in computer science, information security, cyber security or a related field, or equivalent work experience. A recognised security certification, such as CISSP, CISM, CISA, GCIH, GCIA, CEH or equivalent. Proven experience in leading and managing a SOC and a team of cyber analysts, preferably in a large and complex organisation. more »
covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware, SSL and others Experience and knowledge of NIST, COBIT, GCIA, GCIH, GCFA etc. This is an excellent opportunity to work in a large, enterprise level environment, where there is plenty of scope for growth. Please apply more »
analysis, intrusion analysis, digital forensics, penetration testing, or related areas 2-3 years of hands-on SOC/TOC/NOC experience GCIA required. GCIH, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred Familiarity with tools such as IDA Pro, PEiD, PEview, Procmon, Snort more »
understanding covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware, SSL and othersExperience and knowledge of NIST, COBIT, GCIA, GCIH, GCFA etc.This is an excellent opportunity to work in a large, enterprise level environment, where there is plenty of scope for growth.Please apply ASAP for more »
host vulnerability analysis, intrusion analysis, digital forensics, penetration testing, or related areas2-3 years of hands-on SOC/TOC/NOC experienceGCIA required. GCIH, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferredFamiliarity with tools such as IDA Pro, PEiD, PEview, Procmon, Snort, Bro more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
analyses and follow-up measures. Qualifications Degree in Computer Science, or related experience. Professional certifications such as CSA, CompTIA Security+/CySA+, GIAC GSEC, GCIH or other comparable degree or other relevant experience. IT skills Network Security System Administration Malware Analysis Security Information and Event Management (SIEM) Incident Response Tools more »
Computer Science, or a related field. Desired: Master's degree in a related field or professional certifications such as CERT-CSIH, CISSP, GCFA, GCFE, GCIH, GCIA, GMON. Be prepared to participate in a rotating on-call schedule and collaborate across physical locations. Flexibility to work beyond standard hours for critical more »
HIPPA, DORA and other data or privacy laws Frameworks and governance such as NIST, SOCII, ISO27001 etc. Security certification such as CEH, CCNA, OSCP, GCIH etc Security tools/practices such as SIEM, EDR, NDR, OSINT etc Security clearance Commitment As a ‘bench’ Incident Manager you will be called whenever more »
with threat intelligence sources and the ability to translate intelligence into actionable responses. Proficiency in using forensic tools and methodologies. Certifications such as GCFA, GCIH, CISSP, Microsoft, Cisco or equivalent are preferred. Excellent communication skills with the ability to convey technical information to non-technical stakeholders. Strong problem-solving and more »
role in Cyber Security Operations (ideally managing a SOC team) Masters in Cyber Security, Information Technology, Computer Science or relevant experience CISSP, CEH, OSCP, GCIH or applicable security field Incident, change and problem process management experience Experience in SIEM (Splunk, Sentinel), IPS and SOAR tools a plus Experience with investigating more »
exercises to test preparedness. Qualifications and Experience: Bachelor’s degree in a related technical area. One or more relevant certifications such as CISSP, CISM, GCIH, CEH, or OSCP. Proficiency in SIEM Platforms, vulnerability management tools, and incident management processes. Experience in managing security functions or SOC capabilities. Strong analytical skills more »
Python, Powershell etcStrong knowledge of ransomware and related protectionIdeally looking for candidates with professional security qualifications such as CEH, CCNP, CISSP, GIAC (GSEC/GCIH/GCIA).In return the client will offer a fantastic career opportunity as well as a base salary up to £90k plus a generous benefits more »
FMIs and CSD operations is an advantage Knowledge of Swift CSP framework is advantage. IT Security Certification such as CISSP, CSSLP, CCSP, CISM, CISMP, GCIH, CEH, etc. is an advantage. Email kieren@source-technology.com more »
malware analysis. In order to be successful in your application, you will need: At least 3 years cyber incident response experience. Certifications such as GCIH, GCIA or GCFA/E. Ideally, consultancy experience however, strong regulated exposure is also welcomed. Strong baseline threat hunting skills and ideally, an interest in more »
engineering role (or demonstratable advanced technology knowledge). Strong knowledge of operational security across multiple platforms and all major cloud providers. Certifications such as GCIH, GCIA or GCFA/E. Huge passion for cyber security demonstrated by research, testing or other activities. Advanced knowledge of MITRE Att&ck framework and more »
acquire such a clearance will be seen as an advantage. Incident management certifications such as: CREST certifiedincident manager (CCIM) GIACCertifiedIncidentHandler (GCIH) Degree level qualified, MSc in Information Security, IT or relevant STEM subjects. To discuss this or wider Consulting roles with our recruitment team, all you more »
forensic analysis tools. Knowledge of common cyber threats and attack vectors, including malware, phishing, and ransomware. Relevant certifications such as GIACCertifiedIncidentHandler (GCIH), Certified Information Systems Security Professional (CISSP), or equivalent are a plus. If you are interested, please apply with a CV! Thanks more »