAM concepts (authentication, authorization, provisioning, SSO, MFA, PAM). Familiarity with directories (Active Directory, LDAP). Knowledge of industry security frameworks and compliance (e.g., NIST, ISO 27001). Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and More ❯
and Security Center on both Linux/Unix and Windows based environments Responsible for installing and configuring Nessus Agents Secure Tenable server an Enable SSL Integrating Tenable products with LDAP, Active Directory, and CyberArk. Responsible for the creation of tenable Organizations, Repositories, and Scan Zones. Responsible for local and LDAP based user management. Responsible for configuring tenable plugins/feeds More ❯
Security standard methodologies Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools Hands-on experience with IDS/IPS technologies and threat-hunting activities Experience More ❯
Systems, and Applications. Proficient in IT Security best practices. Strong understanding of the OSI Reference Model and network communication protocols (DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S). Knowledgeable in Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation, and impact. Excellent communication skills for liaising with business and suppliers. Desirable More ❯
Employment Type: Contract
Rate: £45.00 - £85.00/hour In IR35 (PAYE & Umbrella) available
Security standard methodologies Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools Hands-on experience with IDS/IPS technologies and threat-hunting activities Experience More ❯