team. What they’re looking for in you as their Security Operations Analyst: Commitment to continuous professional learning and development through ongoing threat analysis and being up to date with the future threat landscape. Working with security tools such as; Sentinel, Defender and Azure Incident response … planning for different CyberThreats Monitoring of IT Security systems, providing trend analysis Implementing and maintaining firewall configurations What's in it for you? Competitive salary up to £55,000 25 Days holiday which can increase to 30+ days Pension Scheme Private medical Security Operations Analyst – Up to more »
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
Experis
. Exposure to modern, large scale Datawarehouse solutions. Ability to work alongside a SecDevOps operating model and associated tools (e.g., JIRA) Ability to identify Threat Vectors in Datawarehouse environments and design associated security/controls. Experience implementing data management solutions Desirable, but not essential Experience with data security and … data access controls and design with Datawarehouse solution (e.g., Snowflakes) Knowledge of cyberthreats, adversarial techniques and vulnerabilities, both current and past, with the ability to innovate and contribute to the application or upgrade of controls and standards to both business and security solutions in order to maintain more »
Job description: Title: SSPM - Secure 3rd Party SaaS integration/CSPM Consultant Skills: SSPM, CyberThreats, SIEM, AWS, Azure Duration: 6 months Location: Kuntsford/Remote We are IT Recruitment Specialists partnered with a prestigious Global Consultancy who required a SSPM - Secure 3rd Party SaaS integration/CSPM … skills to design, build and protect enterprise systems, applications, data, assets and people. Provide services to safeguard information, infrastructures, applications and business against CyberThreats Develop telemetry solution to give full observability of malicious traffic. Investigate strategic XDR solution. Secure 3rd Party SaaS configuration - Uplift security posture management more »