Strong interpersonal and presentation skills. Strong analytical skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of VulnerabilityScanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of More ❯
in basic shell scripting, creating Snort rules, or other log-searching query languages and methods. Must be confident to handle common security incidents independently. Must have good understanding of VulnerabilityScanning and management as well as Ethical Hacking (Penetration Testing) Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of More ❯
systems (Windows, OS X, Linux). Proficiency in shell scripting, creating Snort rules, or other log-searching query languages. Confidence in handling common security incidents independently. Good understanding of VulnerabilityScanning, Management, and Ethical Hacking (Penetration Testing). Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work with minimal supervision. Willingness to work More ❯
tooling is optimised Provide advice and support to business units on security best practice and control implementation What We’re Looking For Hands-on experience with security tooling (EDR, vulnerabilityscanning, access control) Familiarity with Security frameworks such as NIST, PCI-DSS, and GDPR Experience working with Microsoft environments (O365, Azure) Clear communicator, able to engage with both … role, and wants to take on broader responsibilities Has been the security point-person in an IT team, leading on patching or endpoint protection Has hands-on experience with vulnerability management tools like Tenable, and is ready to play a bigger role in shaping how security tools are implemented and optimised across the business. This is a chance to More ❯
Sentinel or similar SIEM tools. Strong verbal and written English communication skills. Interpersonal and presentation skills. Strong analytical skills. Understanding network traffic flows, normal vs. suspicious activities. Knowledge of VulnerabilityScanning, Management, and Ethical Hacking (Penetration Testing). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines (Incident, Problem, Change Management). Ability More ❯
bottlenecks - e.g. Grafana, Datadog Networking Concepts - Knowledge in TCP/IP, DNS, VPN, load balancing, and firewalls Security Best Practices - Implementing security in DevOps (e.g., IAM policies, network security, vulnerabilityscanning, encryption) Security Protocols - Experience with modern security protocols and practices - e.g. Zero Trust, OAuth, OpenID, TLS/SSL Agile Methodologies - Experience with Agile, Scrum, and Kanban DevOps More ❯
recruit for a Security Operations Analyst on a permanent basis. Role Responsibilities: Develop security policies and frameworks. Drive patch management across infrastructure and application teams. Conduct risk assessments and vulnerability scans. Respond to security incidents and alerts. Ensure compliance with regulations (e.g., PCI-DSS, GDPR). Skills & Experience Required: Knowledge of PCI-DSS and GDPR An understanding of Security … best practices SIEM, Vulnerabilityscanning and common security frameworks Security management systems and organisational security controls, including standards, best practices, and approaches to risk assessment and mitigation. If you would like to hear more about this fantastic opportunity, please click apply or send your CV directly to nick.oakley@infinitetalent.co.uk More ❯
recruit for a Security Operations Analyst on a permanent basis. Role Responsibilities: Develop security policies and frameworks. Drive patch management across infrastructure and application teams. Conduct risk assessments and vulnerability scans. Respond to security incidents and alerts. Ensure compliance with regulations (e.g., PCI-DSS, GDPR). Skills & Experience Required: Knowledge of PCI-DSS and GDPR An understanding of Security … best practices SIEM, Vulnerabilityscanning and common security frameworks Security management systems and organisational security controls, including standards, best practices, and approaches to risk assessment and mitigation. If you would like to hear more about this fantastic opportunity, please click apply or send your CV directly to nick.oakley@infinitetalent.co.uk More ❯