Your new company A reputable telecommunications client is looking for a ThreatIntelligence Specialist to join the wider team. You must have hands-on experience of working in this field at least a minimum of 4-5 years+ in post. You will be working with the wider team … ensuring delivery of the ThreatIntelligence Programme within the business unit, delivery of services and products provided by Group Security. Where services are delivered by external providers, ensuring delivery of the ThreatIntelligence services as per requirements of business unit. Your new role As a diverse … the resolution of advanced or complex security threats against client as well as advising on best practice countermeasures and detections. Identifying business unit Priority Intelligence Requirements that enable the business unit to conduct its business continuously in a secure manner. Analysis of information across Strategic, Operational and Tactical arenas more »
Our client a leading Government body are seeking to recruit a Cyber Security Analyst for a 6 month initial contract and you will bring the below skill set: 2 days a week on site is 100% must You will use your experience and in-depth knowledge of cyber … and technical briefs for management and external stakeholders as required. You will design and conduct regular exercises to test incident response procedures. * Lead the Cyber Security Operations Centre (CSOC) to monitor and defend the multiple networks against all cyber threats, providing expert advice to junior SOC staff. * Lead … to enable the timely and effective response to, and management of, incidents, alarms, notifications, calls and other activities related to the CSOC and new cyber threats. * Work with Engineering teams in relation to new developments and solution testing. * Line manage a small team of SOC Analysts. * Excellent knowledge of more »
Our client a leading Government body are seeking to recruit a Cyber Security Analyst for a 6 month initial contract and you will bring the below skill set: 2 days a week on site is 100% must You will use your experience and in-depth knowledge of cyber … and technical briefs for management and external stakeholders as required. You will design and conduct regular exercises to test incident response procedures. * Lead the Cyber Security Operations Centre (CSOC) to monitor and defend the multiple networks against all cyber threats, providing expert advice to junior SOC staff. * Lead … to enable the timely and effective response to, and management of, incidents, alarms, notifications, calls and other activities related to the CSOC and new cyber threats. * Work with Engineering teams in relation to new developments and solution testing. * Line manage a small team of SOC Analysts. * Excellent knowledge of more »
triage security alerts escalated from Tier 1 SOC analysts, determine severity and potential impact of the incident, and follow the triage process until closure. *Threat Analysis: Conduct in-depth analysis of security events to identify malicious activities, tactics, techniques, and procedures used by threat actors. *Security Incident Handling … Security Tool Management: Managing and configuring security tools, specifically Microsoft Sentinel and the Microsoft Defender suite including Defender for Cloud and Microsoft 365 Defender. *ThreatIntelligence: Utilizing threatintelligence feeds and sources to stay up-to-date with the latest threats and vulnerabilities. *Collaboration: Collaborating with … in Kusto Query Language (KQL). Experience with the creation, configuration and use of Playbooks, Notebooks and Workbooks. Strong understanding of advanced cybersecurity concepts, threat landscape, and attack methodologies. Demonstrated experience in conducting in-depth incident analysis, threat hunting, and forensic investigations. People Source Consulting Ltd is acting more »
At least 5+ years of relevant experience in Cyber Security Operations Experience of Incident Response Experience operating within a large-scale enterprise network Has thrived in fast-paced, high-pressure environments Experience with AWS/AliCloud security domains Excellent Windows (Workstation and Server) and Linux skills Excellent Cyber Security problem and troubleshooting ability Broad understanding of ThreatIntelligence, Vulnerability Management, Data Privacy, Cloud, Identity, Compliance, Risk, Process, Technologies. Qualifications within IT Security (eg, SANS Blue Team, CISSP, GCIH, GCIA, GMON) are desirable but not required In-depth knowledge and understanding of how to handle and … respond to security incidents as part of a specialised incident response team Strong working knowledge and thorough understanding of Protective Monitoring, Vulnerability Monitoring, and ThreatIntelligence Knowledge and understanding of a wide variety of security technologies and processes Up-to-date knowledge of current exploit techniques, vulnerability disclosures more »
believes in continuous innovation, is curious and relentless in finding a better way every day Develop and maintain a deep understanding of the latest threat landscape, tactics, techniques, and procedures (TTPs) used by attackers Develop and maintain expertise in threat detection tools and technologies, including SIEM systems, EDR … a part of a Team to improve our security stance and implement your insights into rules Continuously evaluate and improve the effectiveness of existing threat detection and response measures Key skills/knowledge/experience: Experience in development of cybersecurity attacks detection rules in complex corporate environments The ability … to communicate with a broad spectrum of stakeholders effectively from cybersecurity analysts to threatintelligence experts A track record of successful delivery in penetration tests and red team exercises as an ethical hacker A high level of integrity, result-oriented approach, and composure under pressure Strong communication, influencing more »
IT are currently working with a leading consultancy within the Public sector who are look for a SIEM engineer who has Elasticsearch experience. Responsibilities: Threat Detection and Analysis: Utilize your expertise in Elastic to monitor, detect, and analyze potential security threats and incidents. Incident Response: Lead or assist in … and trends. Elasticsearch Expertise: Leverage your proficiency in Elastic tools and technologies to optimize search queries, build dashboards, and develop custom alerts for proactive threat detection. Collaboration: Work closely with other members of the SOC team, as well as cross-functional teams, to share insights, collaborate on incident response … and improve overall security posture. Continuous Improvement: Stay abreast of the latest cybersecurity trends, vulnerabilities, and threatintelligence to contribute to the continuous improvement of security processes and procedures. more »
systems, especially Elastic, to configure, monitor, and manage security alerts and incidents. Leverage Elastic's capabilities to analyze and correlate security data for rapid threat detection and response. Elastic Stack Proficiency: Demonstrate deep knowledge and hands-on experience with the Elastic Stack (Elasticsearch, Logstash, Kibana) for security data analysis … and threat intelligence. KQL Query Development: Create advanced Kusto Query Language (KQL) queries to proactively identify potential security threats within Azure environments. Harness the power of data analytics to enhance our security posture and provide Real Time threat intelligence. Networking Security: Implement and maintain network security controls and … and maintain syslog Servers to collect and analyze logs from various systems and devices. Identify and investigate security incidents leveraging syslog data to enhance threat detection and incident response capabilities. Azure Security Expertise: Work closely with Azure security tools and services to enhance cloud security, including Identity and Access more »