VPNs, firewalls, and cloud platforms (AWS, Azure, GCP). Expertise in Microsoft Sentinel, Cisco Splunk or Palo Alto QRadar, and KQL. Proven skills in threat detection, incident response, and forensic analysis. Knowledge of SOAR tools (especially Palo Alto XSOAR or similar). Familiarity with compliance standards: ISO 27001, NIST, CIS, GDPR, HIPAA. Bonus: scripting/automation skills (Python, PowerShell More ❯
Incident Responder, supporting complex investigations into cyber security incidents. Conduct proactive threat hunting to detect and neutralize emerging threats. Monitor and analyze logs via SIEM, EDR, and network traffic analysis tools for potential attack indicators. Investigate security incidents, including malware infections, phishing attacks, and unauthorized access attempts. Develop and enhance incident response playbooks, ensuring alignment with evolving threats. Analyze … threat intelligence sources to identify new attack vectors and adversary tactics. Provide forensicanalysis and malware reverse engineering to assess security incidents. Collaborate with IT, Risk, and Compliance teams to ensure regulatory compliance and security best practices. Produce timely reports on incident trends, threat intelligence insights, and response actions. Patriciate in training sessions and tabletop exercises to improve … and incident reporting. Deep knowledge of cyber-attack techniques, including phishing, malware, ransomware, lateral movement, and data exfiltration. Strong hands-on experience with SIEM, EDR, IDS/IPS, and forensicanalysis tools. Expertise in threat cyber security frameworks such as MITRE ATT&CK and Cyber Kill Chains. Strong analytical and problem-solving skills, with an investigative mindset to More ❯
testing. Developing and implementing security policies and procedures. Monitoring network traffic for unusual activity and potential threats using SOC/SIEM solutions. Responding to security breaches and carrying out forensic investigations. Ensuring compliance with industry standards and regulations, including ISO 27001 and GDPR. Delivering security training and awareness programs for both clients and staff. Mentoring junior security analysts to … Expertise in Microsoft 365, SharePoint, Azure architecture, security, and Entra. Proficiency in security tools and technologies, including firewalls, identity management, and layered security stacks. Experience in incident response and forensic analysis. Excellent problem-solving, analytical, and communication skills. Relevant certifications (e.g., CISSP, CEH, CompTIA Security+) are advantageous. Benefits: Opportunity to contribute to a growing MSP with a strong client More ❯
to potential threats in real-time. - Develop, implement, and fine-tune detection rules and correlation logic to improve threat detection capabilities. - Conduct in-depth investigations of security incidents, perform forensicanalysis, and coordinate incident response activities. - Maintain and optimize security information and event management systems and other security tools used in the SOC. - Collaborate with other teams to More ❯
and implement security monitoring and logging strategies. Investigate and analyse security incidents, including identifying root causes, determining the scope of impact, and taking appropriate containment and remediation actions. Perform forensicanalysis to identify and investigate suspicious activity. Automate security tasks and workflows to improve efficiency and effectiveness. Google is proud to be an equal opportunity workplace and is More ❯
large data sets for reporting, hunting, and anomaly detection Incident Management - Detect, document, investigate, and resolve security incidents in an efficient manner Endpoint Forensics - Construct meaningful incident timelines from forensic artifact analysis Counter Measures - Ability to design and implement preventative and corrective controls to counteract emerging threats Proactive Threat Hunting - Develop and execute focused plans to discover advanced … threats that evade traditional security controls Behavioral Analysis - Develop and implement criteria to identify anomalous user behavior leading indicating insider threat activity Intrusion Detection - Develop and tune network anomaly control capability to produce reliable actionable data Threat Hunting - Proactively search for unknown threats within the environment. Preferred Knowledge and Experience 3+ years of relevant experience Deep understanding of networking More ❯
the cybersecurity team to integrate DLP measures with broader security initiatives. Your responsibilities: Monitor DLP Systems – Oversee and manage DLP alerts to prevent unauthorized data access and leakage. Incident Analysis – Investigate DLP security incidents, provide reports, and recommend corrective actions. Policy Implementation & Maintenance – Assist in deploying and updating DLP policies, configurations, and security controls. User Support & Training – Provide technical … DLP technologies, threats, and security trends. Desirable skills/knowledge/experience: Experience with Cloud Security – Exposure to cloud-based DLP solutions (e.g., Microsoft 365, AWS, Google Cloud). Forensic Investigation Skills – Ability to conduct forensicanalysis of data security incidents and breaches. Project Management & Process Improvement – Ability to optimize DLP workflows and security processes Change Management More ❯
the cybersecurity team to integrate DLP measures with broader security initiatives. Your responsibilities: Monitor DLP Systems – Oversee and manage DLP alerts to prevent unauthorized data access and leakage. Incident Analysis – Investigate DLP security incidents, provide reports, and recommend corrective actions. Policy Implementation & Maintenance – Assist in deploying and updating DLP policies, configurations, and security controls. User Support & Training – Provide technical … DLP technologies, threats, and security trends. Desirable skills/knowledge/experience: Experience with Cloud Security – Exposure to cloud-based DLP solutions (e.g., Microsoft 365, AWS, Google Cloud). Forensic Investigation Skills – Ability to conduct forensicanalysis of data security incidents and breaches. Project Management & Process Improvement – Ability to optimize DLP workflows and security processes Change Management More ❯
Experience with security frameworks and compliance standards (e.g., ISO 27001, NIST, GDPR). Familiarity with penetration testing and vulnerability assessment tools. Hands-on experience with security incident response and forensicanalysis ECS Recruitment Group Ltd is acting as an Employment Agency in relation to this vacancy. More ❯
large data sets for reporting, hunting, and anomaly detection Incident Management - Detect, document, investigate, and resolve security incidents in an efficient manner Endpoint Forensics - Construct meaningful incident timelines from forensic artifact analysis Counter Measures - Ability to design and implement preventative and corrective controls to counteract emerging threats Proactive Threat Hunting - Develop and execute focused plans to discover advanced … threats that evade traditional security controls Behavioral Analysis -Develop and implement criteria to identify anomalous user behavior leading indicating insider threat activity Intrusion Detection - Develop and tune network anomaly control capability to produce reliable actionable data Threat Hunting - Proactively search for unknown threats within the environment. Knowledge and Experience University degree in related discipline 1+ years of relevant experience More ❯
Overview The Manager- Digital Forensics & Expert Services role, leads, conducts, and assists in data preservation and digital investigations in complex litigation cases by leveraging knowledge of digital forensic tools, technology and protocols related to the collection and management of electronically stored information (ESI) from a wide variety of data sources. A focus of this role will be supporting the … EMEAA team. Responsibilities Serve as the primary point of contact for clients during forensic collection or forensicanalysis engagements, explaining the process and providing regular updates. Work closely with clients to understand their needs, scope of investigation, and collection requirements. Educate clients on data preservation strategies to minimize the risk of data spoliation or loss during investigations. … Perform investigative analysis activities for a variety of digital devices, computers, storage media, servers, networks, cloud-based services, and mobile devices. Perform remote or onsite collections in a defensible manner from a wide array of ESI, including: computers, mobile devices, media storage devices, servers, networks, social media, and cloud-based services. Attend Consilio office forensic lab to leverage More ❯
to find improvements. It is up to the leads build on that desire and passion. Opportunities to work on complex challenges, while using expertise in coding, algorithms, complexity/forensicanalysis, technical architecture, and various system design strategies to address those challenges. Why Lloyds Banking Group Like the modern Britain we serve, we're evolving. Investing billions in More ❯
to find improvements. It is up to the leads build on that desire and passion. Opportunities to work on complex challenges, while using expertise in coding, algorithms, complexity/forensicanalysis, technical architecture, and various system design strategies to address those challenges. Why Lloyds Banking Group Like the modern Britain we serve, we're evolving. Investing billions in More ❯
activities, and collaborate with global departments to create and improve processes that can easily adapt to the constantly evolving nature of music licensing. You will be responsible for the forensicanalysis of income received against income expectations across all major revenue streams and instigate back claims, adjustments and supplemental payments where required. You will have the opportunity to … input and influence the creation of reports that support Income Tracking, including exception & variance reporting, as required for the local offices. Here you'll get to: Conduct income tracking analysis for major revenue sources and support ad hoc requests from local offices. Work as an integrated member of a future-facing administration team. Evolve ways of working to take … our income tracking to the next level. Identify and make claims for shortfalls in income based on analysis of incoming statements. Provide Adhoc analysis for the business on income received from societies, DSPs, affiliates and third parties. Monitor accurate deal level expectations across all income streams. Liaise with counterparts across all affiliate offices, suppliers and sub-publishers to More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
CMS UK
access to critical information. You will be joining a fast growing legal services team at one of the largest global law firms that manages cutting edge technology for its forensicanalysis, review and distribution of electronic and physical evidence for the firm's clients during the investigation and disclosure stages of litigation or arbitration cases.This team is involved More ❯