My client an innovative are an expanding Cybersecurity specialist, is looking to recruit a Tier I SOC Analyst, working hybrid on a 5pm-1am , 1am -9am shift pattern on a rotating basis (circa 37.5 hours per week , to support their continued growth Ideally stemming from a SOC Analyst, IT Helpdesk or other technical related background, our SOC Analyst position provides an exciting opportunity to ensure our clients receive the best possible service whilst protecting their business assets and security. You will help maintain and protect our client's key business assets from threats and risks by monitoring, detecting, analysing, and responding to security incidents. As a Tier 1 SOC Analyst role, this will be an ideal opportunity for an enthusiastic and motivated individual to step into a specialised SOC position. With a key focus on attention to detail and client/stakeholder management, we are looking for someone who is comfortable in a client facing role with the technical skills (training is provided) to triage, respond and resolve to a variety of threats. Please note, this role will be a full-time position based on the provided shift pattern above (flexibility will be required). An overview of the main duties has been provided below: Monitor both customer and internal infrastructure to detect security events and vulnerabilities by using various security tools, SIEM technologies and other security resources. Analyse and investigate various security events to validate security incidents; Perform proactive and reactive security incident handling and escalation where appropriate; Review vulnerability assessments and provide findings with remediation actions; Manage, tune and optimise security tools following best practice and other performance metrics; Respond to customers' tickets and emails, providing assistance with security related issues efficiently and effectively. Collaborate with senior SOC analysts and other cybersecurity stakeholders to mitigate and remediate security threats. Contribute to the development and improvement of SOC processes, procedures, and workflows. Stay up-to-date with the latest cybersecurity threats, trends, and best practices through continuous learning and professional development Skillset, Experience and Qualifications: Previous experience in an IT Helpdesk, IT Support, SOC or related role is essential with the ability to handle and prioritise tickets and issues; Bachelor's degree in computer science, Computer Networks, Information Security or other related technical discipline would be highly desirable; Good knowledge and understanding of networking principles and a variety of operating systems; Strong analytical and problem-solving skills; Experience using SIEM technologies (such as Elastic, Splunk and Log rhythm), firewalls and IDS/IPS technologies would be desirable; Strong organisational skills with a high attention to?detail; Ability to prioritise and handle multiple tasks at any given?time; Proactive and enthusiastic with a can do?attitude; Excellent verbal and written English communication skills, with the ability to influence; Passionate about security and networks; Ability to work on own initiative as well as being a team player.
Mar 28, 2024
Full time
My client an innovative are an expanding Cybersecurity specialist, is looking to recruit a Tier I SOC Analyst, working hybrid on a 5pm-1am , 1am -9am shift pattern on a rotating basis (circa 37.5 hours per week , to support their continued growth Ideally stemming from a SOC Analyst, IT Helpdesk or other technical related background, our SOC Analyst position provides an exciting opportunity to ensure our clients receive the best possible service whilst protecting their business assets and security. You will help maintain and protect our client's key business assets from threats and risks by monitoring, detecting, analysing, and responding to security incidents. As a Tier 1 SOC Analyst role, this will be an ideal opportunity for an enthusiastic and motivated individual to step into a specialised SOC position. With a key focus on attention to detail and client/stakeholder management, we are looking for someone who is comfortable in a client facing role with the technical skills (training is provided) to triage, respond and resolve to a variety of threats. Please note, this role will be a full-time position based on the provided shift pattern above (flexibility will be required). An overview of the main duties has been provided below: Monitor both customer and internal infrastructure to detect security events and vulnerabilities by using various security tools, SIEM technologies and other security resources. Analyse and investigate various security events to validate security incidents; Perform proactive and reactive security incident handling and escalation where appropriate; Review vulnerability assessments and provide findings with remediation actions; Manage, tune and optimise security tools following best practice and other performance metrics; Respond to customers' tickets and emails, providing assistance with security related issues efficiently and effectively. Collaborate with senior SOC analysts and other cybersecurity stakeholders to mitigate and remediate security threats. Contribute to the development and improvement of SOC processes, procedures, and workflows. Stay up-to-date with the latest cybersecurity threats, trends, and best practices through continuous learning and professional development Skillset, Experience and Qualifications: Previous experience in an IT Helpdesk, IT Support, SOC or related role is essential with the ability to handle and prioritise tickets and issues; Bachelor's degree in computer science, Computer Networks, Information Security or other related technical discipline would be highly desirable; Good knowledge and understanding of networking principles and a variety of operating systems; Strong analytical and problem-solving skills; Experience using SIEM technologies (such as Elastic, Splunk and Log rhythm), firewalls and IDS/IPS technologies would be desirable; Strong organisational skills with a high attention to?detail; Ability to prioritise and handle multiple tasks at any given?time; Proactive and enthusiastic with a can do?attitude; Excellent verbal and written English communication skills, with the ability to influence; Passionate about security and networks; Ability to work on own initiative as well as being a team player.
I am working with a cyber security consultancy based on the South Coast. As part of their growth plans for 2024, they are looking for 2 experienced SOC Analysts to join their growing team. The Senior Security Operations Centre (SOC) Analyst is a seasoned cybersecurity professional tasked with safeguarding organisations against evolving security threats. Operating within a 24/7 environment, Senior SOC Analysts are pivotal in the detection, analysis, and response to security incidents, ensuring the protection of sensitive data and systems. Collaborating closely with cybersecurity peers, they fortify the security posture and proactively mitigate potential cyber-attacks. This is an office based role so please only apply if you live close enough to commute on a daily basis. Responsibilities: Security Monitoring and Incident Detection: Utilising security information and event management (SIEM) tools to identify potential security incidents and anomalies. Analysing alerts and log data to assess severity and impact of threats. Incident Response and Analysis: Promptly investigating and responding to security incidents. Conducting in-depth analysis of security events to determine scope, impact, and root causes. Threat Hunting: Proactively searching for hidden threats and vulnerabilities within the organization's network and systems. Employing various security tools and methodologies to address potential weaknesses before exploitation. Vulnerability Management: Assisting in vulnerability assessments and penetration testing. Collaborating with IT and system administrators to prioritize and remediate identified vulnerabilities. Security Reporting and Documentation: Generating detailed reports on security incidents, response actions, and improvement recommendations. Maintaining accurate records of incidents, investigations, and security-related activities. Security Tools Management: Configuring, updating and maintaining security tools such as firewalls, intrusion detection/prevention systems, endpoint protection and SIEM solutions. Who? As a key member of the team, reporting to the Security Operations Head of Service, you will have a genuine passion for Cyber Security and a proven track record in a SOC role, demonstrating proficiency in threat hunting and analysing SOC events. You will have a passion for Cyber Security and possess the required skills and qualifications to excel in the field. Degree in Computer Science, Information Security, or related field (or equivalent work experience). Cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or Microsoft M365/Azure. Proficiency in cybersecurity principles, networking concepts, and diverse operating systems. Familiarity with common security threats, attack vectors, and mitigation strategies. Strong communication skills to articulate technical information to varied audiences. Prior experience in SOC Analyst role essential. Exceptional attention to detail and ability to thrive in high-pressure environments. You will become an integral part of a company committed to sustainable growth and collaborative success. With a culture of inclusivity and continuous development, you will get a competitive base salary and benefits package to support growth and well-being. The benefits packages includes: Enrolment into company pension scheme Cycle to work scheme. 31 days holiday (including bank holidays) Up to £40 gym membership contribution
Mar 27, 2024
Full time
I am working with a cyber security consultancy based on the South Coast. As part of their growth plans for 2024, they are looking for 2 experienced SOC Analysts to join their growing team. The Senior Security Operations Centre (SOC) Analyst is a seasoned cybersecurity professional tasked with safeguarding organisations against evolving security threats. Operating within a 24/7 environment, Senior SOC Analysts are pivotal in the detection, analysis, and response to security incidents, ensuring the protection of sensitive data and systems. Collaborating closely with cybersecurity peers, they fortify the security posture and proactively mitigate potential cyber-attacks. This is an office based role so please only apply if you live close enough to commute on a daily basis. Responsibilities: Security Monitoring and Incident Detection: Utilising security information and event management (SIEM) tools to identify potential security incidents and anomalies. Analysing alerts and log data to assess severity and impact of threats. Incident Response and Analysis: Promptly investigating and responding to security incidents. Conducting in-depth analysis of security events to determine scope, impact, and root causes. Threat Hunting: Proactively searching for hidden threats and vulnerabilities within the organization's network and systems. Employing various security tools and methodologies to address potential weaknesses before exploitation. Vulnerability Management: Assisting in vulnerability assessments and penetration testing. Collaborating with IT and system administrators to prioritize and remediate identified vulnerabilities. Security Reporting and Documentation: Generating detailed reports on security incidents, response actions, and improvement recommendations. Maintaining accurate records of incidents, investigations, and security-related activities. Security Tools Management: Configuring, updating and maintaining security tools such as firewalls, intrusion detection/prevention systems, endpoint protection and SIEM solutions. Who? As a key member of the team, reporting to the Security Operations Head of Service, you will have a genuine passion for Cyber Security and a proven track record in a SOC role, demonstrating proficiency in threat hunting and analysing SOC events. You will have a passion for Cyber Security and possess the required skills and qualifications to excel in the field. Degree in Computer Science, Information Security, or related field (or equivalent work experience). Cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or Microsoft M365/Azure. Proficiency in cybersecurity principles, networking concepts, and diverse operating systems. Familiarity with common security threats, attack vectors, and mitigation strategies. Strong communication skills to articulate technical information to varied audiences. Prior experience in SOC Analyst role essential. Exceptional attention to detail and ability to thrive in high-pressure environments. You will become an integral part of a company committed to sustainable growth and collaborative success. With a culture of inclusivity and continuous development, you will get a competitive base salary and benefits package to support growth and well-being. The benefits packages includes: Enrolment into company pension scheme Cycle to work scheme. 31 days holiday (including bank holidays) Up to £40 gym membership contribution
To play a critical role in safeguarding our clients' digital assets and infrastructure. To be responsible for assessments, monitoring, analysing, and responding to security incidents, ensuring that our clients' environments remain secure and compliant with industry standards and regulations. Key Responsibilities:- Monitor security events and alerts using various security tools and platforms. Conduct security incident analysis and investigation to identify and mitigate potential threats. Implement and maintain security controls, policies, and procedures to protect internal and client environments. Implement and maintain cybersecurity products to safeguard internal and client infrastructures. Perform vulnerability assessments and penetration testing to identify security weaknesses and recommend remedial actions. Collaborate with internal teams and clients to address security needs or concerns and provide recommendations for improving security posture. Stay current with emerging threats, vulnerabilities, and security technologies to proactively mitigate risks. Participate in security audits and compliance assessments to ensure adherence to industry regulations and standards. Skills & Experience:- Proven experience working in a security analyst role, preferably within a Managed Service Provider (MSP) environment. Strong understanding of networking protocols, security technologies, and best practices. Hands-on experience with security tools such as SIEM, IDS/IPS, antivirus, firewalls, and endpoint protection. Familiarity with industry regulations and standards (e.g., GDPR, HIPAA, PCI DSS). Excellent analytical and problem-solving skills with a keen attention to detail. Effective communication skills with the ability to convey complex technical concepts to non-technical stakeholders. Flexible & reliable with a strong work ethic Bachelor's degree in computer science, Information Security, or related field (or equivalent work experience). Relevant certifications such as CISSP, CISM, CEH, or CompTIA Security+ will be a distinct advantage. Mayflower is acting as an Employment Agency in relation to this vacancy.
Mar 27, 2024
Full time
To play a critical role in safeguarding our clients' digital assets and infrastructure. To be responsible for assessments, monitoring, analysing, and responding to security incidents, ensuring that our clients' environments remain secure and compliant with industry standards and regulations. Key Responsibilities:- Monitor security events and alerts using various security tools and platforms. Conduct security incident analysis and investigation to identify and mitigate potential threats. Implement and maintain security controls, policies, and procedures to protect internal and client environments. Implement and maintain cybersecurity products to safeguard internal and client infrastructures. Perform vulnerability assessments and penetration testing to identify security weaknesses and recommend remedial actions. Collaborate with internal teams and clients to address security needs or concerns and provide recommendations for improving security posture. Stay current with emerging threats, vulnerabilities, and security technologies to proactively mitigate risks. Participate in security audits and compliance assessments to ensure adherence to industry regulations and standards. Skills & Experience:- Proven experience working in a security analyst role, preferably within a Managed Service Provider (MSP) environment. Strong understanding of networking protocols, security technologies, and best practices. Hands-on experience with security tools such as SIEM, IDS/IPS, antivirus, firewalls, and endpoint protection. Familiarity with industry regulations and standards (e.g., GDPR, HIPAA, PCI DSS). Excellent analytical and problem-solving skills with a keen attention to detail. Effective communication skills with the ability to convey complex technical concepts to non-technical stakeholders. Flexible & reliable with a strong work ethic Bachelor's degree in computer science, Information Security, or related field (or equivalent work experience). Relevant certifications such as CISSP, CISM, CEH, or CompTIA Security+ will be a distinct advantage. Mayflower is acting as an Employment Agency in relation to this vacancy.
Job Title : Cyber Security Engineer L1/L2 and Team Lead Location : Ashford Salary : £20,000 - £38,000 (DOE)We are working with a leading cyber security service provider a leading provider of innovative security solutions dedicated to safeguarding digital assets and protecting businesses from evolving cyber threats. With a commitment to excellence and a passion for staying ahead of the curve, we are seeking a talented Cyber Security Analyst to join our dynamic team.We are on the lookout for L1/L2 and Team Lead engineers as the company is growing and are on the lookout for 3 new engineers! If you're passionate about cybersecurity and thrive in a fast-paced environment, we want to hear from you! Responsibilities: Monitor and analyse security events and incidents using SIEM tools to identify potential threats and vulnerabilities. Conduct in-depth investigations into security incidents, including malware analysis, network forensics, and log analysis. Develop and maintain security policies, procedures, and standards to ensure compliance with industry regulations and best practices. Collaborate with cross-functional teams to implement security controls and measures to protect against emerging threats. Perform regular security assessments and penetration tests to identify and remediate vulnerabilities in the organization's systems and applications. Stay abreast of the latest cybersecurity trends, threats, and technologies to continuously improve the organization's security posture. Provide guidance and support to internal stakeholders on cybersecurity best practices and incident response procedures. Participate in security awareness training and education programs for employees to promote a culture of security awareness and compliance. Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field. Experience in a cybersecurity role, preferably as a Security Analyst or Incident Responder. Strong knowledge of cybersecurity principles, practices, and technologies, including SIEM, IDS/IPS, firewalls, antivirus, and endpoint protection. Hands-on experience with security tools such as Splunk, Wireshark, Nessus, and Metasploit. Experience with threat hunting, malware analysis, and forensic investigation techniques. Understanding of common cybersecurity frameworks and standards (e.g., NIST, ISO 27001, CIS Controls). Excellent analytical and problem-solving skills with a keen attention to detail. Strong communication and interpersonal skills, with the ability to effectively communicate technical information to non-technical stakeholders. Relevant certifications such as CISSP, CEH, or GIAC are a plus. If you are looking for your next challenge in a cybersecurity focused environment than look no further. Please apply with an up-to-date CV to be considered, like mentioned above, we are on the lookout for 3 new engineers. In Technology Group Ltd is acting as an Employment Agency in relation to this vacancy. In Technology Group Ltd is acting as an Employment Agency in relation to this vacancy.
Mar 27, 2024
Full time
Job Title : Cyber Security Engineer L1/L2 and Team Lead Location : Ashford Salary : £20,000 - £38,000 (DOE)We are working with a leading cyber security service provider a leading provider of innovative security solutions dedicated to safeguarding digital assets and protecting businesses from evolving cyber threats. With a commitment to excellence and a passion for staying ahead of the curve, we are seeking a talented Cyber Security Analyst to join our dynamic team.We are on the lookout for L1/L2 and Team Lead engineers as the company is growing and are on the lookout for 3 new engineers! If you're passionate about cybersecurity and thrive in a fast-paced environment, we want to hear from you! Responsibilities: Monitor and analyse security events and incidents using SIEM tools to identify potential threats and vulnerabilities. Conduct in-depth investigations into security incidents, including malware analysis, network forensics, and log analysis. Develop and maintain security policies, procedures, and standards to ensure compliance with industry regulations and best practices. Collaborate with cross-functional teams to implement security controls and measures to protect against emerging threats. Perform regular security assessments and penetration tests to identify and remediate vulnerabilities in the organization's systems and applications. Stay abreast of the latest cybersecurity trends, threats, and technologies to continuously improve the organization's security posture. Provide guidance and support to internal stakeholders on cybersecurity best practices and incident response procedures. Participate in security awareness training and education programs for employees to promote a culture of security awareness and compliance. Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field. Experience in a cybersecurity role, preferably as a Security Analyst or Incident Responder. Strong knowledge of cybersecurity principles, practices, and technologies, including SIEM, IDS/IPS, firewalls, antivirus, and endpoint protection. Hands-on experience with security tools such as Splunk, Wireshark, Nessus, and Metasploit. Experience with threat hunting, malware analysis, and forensic investigation techniques. Understanding of common cybersecurity frameworks and standards (e.g., NIST, ISO 27001, CIS Controls). Excellent analytical and problem-solving skills with a keen attention to detail. Strong communication and interpersonal skills, with the ability to effectively communicate technical information to non-technical stakeholders. Relevant certifications such as CISSP, CEH, or GIAC are a plus. If you are looking for your next challenge in a cybersecurity focused environment than look no further. Please apply with an up-to-date CV to be considered, like mentioned above, we are on the lookout for 3 new engineers. In Technology Group Ltd is acting as an Employment Agency in relation to this vacancy. In Technology Group Ltd is acting as an Employment Agency in relation to this vacancy.
I am working with a client based in the South of England who specialise in cyber security. This is a fantastic opportunity for the right candidates to join an organisation who are pioneers of cyber risk management, working with a range of customers in both private and public sectors. The Role PLEASE NOTE THIS OPPORTUNITY INVOLVES ON-SITE SHIFT WORK SO PLEASE ONLY APPLY IF YOU ARE HAPPY TO WORK BOTH DAY AND NIGHT SHIFTS AND LIVE WITHIN COMMUTING DISTANCE OF POOLE. Due to expansion, my client is looking to increase the capeability of their 24/7 SOC team. A 24/7 Security Operations Centre (SOC) Analyst is responsible for monitoring and defending customers against potential security threats. This critical role will identify, analyse and respond to security incidents to ensure the confidentiality, integrity and availability of sensitive data and systems. You will need to work closely with other cyber security team members to ensure a strong security posture and prevent or mitigate potential cyber attacks. This role will also offer hands on support to the infrastructure engineering field team in responding to incidents so previous infrastructure experience or experience within a 2nd line support environment is essential. Security Monitoring And Incident Detection Based at their modern and recently refurbished offices near Poole Quay, you will work a four day operational rota including both day shifts (7am - 7pm) and nights shifts (7pm - 7am). The 24/7 SOC analysts work closely with other Digital Forensic and Incident response teams and will perform a multitude of tasks managing and maintaining customers. Duties include: Monitor security information and event management (SIEM) tools and other security monitoring systems to identify potential security incidents and anomalies. Analyse alerts and log data to assess the severity and impact of potential threats. Incident Response And Analysis Investigate and respond to security incidents promptly and effectively. Perform in-depth analysis of security events to understand the scope, impact, and root cause of incidents. Threat Hunting Proactively search for hidden threats and potential security weaknesses in the organization's network and systems. Utilize various security tools and methodologies to identify and address potential vulnerabilities before they are exploited. Vulnerability Management Assist in vulnerability assessments and penetration testing activities. Evaluate and prioritize identified vulnerabilities for remediation by collaborating with IT and system administrators. Security Reporting And Documentation Create detailed reports on security incidents, response actions taken, and recommendations for improvement. Maintain accurate records of incidents, investigations, and security-related activities. Security Tools Management Configure, update, and maintain security tools, including firewalls, intrusion detection/prevention systems, endpoint protection, and SIEM solutions. Who? I would be interested in speaking with both candidates with experience in cyber secruity in a similar role or who have other technical IT infrastructure or support experience and are looking to move to a career in cyber security. You will be given a substantial development plan. A passion for technology and learning new skills is a key sucess factor for this role and, although full training and real world expeprience will be provided, you will need to have the ambition to develop. My client prides itself on providing an excellent service to their customers so the sucessful candidates will need to have strong communication skills and a service-based mindset. Successful Candidates Will Be Enrolled On a Full Training & Certification Program Across The Service Portfolio; however, the following certifications and experience will be beneficial to applicants: Certification in Computer Science, Information Security, or related field (or equivalent work experience). Cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH) or Microsoft M365/Azure Understanding of cybersecurity principles, networking concepts, and various operating systems. Knowledge of common security threats, attack vectors, and mitigation strategies. Excellent communication skills to convey technical information to both technical and non-technical audiences. Experience in an IT Support/MSP support role Experience within a IT infrastructure role Strong attention to detail and ability to work under pressure in a fast-paced environment. Alongside a competitve salary, you will also have access to excellent training and career progression as well as a god benefits package.
Mar 27, 2024
Full time
I am working with a client based in the South of England who specialise in cyber security. This is a fantastic opportunity for the right candidates to join an organisation who are pioneers of cyber risk management, working with a range of customers in both private and public sectors. The Role PLEASE NOTE THIS OPPORTUNITY INVOLVES ON-SITE SHIFT WORK SO PLEASE ONLY APPLY IF YOU ARE HAPPY TO WORK BOTH DAY AND NIGHT SHIFTS AND LIVE WITHIN COMMUTING DISTANCE OF POOLE. Due to expansion, my client is looking to increase the capeability of their 24/7 SOC team. A 24/7 Security Operations Centre (SOC) Analyst is responsible for monitoring and defending customers against potential security threats. This critical role will identify, analyse and respond to security incidents to ensure the confidentiality, integrity and availability of sensitive data and systems. You will need to work closely with other cyber security team members to ensure a strong security posture and prevent or mitigate potential cyber attacks. This role will also offer hands on support to the infrastructure engineering field team in responding to incidents so previous infrastructure experience or experience within a 2nd line support environment is essential. Security Monitoring And Incident Detection Based at their modern and recently refurbished offices near Poole Quay, you will work a four day operational rota including both day shifts (7am - 7pm) and nights shifts (7pm - 7am). The 24/7 SOC analysts work closely with other Digital Forensic and Incident response teams and will perform a multitude of tasks managing and maintaining customers. Duties include: Monitor security information and event management (SIEM) tools and other security monitoring systems to identify potential security incidents and anomalies. Analyse alerts and log data to assess the severity and impact of potential threats. Incident Response And Analysis Investigate and respond to security incidents promptly and effectively. Perform in-depth analysis of security events to understand the scope, impact, and root cause of incidents. Threat Hunting Proactively search for hidden threats and potential security weaknesses in the organization's network and systems. Utilize various security tools and methodologies to identify and address potential vulnerabilities before they are exploited. Vulnerability Management Assist in vulnerability assessments and penetration testing activities. Evaluate and prioritize identified vulnerabilities for remediation by collaborating with IT and system administrators. Security Reporting And Documentation Create detailed reports on security incidents, response actions taken, and recommendations for improvement. Maintain accurate records of incidents, investigations, and security-related activities. Security Tools Management Configure, update, and maintain security tools, including firewalls, intrusion detection/prevention systems, endpoint protection, and SIEM solutions. Who? I would be interested in speaking with both candidates with experience in cyber secruity in a similar role or who have other technical IT infrastructure or support experience and are looking to move to a career in cyber security. You will be given a substantial development plan. A passion for technology and learning new skills is a key sucess factor for this role and, although full training and real world expeprience will be provided, you will need to have the ambition to develop. My client prides itself on providing an excellent service to their customers so the sucessful candidates will need to have strong communication skills and a service-based mindset. Successful Candidates Will Be Enrolled On a Full Training & Certification Program Across The Service Portfolio; however, the following certifications and experience will be beneficial to applicants: Certification in Computer Science, Information Security, or related field (or equivalent work experience). Cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH) or Microsoft M365/Azure Understanding of cybersecurity principles, networking concepts, and various operating systems. Knowledge of common security threats, attack vectors, and mitigation strategies. Excellent communication skills to convey technical information to both technical and non-technical audiences. Experience in an IT Support/MSP support role Experience within a IT infrastructure role Strong attention to detail and ability to work under pressure in a fast-paced environment. Alongside a competitve salary, you will also have access to excellent training and career progression as well as a god benefits package.
Job Title : Cyber Security Engineer L1/L2 and Team Lead Location : Ashford Salary : 20,000 - 38,000 (DOE) We are working with a leading cyber security service provider a leading provider of innovative security solutions dedicated to safeguarding digital assets and protecting businesses from evolving cyber threats. With a commitment to excellence and a passion for staying ahead of the curve, we are seeking a talented Cyber Security Analyst to join our dynamic team. We are on the lookout for L1/L2 and Team Lead engineers as the company is growing and are on the lookout for 3 new engineers! If you're passionate about cybersecurity and thrive in a fast-paced environment, we want to hear from you! Responsibilities: Monitor and analyse security events and incidents using SIEM tools to identify potential threats and vulnerabilities. Conduct in-depth investigations into security incidents, including malware analysis, network forensics, and log analysis. Develop and maintain security policies, procedures, and standards to ensure compliance with industry regulations and best practices. Collaborate with cross-functional teams to implement security controls and measures to protect against emerging threats. Perform regular security assessments and penetration tests to identify and remediate vulnerabilities in the organization's systems and applications. Stay abreast of the latest cybersecurity trends, threats, and technologies to continuously improve the organization's security posture. Provide guidance and support to internal stakeholders on cybersecurity best practices and incident response procedures. Participate in security awareness training and education programs for employees to promote a culture of security awareness and compliance. Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field. Experience in a cybersecurity role, preferably as a Security Analyst or Incident Responder. Strong knowledge of cybersecurity principles, practices, and technologies, including SIEM, IDS/IPS, firewalls, antivirus, and endpoint protection. Hands-on experience with security tools such as Splunk, Wireshark, Nessus, and Metasploit. Experience with threat hunting, malware analysis, and forensic investigation techniques. Understanding of common cybersecurity frameworks and standards (e.g., NIST, ISO 27001, CIS Controls). Excellent analytical and problem-solving skills with a keen attention to detail. Strong communication and interpersonal skills, with the ability to effectively communicate technical information to non-technical stakeholders. Relevant certifications such as CISSP, CEH, or GIAC are a plus. If you are looking for your next challenge in a cybersecurity focused environment than look no further. Please apply with an up-to-date CV to be considered, like mentioned above, we are on the lookout for 3 new engineers. In Technology Group Ltd is acting as an Employment Agency in relation to this vacancy. In Technology Group Ltd is acting as an Employment Agency in relation to this vacancy.
Mar 27, 2024
Full time
Job Title : Cyber Security Engineer L1/L2 and Team Lead Location : Ashford Salary : 20,000 - 38,000 (DOE) We are working with a leading cyber security service provider a leading provider of innovative security solutions dedicated to safeguarding digital assets and protecting businesses from evolving cyber threats. With a commitment to excellence and a passion for staying ahead of the curve, we are seeking a talented Cyber Security Analyst to join our dynamic team. We are on the lookout for L1/L2 and Team Lead engineers as the company is growing and are on the lookout for 3 new engineers! If you're passionate about cybersecurity and thrive in a fast-paced environment, we want to hear from you! Responsibilities: Monitor and analyse security events and incidents using SIEM tools to identify potential threats and vulnerabilities. Conduct in-depth investigations into security incidents, including malware analysis, network forensics, and log analysis. Develop and maintain security policies, procedures, and standards to ensure compliance with industry regulations and best practices. Collaborate with cross-functional teams to implement security controls and measures to protect against emerging threats. Perform regular security assessments and penetration tests to identify and remediate vulnerabilities in the organization's systems and applications. Stay abreast of the latest cybersecurity trends, threats, and technologies to continuously improve the organization's security posture. Provide guidance and support to internal stakeholders on cybersecurity best practices and incident response procedures. Participate in security awareness training and education programs for employees to promote a culture of security awareness and compliance. Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field. Experience in a cybersecurity role, preferably as a Security Analyst or Incident Responder. Strong knowledge of cybersecurity principles, practices, and technologies, including SIEM, IDS/IPS, firewalls, antivirus, and endpoint protection. Hands-on experience with security tools such as Splunk, Wireshark, Nessus, and Metasploit. Experience with threat hunting, malware analysis, and forensic investigation techniques. Understanding of common cybersecurity frameworks and standards (e.g., NIST, ISO 27001, CIS Controls). Excellent analytical and problem-solving skills with a keen attention to detail. Strong communication and interpersonal skills, with the ability to effectively communicate technical information to non-technical stakeholders. Relevant certifications such as CISSP, CEH, or GIAC are a plus. If you are looking for your next challenge in a cybersecurity focused environment than look no further. Please apply with an up-to-date CV to be considered, like mentioned above, we are on the lookout for 3 new engineers. In Technology Group Ltd is acting as an Employment Agency in relation to this vacancy. In Technology Group Ltd is acting as an Employment Agency in relation to this vacancy.
Job Title: Cyber Security Analyst Location: London Salary: £50,000 We are working with a leading cyber security service provider a leading provider of innovative cybersecurity solutions dedicated to safeguarding digital assets and protecting businesses from evolving cyber threats. With a commitment to excellence and a passion for staying ahead of the curve, we are seeking a talented Cyber Security Analyst to join our dynamic team. If you're passionate about cybersecurity and thrive in a fast-paced environment, we want to hear from you! As a Cyber Security Analyst, you will play a crucial role in protecting the organization's digital infrastructure and ensuring the confidentiality, integrity, and availability of our information assets. You will analyse and respond to security incidents, conduct thorough investigations, and implement proactive measures to mitigate risks and vulnerabilities. This position offers an exciting opportunity to work with cutting-edge technologies and collaborate with a team of skilled professionals dedicated to staying ahead of cyber threats. Responsibilities: Monitor and analyse security events and incidents using SIEM tools to identify potential threats and vulnerabilities. Conduct in-depth investigations into security incidents, including malware analysis, network forensics, and log analysis. Develop and maintain security policies, procedures, and standards to ensure compliance with industry regulations and best practices. Collaborate with cross-functional teams to implement security controls and measures to protect against emerging threats. Perform regular security assessments and penetration tests to identify and remediate vulnerabilities in the organization's systems and applications. Stay abreast of the latest cybersecurity trends, threats, and technologies to continuously improve the organization's security posture. Provide guidance and support to internal stakeholders on cybersecurity best practices and incident response procedures. Participate in security awareness training and education programs for employees to promote a culture of security awareness and compliance. Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field. Experience in a cybersecurity role, preferably as a Security Analyst or Incident Responder. Strong knowledge of cybersecurity principles, practices, and technologies, including SIEM, IDS/IPS, firewalls, antivirus, and endpoint protection. Hands-on experience with security tools such as Splunk, Wireshark, Nessus, and Metasploit. Experience with threat hunting, malware analysis, and forensic investigation techniques. Understanding of common cybersecurity frameworks and standards (e.g., NIST, ISO 27001, CIS Controls). Excellent analytical and problem-solving skills with a keen attention to detail. Strong communication and interpersonal skills, with the ability to effectively communicate technical information to non-technical stakeholders. Relevant certifications such as CISSP, CEH, or GIAC are a plus. If you are looking for your next challenge in a cybersecurity focussed environment than look no further. Please apply with an up-to-date CV to be considered. In Technology Group Ltd is acting as an Employment Agency in relation to this vacancy.
Mar 25, 2024
Full time
Job Title: Cyber Security Analyst Location: London Salary: £50,000 We are working with a leading cyber security service provider a leading provider of innovative cybersecurity solutions dedicated to safeguarding digital assets and protecting businesses from evolving cyber threats. With a commitment to excellence and a passion for staying ahead of the curve, we are seeking a talented Cyber Security Analyst to join our dynamic team. If you're passionate about cybersecurity and thrive in a fast-paced environment, we want to hear from you! As a Cyber Security Analyst, you will play a crucial role in protecting the organization's digital infrastructure and ensuring the confidentiality, integrity, and availability of our information assets. You will analyse and respond to security incidents, conduct thorough investigations, and implement proactive measures to mitigate risks and vulnerabilities. This position offers an exciting opportunity to work with cutting-edge technologies and collaborate with a team of skilled professionals dedicated to staying ahead of cyber threats. Responsibilities: Monitor and analyse security events and incidents using SIEM tools to identify potential threats and vulnerabilities. Conduct in-depth investigations into security incidents, including malware analysis, network forensics, and log analysis. Develop and maintain security policies, procedures, and standards to ensure compliance with industry regulations and best practices. Collaborate with cross-functional teams to implement security controls and measures to protect against emerging threats. Perform regular security assessments and penetration tests to identify and remediate vulnerabilities in the organization's systems and applications. Stay abreast of the latest cybersecurity trends, threats, and technologies to continuously improve the organization's security posture. Provide guidance and support to internal stakeholders on cybersecurity best practices and incident response procedures. Participate in security awareness training and education programs for employees to promote a culture of security awareness and compliance. Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field. Experience in a cybersecurity role, preferably as a Security Analyst or Incident Responder. Strong knowledge of cybersecurity principles, practices, and technologies, including SIEM, IDS/IPS, firewalls, antivirus, and endpoint protection. Hands-on experience with security tools such as Splunk, Wireshark, Nessus, and Metasploit. Experience with threat hunting, malware analysis, and forensic investigation techniques. Understanding of common cybersecurity frameworks and standards (e.g., NIST, ISO 27001, CIS Controls). Excellent analytical and problem-solving skills with a keen attention to detail. Strong communication and interpersonal skills, with the ability to effectively communicate technical information to non-technical stakeholders. Relevant certifications such as CISSP, CEH, or GIAC are a plus. If you are looking for your next challenge in a cybersecurity focussed environment than look no further. Please apply with an up-to-date CV to be considered. In Technology Group Ltd is acting as an Employment Agency in relation to this vacancy.
Job Title: Cyber Security Analyst Location: London Salary: 50,000 We are working with a leading cyber security service provider a leading provider of innovative cybersecurity solutions dedicated to safeguarding digital assets and protecting businesses from evolving cyber threats. With a commitment to excellence and a passion for staying ahead of the curve, we are seeking a talented Cyber Security Analyst to join our dynamic team. If you're passionate about cybersecurity and thrive in a fast-paced environment, we want to hear from you! As a Cyber Security Analyst, you will play a crucial role in protecting the organization's digital infrastructure and ensuring the confidentiality, integrity, and availability of our information assets. You will analyse and respond to security incidents, conduct thorough investigations, and implement proactive measures to mitigate risks and vulnerabilities. This position offers an exciting opportunity to work with cutting-edge technologies and collaborate with a team of skilled professionals dedicated to staying ahead of cyber threats. Responsibilities: Monitor and analyse security events and incidents using SIEM tools to identify potential threats and vulnerabilities. Conduct in-depth investigations into security incidents, including malware analysis, network forensics, and log analysis. Develop and maintain security policies, procedures, and standards to ensure compliance with industry regulations and best practices. Collaborate with cross-functional teams to implement security controls and measures to protect against emerging threats. Perform regular security assessments and penetration tests to identify and remediate vulnerabilities in the organization's systems and applications. Stay abreast of the latest cybersecurity trends, threats, and technologies to continuously improve the organization's security posture. Provide guidance and support to internal stakeholders on cybersecurity best practices and incident response procedures. Participate in security awareness training and education programs for employees to promote a culture of security awareness and compliance. Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field. Experience in a cybersecurity role, preferably as a Security Analyst or Incident Responder. Strong knowledge of cybersecurity principles, practices, and technologies, including SIEM, IDS/IPS, firewalls, antivirus, and endpoint protection. Hands-on experience with security tools such as Splunk, Wireshark, Nessus, and Metasploit. Experience with threat hunting, malware analysis, and forensic investigation techniques. Understanding of common cybersecurity frameworks and standards (e.g., NIST, ISO 27001, CIS Controls). Excellent analytical and problem-solving skills with a keen attention to detail. Strong communication and interpersonal skills, with the ability to effectively communicate technical information to non-technical stakeholders. Relevant certifications such as CISSP, CEH, or GIAC are a plus. If you are looking for your next challenge in a cybersecurity focussed environment than look no further. Please apply with an up-to-date CV to be considered. In Technology Group Ltd is acting as an Employment Agency in relation to this vacancy.
Mar 25, 2024
Full time
Job Title: Cyber Security Analyst Location: London Salary: 50,000 We are working with a leading cyber security service provider a leading provider of innovative cybersecurity solutions dedicated to safeguarding digital assets and protecting businesses from evolving cyber threats. With a commitment to excellence and a passion for staying ahead of the curve, we are seeking a talented Cyber Security Analyst to join our dynamic team. If you're passionate about cybersecurity and thrive in a fast-paced environment, we want to hear from you! As a Cyber Security Analyst, you will play a crucial role in protecting the organization's digital infrastructure and ensuring the confidentiality, integrity, and availability of our information assets. You will analyse and respond to security incidents, conduct thorough investigations, and implement proactive measures to mitigate risks and vulnerabilities. This position offers an exciting opportunity to work with cutting-edge technologies and collaborate with a team of skilled professionals dedicated to staying ahead of cyber threats. Responsibilities: Monitor and analyse security events and incidents using SIEM tools to identify potential threats and vulnerabilities. Conduct in-depth investigations into security incidents, including malware analysis, network forensics, and log analysis. Develop and maintain security policies, procedures, and standards to ensure compliance with industry regulations and best practices. Collaborate with cross-functional teams to implement security controls and measures to protect against emerging threats. Perform regular security assessments and penetration tests to identify and remediate vulnerabilities in the organization's systems and applications. Stay abreast of the latest cybersecurity trends, threats, and technologies to continuously improve the organization's security posture. Provide guidance and support to internal stakeholders on cybersecurity best practices and incident response procedures. Participate in security awareness training and education programs for employees to promote a culture of security awareness and compliance. Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field. Experience in a cybersecurity role, preferably as a Security Analyst or Incident Responder. Strong knowledge of cybersecurity principles, practices, and technologies, including SIEM, IDS/IPS, firewalls, antivirus, and endpoint protection. Hands-on experience with security tools such as Splunk, Wireshark, Nessus, and Metasploit. Experience with threat hunting, malware analysis, and forensic investigation techniques. Understanding of common cybersecurity frameworks and standards (e.g., NIST, ISO 27001, CIS Controls). Excellent analytical and problem-solving skills with a keen attention to detail. Strong communication and interpersonal skills, with the ability to effectively communicate technical information to non-technical stakeholders. Relevant certifications such as CISSP, CEH, or GIAC are a plus. If you are looking for your next challenge in a cybersecurity focussed environment than look no further. Please apply with an up-to-date CV to be considered. In Technology Group Ltd is acting as an Employment Agency in relation to this vacancy.
I nformation Security Analyst (GRC) Are you passionate about driving information security to new heights?We are seeking an Information Security Analyst (GRC) to join a leading law firm in London. In this role, you will implement crucial information security tasks, supporting the Head of Information Security (CISO) navigating two key streams in the organisational structure: Policy & Compliance and Operations. The role offers hybrid working, 3 days a week in the London office. Roles and Responsibilities: Assess vendor security aligned with ISO27001, NIST, CIS, and Cyber Essentials. Manage policy updates, risk tracking, and certification programs. Maintain information security tools and reporting activities. Support internal and external audits. Collaborate for tests, vulnerability uncovering, and audit trail. Drive security-by-design and incident management. Qualifications and Experience: CISA, ISO/IEC 27001 Lead Auditor, or Implementer qualification. Experience in Audit, Risk programs coordination. CISSP, CISM, CISA or ISO certifications advantageous. Strong background in information security and risk. Proficiency in network testing, firewalls, SIEM, etc. Ability to mitigate vulnerabilities, manage patches. GRC experience in Infrastructure or Audit roles. If you are ready to elevate your career in Information Security with a dynamic and forward-thinking firm, we invite you to click 'apply' now.
Mar 25, 2024
Full time
I nformation Security Analyst (GRC) Are you passionate about driving information security to new heights?We are seeking an Information Security Analyst (GRC) to join a leading law firm in London. In this role, you will implement crucial information security tasks, supporting the Head of Information Security (CISO) navigating two key streams in the organisational structure: Policy & Compliance and Operations. The role offers hybrid working, 3 days a week in the London office. Roles and Responsibilities: Assess vendor security aligned with ISO27001, NIST, CIS, and Cyber Essentials. Manage policy updates, risk tracking, and certification programs. Maintain information security tools and reporting activities. Support internal and external audits. Collaborate for tests, vulnerability uncovering, and audit trail. Drive security-by-design and incident management. Qualifications and Experience: CISA, ISO/IEC 27001 Lead Auditor, or Implementer qualification. Experience in Audit, Risk programs coordination. CISSP, CISM, CISA or ISO certifications advantageous. Strong background in information security and risk. Proficiency in network testing, firewalls, SIEM, etc. Ability to mitigate vulnerabilities, manage patches. GRC experience in Infrastructure or Audit roles. If you are ready to elevate your career in Information Security with a dynamic and forward-thinking firm, we invite you to click 'apply' now.
Overview: Ensure all your application information is up to date and in order before applying for this opportunity. The Senior Infrastructure Analyst will manage and participate in the delivery and support of IT infrastructure and IT infrastructure security for new and existing systems / solutions. You will ensure RSSB infrastructure is secure and adheres to Cyber Security standards, manage DR processes and business continuity. Where appropriate, you will assist other team members in the provision of 2nd and 3rd line technical IM&T support (Desktop, Software, Infrastructure and Telephony), as well as maintain and deliver a high degree of customer service for all RSSB IM&T support queries and Requests for Change. Responsibilities: Proactively respond to security vulnerabilities identified by monitoring tools, performing remediation tasks Responsible for monitoring and reporting for on-premise and cloud infrastructure systems, for the early identification of issues Act as escalation point for technical issues Responsible for the security, effective management, administration and operation of the RSSB cloud and onsite physical infrastructure environment Management and oversight of the network infrastructure, including network switches, routers, firewalls and virtualised environment. Analyse and make recommendations to improve infrastructure, network, security and reliability of systems Responsible for system and data backups, restores and DR tests Work with the wider IM&T Team, business, internal and external business partners to ensure that security is factored into the evaluation, selection, installation, delivery and configuration process of solutions and systems Plan, manage and communicate infrastructure change with IT Operation Team Leads, Information Security manager and wider IM&T / business departments Mentor and coach colleagues and provide peer to peer advice, as required Qualifications: Computer science, Microsoft, CompTIA or related field qualifications / certifications or relevant demonstrable experience Proactive with a willingness to take ownership and responsibility for work tasks and issues, delivering a high standard of work Proficient in Windows Server v2008/2012/2019+ management to include Active Directory (AD) and Group Policy (GPO) and SQL Server Deploy patches and software applications using InTune / WSUS Knowledge of administering and supporting Azure AD, Azure IaaS/PaaS Management of backup/recovery solutions (g. Veeam, Arcserve) Experience with operating system hardening, vulnerability assessments, security audits, penetration testing, intrusion prevention systems and other security control systems for example PAM, SIEM, IDR etc. Practical experience with endpoint security, content filtering, vulnerability scanning and anti-malware Knowledge of at least one scripting language (e.g., PowerShell) MS InTune device management (mobile and Windows 10 OS) Effective communication, stakeholder' and supplier management skills Ability to work in Teams and individually using own initiative and capable of self-managing workload. Demonstrable knowledge of common vulnerabilities and exploitation techniques would be beneficial Familiarity with Cyber Essentials/Plus or ISO 27001 and ITIL best practice - Incident, Problem and Change management would be beneficial Early applications are encouraged, as we may close this vacancy before the advertised deadline if sufficient numbers of applications are received. We value diversity and equal opportunities in employment and are committed to creating a workplace which is inclusive to everyone. As a member of the Disability Confident Scheme, we encourage candidates with disabilities who meet the minimum criteria, to apply for our jobs. If you have applied under the Disability Confident Scheme, please let us know in advance by emailing If you require any reasonable adjustments with respect to our selection process including information in an alternative format, please contact us at We understand the importance of work-life balance and we offer our staff the flexibility to work within our core hours and the option to vary their location between both the office and home. If you are looking for further flexibility, speak to us at interview stage so that we can consider your request. We value our staff and we offer a competitive benefits package to ensure our staff can achieve their best throughout their journey with us. This includes 30 days annual leave (plus bank holidays); a holiday buy and sell scheme; private medical and dental cover; a season ticket loan and travel subsidy; access to a cycle to work scheme; volunteer leave; a performance related bonus and pension.
Sep 24, 2022
Full time
Overview: Ensure all your application information is up to date and in order before applying for this opportunity. The Senior Infrastructure Analyst will manage and participate in the delivery and support of IT infrastructure and IT infrastructure security for new and existing systems / solutions. You will ensure RSSB infrastructure is secure and adheres to Cyber Security standards, manage DR processes and business continuity. Where appropriate, you will assist other team members in the provision of 2nd and 3rd line technical IM&T support (Desktop, Software, Infrastructure and Telephony), as well as maintain and deliver a high degree of customer service for all RSSB IM&T support queries and Requests for Change. Responsibilities: Proactively respond to security vulnerabilities identified by monitoring tools, performing remediation tasks Responsible for monitoring and reporting for on-premise and cloud infrastructure systems, for the early identification of issues Act as escalation point for technical issues Responsible for the security, effective management, administration and operation of the RSSB cloud and onsite physical infrastructure environment Management and oversight of the network infrastructure, including network switches, routers, firewalls and virtualised environment. Analyse and make recommendations to improve infrastructure, network, security and reliability of systems Responsible for system and data backups, restores and DR tests Work with the wider IM&T Team, business, internal and external business partners to ensure that security is factored into the evaluation, selection, installation, delivery and configuration process of solutions and systems Plan, manage and communicate infrastructure change with IT Operation Team Leads, Information Security manager and wider IM&T / business departments Mentor and coach colleagues and provide peer to peer advice, as required Qualifications: Computer science, Microsoft, CompTIA or related field qualifications / certifications or relevant demonstrable experience Proactive with a willingness to take ownership and responsibility for work tasks and issues, delivering a high standard of work Proficient in Windows Server v2008/2012/2019+ management to include Active Directory (AD) and Group Policy (GPO) and SQL Server Deploy patches and software applications using InTune / WSUS Knowledge of administering and supporting Azure AD, Azure IaaS/PaaS Management of backup/recovery solutions (g. Veeam, Arcserve) Experience with operating system hardening, vulnerability assessments, security audits, penetration testing, intrusion prevention systems and other security control systems for example PAM, SIEM, IDR etc. Practical experience with endpoint security, content filtering, vulnerability scanning and anti-malware Knowledge of at least one scripting language (e.g., PowerShell) MS InTune device management (mobile and Windows 10 OS) Effective communication, stakeholder' and supplier management skills Ability to work in Teams and individually using own initiative and capable of self-managing workload. Demonstrable knowledge of common vulnerabilities and exploitation techniques would be beneficial Familiarity with Cyber Essentials/Plus or ISO 27001 and ITIL best practice - Incident, Problem and Change management would be beneficial Early applications are encouraged, as we may close this vacancy before the advertised deadline if sufficient numbers of applications are received. We value diversity and equal opportunities in employment and are committed to creating a workplace which is inclusive to everyone. As a member of the Disability Confident Scheme, we encourage candidates with disabilities who meet the minimum criteria, to apply for our jobs. If you have applied under the Disability Confident Scheme, please let us know in advance by emailing If you require any reasonable adjustments with respect to our selection process including information in an alternative format, please contact us at We understand the importance of work-life balance and we offer our staff the flexibility to work within our core hours and the option to vary their location between both the office and home. If you are looking for further flexibility, speak to us at interview stage so that we can consider your request. We value our staff and we offer a competitive benefits package to ensure our staff can achieve their best throughout their journey with us. This includes 30 days annual leave (plus bank holidays); a holiday buy and sell scheme; private medical and dental cover; a season ticket loan and travel subsidy; access to a cycle to work scheme; volunteer leave; a performance related bonus and pension.
Governance Risk and Control Analyst/Tester Inside IR35 Leading banking client requires an experienced Governance Risk and Control Analyst/Tester to join on an initial 6 month contract to conduct controls testing of cybersecurity controls against industry security frameworks (e.g., SOX ISO27001. NIST Cybersecurity Improvement framework, FFIEC). Experience of working as an IT auditor, security auditor or governance, risk and compliance analyst Good understanding of cybersecurity/IT control frameworks including but not limited to frameworks from SOX, FFIEC, ISO27001, NIST, Cloud Security Alliance, and PCI-DSS Proven understanding of current best practice approach to security assurance and the application of security frameworks Experience in project management Planning and prioritizing multiple project work streams in response to rapidly developing and changing portfolios. Experience of security risk management Broad knowledge of computer, networking and IT security systems including operating systems, databases, firewalls, SIEM, DLP etc Ability to handle ambiguity and make decisions and recommendations with limited data Solid analytical/problem-solving skills with capability to identify solutions to unusual and complex problems Good presentation, documentation and reporting skills Essential skills: Experience in managing multiple tasks with broad scope, ambiguity, and high degree of difficulty Experience in providing assurance for cybersecurity technologies, policies, standards and procedures Demonstrable proficiency in a wide range of information IT security domains such as Security Governance, Identity and Access Management, Access Controls, Threat Intelligence, Asset Management, Risk Management, Security Assessment/Testing, Security Incident Management and Vulnerability and Patch Management Possessing high level of analytical ability where problems are typically unusual and difficult Ability to maintain a working knowledge of cybersecurity principles and elements Understand global IT risk management structure Demonstrable experience of senior stakeholder management and relevant management reporting. Ability to coach team members through knowledge transfer and constructive feedback Governance Risk and Control Analyst/Tester Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants who are considered suitable for interview will be contacted. Proactive Appointments Limited operates as an employment agency and employment business and is an equal opportunities organisation We take our obligations to protect your personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on our website
Sep 10, 2021
Contractor
Governance Risk and Control Analyst/Tester Inside IR35 Leading banking client requires an experienced Governance Risk and Control Analyst/Tester to join on an initial 6 month contract to conduct controls testing of cybersecurity controls against industry security frameworks (e.g., SOX ISO27001. NIST Cybersecurity Improvement framework, FFIEC). Experience of working as an IT auditor, security auditor or governance, risk and compliance analyst Good understanding of cybersecurity/IT control frameworks including but not limited to frameworks from SOX, FFIEC, ISO27001, NIST, Cloud Security Alliance, and PCI-DSS Proven understanding of current best practice approach to security assurance and the application of security frameworks Experience in project management Planning and prioritizing multiple project work streams in response to rapidly developing and changing portfolios. Experience of security risk management Broad knowledge of computer, networking and IT security systems including operating systems, databases, firewalls, SIEM, DLP etc Ability to handle ambiguity and make decisions and recommendations with limited data Solid analytical/problem-solving skills with capability to identify solutions to unusual and complex problems Good presentation, documentation and reporting skills Essential skills: Experience in managing multiple tasks with broad scope, ambiguity, and high degree of difficulty Experience in providing assurance for cybersecurity technologies, policies, standards and procedures Demonstrable proficiency in a wide range of information IT security domains such as Security Governance, Identity and Access Management, Access Controls, Threat Intelligence, Asset Management, Risk Management, Security Assessment/Testing, Security Incident Management and Vulnerability and Patch Management Possessing high level of analytical ability where problems are typically unusual and difficult Ability to maintain a working knowledge of cybersecurity principles and elements Understand global IT risk management structure Demonstrable experience of senior stakeholder management and relevant management reporting. Ability to coach team members through knowledge transfer and constructive feedback Governance Risk and Control Analyst/Tester Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants who are considered suitable for interview will be contacted. Proactive Appointments Limited operates as an employment agency and employment business and is an equal opportunities organisation We take our obligations to protect your personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on our website
1st Line Support Analyst
Overview
A leading financial services company working on world class products used globally require a 1st Line Support Analyst to join their team in Reigate, Surrey.
Key Responsibilities
• Provide excellent customer service and be the first point of call for IT support queries from internal staff, this could be via phone, email, Skype, and face-to-face
• Administer the internal ticketing system and act upon requests for change and system access.
• Diagnose a wide range of issues focusing on the user workstation environments, but could include some server-side applications.
• Be able to spot potential technical vulnerabilities and suggest resolution.
• Proactively monitor systems and take preventative measures to reduce system downtime.
• Highlight possible trends from re-occurring incidents.
• Update the internal knowledgebase with both technical guides for colleagues, and system usage procedures to aid customers.
• Work collaboratively with third party support services on diagnosing and troubleshooting issues.
• Adhere to all IT security policies and assistance in enforcing and monitoring of IT security policies.
• Understand the requirements of the business and suggest appropriate solutions to help deliver business goals.
• Perform as a member of the IT Infrastructure Team, working closely with other senior team members, and colleagues across the IT department in order to support all systems and technical processes.
Essential Experience
• Strong 1st line technical help desk experience, with proven track record of support.
• Basic 2nd line technical support experience.
• Excellent experience with Microsoft technologies with a focus on end-user administration and client workstation support:
• Windows 7 and Windows 10 desktop support experience in a business environment.
• Active Directory and Group Policy administration.
• MS Exchange administration.
• Excellent experience of diagnosing/troubleshooting issues with physical workstation hardware, ideally Dell business desktops/laptops.
• Good knowledge of managing mobiles, ideally Apple iOS devices.
• Proficient understanding of networking and technologies:
• The TCP/IP stack.
• Concepts of firewalls, VPNs, and VLANs,
• Wireless configurations.
• Knowledge of procedural best practice in a help desk environment.
• Highly self-motivated and internally driven to understand and improve upon the technical aspects of any solution.
• Ability to present ideas in a user-friendly language.
• Experience working in a team-oriented, collaborative environment.
Package
•£25-35k salary dependant on experience
• Annual bonus
• 13% company contribution pension
• Life assurance
• 35 hour standard working week
• Private medical
Oct 29, 2018
1st Line Support Analyst
Overview
A leading financial services company working on world class products used globally require a 1st Line Support Analyst to join their team in Reigate, Surrey.
Key Responsibilities
• Provide excellent customer service and be the first point of call for IT support queries from internal staff, this could be via phone, email, Skype, and face-to-face
• Administer the internal ticketing system and act upon requests for change and system access.
• Diagnose a wide range of issues focusing on the user workstation environments, but could include some server-side applications.
• Be able to spot potential technical vulnerabilities and suggest resolution.
• Proactively monitor systems and take preventative measures to reduce system downtime.
• Highlight possible trends from re-occurring incidents.
• Update the internal knowledgebase with both technical guides for colleagues, and system usage procedures to aid customers.
• Work collaboratively with third party support services on diagnosing and troubleshooting issues.
• Adhere to all IT security policies and assistance in enforcing and monitoring of IT security policies.
• Understand the requirements of the business and suggest appropriate solutions to help deliver business goals.
• Perform as a member of the IT Infrastructure Team, working closely with other senior team members, and colleagues across the IT department in order to support all systems and technical processes.
Essential Experience
• Strong 1st line technical help desk experience, with proven track record of support.
• Basic 2nd line technical support experience.
• Excellent experience with Microsoft technologies with a focus on end-user administration and client workstation support:
• Windows 7 and Windows 10 desktop support experience in a business environment.
• Active Directory and Group Policy administration.
• MS Exchange administration.
• Excellent experience of diagnosing/troubleshooting issues with physical workstation hardware, ideally Dell business desktops/laptops.
• Good knowledge of managing mobiles, ideally Apple iOS devices.
• Proficient understanding of networking and technologies:
• The TCP/IP stack.
• Concepts of firewalls, VPNs, and VLANs,
• Wireless configurations.
• Knowledge of procedural best practice in a help desk environment.
• Highly self-motivated and internally driven to understand and improve upon the technical aspects of any solution.
• Ability to present ideas in a user-friendly language.
• Experience working in a team-oriented, collaborative environment.
Package
•£25-35k salary dependant on experience
• Annual bonus
• 13% company contribution pension
• Life assurance
• 35 hour standard working week
• Private medical
SOC Analyst
Birmingham
£35,000 - £45,000
Benefits: 25 days annual leave + bank holidays, private medical, 10% pension, Life Insurance + further benefits
Our client a large digital transformation consultancy are looking for a SOC Specialist to join their current team. You will work as a SOC Analyst within a 24x7 SOC operational support environments incorporating a tiered security model across a range of security support functions.
The Opportunity
* This is an opportunity to work for a global leader within digital transformation across multiple business sectors and ultimately help organisations to create their firm of the future.
* You will join a rapidly growing Cybersecurity team that is continually dealing with emerging threats and vulnerabilities.
* You will work with the Senior SOC Specialist in the undertaking of system and security monitoring of supported commercial and government customer security deployments.
* Security Information and Event Management (SIEM)
* Network IDS/IPS management and support
* Web Application Firewalls (WAF)
* Incident Management
* Work with vendor TAC in provision of relevant information/logs
* Review and update of SOC support documentation
* Planning (change control management/representation at CAB)
Required Experience
* You will have/the ability to gain SC clearance along with Office for Nuclear Regulation clearance
* Requirement for flexibility in working hours, mixing standard core office hours during Monday - Friday with occasional requirements for late night working, weekend work and adhoc shift coverage – adaptable approach to work requirements is fundamental for role.
* Experience in systems (Linux/Unix) and networking
* Experience of vulnerability and threat assessment
* Experience of Intrusion detection and prevention systems
* Experience of Web-based application security
* Ability to develop custom code (Perl / shell scripting etc.)
If you are interested in this great opportunity, please do send your most up to date CV
Oct 29, 2018
SOC Analyst
Birmingham
£35,000 - £45,000
Benefits: 25 days annual leave + bank holidays, private medical, 10% pension, Life Insurance + further benefits
Our client a large digital transformation consultancy are looking for a SOC Specialist to join their current team. You will work as a SOC Analyst within a 24x7 SOC operational support environments incorporating a tiered security model across a range of security support functions.
The Opportunity
* This is an opportunity to work for a global leader within digital transformation across multiple business sectors and ultimately help organisations to create their firm of the future.
* You will join a rapidly growing Cybersecurity team that is continually dealing with emerging threats and vulnerabilities.
* You will work with the Senior SOC Specialist in the undertaking of system and security monitoring of supported commercial and government customer security deployments.
* Security Information and Event Management (SIEM)
* Network IDS/IPS management and support
* Web Application Firewalls (WAF)
* Incident Management
* Work with vendor TAC in provision of relevant information/logs
* Review and update of SOC support documentation
* Planning (change control management/representation at CAB)
Required Experience
* You will have/the ability to gain SC clearance along with Office for Nuclear Regulation clearance
* Requirement for flexibility in working hours, mixing standard core office hours during Monday - Friday with occasional requirements for late night working, weekend work and adhoc shift coverage – adaptable approach to work requirements is fundamental for role.
* Experience in systems (Linux/Unix) and networking
* Experience of vulnerability and threat assessment
* Experience of Intrusion detection and prevention systems
* Experience of Web-based application security
* Ability to develop custom code (Perl / shell scripting etc.)
If you are interested in this great opportunity, please do send your most up to date CV
1st Line Support Analyst
Overview
A leading financial services company working on world class products used globally require a 1st Line Support Analyst to join their team in Reigate, Surrey.
Key Responsibilities
• Provide excellent customer service and be the first point of call for IT support queries from internal staff, this could be via phone, email, Skype, and face-to-face
• Administer the internal ticketing system and act upon requests for change and system access.
• Diagnose a wide range of issues focusing on the user workstation environments, but could include some server-side applications.
• Be able to spot potential technical vulnerabilities and suggest resolution.
• Proactively monitor systems and take preventative measures to reduce system downtime.
• Highlight possible trends from re-occurring incidents.
• Update the internal knowledgebase with both technical guides for colleagues, and system usage procedures to aid customers.
• Work collaboratively with third party support services on diagnosing and troubleshooting issues.
• Adhere to all IT security policies and assistance in enforcing and monitoring of IT security policies.
• Understand the requirements of the business and suggest appropriate solutions to help deliver business goals.
• Perform as a member of the IT Infrastructure Team, working closely with other senior team members, and colleagues across the IT department in order to support all systems and technical processes.
Essential Experience
• Strong 1st line technical help desk experience, with proven track record of support.
• Basic 2nd line technical support experience.
• Excellent experience with Microsoft technologies with a focus on end-user administration and client workstation support:
• Windows 7 and Windows 10 desktop support experience in a business environment.
• Active Directory and Group Policy administration.
• MS Exchange administration.
• Excellent experience of diagnosing/troubleshooting issues with physical workstation hardware, ideally Dell business desktops/laptops.
• Good knowledge of managing mobiles, ideally Apple iOS devices.
• Proficient understanding of networking and technologies:
• The TCP/IP stack.
• Concepts of firewalls, VPNs, and VLANs,
• Wireless configurations.
• Knowledge of procedural best practice in a help desk environment.
• Highly self-motivated and internally driven to understand and improve upon the technical aspects of any solution.
• Ability to present ideas in a user-friendly language.
• Experience working in a team-oriented, collaborative environment.
Package
•£25-35k salary dependant on experience
• Annual bonus
• 13% company contribution pension
• Life assurance
• 35 hour standard working week
• Private medical
Oct 29, 2018
1st Line Support Analyst
Overview
A leading financial services company working on world class products used globally require a 1st Line Support Analyst to join their team in Reigate, Surrey.
Key Responsibilities
• Provide excellent customer service and be the first point of call for IT support queries from internal staff, this could be via phone, email, Skype, and face-to-face
• Administer the internal ticketing system and act upon requests for change and system access.
• Diagnose a wide range of issues focusing on the user workstation environments, but could include some server-side applications.
• Be able to spot potential technical vulnerabilities and suggest resolution.
• Proactively monitor systems and take preventative measures to reduce system downtime.
• Highlight possible trends from re-occurring incidents.
• Update the internal knowledgebase with both technical guides for colleagues, and system usage procedures to aid customers.
• Work collaboratively with third party support services on diagnosing and troubleshooting issues.
• Adhere to all IT security policies and assistance in enforcing and monitoring of IT security policies.
• Understand the requirements of the business and suggest appropriate solutions to help deliver business goals.
• Perform as a member of the IT Infrastructure Team, working closely with other senior team members, and colleagues across the IT department in order to support all systems and technical processes.
Essential Experience
• Strong 1st line technical help desk experience, with proven track record of support.
• Basic 2nd line technical support experience.
• Excellent experience with Microsoft technologies with a focus on end-user administration and client workstation support:
• Windows 7 and Windows 10 desktop support experience in a business environment.
• Active Directory and Group Policy administration.
• MS Exchange administration.
• Excellent experience of diagnosing/troubleshooting issues with physical workstation hardware, ideally Dell business desktops/laptops.
• Good knowledge of managing mobiles, ideally Apple iOS devices.
• Proficient understanding of networking and technologies:
• The TCP/IP stack.
• Concepts of firewalls, VPNs, and VLANs,
• Wireless configurations.
• Knowledge of procedural best practice in a help desk environment.
• Highly self-motivated and internally driven to understand and improve upon the technical aspects of any solution.
• Ability to present ideas in a user-friendly language.
• Experience working in a team-oriented, collaborative environment.
Package
•£25-35k salary dependant on experience
• Annual bonus
• 13% company contribution pension
• Life assurance
• 35 hour standard working week
• Private medical
A leading Government body requires a Cyber Security Analyst to join their team in Southport on a 12 month contract basis. Candidates who already hold Security Clearance are preferred but all candidates must be willing to go through SC.
As a Security Analyst, your role on the team will include leveraging your knowledge of industry best practices, good judgment and problem solving skills to execute security operations. Areas of concentration include firewalls, intrusion detection/prevention, encryption, antivirus, incident response, and security event management.
Technologies of specific interest (desirable but not essential) include:
Familiarity with Wireless NAC, ELK, and RSA Envision
In this position you will:
* Provide security monitoring for a growing environment; support incident responses and provide root cause analysis support for incidents.
* Provide Information Security Reporting and Metrics and provide input into improving information security reporting and metrics; identify/recommend improvements on internal investigation capabilities via tool building.
* Provide assistance in recovering from security breaches; participates in investigation and remediation of security incidents; establish configuration policies for security technologies.
* Review aggregated server logs, firewall logs, intrusion prevention logs, and network traffic for unusual or suspicious activity.
* Conduct research on emerging threats in support of security enhancement and development efforts; recommend security improvements, upgrades, and/or purchases.
* Create and maintain internal training materials and provide training to appropriate information systems staff; assist with propagating security awareness among employees.
* Working as part of a team, performing deep-dive incident analysis and determining if critical systems or data sets has been impacted.
* Coordinating the incident response of minor incidents by advising on remediation actions and escalating major incidents to the designated parties.
* Generating tailored reports of minor and major incidents. .
* Recording lessons learnt and improving existing processes and procedures.
* Processing incident communications to include initial reporting, follow-ups, requests for information, and resolution activity.
* Providing support for new analytic methods for detecting threats.
* Continuously seeking to identify potential service and process improvements.
Experience
- Have a strong IT technical background and experience working in a SOC environment. - Has functional knowledge of understanding and configuring open source toolsets. Examples are Splunk, Logstash, Redis, ElasticsSearch, and Kibana (ELK).
- Has utilised toolsets for analysis such as but not limited to SIEMs (e.g. Splunk, ELK, LogRhythm, MacAfee, IBM QRadar, etc.), IDS/IPS (e.g. network- and host-based), NAC, FIM, DLP, vulnerability management tools, network monitoring tools, Cyber Security Case management (eg SNow), etc.
- Functional knowledge of TCP/IP protocol suite, LAN/WAN technologies, switching, routing, VoIP and Telephony technologies, firewalls and VPN, intrusion prevention systems (IPS), vulnerability assessment and patch management tools.
- Functional knowledge of UNIX, Linux, Apple and Windows technologies.
- Functional knowledge of operating protocol analysers and analysing output.
- Functional experience performing monitoring, analysis and recovery procedures or security technologies.
- Functional experience performing deep-dive incident analysis by correlating data from various sources.
- Experience of using Security Information and Event Management (SIEM) platforms, and Case Management tools.
- Knowledge of targeted cyber attack analysis and response, and coordinating incident response processes.
- Active CISSP, SSCP, SANS certifications, Security or equivalents
Sep 09, 2016
A leading Government body requires a Cyber Security Analyst to join their team in Southport on a 12 month contract basis. Candidates who already hold Security Clearance are preferred but all candidates must be willing to go through SC.
As a Security Analyst, your role on the team will include leveraging your knowledge of industry best practices, good judgment and problem solving skills to execute security operations. Areas of concentration include firewalls, intrusion detection/prevention, encryption, antivirus, incident response, and security event management.
Technologies of specific interest (desirable but not essential) include:
Familiarity with Wireless NAC, ELK, and RSA Envision
In this position you will:
* Provide security monitoring for a growing environment; support incident responses and provide root cause analysis support for incidents.
* Provide Information Security Reporting and Metrics and provide input into improving information security reporting and metrics; identify/recommend improvements on internal investigation capabilities via tool building.
* Provide assistance in recovering from security breaches; participates in investigation and remediation of security incidents; establish configuration policies for security technologies.
* Review aggregated server logs, firewall logs, intrusion prevention logs, and network traffic for unusual or suspicious activity.
* Conduct research on emerging threats in support of security enhancement and development efforts; recommend security improvements, upgrades, and/or purchases.
* Create and maintain internal training materials and provide training to appropriate information systems staff; assist with propagating security awareness among employees.
* Working as part of a team, performing deep-dive incident analysis and determining if critical systems or data sets has been impacted.
* Coordinating the incident response of minor incidents by advising on remediation actions and escalating major incidents to the designated parties.
* Generating tailored reports of minor and major incidents. .
* Recording lessons learnt and improving existing processes and procedures.
* Processing incident communications to include initial reporting, follow-ups, requests for information, and resolution activity.
* Providing support for new analytic methods for detecting threats.
* Continuously seeking to identify potential service and process improvements.
Experience
- Have a strong IT technical background and experience working in a SOC environment. - Has functional knowledge of understanding and configuring open source toolsets. Examples are Splunk, Logstash, Redis, ElasticsSearch, and Kibana (ELK).
- Has utilised toolsets for analysis such as but not limited to SIEMs (e.g. Splunk, ELK, LogRhythm, MacAfee, IBM QRadar, etc.), IDS/IPS (e.g. network- and host-based), NAC, FIM, DLP, vulnerability management tools, network monitoring tools, Cyber Security Case management (eg SNow), etc.
- Functional knowledge of TCP/IP protocol suite, LAN/WAN technologies, switching, routing, VoIP and Telephony technologies, firewalls and VPN, intrusion prevention systems (IPS), vulnerability assessment and patch management tools.
- Functional knowledge of UNIX, Linux, Apple and Windows technologies.
- Functional knowledge of operating protocol analysers and analysing output.
- Functional experience performing monitoring, analysis and recovery procedures or security technologies.
- Functional experience performing deep-dive incident analysis by correlating data from various sources.
- Experience of using Security Information and Event Management (SIEM) platforms, and Case Management tools.
- Knowledge of targeted cyber attack analysis and response, and coordinating incident response processes.
- Active CISSP, SSCP, SANS certifications, Security or equivalents
Job Title: Senior Cyber Security Analyst
* Working for Home Office
* The Maximum Pay Rate: £350 - £450
* Location: Salford and Southport
* Contract Length: 12 months (12/10/2016 to 26/10/2017)
* Security Clearance Level Required: SC
* Additional Info:Please note that one role will be based in Salford and there will be a second role based in Southport Please specify on you're Cover letter which location you want to be based at.
Description:
Main Duties and Responsibilities: Lead, supervise or directly manage a team of Digital Security Specialists; Lead on development of plans to safeguard computer files against accidental or unauthorised modification, destruction, or disclosure and to meet emergency data processing needs; Confer with users to discuss issues such as computer data access needs, security violations, and programming changes; Monitor current reports of computer viruses to determine when to update virus protection systems; Modify computer security files to incorporate new software, correct errors, or change individual access status; Coordinate implementation of computer system plan with establishment personnel and outside vendors; Train users and promote security awareness to ensure system security and to improve server and network efficiency.
Key tasks and deliverables:
As a Security Analyst, your role on the team will include leveraging your knowledge of industry best practices, good judgment and problem solving skills to execute security operations. Areas of concentration include firewalls, intrusion detection/prevention, encryption, antivirus, incident response, and security event management. Technologies of specific interest (desirable but not essential) include: Familiarity with Wireless NAC, ELK, and RSA Envision
In this position you will:
* Provide security monitoring for a growing environment; support incident responses and provide root cause analysis support for incidents.
* Provide Information Security Reporting and Metrics and provide input into improving information security reporting and metrics; identify/recommend improvements on internal investigation capabilities via tool building.
* Provide assistance in recovering from security breaches; participates in investigation and remediation of security incidents; establish configuration policies for security technologies.
* Review aggregated server logs, firewall logs, intrusion prevention logs, and network traffic for unusual or suspicious activity.
* Conduct research on emerging threats in support of security enhancement and development efforts; recommend security improvements, upgrades, and/or purchases.
* Create and maintain internal training materials and provide training to appropriate information systems staff; assist with propagating security awareness among employees.
* Working as part of a team, performing deep-dive incident analysis and determining if critical systems or data sets has been impacted.
* Coordinating the incident response of minor incidents by advising on remediation actions and escalating major incidents to the designated parties.
* Generating tailored reports of minor and major incidents.
* Recording lessons learnt and improving existing processes and procedures.
* Processing incident communications to include initial reporting, follow-ups, requests for information, and resolution activity.
* Providing support for new analytic methods for detecting threats.
* Continuously seeking to identify potential service and process improvements.
Experience Required
1. Have a strong IT technical background and experience working in a SOC environment.
2. Has functional knowledge of understanding and configuring open source toolsets. Examples are Splunk, Logstash, Redis, ElasticsSearch, and Kibana (ELK).
3. Has utilised toolsets for analysis such as but not limited to SIEMs (e.g. Splunk, ELK, LogRhythm, MacAfee, IBM QRadar, etc.), IDS/IPS (e.g. network- and host-based), NAC, FIM, DLP, vulnerability management tools, network monitoring tools, Cyber Security Case management (eg SNow), etc.
4. Functional knowledge of TCP/IP protocol suite, LAN/WAN technologies, switching, routing, VoIP and Telephony technologies, firewalls and VPN, intrusion prevention systems (IPS), vulnerability assessment and patch management tools.
5. Functional knowledge of UNIX, Linux, Apple and Windows technologies.
6. Functional knowledge of operating protocol analysers and analysing output.
7. Functional experience performing monitoring, analysis and recovery procedures or security technologies.
8. Functional experience performing deep-dive incident analysis by correlating data from various sources.
9. Experience of using Security Information and Event Management (SIEM) platforms, and Case Management tools.
10. Knowledge of targeted cyber attack analysis and response, and coordinating incident response processes.
11. Active CISSP, SSCP, SANS certifications, Security or equivalents
12. Knowledge of building and consuming RESTful web services.
13. Knowledge of JASON, Query String Query, and Python (or similar).
This vacancy is being advertised by Netforte Ltd. Netforte is a recruitment consultancy, the services advertised are those of an Employment Agency.
If your CV matches our clients requirements, we will forward your details to them to confirm your suitability. By applying for this role, you consent to the submission of your details for this purpose only.
Whilst we do our best to contact all candidates, due to the high number of applications we receive we cannot guarantee this for every role. If you have not heard anything from us within 7 days of applying - then unfortunately you have been unsuccessful
Sep 09, 2016
Job Title: Senior Cyber Security Analyst
* Working for Home Office
* The Maximum Pay Rate: £350 - £450
* Location: Salford and Southport
* Contract Length: 12 months (12/10/2016 to 26/10/2017)
* Security Clearance Level Required: SC
* Additional Info:Please note that one role will be based in Salford and there will be a second role based in Southport Please specify on you're Cover letter which location you want to be based at.
Description:
Main Duties and Responsibilities: Lead, supervise or directly manage a team of Digital Security Specialists; Lead on development of plans to safeguard computer files against accidental or unauthorised modification, destruction, or disclosure and to meet emergency data processing needs; Confer with users to discuss issues such as computer data access needs, security violations, and programming changes; Monitor current reports of computer viruses to determine when to update virus protection systems; Modify computer security files to incorporate new software, correct errors, or change individual access status; Coordinate implementation of computer system plan with establishment personnel and outside vendors; Train users and promote security awareness to ensure system security and to improve server and network efficiency.
Key tasks and deliverables:
As a Security Analyst, your role on the team will include leveraging your knowledge of industry best practices, good judgment and problem solving skills to execute security operations. Areas of concentration include firewalls, intrusion detection/prevention, encryption, antivirus, incident response, and security event management. Technologies of specific interest (desirable but not essential) include: Familiarity with Wireless NAC, ELK, and RSA Envision
In this position you will:
* Provide security monitoring for a growing environment; support incident responses and provide root cause analysis support for incidents.
* Provide Information Security Reporting and Metrics and provide input into improving information security reporting and metrics; identify/recommend improvements on internal investigation capabilities via tool building.
* Provide assistance in recovering from security breaches; participates in investigation and remediation of security incidents; establish configuration policies for security technologies.
* Review aggregated server logs, firewall logs, intrusion prevention logs, and network traffic for unusual or suspicious activity.
* Conduct research on emerging threats in support of security enhancement and development efforts; recommend security improvements, upgrades, and/or purchases.
* Create and maintain internal training materials and provide training to appropriate information systems staff; assist with propagating security awareness among employees.
* Working as part of a team, performing deep-dive incident analysis and determining if critical systems or data sets has been impacted.
* Coordinating the incident response of minor incidents by advising on remediation actions and escalating major incidents to the designated parties.
* Generating tailored reports of minor and major incidents.
* Recording lessons learnt and improving existing processes and procedures.
* Processing incident communications to include initial reporting, follow-ups, requests for information, and resolution activity.
* Providing support for new analytic methods for detecting threats.
* Continuously seeking to identify potential service and process improvements.
Experience Required
1. Have a strong IT technical background and experience working in a SOC environment.
2. Has functional knowledge of understanding and configuring open source toolsets. Examples are Splunk, Logstash, Redis, ElasticsSearch, and Kibana (ELK).
3. Has utilised toolsets for analysis such as but not limited to SIEMs (e.g. Splunk, ELK, LogRhythm, MacAfee, IBM QRadar, etc.), IDS/IPS (e.g. network- and host-based), NAC, FIM, DLP, vulnerability management tools, network monitoring tools, Cyber Security Case management (eg SNow), etc.
4. Functional knowledge of TCP/IP protocol suite, LAN/WAN technologies, switching, routing, VoIP and Telephony technologies, firewalls and VPN, intrusion prevention systems (IPS), vulnerability assessment and patch management tools.
5. Functional knowledge of UNIX, Linux, Apple and Windows technologies.
6. Functional knowledge of operating protocol analysers and analysing output.
7. Functional experience performing monitoring, analysis and recovery procedures or security technologies.
8. Functional experience performing deep-dive incident analysis by correlating data from various sources.
9. Experience of using Security Information and Event Management (SIEM) platforms, and Case Management tools.
10. Knowledge of targeted cyber attack analysis and response, and coordinating incident response processes.
11. Active CISSP, SSCP, SANS certifications, Security or equivalents
12. Knowledge of building and consuming RESTful web services.
13. Knowledge of JASON, Query String Query, and Python (or similar).
This vacancy is being advertised by Netforte Ltd. Netforte is a recruitment consultancy, the services advertised are those of an Employment Agency.
If your CV matches our clients requirements, we will forward your details to them to confirm your suitability. By applying for this role, you consent to the submission of your details for this purpose only.
Whilst we do our best to contact all candidates, due to the high number of applications we receive we cannot guarantee this for every role. If you have not heard anything from us within 7 days of applying - then unfortunately you have been unsuccessful
A leading Government body requires a Cyber Security Analyst to join their team in Southport on a 12 month contract basis. Candidates who already hold Security Clearance are preferred but all candidates must be willing to go through SC.
As a Security Analyst, your role on the team will include leveraging your knowledge of industry best practices, good judgment and problem solving skills to execute security operations. Areas of concentration include firewalls, intrusion detection/prevention, encryption, antivirus, incident response, and security event management.
Technologies of specific interest (desirable but not essential) include:
Familiarity with Wireless NAC, ELK, and RSA Envision
In this position you will:
* Provide security monitoring for a growing environment; support incident responses and provide root cause analysis support for incidents.
* Provide Information Security Reporting and Metrics and provide input into improving information security reporting and metrics; identify/recommend improvements on internal investigation capabilities via tool building.
* Provide assistance in recovering from security breaches; participates in investigation and remediation of security incidents; establish configuration policies for security technologies.
* Review aggregated server logs, firewall logs, intrusion prevention logs, and network traffic for unusual or suspicious activity.
* Conduct research on emerging threats in support of security enhancement and development efforts; recommend security improvements, upgrades, and/or purchases.
* Create and maintain internal training materials and provide training to appropriate information systems staff; assist with propagating security awareness among employees.
* Working as part of a team, performing deep-dive incident analysis and determining if critical systems or data sets has been impacted.
* Coordinating the incident response of minor incidents by advising on remediation actions and escalating major incidents to the designated parties.
* Generating tailored reports of minor and major incidents. .
* Recording lessons learnt and improving existing processes and procedures.
* Processing incident communications to include initial reporting, follow-ups, requests for information, and resolution activity.
* Providing support for new analytic methods for detecting threats.
* Continuously seeking to identify potential service and process improvements.
Experience
- Have a strong IT technical background and experience working in a SOC environment. - Has functional knowledge of understanding and configuring open source toolsets. Examples are Splunk, Logstash, Redis, ElasticsSearch, and Kibana (ELK).
- Has utilised toolsets for analysis such as but not limited to SIEMs (e.g. Splunk, ELK, LogRhythm, MacAfee, IBM QRadar, etc.), IDS/IPS (e.g. network- and host-based), NAC, FIM, DLP, vulnerability management tools, network monitoring tools, Cyber Security Case management (eg SNow), etc.
- Functional knowledge of TCP/IP protocol suite, LAN/WAN technologies, switching, routing, VoIP and Telephony technologies, firewalls and VPN, intrusion prevention systems (IPS), vulnerability assessment and patch management tools.
- Functional knowledge of UNIX, Linux, Apple and Windows technologies.
- Functional knowledge of operating protocol analysers and analysing output.
- Functional experience performing monitoring, analysis and recovery procedures or security technologies.
- Functional experience performing deep-dive incident analysis by correlating data from various sources.
- Experience of using Security Information and Event Management (SIEM) platforms, and Case Management tools.
- Knowledge of targeted cyber attack analysis and response, and coordinating incident response processes.
- Active CISSP, SSCP, SANS certifications, Security or equivalents
Sep 09, 2016
A leading Government body requires a Cyber Security Analyst to join their team in Southport on a 12 month contract basis. Candidates who already hold Security Clearance are preferred but all candidates must be willing to go through SC.
As a Security Analyst, your role on the team will include leveraging your knowledge of industry best practices, good judgment and problem solving skills to execute security operations. Areas of concentration include firewalls, intrusion detection/prevention, encryption, antivirus, incident response, and security event management.
Technologies of specific interest (desirable but not essential) include:
Familiarity with Wireless NAC, ELK, and RSA Envision
In this position you will:
* Provide security monitoring for a growing environment; support incident responses and provide root cause analysis support for incidents.
* Provide Information Security Reporting and Metrics and provide input into improving information security reporting and metrics; identify/recommend improvements on internal investigation capabilities via tool building.
* Provide assistance in recovering from security breaches; participates in investigation and remediation of security incidents; establish configuration policies for security technologies.
* Review aggregated server logs, firewall logs, intrusion prevention logs, and network traffic for unusual or suspicious activity.
* Conduct research on emerging threats in support of security enhancement and development efforts; recommend security improvements, upgrades, and/or purchases.
* Create and maintain internal training materials and provide training to appropriate information systems staff; assist with propagating security awareness among employees.
* Working as part of a team, performing deep-dive incident analysis and determining if critical systems or data sets has been impacted.
* Coordinating the incident response of minor incidents by advising on remediation actions and escalating major incidents to the designated parties.
* Generating tailored reports of minor and major incidents. .
* Recording lessons learnt and improving existing processes and procedures.
* Processing incident communications to include initial reporting, follow-ups, requests for information, and resolution activity.
* Providing support for new analytic methods for detecting threats.
* Continuously seeking to identify potential service and process improvements.
Experience
- Have a strong IT technical background and experience working in a SOC environment. - Has functional knowledge of understanding and configuring open source toolsets. Examples are Splunk, Logstash, Redis, ElasticsSearch, and Kibana (ELK).
- Has utilised toolsets for analysis such as but not limited to SIEMs (e.g. Splunk, ELK, LogRhythm, MacAfee, IBM QRadar, etc.), IDS/IPS (e.g. network- and host-based), NAC, FIM, DLP, vulnerability management tools, network monitoring tools, Cyber Security Case management (eg SNow), etc.
- Functional knowledge of TCP/IP protocol suite, LAN/WAN technologies, switching, routing, VoIP and Telephony technologies, firewalls and VPN, intrusion prevention systems (IPS), vulnerability assessment and patch management tools.
- Functional knowledge of UNIX, Linux, Apple and Windows technologies.
- Functional knowledge of operating protocol analysers and analysing output.
- Functional experience performing monitoring, analysis and recovery procedures or security technologies.
- Functional experience performing deep-dive incident analysis by correlating data from various sources.
- Experience of using Security Information and Event Management (SIEM) platforms, and Case Management tools.
- Knowledge of targeted cyber attack analysis and response, and coordinating incident response processes.
- Active CISSP, SSCP, SANS certifications, Security or equivalents
Job Title: Senior Cyber Security Analyst
* Working for Home Office
* The Maximum Pay Rate: £350 - £450
* Location: Salford and Southport
* Contract Length: 12 months (12/10/2016 to 26/10/2017)
* Security Clearance Level Required: SC
* Additional Info:Please note that one role will be based in Salford and there will be a second role based in Southport Please specify on you're Cover letter which location you want to be based at.
Description:
Main Duties and Responsibilities: Lead, supervise or directly manage a team of Digital Security Specialists; Lead on development of plans to safeguard computer files against accidental or unauthorised modification, destruction, or disclosure and to meet emergency data processing needs; Confer with users to discuss issues such as computer data access needs, security violations, and programming changes; Monitor current reports of computer viruses to determine when to update virus protection systems; Modify computer security files to incorporate new software, correct errors, or change individual access status; Coordinate implementation of computer system plan with establishment personnel and outside vendors; Train users and promote security awareness to ensure system security and to improve server and network efficiency.
Key tasks and deliverables:
As a Security Analyst, your role on the team will include leveraging your knowledge of industry best practices, good judgment and problem solving skills to execute security operations. Areas of concentration include firewalls, intrusion detection/prevention, encryption, antivirus, incident response, and security event management. Technologies of specific interest (desirable but not essential) include: Familiarity with Wireless NAC, ELK, and RSA Envision
In this position you will:
* Provide security monitoring for a growing environment; support incident responses and provide root cause analysis support for incidents.
* Provide Information Security Reporting and Metrics and provide input into improving information security reporting and metrics; identify/recommend improvements on internal investigation capabilities via tool building.
* Provide assistance in recovering from security breaches; participates in investigation and remediation of security incidents; establish configuration policies for security technologies.
* Review aggregated server logs, firewall logs, intrusion prevention logs, and network traffic for unusual or suspicious activity.
* Conduct research on emerging threats in support of security enhancement and development efforts; recommend security improvements, upgrades, and/or purchases.
* Create and maintain internal training materials and provide training to appropriate information systems staff; assist with propagating security awareness among employees.
* Working as part of a team, performing deep-dive incident analysis and determining if critical systems or data sets has been impacted.
* Coordinating the incident response of minor incidents by advising on remediation actions and escalating major incidents to the designated parties.
* Generating tailored reports of minor and major incidents.
* Recording lessons learnt and improving existing processes and procedures.
* Processing incident communications to include initial reporting, follow-ups, requests for information, and resolution activity.
* Providing support for new analytic methods for detecting threats.
* Continuously seeking to identify potential service and process improvements.
Experience Required
1. Have a strong IT technical background and experience working in a SOC environment.
2. Has functional knowledge of understanding and configuring open source toolsets. Examples are Splunk, Logstash, Redis, ElasticsSearch, and Kibana (ELK).
3. Has utilised toolsets for analysis such as but not limited to SIEMs (e.g. Splunk, ELK, LogRhythm, MacAfee, IBM QRadar, etc.), IDS/IPS (e.g. network- and host-based), NAC, FIM, DLP, vulnerability management tools, network monitoring tools, Cyber Security Case management (eg SNow), etc.
4. Functional knowledge of TCP/IP protocol suite, LAN/WAN technologies, switching, routing, VoIP and Telephony technologies, firewalls and VPN, intrusion prevention systems (IPS), vulnerability assessment and patch management tools.
5. Functional knowledge of UNIX, Linux, Apple and Windows technologies.
6. Functional knowledge of operating protocol analysers and analysing output.
7. Functional experience performing monitoring, analysis and recovery procedures or security technologies.
8. Functional experience performing deep-dive incident analysis by correlating data from various sources.
9. Experience of using Security Information and Event Management (SIEM) platforms, and Case Management tools.
10. Knowledge of targeted cyber attack analysis and response, and coordinating incident response processes.
11. Active CISSP, SSCP, SANS certifications, Security or equivalents
12. Knowledge of building and consuming RESTful web services.
13. Knowledge of JASON, Query String Query, and Python (or similar).
This vacancy is being advertised by Netforte Ltd. Netforte is a recruitment consultancy, the services advertised are those of an Employment Agency.
If your CV matches our clients requirements, we will forward your details to them to confirm your suitability. By applying for this role, you consent to the submission of your details for this purpose only.
Whilst we do our best to contact all candidates, due to the high number of applications we receive we cannot guarantee this for every role. If you have not heard anything from us within 7 days of applying - then unfortunately you have been unsuccessful
Sep 09, 2016
Job Title: Senior Cyber Security Analyst
* Working for Home Office
* The Maximum Pay Rate: £350 - £450
* Location: Salford and Southport
* Contract Length: 12 months (12/10/2016 to 26/10/2017)
* Security Clearance Level Required: SC
* Additional Info:Please note that one role will be based in Salford and there will be a second role based in Southport Please specify on you're Cover letter which location you want to be based at.
Description:
Main Duties and Responsibilities: Lead, supervise or directly manage a team of Digital Security Specialists; Lead on development of plans to safeguard computer files against accidental or unauthorised modification, destruction, or disclosure and to meet emergency data processing needs; Confer with users to discuss issues such as computer data access needs, security violations, and programming changes; Monitor current reports of computer viruses to determine when to update virus protection systems; Modify computer security files to incorporate new software, correct errors, or change individual access status; Coordinate implementation of computer system plan with establishment personnel and outside vendors; Train users and promote security awareness to ensure system security and to improve server and network efficiency.
Key tasks and deliverables:
As a Security Analyst, your role on the team will include leveraging your knowledge of industry best practices, good judgment and problem solving skills to execute security operations. Areas of concentration include firewalls, intrusion detection/prevention, encryption, antivirus, incident response, and security event management. Technologies of specific interest (desirable but not essential) include: Familiarity with Wireless NAC, ELK, and RSA Envision
In this position you will:
* Provide security monitoring for a growing environment; support incident responses and provide root cause analysis support for incidents.
* Provide Information Security Reporting and Metrics and provide input into improving information security reporting and metrics; identify/recommend improvements on internal investigation capabilities via tool building.
* Provide assistance in recovering from security breaches; participates in investigation and remediation of security incidents; establish configuration policies for security technologies.
* Review aggregated server logs, firewall logs, intrusion prevention logs, and network traffic for unusual or suspicious activity.
* Conduct research on emerging threats in support of security enhancement and development efforts; recommend security improvements, upgrades, and/or purchases.
* Create and maintain internal training materials and provide training to appropriate information systems staff; assist with propagating security awareness among employees.
* Working as part of a team, performing deep-dive incident analysis and determining if critical systems or data sets has been impacted.
* Coordinating the incident response of minor incidents by advising on remediation actions and escalating major incidents to the designated parties.
* Generating tailored reports of minor and major incidents.
* Recording lessons learnt and improving existing processes and procedures.
* Processing incident communications to include initial reporting, follow-ups, requests for information, and resolution activity.
* Providing support for new analytic methods for detecting threats.
* Continuously seeking to identify potential service and process improvements.
Experience Required
1. Have a strong IT technical background and experience working in a SOC environment.
2. Has functional knowledge of understanding and configuring open source toolsets. Examples are Splunk, Logstash, Redis, ElasticsSearch, and Kibana (ELK).
3. Has utilised toolsets for analysis such as but not limited to SIEMs (e.g. Splunk, ELK, LogRhythm, MacAfee, IBM QRadar, etc.), IDS/IPS (e.g. network- and host-based), NAC, FIM, DLP, vulnerability management tools, network monitoring tools, Cyber Security Case management (eg SNow), etc.
4. Functional knowledge of TCP/IP protocol suite, LAN/WAN technologies, switching, routing, VoIP and Telephony technologies, firewalls and VPN, intrusion prevention systems (IPS), vulnerability assessment and patch management tools.
5. Functional knowledge of UNIX, Linux, Apple and Windows technologies.
6. Functional knowledge of operating protocol analysers and analysing output.
7. Functional experience performing monitoring, analysis and recovery procedures or security technologies.
8. Functional experience performing deep-dive incident analysis by correlating data from various sources.
9. Experience of using Security Information and Event Management (SIEM) platforms, and Case Management tools.
10. Knowledge of targeted cyber attack analysis and response, and coordinating incident response processes.
11. Active CISSP, SSCP, SANS certifications, Security or equivalents
12. Knowledge of building and consuming RESTful web services.
13. Knowledge of JASON, Query String Query, and Python (or similar).
This vacancy is being advertised by Netforte Ltd. Netforte is a recruitment consultancy, the services advertised are those of an Employment Agency.
If your CV matches our clients requirements, we will forward your details to them to confirm your suitability. By applying for this role, you consent to the submission of your details for this purpose only.
Whilst we do our best to contact all candidates, due to the high number of applications we receive we cannot guarantee this for every role. If you have not heard anything from us within 7 days of applying - then unfortunately you have been unsuccessful
A large and high profile organisation is looking for an IT & Information Security Analyst to assist in leading policy, process and strategic direction of Information Security throughout the organisation.
With support from the infrastructure and networking teams you will help to ensure Information and IT Security is fit for purpose, and that the information and IT systems are properly protected from any vulnerabilities, risks and threats.
Working to ISO27001 standards, the Information Security / IT Security Analyst will be required to get "hands-on" at times but also play a key role in liasing with third parties including IT security companies (liaising with them on new implementations, penetration testing, etc). You will help to advise on new procedures, technology and methods of working and will be aiming to achieve ISO27001 certification alongside the IT security and management teams.
Performing risk assessments, analysing vulnerability threats, breaches, incidents, DR and DLP capabilities will be part of the IT / Information Security Analysts role as well as helping to provide reports on such issues.
Benefits
In return for your hard work, you will join one of the most interesting organisations around and be challenged with keeping this great organisation safe and secure. An unbeatable benefits package is also on offer, including 20% pension contributions and 36 days holiday!
Information Security Analyst, IT Security Officer, Vulnerability, Risk, Breaches, Stakeholder Management, Pentest, Firewalls, Gateways, DLP, ISO27001, PCI DSS, CEH, CISSP, ITIL, IT Security, Information Security
Sep 09, 2016
A large and high profile organisation is looking for an IT & Information Security Analyst to assist in leading policy, process and strategic direction of Information Security throughout the organisation.
With support from the infrastructure and networking teams you will help to ensure Information and IT Security is fit for purpose, and that the information and IT systems are properly protected from any vulnerabilities, risks and threats.
Working to ISO27001 standards, the Information Security / IT Security Analyst will be required to get "hands-on" at times but also play a key role in liasing with third parties including IT security companies (liaising with them on new implementations, penetration testing, etc). You will help to advise on new procedures, technology and methods of working and will be aiming to achieve ISO27001 certification alongside the IT security and management teams.
Performing risk assessments, analysing vulnerability threats, breaches, incidents, DR and DLP capabilities will be part of the IT / Information Security Analysts role as well as helping to provide reports on such issues.
Benefits
In return for your hard work, you will join one of the most interesting organisations around and be challenged with keeping this great organisation safe and secure. An unbeatable benefits package is also on offer, including 20% pension contributions and 36 days holiday!
Information Security Analyst, IT Security Officer, Vulnerability, Risk, Breaches, Stakeholder Management, Pentest, Firewalls, Gateways, DLP, ISO27001, PCI DSS, CEH, CISSP, ITIL, IT Security, Information Security
Incident Analyst / Support
Purpose of role:
The Incident Response Analyst job is responsible for monitoring multiple sources of analytical computer and physical security related information. The Incident Response Analyst's main focus is to take this disparate information, and turn it into strategic and tactical intelligence that is relevant to protecting the companies lines of business. The output of this analysis will be used to ensure a consistent and coordinated response to on-going security threats ensuring the company can continue to operate safely and securely. This position requires shift work to provide round-the-clock operations.
Key Duties & Responsibilities - Please add the most important duties and responsibilities. Ensure that each duty / responsibility can be linked to the operational and the company’s strategy.
• Conduct network packet analysis using Wireshark, TCPDump, and internal Deep Packet Inspection Tools.
• Ability to work with internal partners and external security partners (MSSP) to proactively hunt and isolate threats on the Global network.
• Recommend and implement rules to support enforcement of Global security policies.
• Analyze malware and system forensics to determine level of impact.
• Coordination of incident response activities (escalations, notifications, conferences calls, etc)
• Promote awareness of security and technology through training and coaching
• Research, evaluate, and assess emerging threats, incidents, and vulnerabilities
• Other Duties as assigned
• Conduct network packet analysis using Wireshark, TCPDump, and internal Deep Packet Inspection Tools.
• Ability to work with internal partners and external security partners (MSSP) to proactively hunt and isolate threats on the Global network.
• Recommend and implement rules to support enforcement of Global security policies.
• Analyse malware and system forensics to determine level of impact.
• Coordination of incident response activities (escalations, notifications, conferences calls, etc)
• Promote awareness of security and technology through training and coaching
• Research, evaluate, and assess emerging threats, incidents, and vulnerabilities
• Other Duties as assigned
Key Results Indicators & Measures of success - Indicate what results the job holder will be accountable for and how success will be measured
Skills / Knowledge & Experience:
• Bachelor’s Degree in Computer Systems Engineering, Computer Science, Computer Information Systems or equivalent education and experience required.
• Specialized training in information security, computer systems engineering, and network engineering.
• Information Security certifications and Security Product Certifications are desirable.
• CISSP or applicable experience (SANs) in the Converged Security field.
• Candidates will have in depth architecture/engineering skills in the Information Security Field.
• Other necessary skills include Windows NT, knowledge of UNIX, understanding and experience with Internet technologies, such as: TCP/IP, DNS, HTTP, FTP, SMTP, SSL, PKI, Firewalls, load balancers, intrusion detection/prevention, Anti-virus, application security, policy development, risk assessments, encryption, and website monitoring.
• Candidates will have in depth experience with enterprise information security technologies
• Ability to lead cross functional teams, communicates well, and possess good analytical, technical, problem-solving, and organizational skills. Team members must have the ability to adjust quickly to shifting priorities and make quick decisions with limited information. They will also be able to make decisions independently and in a self-directed manner in support of the goals of the team and organization, as well as be motivated to tackle challenging problems.
Qualifications required:
• Technical / Professional qualification
• At least 5 years' commercial experience within a similar role
• Understanding of security protocols and all relevant relations such as HTTPS, TLS, SSL, SSH, PKI, IPSEC, VPN
• Understanding of Cloud and/or SAAS
• Ability to run and configure security testing tools and analyse the results.
• Experience of security monitoring and Security Operation Centre (SOC) tools
Desirable:
• Technical / Professional qualifications
• SANs Courses / Qualifications
• Certified Ethical Hacker (CEH)
• CCNA or other Cisco Qualifications
• Educational qualifications
• Bachelor’s degree in Computer Systems Engineering, Computer Science or related.
Incident Analyst / Support
Feb 21, 2016
Incident Analyst / Support
Purpose of role:
The Incident Response Analyst job is responsible for monitoring multiple sources of analytical computer and physical security related information. The Incident Response Analyst's main focus is to take this disparate information, and turn it into strategic and tactical intelligence that is relevant to protecting the companies lines of business. The output of this analysis will be used to ensure a consistent and coordinated response to on-going security threats ensuring the company can continue to operate safely and securely. This position requires shift work to provide round-the-clock operations.
Key Duties & Responsibilities - Please add the most important duties and responsibilities. Ensure that each duty / responsibility can be linked to the operational and the company’s strategy.
• Conduct network packet analysis using Wireshark, TCPDump, and internal Deep Packet Inspection Tools.
• Ability to work with internal partners and external security partners (MSSP) to proactively hunt and isolate threats on the Global network.
• Recommend and implement rules to support enforcement of Global security policies.
• Analyze malware and system forensics to determine level of impact.
• Coordination of incident response activities (escalations, notifications, conferences calls, etc)
• Promote awareness of security and technology through training and coaching
• Research, evaluate, and assess emerging threats, incidents, and vulnerabilities
• Other Duties as assigned
• Conduct network packet analysis using Wireshark, TCPDump, and internal Deep Packet Inspection Tools.
• Ability to work with internal partners and external security partners (MSSP) to proactively hunt and isolate threats on the Global network.
• Recommend and implement rules to support enforcement of Global security policies.
• Analyse malware and system forensics to determine level of impact.
• Coordination of incident response activities (escalations, notifications, conferences calls, etc)
• Promote awareness of security and technology through training and coaching
• Research, evaluate, and assess emerging threats, incidents, and vulnerabilities
• Other Duties as assigned
Key Results Indicators & Measures of success - Indicate what results the job holder will be accountable for and how success will be measured
Skills / Knowledge & Experience:
• Bachelor’s Degree in Computer Systems Engineering, Computer Science, Computer Information Systems or equivalent education and experience required.
• Specialized training in information security, computer systems engineering, and network engineering.
• Information Security certifications and Security Product Certifications are desirable.
• CISSP or applicable experience (SANs) in the Converged Security field.
• Candidates will have in depth architecture/engineering skills in the Information Security Field.
• Other necessary skills include Windows NT, knowledge of UNIX, understanding and experience with Internet technologies, such as: TCP/IP, DNS, HTTP, FTP, SMTP, SSL, PKI, Firewalls, load balancers, intrusion detection/prevention, Anti-virus, application security, policy development, risk assessments, encryption, and website monitoring.
• Candidates will have in depth experience with enterprise information security technologies
• Ability to lead cross functional teams, communicates well, and possess good analytical, technical, problem-solving, and organizational skills. Team members must have the ability to adjust quickly to shifting priorities and make quick decisions with limited information. They will also be able to make decisions independently and in a self-directed manner in support of the goals of the team and organization, as well as be motivated to tackle challenging problems.
Qualifications required:
• Technical / Professional qualification
• At least 5 years' commercial experience within a similar role
• Understanding of security protocols and all relevant relations such as HTTPS, TLS, SSL, SSH, PKI, IPSEC, VPN
• Understanding of Cloud and/or SAAS
• Ability to run and configure security testing tools and analyse the results.
• Experience of security monitoring and Security Operation Centre (SOC) tools
Desirable:
• Technical / Professional qualifications
• SANs Courses / Qualifications
• Certified Ethical Hacker (CEH)
• CCNA or other Cisco Qualifications
• Educational qualifications
• Bachelor’s degree in Computer Systems Engineering, Computer Science or related.
Incident Analyst / Support