CrowdStrike Falcon, RoboShadow, Microsoft Defender, ThreatLocker Evaluate and onboard new security technologies; liaise with vendors Lead technical onboarding of cyber tools for both internal and client deployments Incident Response & ThreatManagement: Develop and own incident response playbooks Act as the lead escalation point for live security incidents Analyse alerts, threat intelligence, and forensic data from platforms like … Microsoft Defender, Conditional Access, MFA, Secure Score Familiarity with frameworks: Cyber Essentials Plus, ISO 27001, PCI DSS Incident response experience with real-world investigations Understanding of identity security, patch management, and user awareness training Excellent written and verbal communication - able to simplify complex concepts for clients Confident producing clear documentation and reporting Desirable Skills: Certifications: Security+, SC-200, CEH More ❯
CrowdStrike Falcon, RoboShadow, Microsoft Defender, ThreatLocker Evaluate and onboard new security technologies; liaise with vendors Lead technical onboarding of cyber tools for both internal and client deployments Incident Response & ThreatManagement: Develop and own incident response playbooks Act as the lead escalation point for live security incidents Analyse alerts, threat intelligence, and forensic data from platforms like … Microsoft Defender, Conditional Access, MFA, Secure Score Familiarity with frameworks: Cyber Essentials Plus, ISO 27001, PCI DSS Incident response experience with real-world investigations Understanding of identity security, patch management, and user awareness training Excellent written and verbal communication - able to simplify complex concepts for clients Confident producing clear documentation and reporting Desirable Skills: Certifications: Security+, SC-200, CEH More ❯
years post-qualification experience. Must have in-depth knowledge of IT risks and audit methodologies, including data analytics capabilities Previous experience and coverage of: IT security, including access management, perimeter security, and threat management. Solid IT general controls (ITGCs) knowledge. IT outsourcing arrangements, including service delivery, supplier management, and data security considerations. IT governance, strategy, and operating More ❯