protocols, threat actors, and attack vectors. Ability to analyse complex data and deliver actionable insights. Familiarity with scripting (Python or similar) andsecurityautomation (SOAR). Understanding of threat intelligence and its operational use. Desirable Skills: Experience in software engineering or penetration testing. Exposure to Splunk ES and development of More ❯
partners and customers. Familiarity with current security technologies including one or more of the following: Next-Generation Anti-virus, Endpoint Detection andResponse (EDR), SecurityOrchestration, Automation, andResponse (SOAR), Security Information and Event Management (SIEM, particularly Splunk and/or Splunk Cloud), firewalls, and other core security products. (e.g. More ❯
for: Proven experience in cyber incident response leadership , ideally within an enterprise or MSSP setting A strong understanding of SOC workflows, forensics, SIEM/SOAR tooling, andresponse frameworks (e.g. NIST, MITRE ATT&CK) Ability to write and implement incident response playbooks and processes from scratch Confident communicator, capable of More ❯
within an MSP environment, with a strong understanding of managed security services. Technical Expertise: Hands-on experience with security technologies such as SIEM, EDR, SOAR, vulnerability and exposure management tooling, threat intelligence, and data security solutions. Pre-Sales & Consulting Experience: Proven experience in a pre-sales, solution consulting, or technical More ❯
and tender proposals. Managing and updating sales-related Bill of Materials. Key Requirements: A technical background in Cyber-Securityand Networking. Knowledge of SIEM, SOAR, or Managed Security Services is advantageous, particularly in areas like DDoS protection, WAF, IDAM, EDR, MDM, or Vulnerability Management. Multi-vendor knowledge, e.g. Fortinet, Palo More ❯