Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM Identity Access ManagementSIEMand MDR VA Vulnerability Analysis and mitigation DLP Data loss prevention PKI Public key infrastructure Ability to guide engineering teams through the deployment where required more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM Identity Access ManagementSIEMand MDR VA Vulnerability Analysis and mitigation DLP Data loss prevention PKI Public key infrastructure Ability to guide engineering teams through the deployment where required more »
a security operations centre (SOC) and responding to security alerts. Experience in creating response playbooks and handling escalations. Additional experience in EDR, M365 security, SIEM, Vulnerability management, MITRE attack framework, and Incident response. Strong stakeholder engagement skills and the ability to promote a secure mindset within an organisation. Previous experience more »
ISO27001/17 and STRIDE Threat Modelling Framework. Understanding of general security practices such as encryption, IAM, PAM, penetration testing, container security, securityinformationandeventmanagement etc. and supporting technologies. Ability to take ownership and work proactively . Organised with a proven ability to prioritise workload, meet deadlines, andmore »
interactions between diverse authentication platforms, both on-site and remote. Knowledge of client and server Firewalling technologies and capabilities. Knowledge of securityeventmanagement (SIEM), event correlation and analysis technologies. Knowledge of data encryption technologies. Strong knowledge of Intrusion Detection and Intrusion Prevention technical capabilities. Knowledge of web filtering andmore »
interactions between diverse authentication platforms, both on-site and remote. Knowledge of client and server Firewalling technologies and capabilities. Knowledge of securityeventmanagement (SIEM), event correlation and analysis technologies. Knowledge of data encryption technologies. Strong knowledge of Intrusion Detection and Intrusion Prevention technical capabilities. Knowledge of web filtering andmore »
and communication Important Knowledge Cybersecurity Capability Maturity Model (C2M2) and NIST Cyber Security Framework (CSF) Current awareness of the market for data analytics andSIEM platforms, including emerging leaders and Network security implementations (e.g host-based IDS, IPS), including their function and placement Cyber defence andinformationsecurity policies, procedures more »
and communication Important Knowledge Cybersecurity Capability Maturity Model (C2M2) and NIST Cyber Security Framework (CSF) Current awareness of the market for data analytics andSIEM platforms, including emerging leaders and Network security implementations (e.g host-based IDS, IPS), including their function and placement Cyber defence andinformationsecurity policies, procedures more »
Cyber Security Experience of working in environments using ISO27001 or Cyber Essentials Plus would be beneficial Strong knowledge of security tooling and technologies including SIEM, vulnerability management, DLP etc Good knowledge and understanding of public Cloud platforms (e.g. AWS and Azure) Good understanding of the current threat landscape Excellent communication more »
Bradford, Yorkshire, United Kingdom Hybrid / WFH Options
Caraffi Limited
policies, and standards. Evaluate risk and compliance for large-scale solutions, focusing on environments with 5000+ endpoints, and implement security infrastructure solutions such as SIEM, Access Governance, SASE, and Endpoint Protection. Adhere to informationsecurity standards (eg, ISO 27001, ISF, NIST), industry security guidance (OWASP & CIS), and risk assessment frameworks more »
Oversee incident response, threat detection, and mitigation efforts You'll be someone with: A good understanding of monitoring frameworks eg MITRE ATT&CK andSIEM technologies eg Microsoft Sentinel An interest in automation of Security operation function including artificial intelligence An understanding of Microsoft security product portfolio CISSP/CISM more »
VMware, Messaging (Exchange 2016+), IIS, SQL 2012+, Linux appliances, architecture and OS, backup technologies, Citrix, and Cisco networking. understanding of security technologies such as SIEM, firewalls, intrusion detection/prevention systems, anti-virus software, authentication systems, and log management. knowledge of security approaches including ISMS, risk analysis and assessments, the more »
Maintain incident response procedures and documentation Desirable Skills: - Experience with Microsoft technologies (Windows Server, Active Directory, Azure) - Knowledge of Elasticsearch and Linux - Familiarity with SIEM tools - Strong analytical and problem-solving skills more »
on Sentinel, IAC, and SecOps. Previous experience working in start-ups or software development companies is highly desirable. Proficiency with Microsoft Sentinel and other SIEM platforms. Strong experience with Infrastructure as Code (IAC) tools such as Terraform, CloudFormation, or ARM. Hands-on experience with security tools and technologies In-depth more »
and Dynamic) Threat Hunting and Threat Intelligence (MITRE ATT&CK) Cloud Security Penetration Testing Security Automation (SOAR) Qualifications: Knowledge and experience in the following: SIEM Tools Vulnerability Management EDR Software Intrusion Detection/Prevention Systems Web Proxies Network Security & Firewalls Programming – Nice to have! More details: Permanent role 2 days more »
s cyber security measures; responds to actual penetration attempts by malicious parties Key Accountabilities Perform forensic analysis and gather evidence Correlation monitoring using multiple SIEM technologies Assist in gathering forensic data and physical equipment Act as incident responder for potential incident identified Ability to work under pressure In-depth understanding more »
/or SOC teams Experience in a leadership position within a Security Operations Center preferred. Significant demonstrated experience working with SecurityInformationEventManagement (SIEM), Continuous Monitoring, Intrusion Detection/Prevention Systems (ID/PS), Network Traffic Analysis, Incident Response, Endpoint Security Systems, Digital Forensics, WLAN Monitoring, and/or more »
and risk levels Develop and maintain SecOps documentation, policies, and procedures Maintain cybersecurity solutions across systems, applications, and infrastructure Investigate security alerts from the SIEM tool and take appropriate incident response actions. Communicate with stakeholders about security incidents, detailing actions taken. Support the Cyber Incident Response Manager by triaging events more »
Cloud and/or any experience on AppOmni • Strong understanding of industry security framework and benchmarks such as NIST and CIS • Previous experience with SIEM tools and integration • Security Engineering experience • Excellent analytical and troubleshooting skills across complex systems. • Able to articulate complicated processes to non-technical stakeholders. • Experience creating more »
London, England, United Kingdom Hybrid / WFH Options
Nexus Jobs
CISO) Need an individual with a strong hands on network andsecurity background Cisco networking Cisco firewalls (Firepower/Threat Detection) Palo Alto firewalls SIEM experience ( Logarithm desirable) Web proxy (Forcepoint desirable) Governance skills Policy writing/reviewing Reporting KPI monitoring Certifications like CCNP/CISM would be desirable but more »
specifically around policies, security practices, and risk management methodologies. Technologies: Advanced proficiency with AuditBoard is preferred. Experience with other key cybersecurity technologies such as SIEM, firewall management, and intrusion detection systems is highly regarded. Education: Bachelor's degree in computer science, informationsecurity, or a related field; a graduate degree more »
Directory, Defender 365, Sentinel and Azure Virtual Desktop and Intune. Proven work experience as a Cybersecurity Analyst or similar role. Understanding of firewalls, proxies, SIEM, antivirus and IDPS concepts. Ability to identify and mitigate network vulnerabilities and explain how to avoid them. Knowledge of security frameworks and standards, such as more »
NCSC) Cyber Assessment Framework (CAF) and ISA/IEC 62443, ISO/IEC 27001/27002, and GDPR. Working knowledge of security technologies including SIEM, SOAR, EDR, AV, IDS/IPS, NAC, AD, DLP, Web Filtering, Email Filtering, Behavioural Analytics. Knowledge of adversarial tactics, techniques, procedures (TTPs) and industry standard more »
Information Security. In-depth knowledge of informationsecurity frameworks, standards, and best practices. (ISO27001) Hands-on experience with security technologies and tools, such as SIEM, IDS/IPS, firewalls, and encryption. Strong analytical and problem-solving skills, with the ability to make decisions under pressure. Excellent communication and interpersonal skills more »
tiers when necessary. Vulnerability Scanning: scan systems for vulnerabilities. and manage vulnerabilities discovered during scans. Security Tool Management: Configure and manage security tools (e.g., SIEM, IDS/IPS, antivirus). Ensure proper functioning and timely updates. Reporting and Documentation: Document incidents, actions taken, and findings. Prepare incident reports for further more »