Key Responsibilities Monitor and analyze security events and alerts from multiple sources, including security information and event management (SIEM) software, network and host-based intrusiondetection systems, firewall logs, and system logs (Windows and Unix), and databases Separate true threats from false positives using network and log analysis … hardware and software monitoring systems Maintain a strong awareness of the current threat landscape Basic Qualifications Excellent teamwork skills Knowledge of and experience with intrusiondetection/prevention systems and SIEM software Strong knowledge and understanding of network protocols and devices. Strong experience with Mac OS, Windows, and … administrators. Familiarity with tools such as Wireshark, TCP Dump, Security Onion, and Splunk Strong knowledge of the following: SIEM Packet Analysis SSL Decryption Malware Detection HIDS/NIDS Network Monitoring Tools Case Management System Knowledge Base Web Security Gateway Email Security Data Loss Prevention Anti-Virus Preferred Qualifications Experience more »
continue unhindered.Key ResponsibilitiesMonitor and analyze security events and alerts from multiple sources, including security information and event management (SIEM) software, network and host-based intrusiondetection systems, firewall logs, and system logs (Windows and Unix), and databasesSeparate true threats from false positives using network and log analysis and … with customers to deploy hardware and software monitoring systemsMaintain a strong awareness of the current threat landscapeBasic QualificationsExcellent teamwork skillsKnowledge of and experience with intrusiondetection/prevention systems and SIEM softwareStrong knowledge and understanding of network protocols and devices.Strong experience with Mac OS, Windows, and Unix systems.Ability … SIEMPacket AnalysisSSL DecryptionMalware DetectionHIDS/NIDSNetwork Monitoring ToolsCase Management SystemKnowledge BaseWeb Security GatewayEmail SecurityData Loss PreventionAnti-VirusPreferred QualificationsExperience in network/host vulnerability analysis, intrusion analysis, digital forensics, penetration testing, or related areas2-3 years of hands-on SOC/TOC/NOC experienceGCIA required. GCIH, GCFE, CISSP, Security more »
Company, their Security Operations Centre provides around the clock protective monitoring solutions to a client base that spans multiple industry verticals. Utilising industry-leading detection technology, the team of experienced SOC members work to provide assurance detection and incident response capabilities to organisations of all sizes. They are … successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), IntrusionDetection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the use more »
2016+), IIS, SQL 2012+, Linux appliances, architecture and OS, Back-up technologies, Citrix, and Cisco networking An excellent understanding of security technologies: SIEM, firewalls, intrusiondetection/prevention systems, anti-virus software, authentication systems, log management, content filtering, etc. An excellent understanding of security approaches: ISMS, risk analysis more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Cloud Decisions
as part of an engaging SOC team that provides around-the-clock protective monitoring solutions to clients across various industry verticals. Leveraging cutting-edge detection technology, offering assurance detection and incident response capabilities to organizations of all sizes. Role Overview As a SOC Engineer you'll work handling … both reactive and proactive security engagements. Your responsibilities will include: ?Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and IntrusionDetection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. ?Incident Reporting: Ensure timely, accurate … directly with customers regarding threats and alerts. Prepare and present findings to clients. ?Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and Vulnerability Management tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible more »
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Cloud Decisions
as part of an engaging SOC team that provides around-the-clock protective monitoring solutions to clients across various industry verticals. Leveraging cutting-edge detection technology, offering assurance detection and incident response capabilities to organizations of all sizes. Role Overview As a SOC Engineer you'll work handling … both reactive and proactive security engagements. Your responsibilities will include: ?Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and IntrusionDetection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. ?Incident Reporting: Ensure timely, accurate … directly with customers regarding threats and alerts. Prepare and present findings to clients. ?Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and Vulnerability Management tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible more »
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Matchtech
in leading a technical security team. Demonstrated experience in planning, developing, and implementing Azure security technologies. Familiarity with security technologies such as SIEM, firewalls, intrusiondetection/prevention systems, antivirus software, authentication systems, and log management. Strong knowledge of security approaches, including risk analysis, attack vectors, cryptography, and more »
Doncaster, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Cloud Decisions
as part of an engaging SOC team that provides around-the-clock protective monitoring solutions to clients across various industry verticals. Leveraging cutting-edge detection technology, offering assurance detection and incident response capabilities to organizations of all sizes. Role Overview As a SOC Engineer you'll work handling … both reactive and proactive security engagements. Your responsibilities will include: ?Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and IntrusionDetection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. ?Incident Reporting: Ensure timely, accurate … directly with customers regarding threats and alerts. Prepare and present findings to clients. ?Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and Vulnerability Management tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible more »
Doncaster, South Yorkshire, Yorkshire, United Kingdom
Forward Role
Company, their Security Operations Centre provides around the clock protective monitoring solutions to a client base that spans multiple industry verticals. Utilising industry-leading detection technology, the team of experienced SOC members work to provide assurance detection and incident response capabilities to organisations of all sizes. They are … successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), IntrusionDetection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the use more »
and safe practices Risk Assessment: Evaluate risks associated with new technologies or system changes Network Security: Advise in the configuration and maintenance of firewalls, intrusiondetection/prevention systems, and other security infrastructure Security Documentation: Maintain accurate records of security configurations, incidents, and procedures Security Policies: Help enforce more »
excellence. Maintain security measures to protect systems, networks, and data from unauthorised access, cyber threats, and malware, installing and maintaining firewalls, antivirus software, and intrusiondetection systems, and conducting security audits and assessments. Document and maintain accurate records of technical configurations, procedures, and troubleshooting steps. Stay current with more »