Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Delaney & Bourton
log analysis and PCAP analysis. A solid understanding in the approach threat actors take to attacking a network, phishing, port scanning, web application attacks, DDoS, lateral movement. Experience with security monitoring, incident response, and vulnerability management. Understanding of malware analysis, intrusion detection/prevention systems, and endpoint security more »
London, England, United Kingdom Hybrid / WFH Options
The Fortune Group (Recruitment)
and Monitoring/Alerting service AntiVirus/AntiMalware for End User devices Antivirus/Malware/Ransomware etc for Product/Platform DDos Protection Access Management/Review (IAM) Threat modelling Setup Bug Bounty program Application Security/Testing Brand monitoring (domans etc) Whitelist client access Encryption in more »
South East London, London, United Kingdom Hybrid / WFH Options
The Fortune Group (Recruitment) Limited
and Monitoring/Alerting service AntiVirus/AntiMalware for End User devices Antivirus/Malware/Ransomware etc for Product/Platform DDos Protection Access Management/Review (IAM) Threat modelling Setup Bug Bounty program Application Security/Testing Brand monitoring (domans etc) Whitelist client access Encryption in more »
and demonstratable experience across core routing and WAN technologies including: IPSec VPNs, WAN transports, Data Centre Interconnects (DCI), Internet routing (peering and transit) and DDoS mitigation solutions. You'll also have knowledge of: SD-WAN and NFV technologies, Content Delivery Networks (CDNs), Colo/Carrier Neutral Facility (CNF more »
Finance or related field preferred.Good knowledge of key global IP Networks & Service providers, Ethernet service offerings, CDN and DDoS servicesHave a good understanding of the respective strengths and weaknesses of such Providers.Work Experience RequiredGood knowledge of all Microsoft more »
LDAP/AD, etc. Advanced knowledge in Privileged Access Management (PAM) and associated tools. High proficiency in Vulnerability and Compliance Management, as well as DDOS protection. Hands-on experience in engineering Cyber Security solutions for cloud platforms (e.g., AWS, Azure) utilizing open-source tools, DevOps, and automation (e.g., Zabbix, ELK more »
skills related to the design and implementation of secure networking solutions. Experience with network security products including Firewalls, IDS/IPS, WAF, DDoS mitigation solutions. Akamai experience is desirable. In this role, you will be at the forefront of shaping secure connections that drive our global more »
PCAP analysis Good level of understanding in the approach threat actors take to attacking a network; phishing, port scanning, web application attacks, DDoS, lateral movement. Knowledge in Windows and/or Linux operating systems, how to investigate them for signs of compromise. Ability to demonstrate the more »