Greater London, England, United Kingdom Hybrid / WFH Options
Apollo Solutions
guidance throughout the project lifecycle. project budgets, timelines, and resource allocation to ensure efficiency and profitability. Must-Have: degree in a relevant field (e.g., Computer Science, Information Technology, Legal Studies) or equivalent practical experience. experience in eDiscovery, with a strong understanding of industry standards and best practices. in eDiscovery more »
technical skills you can use across the network, and throughout your career. What you'll do You will work alongside industry-recognised specialists in computerforensics, electronic discovery, information governance and disclosure. Much of our work centres on the analysis of large volumes of electronic data. And because more »
technical skills you can use across the network, and throughout your career. What you'll do You will work alongside industry-recognised specialists in computerforensics, electronic discovery, information governance and disclosure. Much of our work centres on the analysis of large volumes of electronic data. And because more »
provide integrated solutions to our clients’ most challenging problems. In this role you will have demonstrated skills in various elements of Incident Response, conducting computer intrusion investigations, and have a strong foundation in cyber security policy, operations and best practices, ideally in large enterprise environments. Ideally, you will have … travel, either within the country or internationally. Required Technical and Professional Expertise • Hands-on experience with hardware/software tools used in incident response, computerforensics, network security assessments, and/or application security. • Experience within incident response teams and handling tasks across all phases of an engagement. more »
Knowledge * Working knowledge of various Operating Systems (OS) (MSWin, Linux, OSX, IOS) * Purple Teaming knowledge * Basic understanding of computerforensics * Use of Firewalls and IDS/IPS devices * Knowledge of SIEM technologies. * Networking, routing and switching * Cyber Security Review (CSR) Compliant * Cybersecurity Frameworks and Standards: Knowledge of frameworks more »
responsibilities: Monitor for attacks, intrusions and unusual, Unauthorised or illegal activity Creating and executing strategies to secure and protect networks and data resources Planning computer and network security upgrades and testing hardware and software related to the upgrade Use advanced analytic tools to determine emerging threat patterns and vulnerabilities … i.e. SentinelOne Managing technical problems related to applications and production equipment Addressing intrusions using expertise in computerforensics Engage in 'ethical hacking', for example, simulating security breaches Foreseeing future problem areas by monitoring workflows and network traffic patterns Monitor identity and access management, including monitoring for abuse of more »