Strong interpersonal and presentation skills. Strong analytical skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of VulnerabilityScanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of More ❯
in basic shell scripting, creating Snort rules, or other log-searching query languages and methods. Must be confident to handle common security incidents independently. Must have good understanding of VulnerabilityScanning and management as well as Ethical Hacking (Penetration Testing) Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of More ❯
systems (Windows, OS X, Linux). Proficiency in shell scripting, creating Snort rules, or other log-searching query languages. Confidence in handling common security incidents independently. Good understanding of VulnerabilityScanning, Management, and Ethical Hacking (Penetration Testing). Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work with minimal supervision. Willingness to work More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
ECS Resource Group Ltd
those related to physical security. Maintain and enhance the security posture of servers for both existing and new applications, on-premise and in Azure cloud environments. Monitor and manage vulnerabilityscanning tools, address findings, and coordinate remediation efforts with infrastructure and development teams. Support the development, testing, and annual validation of disaster recovery and backup plans. Create and … To Be Considered for This Role, You Will Need: Cybersecurity Experience: Demonstrated experience in implementing and managing security controls across hybrid environments. Familiarity with endpoint protection, threat detection, and vulnerability management tools. Incident Response & Problem Solving: Ability to respond swiftly and effectively to security incidents. Skilled in structured analysis and incident remediation to ensure rapid recovery. Threat Awareness & Risk More ❯