Incident Response Jobs in Worthing

2 of 2 Incident Response Jobs in Worthing

Information Security Engineer

Worthing, England, United Kingdom
Stratospherec Limited
regular vulnerability scans using tools like Nessus, Qualys, or OpenVAS. • Analysing scan results, prioritizing risks, and coordinating with stakeholders for remediation. • Key activities in relation to threat monitoring and response will include monitoring networks, systems, and applications for potential threats and unusual activity. • Responding to security incidents, investigating breaches, and leading root cause analyses. • Maintaining incident response … protection software EDR, Anti-Virus, DLP and securing mobile, tablet, laptop, desktop devices. • Familiar with Zero Trust security models • Proficient in using SIEM tools • Experience with log analysis and incident detection. • Familiarity with securing cloud-native applications, containers and microservices. • Incident detection, containment and mitigation through post-incident investigations and root cause analysis. • Data encryption and Data More ❯
Posted:

Information Security Engineer

Worthing, east anglia, united kingdom
Stratospherec Limited
regular vulnerability scans using tools like Nessus, Qualys, or OpenVAS. • Analysing scan results, prioritizing risks, and coordinating with stakeholders for remediation. • Key activities in relation to threat monitoring and response will include monitoring networks, systems, and applications for potential threats and unusual activity. • Responding to security incidents, investigating breaches, and leading root cause analyses. • Maintaining incident response … protection software EDR, Anti-Virus, DLP and securing mobile, tablet, laptop, desktop devices. • Familiar with Zero Trust security models • Proficient in using SIEM tools • Experience with log analysis and incident detection. • Familiarity with securing cloud-native applications, containers and microservices. • Incident detection, containment and mitigation through post-incident investigations and root cause analysis. • Data encryption and Data More ❯
Posted: