how traffic flows within a network. • Advanced knowledge of Windows and Linux operating environments, including standard commands, file systems, and user authentication mechanisms. • Competence in using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis; some exposure to additional analysis tools such as basic XDR platforms. • Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to More ❯
how traffic flows within a network. * Advanced knowledge of Windows and Linux operating environments, including standard commands, file systems, and user authentication mechanisms. * Competence in using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis; some exposure to additional analysis tools such as basic XDR platforms. * Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to More ❯
Livingston, West Lothian, Scotland, United Kingdom
FPSG Connect
how traffic flows within a network. * Advanced knowledge of Windows and Linux operating environments, including standard commands, file systems, and user authentication mechanisms. * Competence in using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis; some exposure to additional analysis tools such as basic XDR platforms. * Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to More ❯
ITIL, ISO 27001, ISO and other best practice standards Desirable Experience/Skills: In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g., ArcSight, Splunk, Nitro/McAfee Enterprise Security Manager, QRadar, LogLogic). Understanding of event and incident investigations and incident response in a 24/7 SOC environment. Proficiency in configuring More ❯
applicant for the role of a SOC Analyst will: Have come from either cyber analyst or SOC L1 background Possess hands on experience of: SIEM tools for example, Splunk, ArcSight, Rapid7 or QRadar EDR tooling for example: SentinelOne, CrowdStrike or Carbon Black Vulnerability tools for example: Nessus or Qualys Threat Intelligence tools, SOAR platforms and Firewalls Have strong operating More ❯