Coventry, West Midlands, United Kingdom Hybrid / WFH Options
Maclean Moore Ltd
SOC ANALYST LOCATION: COVENTRY (HYBRID) RATE: £550 A DAY INSIDE IR35 LENGTH: 6 MONTHS WITH SCOPE TO EXTEND Key responsibilities: Alert monitoring, Security Events analysis, Log Management Microsoft Sentinel Security Incident response management Manage, tune, and optimise SIEM tool (Sentinel), which includes evaluating existing rules, filters, events and use … controls such as IDS/IPS, endpoint security, vulnerability management, data loss prevention (DLP) Handling escalated security incidents/issues. Responsible for deep dive analysis of escalated incidents, threat hunting & Malwareanalysis Plan and provide required support for external/3 rd party teams in the scenario more »
need for escalation It would be great if you had: Knowledge of; Cloud, on-prem, SaaS, PaaS, IaaS environments Security incident response, code/malwareanalysis Strong coding skills CISSP-ISSEP (Information Systems Security Engineering Professional) Other Cyber/information Security qualification (e.g. CISSP, CCSP, CCNA, SABSA) If more »
need for escalation It would be great if you had: Knowledge of; Cloud, on-prem, SaaS, PaaS, IaaS environments Security incident response, code/malwareanalysis Strong coding skills CISSP-ISSEP (Information Systems Security Engineering Professional) Other Cyber/information Security qualification (e.g. CISSP, CCSP, CCNA, SABSA) If more »
programmer will be able to transfer skillsets across languages. Technical proficiency in at least one of these areas: network security/traffic/log analysis Linux and/or Mac/Unix operating system forensics Linux/Unix disk forensics (ext2/3/4, HFS, and/or … APFS file systems), advanced memory forensics, static and dynamic malwareanalysis/reverse engineering, advanced mobile device forensics Advanced experience in industry computer forensic tools such as X-Ways, EnCase, FTK, Internet Evidence Finder (IEF)/AXIOM, TZWorks, and/or Cellebrite Advanced experience in preservation of digital … forensics certificates such as: CREST certified registered intrusion analyst (CRIA), CREST certified network intrusion analyst (CCNIA), CREST certified host intrusion analyst (CCHIA), CREST certified malware reverse engineer (CCMRE), GIAC Certified (Network) Forensic Analyst (GCFA, GNFA more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
mitigate risks. Incident Lifecycle Management: Overseeing incidents from the moment of detection, through the containment and eradication stages, to the final resolution. Post-Incident Analysis: Conducting detailed investigations post-incident to understand the root cause and to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on … the organization's security systems to detect any suspicious activities early. Threat Analysis: Evaluating potential threats and vulnerabilities to ensure that the organization is prepared to defend against them. Strategic Defense Implementation: Putting in place robust security measures to protect the organization's information assets. Cross-Team Coordination: Collaborating … such as CSA, CompTIA Security+/CySA+, GIAC GSEC, GCIH or other comparable degree or other relevant experience. IT skills Network Security System Administration MalwareAnalysis Security Information and Event Management (SIEM) Incident Response Tools Professional Competencies Solid grasp of cybersecurity concepts, including threat identification, risk assessment, and more »
to and understood by cybersecurity operations teams. As one of the team s specialists on cloud technologies, you will work to mature the Attack Analysis team in how we secure, monitor and respond to incidents in both private and public cloud environments. You will work with internal security engineering … and cloud engineering teams to ensure that Attack Analysis requirements are represented in the architecture, design and implementation of cloud environments. You'll help design, write and automate detection and incident response processes and tools for public and private cloud environments. Working in cybersecurity takes passion for technology, speed … our products. Working with your internal team, as well as technologists and innovators across our global network, your ability to identify threats, provide intelligent analysis and positive actions will stop crimes and strengthen our data. As a member of the Attack Analysis team, you will fit into a more »
offices may be required from time to time which provides opportunity for international travel. Your team also carries out incident triage and investigation including malwareanalysis and some digital forensic work. If these are not areas that you are already experienced in, then this is a great opportunity … a managed hosting environment/ISP beneficial Demonstrable Cloud (AWS is preferable) expertise both from a policy/standards/delivery perspective and threat analysis and compliance reporting Experience using SumoLogic SIEM or similar SIEM solution Workplace Security experience including Google Workplace, Windows 10 and MacOS Any experience of more »
. Knowledge of cloud service models (e.g., IaaS, PaaS and SaaS) and how those models can limit digital forensics and incident response. Knowledge of malwareanalysis concepts and methodologies. Knowledge of adversarial tactics, techniques, and procedures. Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow more »
conclusion and take ownership within the team. Managing development and improvements required for detection engineering and associated technologies. Responsible for the operational and threat malwareanalysis for the group. Providing security input and for maintaining relationships with the Service Management function in relation to change management, problem management … device logs, etc. Knowledge and experience of enterprise grade technologies including operating systems, databases, and web applications. Knowledge and experience of performing network traffic analysis for identifying any developing patterns. Ability to assist with knowledge transfer and mentoring/up skilling of junior team members Security Analysis for more »
. Knowledge of cloud service models (e.g., IaaS, PaaS and SaaS) and how those models can limit digital forensics and incident response. Knowledge of malwareanalysis concepts and methodologies. Knowledge of adversarial tactics, techniques, and procedures. Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Delaney & Bourton
up to date and effectively protecting the organisations assets. Conduct regular system and network security assessments to identify vulnerabilities and mitigate them. Penetration testing analysis and remediation activities. Monitor security access and access control to prevent unauthorised access, data breaches, and cyber-attacks. Create technical documentation to assist colleagues … experience in a cybersecurity role within a reputable business. Strong knowledge of cybersecurity principles, best practices, and technologies. Experience or demonstrable knowledge in log analysis and PCAP analysis. A solid understanding in the approach threat actors take to attacking a network, phishing, port scanning, web application attacks, DDoS, lateral … movement. Experience with security monitoring, incident response, and vulnerability management. Understanding of malwareanalysis, intrusion detection/prevention systems, and endpoint security solutions. Ability to analyze and interpret security logs and data. Role can work hybrid, for a super flexible business. Ideally candidates would commute to their HQ more »