developments and solution testing. * Line manage a small team of SOC Analysts. * Excellent knowledge of cybersecurity technologies, trends and strategy - including cyberthreat landscape, adversary methodologies and cyber defence strategies * Previous experience working in a lead role in one of the following security areas: CSOC … Analyst, Malware Researcher, Threat Analyst - 3 years minimum * Expert understanding and demonstrable experience of security log analysis, security analytics, EDR, SIEM and other monitoring platforms * Advanced understanding and demonstrable experience of network architecture, IT infrastructure, applications, and systems. Including an understanding of cloud services such as Azure and AWS … for example the MITRE Attack Framework * Lead role experience of cyber incident response and management * Proven experience in integrating cyberthreat intelligence into the CSOC process People Source Consulting Ltd is acting as an Employment Business in relation to this vacancy. People Source specialise in more »
developments and solution testing. * Line manage a small team of SOC Analysts. * Excellent knowledge of cybersecurity technologies, trends and strategy - including cyberthreat landscape, adversary methodologies and cyber defence strategies * Previous experience working in a lead role in one of the following security areas: CSOC … Analyst, Malware Researcher, Threat Analyst - 3 years minimum * Expert understanding and demonstrable experience of security log analysis, security analytics, EDR, SIEM and other monitoring platforms * Advanced understanding and demonstrable experience of network architecture, IT infrastructure, applications, and systems. Including an understanding of cloud services such as Azure and AWS … for example the MITRE Attack Framework * Lead role experience of cyber incident response and management * Proven experience in integrating cyberthreat intelligence into the CSOC process People Source Consulting Ltd is acting as an Employment Business in relation to this vacancy. People Source specialise in more »
of data pipelines using NiFi, ensuring efficient data flow and integrity. Signature Updates: Implement and manage signature updates using Elastic/Kibana to enhance threat detection capabilities. System Administration: Perform system administration tasks on specific cyber defence applications and systems, including installation, configuration, maintenance, troubleshooting, backup, and … restoration. Threat Response Coordination: Coordinate with SOC Engineers and CTI Analysts to develop and implement rules and signatures in response to new or observed threats within the network environment. Operating System Administration: Conduct system administration for various operating systems, including Unix/Linux, IOS, Android, and Windows. Required Skills … commute/relocate for work. Technical Skills: Proficient in data pipeline management using NiFi. Experienced in using Elastic/Kibana for signature updates and threat detection. Strong system administration skills for operating systems including Unix/Linux, IOS, Android, and Windows. Collaboration: Ability to effectively coordinate with SOC Engineers more »
The team also work reactively to respond to alerts and incidents, making rapid decisions and recommendations given risk and business context. The team gather threat intelligence and vulnerability data, configure proactive monitoring rules, and are part of the handover to live for all new digital systems. The SecOps lead … risk. Main Duties: Use understanding of digital systems and attack frameworks to apply theory to practice. Be aware of the current cyberthreat landscape and industry best practices and standards. Lead on scope and health of data gathering such as event monitoring and vulnerability scanning Interpret threat intelligence and vulnerability data to prioritise findings Act as technical escalation for analyst on alerts, incidents, investigations, including hands on experience Carry out threat modelling and risk assessments Working with architects and interpreting designs to ensure SecOps handover during new service go live. Recommendation and implement improvements to more »
requirements and recommend appropriate Akamai solutions. Design, configure, and implement Akamai CDN and cloud security services to enhance website performance and protect against cyber threats. Conduct performance analysis and optimization to ensure that web applications meet or exceed performance objectives. Troubleshoot technical issues related to Akamai products and more »
candidate will be responsible for the support, deployment, and management of network infrastructure and security solutions, ensuring seamless connectivity and robust protection against cyber threats. This role requires a professional with strong technical expertise, problem-solving abilities, and the capacity to work in a fast-paced environment. Key more »
SPEN are looking for a Cyber Governance, Risk & Assurance Analyst to join their cyber team based in Glasgow Job Title: Cyber Risk and Assurance Analyst Business: Scottish Power Energy Networks Location: St Vincent Street Glasgow/hybrid style working Duration: 12-18 month contract … with possibility of extension or permanency Rate: Inside IR35, Umbrella and PAYE options available Job Purpose Statement Reporting into the Cyber Security Architecture Lead, Cyber Security Architect Consultant role is a critical role in ensuring delivery against the strategic security vision and development and maintenance of … NIS regulations. Drive the adoption of secure designs, patterns, and best practices. Keeps abreast of the latest intelligence from sources of cyberthreat information and briefs stakeholders with actionable information. Criteria Cyber/Information risk assessment experience Ability to influence key technical and non-technical more »
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Experis
skills to design, build and protect enterprise systems, applications, data, assets and people. Provide services to safeguard information, infrastructures, applications and business against CyberThreats Develop telemetry solution to give full observability of malicious traffic. Investigate strategic XDR solution. Secure 3rd Party SaaS configuration - Uplift security posture management … s degree in Information Technology, Computer Science or a related discipline. Previous experience in the financial sector Good awareness of Enterprise Security and Cyber Security as problem domains Demonstrates excellent judgment for balancing between rapid development, long-term code maintainability and supportability. Believes in the power of and more »
financial sector. Key Responsibilities Design, build, and protect enterprise systems, applications, data, assets, and personnel. Safeguard information, infrastructures, applications, and business operations against cyber threats. Develop telemetry solutions for observing malicious traffic. Investigate strategic XDR solutions. Enhance security posture management for 3rd Party SaaS configurations. Collaborate with global … Preferred Qualifications Bachelor's degree in IT, Computer Science, or a related field. Experience in the financial sector. Strong awareness of enterprise and cyber security challenges. Excellent judgement in balancing rapid development with long-term maintainability. Commitment to writing automated tests as part of development. Additional Requirements Right more »
Cyber Defence Analyst - DV Clearance Required! The Cyber Defence Analyst will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threatsmore »