ongoing maintenance and monitoring. the team in demanding environments, provide constructive feedback, and foster individual and team development. as the escalation point for security response incidents, both during and outside business hours. the Cyber Security Incident process/procedure and IncidentResponse Team, conducting war games … and incident scenarios to prepare the IT department for real incidents. forensic investigations and reporting following cyber security incidents, involving third-party specialists if necessary. informed about the latest security threats, principles, techniques, and protocols, including new vulnerabilities, and act on them as needed. within an ITIL V3 & ISO27001 … approaches including ISMS, risk analysis and assessments, the CIA triad, attack vectors (including social engineering), cryptography, confidentiality issues, and best practices for cyber security incidentresponse (including triage and chain of custody). to proactively identify areas for improvement, share lessons learned, and encourage the same behavior in more »
reviews, and adherence to processes and procedures. Develop and manage the security cloud migration process, identifying and addressing any gaps. Manage the Cyber Security Incident process and the IncidentResponse Team, conducting training exercises to prepare for real incidents. Proactively handle complaints and escalations, resolving issues before … they escalate. Act as the escalation point for security response incidents Conduct one to one performance reviews with team members to support their development. Maintain and enhance the security of IT services, coordinating with third parties for patching, vulnerability resolution, and system hardening. Create and update security documentation to … management, and content filtering. Solid grasp of security approaches including ISMS, risk analysis and assessments, the CIA triad, social engineering, cryptography, confidentiality issues, and incidentresponse best practices. Operate within an ITIL V3 and ISO27001 service delivery framework. Manage relationships with stakeholders. Work to meet defined Service Level more »
in the Microsoft Stack and SIEM tools will be crucial in maintaining and enhancing our client's security posture. Key Responsibilities: Security Monitoring and IncidentResponse: Monitor and analyse security events using SIEM tools Investigate security incidents and breaches, and implement containment and remediation actions Develop and maintain … incidentresponse procedures Client Interaction and Training: Provide security training to clients on tools such as Lookpoint and Check Point Conduct regular security awareness sessions to ensure clients are up-to-date with best practices and threat landscapes Offer guidance and support to clients on implementing security measures … not required) Experience: Proven experience as a SOC Analyst or in a similar role within managed services Strong experience with SIEM tools and security incident management Proficiency with the Microsoft Stack, including Azure, M365, and Defender Experience with technologies outside SIEM, such as Palo Alto, Fortinet or Check Point more »
Leeds, England, United Kingdom Hybrid / WFH Options
Cyber Security Jobsite
of a 24/7 operation with four shift teams working in a standard rotation. They are responsible for utilising the SOC's Security Incident and Event Management (SIEM) toolsets to detect and investigate potential Security and Service Incidents occurring within the monitored networks. These roles require a minimum … using the Protective Monitoring platform and Internet resources to identify cyber-attacks/security incidents. Categorise all suspected incidents in line with the Security Incident policy Recognise potential, successful and unsuccessful intrusion attempts and compromises through reviews and further analysis of relevant event detail and incident summary information. … Write up high quality security incident tickets using a combination of existing knowledge resources and independent research. Assist with remediation activities and conduct permitted remediation (or support customer stakeholders) to inhibit cyber-attacks, clean up IT systems and secure networks against repeat attacks. Produce security incident review reports more »
global leaders with 120 offices spanning 50 countries worldwide Get in touch if you’re looking for your next opportunity! Responsibilities: Assist with security incident management and response activities General day-to-day support on managing and responding to security alerts from systems and end users Perform daily … formal document creation, such as the creation of reports or procedures Detailed knowledge of: Microsoft O365 environment Threat Intelligence analysis and best practice Security IncidentResponse processes, procedures, and best practices Disaster Recovery and Business Continuity principles Event and log analysis Salary: They offer a great salary up more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
CIIH Ltd T/A Headway Recruitment
standards, including Cyber Essentials, ISO 27001, 27002, Data Protection Act, and GDPR. In-depth knowledge of the Microsoft O365 environment, threat intelligence analysis, Security IncidentResponse processes, disaster recovery, and business continuity principles. Familiarity with security testing principles, vulnerability scanning, risk identification, resolution, and reporting. Experience in formal … document creation, such as reports or procedures. Key Responsibilities include but not limited to: Assist with security incident management and response activities, emphasizing cyber threats. Conduct daily, weekly, and monthly security checks, reconciliation, and compliance checks. Handle security alerts and inquiries from systems and end users. Complete client more »
Leeds, England, United Kingdom Hybrid / WFH Options
Fruition IT
Security Risk Analyst to join them as they proceed on their transformation journey! In this position, you will play a crucial role in the IncidentResponse Team to assess risk, carry out security assessments both internally and with suppliers against industry standard security controls. You'll be working more »
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Confidential
technical and process skills, as well as an architectural view and implementing security by design. Other essentials: Background that covers cyber technology, security operations, incidentresponse, architecture, and training. Experience in implementing technology such as SIEM, XDR, SOAR, etc. Background in Financial Services or other regulated industries (desired more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
McGregor Boyall Associates Limited
Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security Expertise in securing virtualized environments, including threat detection, incidentresponse, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management tools, and more »