Portsmouth, Hampshire, United Kingdom Hybrid / WFH Options
J & C Associates Ltd
SIEM/Incident SME (Active DV Clearance) ELK (Elastic, Logstash, Kibana) Tanium MITREATT&CK Cyber Kill Chain Location: Hybrid onsite in one of the following locations 2/3 days per week - Corsham, Portsmouth or Northallerton Duration: 6 months We are Global IT Recruitment … creation, their deployment and tuning. Experience as a mentor/coach to Junior Analysts Your profile Previous experience of utilising the MITREATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Skilled in using virtualisation software. Knowledge of key security frameworks more »
Corsham, England, United Kingdom Hybrid / WFH Options
J&C Associates Ltd
creation, their deployment and tuning. • Experience as a mentor/coach to junior analysts Your profile • Previous experience of utilising the MITREATT&CK and Cyber Kill Chain frameworks • Skilled in maintaining Microsoft directory services. • Skilled in using virtualisation software. • Knowledge of key security frameworks more »
Corsham, Wiltshire, United Kingdom Hybrid / WFH Options
Lawrence Harvey
security event monitoring and incident management services Ideally experience with ELK (Elastic, Logstash, Kibana) and Tanium Previous experience of utilising the MITREATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services Collaborate with SOC Engineers to maintain up to date dashboards more »
Maidstone, Kent, United Kingdom Hybrid / WFH Options
NewDay
cloud platform/DevOps environment. Developing cyber incident response playbooks and practices in line with industry standard frameworks and standards, e.g. MitreAtt&ck, NIST. SIEM technologies, and security logging and monitoring good practice for cloud platforms. And would love you to know or learn more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
typical techniques used by attackers, ranging from E criminal to state affiliated groups. Preventing and detecting common attacker techniques and the MITREATT&CK framework. Tuning and configuring cyber security tools, for example SIEM and EDR tooling. How enterprise IT networks, Active Directory and Azure more »