is just as well regarded. Strong working knowledge of SIEM, SOAR, EDR tooling is essential, as is an understanding of the MITREATT&CK framework. Experience in CNI/Defence sectors is also desirable.This is a fantastic opportunity for an experience, hands on professional, looking more »
Portsmouth, Hampshire, United Kingdom Hybrid / WFH Options
J & C Associates Ltd
SIEM/Incident SME (Active DV Clearance) ELK (Elastic, Logstash, Kibana) Tanium MITREATT&CK Cyber Kill Chain Location: Hybrid onsite in one of the following locations 2/3 days per week - Corsham, Portsmouth or Northallerton Duration: 6 months We are Global IT Recruitment … creation, their deployment and tuning. Experience as a mentor/coach to Junior Analysts Your profile Previous experience of utilising the MITREATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Skilled in using virtualisation software. Knowledge of key security frameworks more »
IPS, NAC, AD, DLP, Web Filtering, Email Filtering, Behavioural Analytics. Knowledge of adversarial tactics, techniques, procedures (TTPs) and industry standard frameworks (MitreATT&CK). Experience working within a regulated environment, preferably Energy sector Critical National Infrastructure (CNI more »
tools. Strong understanding of common security vulnerabilities and threats specific to AI/ML, including adversarial attacks, prompt injection, data poisoning and the MITRE ATLAS framework. Hands on experience using security assessment and threat modelling tools and techniques to evaluate AI/ML systems and identify potential security more »
Maidstone, Kent, United Kingdom Hybrid / WFH Options
NewDay
cloud platform/DevOps environment. Developing cyber incident response playbooks and practices in line with industry standard frameworks and standards, e.g. MitreAtt&ck, NIST. SIEM technologies, and security logging and monitoring good practice for cloud platforms. And would love you to know or learn more »
tools. Strong understanding of common security vulnerabilities and threats specific to AI/ML, including adversarial attacks, prompt injection, data poisoning and the MITRE ATLAS framework. Hands on experience using security assessment and threat modelling tools and techniques to evaluate AI/ML systems and identify potential security more »