Lake data management and log ingestion infrastructure in collaboration with Cyber Defense Engineering. Evaluate, validate, tune, and sunset where necessary detection capabilities Maintains operational guidelines, diagrams, and documentation for security detection and response. Incident Response Support: Collaborate with the incident response team to ensure rapid detection and containment of cyber threats. Provide technical expertise and guidance to develop detection … use cases during high-severity security incidents. Continuously improve detection and response processes based on lessons learned from incidents. Other duties may be assigned as needed to address new security threats facing the enterprise. Provides off hour support as needed for security administration, detection, and response activities. Threat Intelligence Integration: Leverage threat intelligence to enhance detection capabilities … skills you need to be able to do the job) Ability to: Proven track record of building scalable organizations that have world class threat detection capabilities. Technical proficiency performing security investigations at scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for More ❯
This Cybersecurity Specialistrole is offered by a prominent organisation in the technology and security sector and is designed for graduates or early-career professionals interested in starting a career in cybersecurity and information protection. As a Cybersecurity Specialist, you will be part of a dedicated team working to safeguard critical systems, networks, and data against cyber threats. This … for individuals with a strong interest in cybersecurity, technology, and risk management who want to take their first step into a fast-growing field. Key Responsibilities: Monitor and analyse security alerts to identify potential threats. Assist in investigating and resolving security incidents. Support vulnerability assessments and penetration testing activities. Help implement security policies, procedures, and compliance standards. … Learn and apply industry best practices, tools, and frameworks (e.g., ISO 27001, NIST, CIS). Requirements: Bachelors degree in Cybersecurity, Computer Science, Information Technology, or a related field. Strong analytical and problem-solving skills with keen attention to detail. Basic understanding of networking, operating systems, and informationsecurity principles. Familiarity with security tools (e.g., firewalls, SIEM More ❯
clients enterprise architecture across IT, Operational technology, business systems. Develop and maintain a holistic view of their enterprise ecosystem, ensuring technology investments align with business goals, operational resilience and informationsecurity & regulatory compliance. My client is going through a companywide digital transformation. Define, evolve, and govern the enterprise architecture framework encompassing IT systems, operational technology, data flows, applications More ❯