Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Hays Technology
Experience with a range of skills relevant to Cyber Security such as Operations, Architecture, Forensics, Software Development, System Administration (Windows and Linux), Incident Response, Cryptography, Compliance, System Integrations (API and Microservices), Testing, Endpoint security, Cloud Services, Data Management, Networking, End-User/Client devices, Identity and Access Management, Application Development more »
PCI-DSS and CIS). Practice expert level assessment skills using technology-based controls of a cybersecurity program including cloud security, penetration testing results, cryptography & network security fundamentals, malware defense, data loss prevention and endpoint security. Compile professional security assessment reports, slides, and lead discussions to effectively communicate the risks more »
Rolling out, managing, and configuring a range of network security tools and appliances. Key Skills: SIEM Tenable.io/Nessus IDS/IPS, MFA, Proxies, Cryptography Security assessments Information Security best practices, policies, and procedures Penetration Testing/Ethical Hacking Solid understanding of computer networking - Routing/Switching, LAN/WAN more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber more »