in computer science, information security, cyber security or a related field, or equivalent work experience. A recognised security certification, such as CISSP, CISM, CISA, GCIH, GCIA, CEH or equivalent. Proven experience in leading and managing a SOC and a team of cyber analysts, preferably in a large and complex organisation. more »
covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware, SSL and others Experience and knowledge of NIST, COBIT, GCIA, GCIH, GCFA etc. This is an excellent opportunity to work in a large, enterprise level environment, where there is plenty of scope for growth. Please apply more »
analysis, intrusion analysis, digital forensics, penetration testing, or related areas 2-3 years of hands-on SOC/TOC/NOC experience GCIA required. GCIH, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred Familiarity with tools such as IDA Pro, PEiD, PEview, Procmon, Snort more »
understanding covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware, SSL and othersExperience and knowledge of NIST, COBIT, GCIA, GCIH, GCFA etc.This is an excellent opportunity to work in a large, enterprise level environment, where there is plenty of scope for growth.Please apply ASAP for more »
host vulnerability analysis, intrusion analysis, digital forensics, penetration testing, or related areas2-3 years of hands-on SOC/TOC/NOC experienceGCIA required. GCIH, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferredFamiliarity with tools such as IDA Pro, PEiD, PEview, Procmon, Snort, Bro more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
analyses and follow-up measures. Qualifications Degree in Computer Science, or related experience. Professional certifications such as CSA, CompTIA Security+/CySA+, GIAC GSEC, GCIH or other comparable degree or other relevant experience. IT skills Network Security System Administration Malware Analysis Security Information and Event Management (SIEM) Incident Response Tools more »
Computer Science, or a related field. Desired: Master's degree in a related field or professional certifications such as CERT-CSIH, CISSP, GCFA, GCFE, GCIH, GCIA, GMON. Be prepared to participate in a rotating on-call schedule and collaborate across physical locations. Flexibility to work beyond standard hours for critical more »
exercises to test preparedness. Qualifications and Experience: Bachelor’s degree in a related technical area. One or more relevant certifications such as CISSP, CISM, GCIH, CEH, or OSCP. Proficiency in SIEM Platforms, vulnerability management tools, and incident management processes. Experience in managing security functions or SOC capabilities. Strong analytical skills more »
etc Strong knowledge of ransomware and related protection Ideally looking for candidates with professional security qualifications such as CEH, CCNP, CISSP, GIAC (GSEC/GCIH/GCIA). In return the client will offer a fantastic career opportunity as well as a base salary up to £90k plus a generous more »
Python, Powershell etcStrong knowledge of ransomware and related protectionIdeally looking for candidates with professional security qualifications such as CEH, CCNP, CISSP, GIAC (GSEC/GCIH/GCIA).In return the client will offer a fantastic career opportunity as well as a base salary up to £90k plus a generous benefits more »
writing and presentation skills. A relevant professional certification such as CREST CPIA/CRIA/CCNIA/CCHIA or SANS GCFA/GNFA/GCIH Good understanding of common enterprise technologies and configuration, including could platforms such as Azure, AWS and GCP. Behaviors Client-Focused: Prioritises client needs and expectations more »
FMIs and CSD operations is an advantage Knowledge of Swift CSP framework is advantage. IT Security Certification such as CISSP, CSSLP, CCSP, CISM, CISMP, GCIH, CEH, etc. is an advantage. Email kieren@source-technology.com more »
malware analysis. In order to be successful in your application, you will need: At least 3 years cyber incident response experience. Certifications such as GCIH, GCIA or GCFA/E. Ideally, consultancy experience however, strong regulated exposure is also welcomed. Strong baseline threat hunting skills and ideally, an interest in more »
acquire such a clearance will be seen as an advantage. Incident management certifications such as: CREST certifiedincident manager (CCIM) GIACCertifiedIncidentHandler (GCIH) Degree level qualified, MSc in Information Security, IT or relevant STEM subjects. To discuss this or wider Consulting roles with our recruitment team, all you more »