covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware, SSL and others Experience and knowledge of NIST, COBIT, GCIA, GCIH, GCFA etc. This is an excellent opportunity to work in a large, enterprise level environment, where there is plenty of scope for growth. Please apply more »
analysis, intrusion analysis, digital forensics, penetration testing, or related areas 2-3 years of hands-on SOC/TOC/NOC experience GCIA required. GCIH, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred Familiarity with tools such as IDA Pro, PEiD, PEview, Procmon, Snort more »
host vulnerability analysis, intrusion analysis, digital forensics, penetration testing, or related areas2-3 years of hands-on SOC/TOC/NOC experienceGCIA required. GCIH, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferredFamiliarity with tools such as IDA Pro, PEiD, PEview, Procmon, Snort, Bro more »
and verbal communication skills. Ability to work independently and as part of a team. Eligible to obtain Security Clearance. Desired Qualifications: Relevant certifications (e.g., GCIH, CISSP, Security+, CySA+). Experience with cloud security (AWS, Azure). Familiarity with industry security standards and frameworks (NIST, ISO 27001). What They Offer more »
analysis outcomes, and remediation efforts. Qualifications Degree in Computer Science, or related experience. Professional certifications such as CSA, CompTIA Security+/CySA+, GIAC GSEC, GCIH or other comparable degree or other relevant experience. Work Experience A minimum of 5 years’ experience in a related SOC Incident management/Analyst role more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
analyses and follow-up measures. Qualifications Degree in Computer Science, or related experience. Professional certifications such as CSA, CompTIA Security+/CySA+, GIAC GSEC, GCIH or other comparable degree or other relevant experience. IT skills Network Security System Administration Malware Analysis Security Information and Event Management (SIEM) Incident Response Tools more »
Computer Science, or a related field. Desired: Master's degree in a related field or professional certifications such as CERT-CSIH, CISSP, GCFA, GCFE, GCIH, GCIA, GMON. Be prepared to participate in a rotating on-call schedule and collaborate across physical locations. Flexibility to work beyond standard hours for critical more »
as GDPR, HIPPA, DORA and other data or privacy lawsFrameworks and governance such as NIST, SOCII, ISO27001 etc.Security certification such as CEH, CCNA, OSCP, GCIH etcSecurity tools/practices such as SIEM, EDR, NDR, OSINT etcSecurity clearance CommitmentAs a ‘bench’ Incident Manager you will be called whenever a suitable incidentmore »
HIPPA, DORA and other data or privacy laws Frameworks and governance such as NIST, SOCII, ISO27001 etc. Security certification such as CEH, CCNA, OSCP, GCIH etc Security tools/practices such as SIEM, EDR, NDR, OSINT etc Security clearance Commitment As a ‘bench’ Incident Manager you will be called whenever more »
with threat intelligence sources and the ability to translate intelligence into actionable responses. Proficiency in using forensic tools and methodologies. Certifications such as GCFA, GCIH, CISSP, Microsoft, Cisco or equivalent are preferred. Excellent communication skills with the ability to convey technical information to non-technical stakeholders. Strong problem-solving and more »
role in Cyber Security Operations (ideally managing a SOC team) Masters in Cyber Security, Information Technology, Computer Science or relevant experience CISSP, CEH, OSCP, GCIH or applicable security field Incident, change and problem process management experience Experience in SIEM (Splunk, Sentinel), IPS and SOAR tools a plus Experience with investigating more »
FMIs and CSD operations is an advantage Knowledge of Swift CSP framework is advantage. IT Security Certification such as CISSP, CSSLP, CCSP, CISM, CISMP, GCIH, CEH, etc. is an advantage. Email kieren@source-technology.com more »
malware analysis. In order to be successful in your application, you will need: At least 3 years cyber incident response experience. Certifications such as GCIH, GCIA or GCFA/E. Ideally, consultancy experience however, strong regulated exposure is also welcomed. Strong baseline threat hunting skills and ideally, an interest in more »
support or engineering role (or demonstratable advanced technology knowledge).Strong knowledge of operational security across multiple platforms and all major cloud providers.Certifications such as GCIH, GCIA or GCFA/E.Huge passion for cyber security demonstrated by research, testing or other activities.Advanced knowledge of MITRE Att&ck framework and common TTPsExtensive more »
engineering role (or demonstratable advanced technology knowledge). Strong knowledge of operational security across multiple platforms and all major cloud providers. Certifications such as GCIH, GCIA or GCFA/E. Huge passion for cyber security demonstrated by research, testing or other activities. Advanced knowledge of MITRE Att&ck framework and more »
forensic analysis tools. Knowledge of common cyber threats and attack vectors, including malware, phishing, and ransomware. Relevant certifications such as GIACCertifiedIncidentHandler (GCIH), Certified Information Systems Security Professional (CISSP), or equivalent are a plus. If you are interested, please apply with a CV! Thanks more »