to detect and investigate potential Security and Service Incidents occurring within the monitored networks. Main Duties Monitor, triage, analyse and investigate alerts, log data and network traffic using the ProtectiveMonitoring platform and Internet resources to identify cyber-attacks/security incidents. Categorise all suspected incidents in line with the Security Incident policy Recognise potential, successful, and unsuccessful More ❯
motivated individuals to join our team. What you'll be doing: What you'll be doing: Monitor, triage, analyse and investigate alerts, log data, and network traffic using the ProtectiveMonitoring platform and Internet resources to identify cyber-attacks/security incidents. Categorise all suspected incidents in line with the Security Incident policy. Recognise potential, successful, and unsuccessful More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Apacheix
and Information Assurance standards Experience of MoD security process and practices (Relevant JSPs and Defcons) Technical understanding of IT security, Cloud Security, System Hardening, Boundary Controls, Crypto, PKI and ProtectiveMonitoring UK resident and right to work with (or ability to attain) SC vetting status (or higher) Experience utilising agile delivery methodologies and processes Willingness to travel to More ❯
Huntingdon, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
and technical controls Work with the engineering teams to ensure systems remain at the required security posture against baseline requirements Develop and document system security baselines. Work with the ProtectiveMonitoring engineering team to ensure logs are forward to the SIEM capability Work with the customer and appropriate agencies to develop new policies, design processes, and procedures, and More ❯
and operational life cycle of a system Provision of authoritative specialist security advice in Risk and threat-based mitigation to system designs Control frameworks such as NIST, ISO, CIS Protectivemonitoring, Authentication and authorization best practices. Develop excellent working relationships with key stakeholders, peers and subordinates. Communicating effectively verbally and in writing, demonstrated through: Effectively explain complex technical More ❯
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Logiq
non-technical stakeholders. Your experience will include: Expertise in Defensive Cyber, Enterprise Architecture, Secure Systems, Network & Cloud Security, System Hardening, Cryptographic Controls (PKI, Data at Rest/In Transit), ProtectiveMonitoring, and Security Auditing. Strong understanding of the ISO 27000 series, NIST Cyber Security & Risk Management Frameworks, NCSC CAF, and other industry standards. Familiarity with NCSC guidance and More ❯