pipeline practices Familiarity with telemetry and logging tools: Cribl, Elastic, Splunk, Fluentd, and Syslog Deep understanding of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS More ❯
Knutsford, Cheshire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
security expertise Familiarity with telemetry and observability stacks Solid grasp of networking, firewalls, and core security principles Knowledge of container security tools (Aqua, Twistlock, Trivy) Understanding of frameworks like NIST or ISO 27001 Excellent analytical and communication skills Bonus Points Certifications such as CISSP, CISM, or CKS Experience building MVPs or working in agile, early-stage environments Cloud security knowledge More ❯
Alexander Mann Solutions - Public Sector Resourcing
etc.) . Familiarity with cloud migration strategies and hybrid logging environments . Strong documentation skills and attention to detail . Experience with security frameworks such as MITRE ATT&CK, NIST, and CAF . Ability to troubleshoot complex ingestion or parsing issues and resolve at speed Essential Skills . Proven experience onboarding and managing log sources in Azure Sentinel . Hands More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
remotely, Willing and able to travel occasionally to client sites as required. Experience auditing public sector organisations or government bodies Familiarity with relevant standardsand frameworks (e.g. ISO 27001, NIST, COBIT) What you need to do now If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us More ❯
OCTAVE, MITRE ATT&CK. • Up to date knowledge of cyber security threats, threat actor motivation and capability, and relevant threat group TTPs. • An understanding of risk management frameworks e.g. NIST, FAIR, Orange Book, and an understanding of Government Functional Standards e.g. GovS 007. • Knowledge of security control (and maturity) frameworks e.g. NIST (e.g. CSMA, CSF), CIS, ISO 27000 series, CSA … Cloud Controls Matrix, NCSC CAF, and an understanding of the types and functions of security controls. • An understanding of hypothetical attack paths, familiarity with NIST CSF tools and able to use it for gap analysis. • Understands Data Flow Diagrams (DFD) and trust boundaries and is able to create one using information provided about an environment. • Familiar with the functions ofMore ❯
OCTAVE, MITRE ATT&CK. Up to date knowledge of cyber security threats, threat actor motivation and capability, and relevant threat group TTPs. An understanding of risk management frameworks e.g. NIST, FAIR, Orange Book, and an understanding of Government Functional Standards e.g. GovS 007. Knowledge of security control (and maturity) frameworks e.g. NIST (e.g. CSMA, CSF), CIS, ISO 27000 series, CSA … Cloud Controls Matrix, NCSC CAF, and an understanding of the types and functions of security controls. An understanding of hypothetical attack paths, familiarity with NIST CSF tools and able to use it for gap analysis. Understands Data Flow Diagrams (DFD) and trust boundaries and is able to create one using information provided about an environment. Familiar with the functions ofMore ❯