Strong interpersonal and presentation skills. Strong analytical skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of VulnerabilityScanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of More ❯
in basic shell scripting, creating Snort rules, or other log-searching query languages and methods. Must be confident to handle common security incidents independently. Must have good understanding of VulnerabilityScanning and management as well as Ethical Hacking (Penetration Testing) Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of More ❯
systems (Windows, OS X, Linux). Proficiency in shell scripting, creating Snort rules, or other log-searching query languages. Confidence in handling common security incidents independently. Good understanding of VulnerabilityScanning, Management, and Ethical Hacking (Penetration Testing). Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work with minimal supervision. Willingness to work More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
ECS Resource Group Ltd
those related to physical security. Maintain and enhance the security posture of servers for both existing and new applications, on-premise and in Azure cloud environments. Monitor and manage vulnerabilityscanning tools, address findings, and coordinate remediation efforts with infrastructure and development teams. Support the development, testing, and annual validation of disaster recovery and backup plans. Create and … To Be Considered for This Role, You Will Need: Cybersecurity Experience: Demonstrated experience in implementing and managing security controls across hybrid environments. Familiarity with endpoint protection, threat detection, and vulnerability management tools. Incident Response & Problem Solving: Ability to respond swiftly and effectively to security incidents. Skilled in structured analysis and incident remediation to ensure rapid recovery. Threat Awareness & Risk More ❯
Work across our growing toolset to monitor the entire infrastructure and react to real time threats as they occur. Intrusion detection and illegal activity monitoring. Assist with penetration and vulnerability testing. Implement network, firewall, patching and other technical security matter. Ensure up to date patch management is undertaken. Assist with security audits and documentation. Assist in ensuring that vulnerability … Excellent written and verbal communication skills. A thorough understanding of the network infrastructure fundamentals A good working knowledge of various security technologies such as: active directory, anti-malware protection, vulnerability scanners, intrusion detection/prevention, system hardening along with some knowledge of MS-Windows server operating systems A willingness and ability to learn about new technologies and solutions and More ❯
brand/reputation of working with large police forces across the UK and assisting with Technical Cyber Security consulting side and offering services such as outsourced SOC, penetration testing, vulnerabilityscanning to name a few. This role is to join the commercial team to leverage current client base and offer technical Cyber Security solutions but mainly to create More ❯