Cyber Kill Chain Jobs in the UK

1 to 15 of 15 Cyber Kill Chain Jobs in the UK

SIEM/Incident SME - DV Cleared- ELK - Tanium

Portsmouth, Hampshire, United Kingdom
Hybrid / WFH Options
J & C Associates Ltd
SIEM/Incident SME (Active DV Clearance) ELK (Elastic, Logstash, Kibana) Tanium MITRE ATT&CK Cyber Kill Chain Location: Hybrid onsite in one of the following locations 2/3 days per week - Corsham, Portsmouth or Northallerton Duration: 6 months We are Global IT Recruitment specialist that … and Australia. We have an excellent job opportunity for you. Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring … on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. more »
Employment Type: Contract
Rate: GBP Daily
Posted:

DV Cleared Cyber Security Analyst

England, United Kingdom
GS Solutions
Cyber Security Engineers/Analyst Inside IR35 Circa £700 per day DV Clearance essential Hybrid 1-2 days per week (Flexible) Multiple sites Core Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium Role duties - • Develop and integrate security event monitoring and incident management services. • Respond to security … incident. • Document, validate and create operational processes and procedures to help develop the SOC. • Assist in identifying, prioritising, and coordinating the protection of critical cyber defence infrastructure and key resources. • Build, install, configure, and test dedicated cyber defence hardware. • Support Junior Analysts to manage SOC systems. • Previous experience … their deployment and tuning. • Experience as a mentor/coach to junior analysts Your profile • Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks • Skilled in maintaining Microsoft directory services. • Skilled in using virtualisation software. • Knowledge of key security frameworks (e.g. ISO, NIST more »
Posted:

Cyber Security Consultant

Horsham, England, United Kingdom
83zero
Cyber Security Consultant - Permanent MUST HAVE ACTIVE DV CLEARANCE! Your role: Our client (a well established, global IT consultancy) are looking to hire an experience Cyber Security Consultant in Horsham! £100,000 - £105,000 plus benefits, healthcare options, and bonus! Important considerations for the role: Proven experience of … Producing dashboards and reports, Vulnerability Management utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain (CKC), Intelligence Driven Defence (IDD), Unified Enterprise Defence (UED), Consultancy and communication Important Knowledge Cybersecurity Capability Maturity Model (C2M2) and … NIST Cyber Security Framework (CSF) Current awareness of the market for data analytics and SIEM platforms, including emerging leaders and Network security implementations (e.g host-based IDS, IPS), including their function and placement Cyber defence and information security policies, procedures, and regulations, Network security architecture concepts including topology more »
Posted:

SIEM/ Incident SME Analyst 00254732 Portsmouth

Portsmouth, South East
Computer Futures
Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external … cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of … incident. Document, validate and create operational processes and procedures to help develop the SOC. Assist in identifying, prioritising, and coordinating the protection of critical cyber defence infrastructure and key resources. Build, install, configure, and test dedicated cyber defence hardware. Support Junior Analysts to manage SOC systems. Previous experience more »
Employment Type: Contract
Rate: £650 - £671
Posted:

SIEM/ Incident SME Analyst 00254732 Northallerton

Northallerton, North Yorkshire, Yorkshire and the Humber
Computer Futures
Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external … cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of … incident. Document, validate and create operational processes and procedures to help develop the SOC. Assist in identifying, prioritising, and coordinating the protection of critical cyber defence infrastructure and key resources. Build, install, configure, and test dedicated cyber defence hardware. Support Junior Analysts to manage SOC systems. Previous experience more »
Employment Type: Contract
Rate: £650 - £671
Posted:

DV Cleared SIEM/ Incident SME Analyst 00254732 Corsham

Corsham, Wiltshire, South West
Computer Futures
Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external … cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of … incident. Document, validate and create operational processes and procedures to help develop the SOC. Assist in identifying, prioritising, and coordinating the protection of critical cyber defence infrastructure and key resources. Build, install, configure, and test dedicated cyber defence hardware. Support Junior Analysts to manage SOC systems. Previous experience more »
Employment Type: Contract
Rate: £650 - £670
Posted:

SIEM / Incident SME(Need Active DV Clearance)

Corsham, England, United Kingdom
Hybrid / WFH Options
J&C Associates Ltd
days per week - Corsham, Portsmouth or Northallerton Duration: 6 Months Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring … on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. Your role • Develop and integrate security event monitoring and incident management services. … incident. • Document, validate and create operational processes and procedures to help develop the SOC. • Assist in identifying, prioritising, and coordinating the protection of critical cyber defence infrastructure and key resources. • Build, install, configure, and test dedicated cyber defence hardware. • Support Junior Analysts to manage SOC systems. • Previous experience more »
Posted:

SIEM / Incident SME

Corsham, Wiltshire, South West
LA International Computer Consultants Ltd
in either Corsham, Northallerton or Portsmouth Clearance: DV clearance required Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring … on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. Your role * Develop and integrate security event monitoring and incident management services. … incident. * Document, validate and create operational processes and procedures to help develop the SOC. * Assist in identifying, prioritising, and coordinating the protection of critical cyber defence infrastructure and key resources. * Build, install, configure, and test dedicated cyber defence hardware. * Support Junior Analysts to manage SOC systems. * Previous experience more »
Employment Type: Contract
Rate: £1
Posted:

SIEM/Incident SME

Corsham, Wiltshire, United Kingdom
Hybrid / WFH Options
eTeam Inc
months Contract Inside IR35 CONTRACTOR MUST HOLD DV CLEARANCE Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on … priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond … incident. Document, validate and create operational processes and procedures to help develop the SOC. Assist in identifying, prioritising, and coordinating the protection of critical cyber defence infrastructure and key resources. Build, install, configure, and test dedicated cyber defence hardware. Support Junior Analysts to manage SOC systems. Previous experience more »
Employment Type: Contract
Rate: GBP 720 Daily
Posted:

Cloud Security Architect - CGEMJP00253852

Knutsford, Cheshire, United Kingdom
Experis
Vectors in enterprise or cloud environments and design associated security/controls. * Knowledge of Enterprise security frameworks such as NIST Cybersecurity Framework. * Knowledge of Cyber-attack phases (e.g. Cyber Kill Chain and/or Mitre Attack Framework). * Knowledge of a broad range of security capabilities … security, endpoint security, security penetration testing, identity and access management, vulnerability management etc). Desirable skills/Preferred Qualifications: * Understanding of the interplay between cyber security risk factors, regulatory requirements and changing technology landscape for the financial services sector. * Knowledge of cyber threats, adversarial techniques and vulnerabilities, both more »
Employment Type: Contract
Rate: £750 - £800/day Umbrella
Posted:

Cyber Security Consultant - DV Cleared

Corsham, Wiltshire, South West, United Kingdom
83zero Limited
Producing dashboards and reports, Vulnerability Management utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain (CKC), Intelligence Driven Defence (IDD), Unified Enterprise Defence (UED), Consultancy and communication Important Knowledge Cybersecurity Capability Maturity Model (C2M2) and … NIST Cyber Security Framework (CSF) Current awareness of the market for data analytics and SIEM platforms, including emerging leaders and Network security implementations (e.g host-based IDS, IPS), including their function and placement Cyber defence and information security policies, procedures, and regulations, Network security architecture concepts including topology more »
Employment Type: Permanent
Posted:

Security Operations Center Analyst

United Kingdom
iFindTech Ltd
Linux Experience *BONUS SKILLS* Has a passion for Security Enjoys solving problems Is naturally inquisitive Understands the phases of security incident response and the Cyber Kill Chain *RESPONSIBILITIES* Analysis and investigation of alerts arising from Security Information and Event Management tools General day to day maintenance of more »
Posted:

Researcher - Threat Intelligence

London, England, United Kingdom
Hybrid / WFH Options
Control Risks
In this role you will be responsible for conducting desktop research into cyber and online threats, to enrich our Cyber Threat Intelligence reporting. This role will primarily involve contributing regular reporting for Control Risks' clients that subscribe to our intelligence platform, as well as supporting on and eventually … new sources of information and develop capabilities to collect and analyse information in support of the team. Demonstrate strong investigation skills relating to specific cyber threat incidents, data breaches and other cyber security incidents. Build knowledge of collection tools to support bespoke investigative projects and Cyber Incident … engagements. Conduct research on topics which support other service lines, notably Global Risk Analysis, Compliance Forensics and Investigations, and Response. Develop knowledge of principal cyber and online threat actors through research on open source, social media, deep and dark web sites and Control Risks internal intelligence systems. Contribute continuous more »
Posted:

Directory Services Engineer

Slough, England, United Kingdom
Mars
disaster recovery planning and execution. Understanding of Microsoft’s RAMP and legacy Tier Access models Strong proficiency in PowerShell scripting Functional understanding of cybersecurity kill chain. Knowledge of Quest Software Solutions (Change Auditor, Active Roles, GPO Admin, RMAD) a plus What will be your key responsibilities? Regional SPOC for more »
Posted:

Modelling and Simulation Engineer

Farnborough, Hampshire, South East, United Kingdom
Jefferson Wells
and surface Datalink, C2, mission data fusion Aircraft Fighter, Strike, ISTAR, UAS, Tanker Integrated weapon system e.g. red air flight or SAM laydown SAM Kill Chain, EOB, TTPs Computer Aided Design Interpretation of modelling requirements, CAD related modelling services MATLAB Simulink Solidworks Desirable skills and knowledge. 2+ years more »
Employment Type: Contract
Posted:
Cyber Kill Chain
10th Percentile
£55,750
25th Percentile
£65,000
Median
£83,805
75th Percentile
£95,000
90th Percentile
£97,250