Knowledge * Working knowledge of various Operating Systems (OS) (MSWin, Linux, OSX, IOS) * Purple Teaming knowledge * Basic understanding of computerforensics * Use of Firewalls and IDS/IPS devices * Knowledge of SIEM technologies. * Networking, routing and switching * Cyber Security Review (CSR) Compliant * Cybersecurity Frameworks and Standards: Knowledge of frameworks more »
Clearance Experience working in a live SOC environment Working knowledge of various Operating Systems (Windows, Linux, OSX, IOS) Experience with Purple Teaming Understanding of computerforensics History with use of Firewalls and IDS/IPS devices Proven ability with SIEM (Security Information and Event Management) technologies Experience in more »
technology to increase security and compliance. Deputise, as required, for the Information Assurance and Security Manager Person Specification Qualifications Essential Degree, or equivalent, in Computer Networks, ComputerForensics, Engineering or related subject (modules in Cyber Security would be advantageous) plus specialist Its security knowledge and expertise in more »
hands on SOC experience >Shift work (5 Days on, 2 Off, 5 Nights on, 3 Off) Tech Stack across roles: Experience with Operating Systems & ComputerForensics Network, Routing & Switching experience with knowledge of SIEM Technologies Knowledge of Cybersecurity frameworks and standards If you are interested in any of more »
responsibilities: Monitor for attacks, intrusions and unusual, Unauthorised or illegal activity Creating and executing strategies to secure and protect networks and data resources Planning computer and network security upgrades and testing hardware and software related to the upgrade Use advanced analytic tools to determine emerging threat patterns and vulnerabilities … i.e. SentinelOne Managing technical problems related to applications and production equipment Addressing intrusions using expertise in computerforensics Engage in 'ethical hacking', for example, simulating security breaches Foreseeing future problem areas by monitoring workflows and network traffic patterns Monitor identity and access management, including monitoring for abuse of more »