Sevenoaks, Kent, South East, United Kingdom Hybrid / WFH Options
Constant Recruitment
other administrative tasks as needed. Key Technologies and Skills: Microsoft Windows Server Active Directory Linux IBM operating systems Microsoft Excel QUALYS PALO ALTO CORTEX SIEM tools (e.g., Splunk, ArcSight, LogRhythm) Patching and Update ManagementSecurity Monitoring Automation tools (e.g., Ansible, Puppet, Chef) Scripting languages (e.g., Python, PowerShell, Bash) Compliance frameworks more »
of achieving and exceeding sales targets in the SaaS, technology, or software sectors. - Experience selling any of the following: Security Tooling such as Cyber, SIEM, Code Analysis, Cloud, such as Cloud Infra or Cloud monitoring, Developer Tools, CI/CD or Gitlab, Github etc or a range of other technical more »
vectors, current threats, and remediation strategies. Proficient in patch lifecycle management using tools such as SCCM, Qualys, and Patch my PC. Experience working with SIEM providers, SOC, and other third parties in the security space. Benefits A fantastic pension Life assurance Great holidays An award-winning flexible benefits package Volunteering more »
integrations. Deep understanding of Google Chronicle's capabilities and applications in threat intelligence, with knowledge of how to conduct analyses within SIEM (SecurityInformationandEventManagement) and SOAR (Security Orchestration, Automation, and Response) platforms. Strong foundation in cybersecurity principles, practices, and technologies, including data management specific to cybersecurity applications. … CISSP, GCIH, or Google Cloud Professional Security Engineer are desirable. Skills in data onboarding, quality control, and ensuring high-quality, non-duplicative data for SIEMand SOAR platforms. Preferred Qualifications Include: Master's degree in Cybersecurity, Computer Science, or related field preferred Advanced certifications such as CISSP, CISM, OSCP, andmore »
Vulnerability Analysis, reviewing as-built documentation, security assessments and improvement programmes. Monitoring and managing a 3rd party Security Operations Centre (SOC), reviewing and monitoring SIEM inputs/outputs with the SOC team and ensuring that appropriate logs are ingested and monitored. Building policies and procedures to enhance the controls andmore »
Maintain incident response procedures and documentation Desirable Skills: - Experience with Microsoft technologies (Windows Server, Active Directory, Azure) - Knowledge of Elasticsearch and Linux - Familiarity with SIEM tools - Strong analytical and problem-solving skills more »
andsecurity monitoring Understanding of threat modelling Investigation experience into Informationand Cyber security incidents Broad technical understanding covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware, SSL and others Experience and knowledge of NIST, COBIT, GCIA, GCIH, GCFA etc. This is an excellent opportunity more »
Information Security. In-depth knowledge of informationsecurity frameworks, standards, and best practices. (ISO27001) Hands-on experience with security technologies and tools, such as SIEM, IDS/IPS, firewalls, and encryption. Strong analytical and problem-solving skills, with the ability to make decisions under pressure. Excellent communication and interpersonal skills more »
s cyber security measures; responds to actual penetration attempts by malicious parties Key Accountabilities Perform forensic analysis and gather evidence Correlation monitoring using multiple SIEM technologies Assist in gathering forensic data and physical equipment Act as incident responder for potential incident identified Ability to work under pressure In-depth understanding more »
Directory, Defender 365, Sentinel and Azure Virtual Desktop and Intune. Proven work experience as a Cybersecurity Analyst or similar role. Understanding of firewalls, proxies, SIEM, antivirus and IDPS concepts. Ability to identify and mitigate network vulnerabilities and explain how to avoid them. Knowledge of security frameworks and standards, such as more »
to technical and nontechnical people.Experience engaging 3rd party security specialists to provide additional assurance.Experience and knowledge with IT Security software e.g. NGAV, EDR, XDR, SIEM etc.Be willing to deploy to clients sites at short notice to direct recovery and rebuild activity and strategy.Ability to Build successful working relationships with team more »
systems with a mix of both BAU and project work. Your role will involve the following, Using your knowledge of security tools such as SIEM, Firewalls and Cloud Security to monitor systems Providing Windows Server and Network Support Assess and respond to external threat intelligence reports Support ISO27001, Cyber Essentials more »
Tier 1 Analysts to improve detection/analytical capabilities within the SOC and monitor SOC Tier 1 Analyst performance. Qualifications: Skills: Proficiency in using SIEM tools, especially Microsoft Sentinel and the Microsoft Defender suite. Proficiency in Kusto Query Language (KQL). Experience with the creation, configuration and use of Playbooks more »
London, England, United Kingdom Hybrid / WFH Options
iO Associates - UK/EU
week, although if you're based further afield, they mentioned there is some flexibility. They're looking for the following experience: Strong understanding of SIEM systems Experience working with IT SecurityManagement, Policies, Procedures, Standards and Guidelines Experience with the following tech (they don't expect you to have experience more »
experience Confident advising on secure operating system and network device configuration standards Organised and proactive Excellent communication skills Knowledge of tools such as IDS, SIEM, Secure Gateways etc is ideal Experience evaluating threats and vulnerabilities Ability to create reports on cyber security vulnerabilities, organisational posture, and other indicators of cyber more »
provided and completing control frameworks Qualifications Who we're looking for: A good understanding of general security practices such as encryption, IAM, securityinformationandeventmanagement etc. and supporting technologies Prior experience in delivering highly technical and innovative security engineering/design products You'll also enjoy collaborating with more »
in previous Incident Response function environments. Experience with tools for open-source investigation (WireShark, TCPDump, Netflow, etc.); network defence monitoring technologies (IDS/IPS, SIEM, Firewalls, etc.); and sandboxing technologies for static and dynamic malware analysis (IDA Pro, REMnux, etc.). Working knowledge of leading a technical team and mentoring more »
Leeds, England, United Kingdom Hybrid / WFH Options
Fruition IT
Proven experience in deploying new projects, services and features to cloud. Ability to support SaaS platforms such as Mimecast, Varonis, Identity Management, Cisco Umbrella, SIEMand SASE services, as well as traditional on-premises servers and Windows operating systems, VMware and Storage Knowledge of device and mobility managementand applied more »
security tools. Familiarity with intrusion detection/prevention systems (IDS/IPS), firewalls, and anti-virus software. Experience with securityinformationandeventmanagement (SIEM) systems. Strong analytical and problem-solving skills. Excellent communication and teamwork abilities. Relevant certifications such as CISSP, CEH, or CompTIA Security+ are a plus. Preferred more »
will also be given a great opportunity to develop your technical skills and grow in a dynamic, successful company. You will need: Knowledge of SIEM tools e.g Microsoft Sentinel, Google Chronicle. Excellent knowledge of EDR tools e.g CrowdStrike, SentinelOne, Microsoft Defender. Experience providing BAU support. Experience in a SOC environment. more »
cyber defence hardware. • Support Junior Analysts to manage SOC systems. • Previous experience of Enterprise ICS/network architectures and technologies • Experience and knowledge of SIEM solutions; having the ability to identify use cases and their creation, their deployment and tuning. • Experience as a mentor/coach to junior analysts Your … C2M2) • Excellent communication skills • Experience of writing Defence/Government documentation Desirable Qualifications: • Broad Spectrum Cyber Course (SANS SEC401 or SEC501 or equivalent) • SIEM Design, Architecture and Analyst Course (SANS SEC455 or SEC555 or equivalent) • Advanced Analyst Course (SANS SEC503 or equivalent more »
analyse, and respond to cyber threats. Understanding of networking technology Cyber security service trends compliance requirements in enterprise organisations Core cyber security products including SIEM, Zero Trust and NDR/XDR products. Core network routing and switching protocols. Knowledge of network performance and optimisation and services Please apply ASAP to more »
Manchester Area, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
etc Excellent understanding of cybersecurity trends Ability to interpret customer landscape and challenges Strong presentation and client-facing skills Desired Skills: Knowledge across EDR, SIEM, Vulnerability Management Operational experience with security technologies Existing relationships in Manchester area Self-motivation and ability to work autonomously Job Specifics: This is a hybrid more »
on bids and/or large and complex changes. Solid understanding of a variety of network and routing protocols. Experience with Network Management or SIEM designs, tooling or support. Demonstrable troubleshooting skills and approach to defect resolution. SDWAN experience is advantageous Working Pattern (Mon-Fri, Shifts, on-call) This is more »
to the Security Operations Manager, your key tasks may involve: Managing vulnerability scanning tools - SAST, SCA, IaC, Containers & DAST for all Egress products Investigate SIEM alerts, working with the Engineering and Operations teams to resolve issues Managing vetting applications, supplier onboarding andsecurity awareness programmes Plan and manage 3rd party … Reviewing vulnerabilities found in code analysis tools and liaising with development/engineering to prioritise the resolution SOC investigation of security events in a SIEM (e.g. Azure Sentinel, Splunk etc) A basic knowledge and desire to learn python, to automate day to day tasks. You should have good prioritisation andmore »