out! https://www.nccgroup.com/uk/The Opportunity The successful candidate will be involved in each aspect of the attack chain from socialengineering and initial access, evading best-in-class EDR products, through lateral movement and achieving objectives set by the client. Operational Security and more »
software, authentication systems, log management, content filtering, etc.An excellent understanding of security approaches: ISMS, risk analysis and assessments, the CIA triad, attack vectors including socialengineering, cryptography, confidentiality issues and cyber security incident response best practices, including triage and chain of custodyProactively identifies areas for improvement, shares lessons more »
anti-virus software, authentication systems, and log management. knowledge of security approaches including ISMS, risk analysis and assessments, the CIA triad, attack vectors (including socialengineering), cryptography, confidentiality issues, and best practices for cyber security incident response (including triage and chain of custody). to proactively identify areas more »