Junior SOC Analyst - Hybrid - 3 days on site - Nottinghamshire Main Responsibilities: - Triage, analyse and investigate alerts, log data and network traffic using security tools to identify cyber-attacks / security incidents. This includes the investigation and root cause analysis of potential security incidents. - Proactively investigate potential security breaches by utilising threat intelligence and internal and external security systems and provide subject matter expertise for technical responses to confirmed cyber security incidents. - Create and maintain the clients target cyber security architecture. - Deliver subject matter expertise to key stakeholders to drive the implementation of security controls to meet the target architecture. - Accountable for vulnerability scanning, including the prioritisation of unpatched vulnerabilities and reporting against agreed KPIs and KRIs. - Support the annual penetration testing schedule by arranging penetration testing, including tracking, and communicating penetration testing results. - Perform supplementary testing of clients detection and response controls by procuring, installing, and running penetration testing tooling. - Participate in process improvement work to automate and improve critical cyber security processes such as monitoring, patching, and hardening. - Develop and maintain process documentation for security architecture, vulnerability management, cyber incident response, and playbooks. - Provide security representation across multiple geographies, business units and teams to achieve objectives, including engagement with the Information Security Enhancement Office. Skills, Knowledge and Experience - Has obtained one or more of the following qualifications: CEH, CRTSA, and OSCP. - Qualifications such as CISSP and CISM would be advantageous. - Problem solving skills, and the ability to come up with new solutions to existing challenges. - Strengths in key soft skill areas such as relationship management, communication, and presentation of technical security information to a variety of audiences. - Technical skills to investigate potential breaches through existing tools, packet capture and log file analysis. - A logical mindset, the ability to identify proportionate, appropriate mitigations to identified security incidents, and to prioritise incidents based on risk. - Capable of working independently/without ongoing supervision on projects and day to day tasks. Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants who are considered suitable for interview will be contacted. Proactive Appointments Limited operates as an employment agency and employment business and is an equal opportunities organisation We take our obligations to protect your personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on our website (url removed)
Apr 30, 2024
Full time
Junior SOC Analyst - Hybrid - 3 days on site - Nottinghamshire Main Responsibilities: - Triage, analyse and investigate alerts, log data and network traffic using security tools to identify cyber-attacks / security incidents. This includes the investigation and root cause analysis of potential security incidents. - Proactively investigate potential security breaches by utilising threat intelligence and internal and external security systems and provide subject matter expertise for technical responses to confirmed cyber security incidents. - Create and maintain the clients target cyber security architecture. - Deliver subject matter expertise to key stakeholders to drive the implementation of security controls to meet the target architecture. - Accountable for vulnerability scanning, including the prioritisation of unpatched vulnerabilities and reporting against agreed KPIs and KRIs. - Support the annual penetration testing schedule by arranging penetration testing, including tracking, and communicating penetration testing results. - Perform supplementary testing of clients detection and response controls by procuring, installing, and running penetration testing tooling. - Participate in process improvement work to automate and improve critical cyber security processes such as monitoring, patching, and hardening. - Develop and maintain process documentation for security architecture, vulnerability management, cyber incident response, and playbooks. - Provide security representation across multiple geographies, business units and teams to achieve objectives, including engagement with the Information Security Enhancement Office. Skills, Knowledge and Experience - Has obtained one or more of the following qualifications: CEH, CRTSA, and OSCP. - Qualifications such as CISSP and CISM would be advantageous. - Problem solving skills, and the ability to come up with new solutions to existing challenges. - Strengths in key soft skill areas such as relationship management, communication, and presentation of technical security information to a variety of audiences. - Technical skills to investigate potential breaches through existing tools, packet capture and log file analysis. - A logical mindset, the ability to identify proportionate, appropriate mitigations to identified security incidents, and to prioritise incidents based on risk. - Capable of working independently/without ongoing supervision on projects and day to day tasks. Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants who are considered suitable for interview will be contacted. Proactive Appointments Limited operates as an employment agency and employment business and is an equal opportunities organisation We take our obligations to protect your personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on our website (url removed)
Senior SOC Analyst This is a chance for an individual to be in 'at the ground up' at the start of the development of the SOC and will play a leading role in the day-to-day activity of the SOC and influence of the SOC on an operational, technical and strategic level. The role will require SC Security Clearance and therefore candidate must only be UK nationals (duel nationality isn't accepted unfortunately) £50000 - £60000 per annum + Remote working London, Central What will you be doing? Primarily the role will be concerned with selecting and standing up an appropriate SIEM platform to service our client's needs. Once the tool is Embedded and processes are in place to ensure Business as Usual running, the role will then involve leading security monitoring efforts, conducting in-depth investigations, and actively participating in incident response activities. Duties & Responsibilities: Security Monitoring: Oversee and enhance security monitoring systems to detect and analyse potential security incidents. Conduct Real Time analysis of security alerts and escalate incidents as necessary. Incident Response: Lead and coordinate incident response activities to effectively contain, eradicate, and recover from security incidents. Develop and maintain incident response plans, ensuring they align with industry best practices. Threat Intelligence: Stay abreast of the latest cybersecurity threats and vulnerabilities, integrating threat intelligence into security monitoring processes. Contribute to the development of threat intelligence feeds to enhance proactive threat detection. Investigations: Perform in-depth investigations into incidents, determining the root cause and impact. Document findings and lessons learned to improve incident response procedures. Collaboration: Collaborate with cross-functional teams, including IT, legal, and management, to address security incidents and implement preventive measures. Provide expertise and guidance to other analysts. Security Tool Management: Manage and optimise security tools, ensuring they are properly configured and updated to maximize effectiveness. Evaluate new security technologies and recommend enhancements to the security infrastructure. Security Awareness: Contribute to security awareness training programs for employees to promote a culture of cybersecurity vigilance. Provide guidance on security best practices to various teams within the organization. Documentation: Maintain accurate and up-to-date documentation of security procedures, incident response plans, and analysis reports. Create post-incident reports for management and stakeholders. Create monthly reporting packs as per contractual requirements. Create and document robust event and incident management processes Essential Skills and Experience: Analytical mindset with the ability to troubleshoot and solve complex security issues. Excellent communication and interpersonal skills for collaborating with diverse teams. Leadership qualities to guide Junior Analysts and drive security initiatives. Up-to-date knowledge of cybersecurity trends and threats. Full understanding of SIEM systems - IBM QRadar, FortiSIEM, Splunk, Sentinel etc IT Security Management, Policies, Procedures, Standards and Guidelines Risk Assessment Privacy and Compliance Conversant with security best practices (including ISO27001) and relevant security legislation Security Operations and Incident Handling IT Security Architecture If you are interested in hearing more please apply below or ring or send your CV to (see below)
Apr 29, 2024
Full time
Senior SOC Analyst This is a chance for an individual to be in 'at the ground up' at the start of the development of the SOC and will play a leading role in the day-to-day activity of the SOC and influence of the SOC on an operational, technical and strategic level. The role will require SC Security Clearance and therefore candidate must only be UK nationals (duel nationality isn't accepted unfortunately) £50000 - £60000 per annum + Remote working London, Central What will you be doing? Primarily the role will be concerned with selecting and standing up an appropriate SIEM platform to service our client's needs. Once the tool is Embedded and processes are in place to ensure Business as Usual running, the role will then involve leading security monitoring efforts, conducting in-depth investigations, and actively participating in incident response activities. Duties & Responsibilities: Security Monitoring: Oversee and enhance security monitoring systems to detect and analyse potential security incidents. Conduct Real Time analysis of security alerts and escalate incidents as necessary. Incident Response: Lead and coordinate incident response activities to effectively contain, eradicate, and recover from security incidents. Develop and maintain incident response plans, ensuring they align with industry best practices. Threat Intelligence: Stay abreast of the latest cybersecurity threats and vulnerabilities, integrating threat intelligence into security monitoring processes. Contribute to the development of threat intelligence feeds to enhance proactive threat detection. Investigations: Perform in-depth investigations into incidents, determining the root cause and impact. Document findings and lessons learned to improve incident response procedures. Collaboration: Collaborate with cross-functional teams, including IT, legal, and management, to address security incidents and implement preventive measures. Provide expertise and guidance to other analysts. Security Tool Management: Manage and optimise security tools, ensuring they are properly configured and updated to maximize effectiveness. Evaluate new security technologies and recommend enhancements to the security infrastructure. Security Awareness: Contribute to security awareness training programs for employees to promote a culture of cybersecurity vigilance. Provide guidance on security best practices to various teams within the organization. Documentation: Maintain accurate and up-to-date documentation of security procedures, incident response plans, and analysis reports. Create post-incident reports for management and stakeholders. Create monthly reporting packs as per contractual requirements. Create and document robust event and incident management processes Essential Skills and Experience: Analytical mindset with the ability to troubleshoot and solve complex security issues. Excellent communication and interpersonal skills for collaborating with diverse teams. Leadership qualities to guide Junior Analysts and drive security initiatives. Up-to-date knowledge of cybersecurity trends and threats. Full understanding of SIEM systems - IBM QRadar, FortiSIEM, Splunk, Sentinel etc IT Security Management, Policies, Procedures, Standards and Guidelines Risk Assessment Privacy and Compliance Conversant with security best practices (including ISO27001) and relevant security legislation Security Operations and Incident Handling IT Security Architecture If you are interested in hearing more please apply below or ring or send your CV to (see below)
Cyber Defence Anlayst Multiple Locations Must be DV cleared Your Role: Develop and integrate security event monitoring and incident management services. Respond promptly to security incidents as part of an incident response team. Implement metrics and dashboards to provide visibility of the Enterprise infrastructure. Utilize the SOAR platform for playbook automation and case management to streamline team processes. Produce documentation to ensure repeatability and standardization of security operating procedures. Develop innovative investigative methods using SOC software toolsets to enhance threat detection capabilities. Maintain system security baseline according to the latest threat intelligence and evolving trends. Participate in root cause analysis of incidents in collaboration with engineers across the enterprise. Provide Subject Matter Expertise (SME) on information security standards and best practices. Offer strategic and tactical security guidance, including technical control evaluation. Contribute to the CRM process. Collaborate with SOC engineers to maintain up-to-date security alert dashboards for improved incident response. Document, validate, and create operational processes and procedures to enhance SOC development. Assist in identifying, prioritizing, and coordinating the protection of critical cyber defence infrastructure and key resources. Build, install, configure, and test dedicated cyber defence hardware. Support Junior Analysts in managing SOC systems. Demonstrate previous experience with Enterprise ICS/network architectures and technologies. Possess experience and knowledge of SIEM solutions, including use case identification, creation, deployment, and tuning. Serve as a mentor/coach to junior analysts. Your Profile: Previous experience utilizing the MITRE ATT&CK and Cyber Kill Chain frameworks. Proficiency in maintaining Microsoft directory services. Familiarity with virtualization software. Knowledge of key security frameworks such as ISO, NIST 800-53, (Apply online only), (Apply online only), C2M2. Excellent communication skills. Experience in writing Defence/Government documentation. GCS is acting as an Employment Agency in relation to this vacancy.
Apr 29, 2024
Full time
Cyber Defence Anlayst Multiple Locations Must be DV cleared Your Role: Develop and integrate security event monitoring and incident management services. Respond promptly to security incidents as part of an incident response team. Implement metrics and dashboards to provide visibility of the Enterprise infrastructure. Utilize the SOAR platform for playbook automation and case management to streamline team processes. Produce documentation to ensure repeatability and standardization of security operating procedures. Develop innovative investigative methods using SOC software toolsets to enhance threat detection capabilities. Maintain system security baseline according to the latest threat intelligence and evolving trends. Participate in root cause analysis of incidents in collaboration with engineers across the enterprise. Provide Subject Matter Expertise (SME) on information security standards and best practices. Offer strategic and tactical security guidance, including technical control evaluation. Contribute to the CRM process. Collaborate with SOC engineers to maintain up-to-date security alert dashboards for improved incident response. Document, validate, and create operational processes and procedures to enhance SOC development. Assist in identifying, prioritizing, and coordinating the protection of critical cyber defence infrastructure and key resources. Build, install, configure, and test dedicated cyber defence hardware. Support Junior Analysts in managing SOC systems. Demonstrate previous experience with Enterprise ICS/network architectures and technologies. Possess experience and knowledge of SIEM solutions, including use case identification, creation, deployment, and tuning. Serve as a mentor/coach to junior analysts. Your Profile: Previous experience utilizing the MITRE ATT&CK and Cyber Kill Chain frameworks. Proficiency in maintaining Microsoft directory services. Familiarity with virtualization software. Knowledge of key security frameworks such as ISO, NIST 800-53, (Apply online only), (Apply online only), C2M2. Excellent communication skills. Experience in writing Defence/Government documentation. GCS is acting as an Employment Agency in relation to this vacancy.
Junior Cyber Security Analyst. Location: Duxford, Cambridgeshire. On-premises. Office Based: Four days a week. Remote Working: One day a week. An exceptional career opportunity is available to work for a globally recognized museum. The museum has recently invested significantly in advanced systems to detect, prevent and resolve emerging cyber threats. Additionally, the museum must comply with various regulatory frameworks and legislation such as PCI-DSS, GDPR, CAA and Cyber Essentials. The maintenance of these security systems requires dedicated security team resources. This vacancy is a fantastic opportunity for a junior-level cybersecurity enthusiast with practical blue team knowledge/experience to develop more cyber awareness and understanding. Junior Cyber Security Analyst Key Skills: We are eager to connect with aspiring Junior Cyber Security Analysts, Cyber Security Interns, Entry-Level Cyber Security Engineers, Junior IT Security Engineers, and other early-career professionals focusing on cyber and IT security. To excel in this position, you must possess many of the following: - A good understanding of Cyber and IT Security concepts and practices. - Some experience performing Antivirus audits and checks. - Good knowledge or practical experience of blue team activities, including daily monitoring and reporting cyber threats, hazards, or risks. - The ability to patch devices, systems, or networks against vulnerabilities. - Knowledge or experience of one or more of the following: Cyber Essentials, Darktrace, Qualys. - Experience working with any endpoint security tool or software, such as MS Defender, Sophos, ESET, Trellix, Symantec, etc. - Have excellent English communication skills (written and verbal). All applicants must reside in the UK and have the right to work. About the Junior Cyber Security Analyst position: You will be a member of the IT Security Team. You will track and report daily cyber threats, hazards, risks, controls, mitigations, and measures to safeguard our client's systems and personnel. You will proactively monitor all output from the various security systems to ensure minimal downtime, and the business will always be protected from cyber threats. You will ensure that all websites, services, servers, and employee devices have installed adequate vulnerability patches. Responsibilities include: - Harnessing the cutting-edge capabilities of Darktrace to detect, prevent, and monitor cyber threats in real-time. - Finding systemic cyber vulnerabilities to make sure security is preserved. - To oversee the patching of critical systems and infrastructure across the entire company, including those platforms maintained by third-party suppliers, in accordance with Cyber Essentials, and to make sure that all devices covered by the programme comply with the standard. - Investigating and researching attack methods to create defences against emerging threats. - Support and adhere to the IT Security Incident Response process as needed. - Assistance with cyber security risk assessments, yearly audits, and ongoing improvement of incident management. Salary and Benefits: Salary: To £30-38,000 Location: Duxford, Cambridgeshire. On-premises. Office Based: Four days a week. Remote Working: One day a week. Holiday: 25 days + Bank Holidays. Rising to 30 days after five years. Museum benefits: - 20% discount in all on-site shops - 25% discount in museum cafes - Free entry to a large number of other museums and galleries. - Enhanced maternity and paternity: Yes Other benefits: - Access to Childcare vouchers. - Access to in-house training programmes and development. For more information on this Junior Cyber Security Analyst position, please get in touch with us to discuss. Our client welcomes everyone. They celebrate difference and encourage everyone to join and be themselves at work.
Apr 27, 2024
Full time
Junior Cyber Security Analyst. Location: Duxford, Cambridgeshire. On-premises. Office Based: Four days a week. Remote Working: One day a week. An exceptional career opportunity is available to work for a globally recognized museum. The museum has recently invested significantly in advanced systems to detect, prevent and resolve emerging cyber threats. Additionally, the museum must comply with various regulatory frameworks and legislation such as PCI-DSS, GDPR, CAA and Cyber Essentials. The maintenance of these security systems requires dedicated security team resources. This vacancy is a fantastic opportunity for a junior-level cybersecurity enthusiast with practical blue team knowledge/experience to develop more cyber awareness and understanding. Junior Cyber Security Analyst Key Skills: We are eager to connect with aspiring Junior Cyber Security Analysts, Cyber Security Interns, Entry-Level Cyber Security Engineers, Junior IT Security Engineers, and other early-career professionals focusing on cyber and IT security. To excel in this position, you must possess many of the following: - A good understanding of Cyber and IT Security concepts and practices. - Some experience performing Antivirus audits and checks. - Good knowledge or practical experience of blue team activities, including daily monitoring and reporting cyber threats, hazards, or risks. - The ability to patch devices, systems, or networks against vulnerabilities. - Knowledge or experience of one or more of the following: Cyber Essentials, Darktrace, Qualys. - Experience working with any endpoint security tool or software, such as MS Defender, Sophos, ESET, Trellix, Symantec, etc. - Have excellent English communication skills (written and verbal). All applicants must reside in the UK and have the right to work. About the Junior Cyber Security Analyst position: You will be a member of the IT Security Team. You will track and report daily cyber threats, hazards, risks, controls, mitigations, and measures to safeguard our client's systems and personnel. You will proactively monitor all output from the various security systems to ensure minimal downtime, and the business will always be protected from cyber threats. You will ensure that all websites, services, servers, and employee devices have installed adequate vulnerability patches. Responsibilities include: - Harnessing the cutting-edge capabilities of Darktrace to detect, prevent, and monitor cyber threats in real-time. - Finding systemic cyber vulnerabilities to make sure security is preserved. - To oversee the patching of critical systems and infrastructure across the entire company, including those platforms maintained by third-party suppliers, in accordance with Cyber Essentials, and to make sure that all devices covered by the programme comply with the standard. - Investigating and researching attack methods to create defences against emerging threats. - Support and adhere to the IT Security Incident Response process as needed. - Assistance with cyber security risk assessments, yearly audits, and ongoing improvement of incident management. Salary and Benefits: Salary: To £30-38,000 Location: Duxford, Cambridgeshire. On-premises. Office Based: Four days a week. Remote Working: One day a week. Holiday: 25 days + Bank Holidays. Rising to 30 days after five years. Museum benefits: - 20% discount in all on-site shops - 25% discount in museum cafes - Free entry to a large number of other museums and galleries. - Enhanced maternity and paternity: Yes Other benefits: - Access to Childcare vouchers. - Access to in-house training programmes and development. For more information on this Junior Cyber Security Analyst position, please get in touch with us to discuss. Our client welcomes everyone. They celebrate difference and encourage everyone to join and be themselves at work.
Junior Cyber Security Analyst. Location: London. On-premises. Office Based: Four days a week. Remote Working: One day a week. An exceptional career opportunity is available to work for a nationally recognised museum. The museum has recently invested significantly in advanced systems to detect, prevent and resolve emerging cyber threats. Additionally, the museum must comply with various regulatory frameworks and legislation such as PCI-DSS, GDPR, CAA and Cyber Essentials. The maintenance of these security systems requires dedicated security team resources. This vacancy is a fantastic opportunity for a junior-level cybersecurity enthusiast with practical blue team knowledge/experience to develop more cyber awareness and understanding. Junior Cyber Security Analyst Key Skills: We are eager to connect with aspiring Junior Cyber Security Analysts, Cyber Security Interns, Entry-Level Cyber Security Engineers, Junior IT Security Engineers, and other early-career professionals focusing on cyber and IT security. To excel in this position, you must possess many of the following: - A good understanding of Cyber and IT Security concepts and practices. - Some experience performing Antivirus audits and checks. - Good knowledge or practical experience of blue team activities, including daily monitoring and reporting cyber threats, hazards, or risks. - The ability to patch devices, systems, or networks against vulnerabilities. - Knowledge or experience of one or more of the following: Cyber Essentials, Darktrace, Qualys. - Experience working with any endpoint security tool or software, such as MS Defender, Sophos, ESET, Trellix, Symantec, etc. - Have excellent English communication skills (written and verbal). All applicants must reside in the UK and have the right to work. About the Junior Cyber Security Analyst position: You will be a member of the IT Security Team. You will track and report daily cyber threats, hazards, risks, controls, mitigations, and measures to safeguard our client's systems and personnel. You will proactively monitor all output from the various security systems to ensure minimal downtime, and the business will always be protected from cyber threats. You will ensure that all websites, services, servers, and employee devices have installed adequate vulnerability patches. Responsibilities include: - Harnessing the cutting-edge capabilities of Darktrace to detect, prevent, and monitor cyber threats in real-time. - Finding systemic cyber vulnerabilities to make sure security is preserved. - To oversee the patching of critical systems and infrastructure across the entire company, including those platforms maintained by third-party suppliers, in accordance with Cyber Essentials, and to make sure that all devices covered by the programme comply with the standard. - Investigating and researching attack methods to create defences against emerging threats. - Support and adhere to the IT Security Incident Response process as needed. - Assistance with cyber security risk assessments, yearly audits, and ongoing improvement of incident management. Salary and Benefits: Salary: To £30-38,000 Location: London. On-premises. Office Based: Four days a week. Remote Working: One day a week. Holiday: 25 days + Bank Holidays. Rising to 30 days after five years. Museum benefits: - 20% discount in all on-site shops - 25% discount in museum cafes - Free entry to a large number of other museums and galleries. - Enhanced maternity and paternity: Yes Other benefits: - Access to Childcare vouchers. - Access to in-house training programmes and development. For more information on this Junior Cyber Security Analyst position, please get in touch with us to discuss. Our client welcomes everyone. They celebrate difference and encourage everyone to join and be themselves at work.
Apr 27, 2024
Full time
Junior Cyber Security Analyst. Location: London. On-premises. Office Based: Four days a week. Remote Working: One day a week. An exceptional career opportunity is available to work for a nationally recognised museum. The museum has recently invested significantly in advanced systems to detect, prevent and resolve emerging cyber threats. Additionally, the museum must comply with various regulatory frameworks and legislation such as PCI-DSS, GDPR, CAA and Cyber Essentials. The maintenance of these security systems requires dedicated security team resources. This vacancy is a fantastic opportunity for a junior-level cybersecurity enthusiast with practical blue team knowledge/experience to develop more cyber awareness and understanding. Junior Cyber Security Analyst Key Skills: We are eager to connect with aspiring Junior Cyber Security Analysts, Cyber Security Interns, Entry-Level Cyber Security Engineers, Junior IT Security Engineers, and other early-career professionals focusing on cyber and IT security. To excel in this position, you must possess many of the following: - A good understanding of Cyber and IT Security concepts and practices. - Some experience performing Antivirus audits and checks. - Good knowledge or practical experience of blue team activities, including daily monitoring and reporting cyber threats, hazards, or risks. - The ability to patch devices, systems, or networks against vulnerabilities. - Knowledge or experience of one or more of the following: Cyber Essentials, Darktrace, Qualys. - Experience working with any endpoint security tool or software, such as MS Defender, Sophos, ESET, Trellix, Symantec, etc. - Have excellent English communication skills (written and verbal). All applicants must reside in the UK and have the right to work. About the Junior Cyber Security Analyst position: You will be a member of the IT Security Team. You will track and report daily cyber threats, hazards, risks, controls, mitigations, and measures to safeguard our client's systems and personnel. You will proactively monitor all output from the various security systems to ensure minimal downtime, and the business will always be protected from cyber threats. You will ensure that all websites, services, servers, and employee devices have installed adequate vulnerability patches. Responsibilities include: - Harnessing the cutting-edge capabilities of Darktrace to detect, prevent, and monitor cyber threats in real-time. - Finding systemic cyber vulnerabilities to make sure security is preserved. - To oversee the patching of critical systems and infrastructure across the entire company, including those platforms maintained by third-party suppliers, in accordance with Cyber Essentials, and to make sure that all devices covered by the programme comply with the standard. - Investigating and researching attack methods to create defences against emerging threats. - Support and adhere to the IT Security Incident Response process as needed. - Assistance with cyber security risk assessments, yearly audits, and ongoing improvement of incident management. Salary and Benefits: Salary: To £30-38,000 Location: London. On-premises. Office Based: Four days a week. Remote Working: One day a week. Holiday: 25 days + Bank Holidays. Rising to 30 days after five years. Museum benefits: - 20% discount in all on-site shops - 25% discount in museum cafes - Free entry to a large number of other museums and galleries. - Enhanced maternity and paternity: Yes Other benefits: - Access to Childcare vouchers. - Access to in-house training programmes and development. For more information on this Junior Cyber Security Analyst position, please get in touch with us to discuss. Our client welcomes everyone. They celebrate difference and encourage everyone to join and be themselves at work.
Cyber Defence Engineer - DV Clearance Required! The Cyber Defence Engineer will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extensions Northallerton (4 days on site) What we're looking for: Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Experience using virtualisation software. Excellent communication skills Experience of writing Defence/Government documentation Someone hands on. Responsibilities include: Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and dashboards to give visibility of the Enterprise infrastructure. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further.
Apr 26, 2024
Contractor
Cyber Defence Engineer - DV Clearance Required! The Cyber Defence Engineer will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extensions Northallerton (4 days on site) What we're looking for: Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Experience using virtualisation software. Excellent communication skills Experience of writing Defence/Government documentation Someone hands on. Responsibilities include: Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and dashboards to give visibility of the Enterprise infrastructure. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further.
Senior Threat Intelligence Analyst About Us: We are the tech company with people at heart. At Advania, we believe in empowering people to create sustainable value through the clever use of technology. As one of Microsoft's leading partners in the UK, specialising in Azure, Security, Dynamics 365, and Microsoft 365, we have a proven track record of success in delivering transformational IT services. Position Overview: As a Senior Cyber Threat Intelligence Analyst, you will be responsible for the day-today delivery of Cyber Threat Intelligence to clients spanning multiple industries, as well as leadership and coaching of junior analysts, and ongoing development of our service. This is a hands-on role and requires both a broad technical knowledge of Cyber Security, as well as specific focused knowledge of CTI tools and processes. Knowledge and/or experience of modern IT Systems, particularly Microsoft solutions and network infrastructure is advantageous. Responsibilities: Proactively research and analyse emerging cyber threats, malware variants, and attacker Tactics, Techniques, and Procedures (TTPs) from various open and closed sources, including threat intelligence feeds, dark web monitoring, and open-source reporting. Develop and maintain comprehensive threat intelligence reports and briefings tailored for technical and non-technical audiences, translating complex information into actionable insights for informed decision-making. Lead or participate in incident response activities, including investigation, analysis of evidence, and collaboration with other teams like IT operations and forensics. Conduct advanced threat hunting to proactively identify hidden threats within the organisation's network, utilising advanced tools and techniques. Participate in vulnerability management activities, collaborating with the vulnerability management team to prioritise and remediate critical vulnerabilities identified through intelligence gathering and risk assessments. Contribute to the development and implementation of comprehensive security policies and procedures to strengthen the organisation's overall cyber defence posture. Stay up to date with the latest cyber security trends and developments through continuous learning and participation in industry conferences and training programs. Mentor and support junior cyber security analysts within the team. Analyse large volumes of complex data from security tools, logs, and incident reports to identify potential threats and assess their risk level. Professional Experience: Demonstrable understanding of the Cybersecurity Ecosystem and Infrastructure Technologies (e.g. firewall logs, network security tools, malware detonation devices, proxies, IPS/IDS). Experience in secured cloud architectures (Azure, AWS, or similar) and engineering solutions. An understanding of operating systems and their programming interfaces such as UNIX Shell and PowerShell. Experience with scripting languages (Python, Bash) and familiarity with APIs beneficial. An awareness of cyber security related standards and regulations, for example, NIST, CIS, ISO 27001 and PCI DSS. Experience leading teams and providing deputy support to Management. Experience designing a service, reviewing effectiveness of services, procurement, or business project work. Qualifications: One or more of the following industry certifications: SANS301/SANS401/FOR578, Crest CRTIA/CCTIM, Security+, or similar. Ideally a BSc or MSc in Cyber Security, preferably including modules on Ethical Hacking, Digital Forensics, Information Security or Threat Intelligence Please note you need to be eligible to undergo the Security Clearance process for this position. This means you will need to be a British national with 5 years residency in the UK. Click here for the list of benefits. Our Selection Process: We are committed to ensuring an equitable experience for all candidates, regardless of race, religion or belief, ethnic or national origin, disability, age, citizenship, marital, domestic or civil partnership status, sexual orientation, gender identity, or any other basis as protected by applicable law. Please do let us know if you'll need any reasonable adjustments as part of the selection process by highlighting these on your application form.
Apr 25, 2024
Full time
Senior Threat Intelligence Analyst About Us: We are the tech company with people at heart. At Advania, we believe in empowering people to create sustainable value through the clever use of technology. As one of Microsoft's leading partners in the UK, specialising in Azure, Security, Dynamics 365, and Microsoft 365, we have a proven track record of success in delivering transformational IT services. Position Overview: As a Senior Cyber Threat Intelligence Analyst, you will be responsible for the day-today delivery of Cyber Threat Intelligence to clients spanning multiple industries, as well as leadership and coaching of junior analysts, and ongoing development of our service. This is a hands-on role and requires both a broad technical knowledge of Cyber Security, as well as specific focused knowledge of CTI tools and processes. Knowledge and/or experience of modern IT Systems, particularly Microsoft solutions and network infrastructure is advantageous. Responsibilities: Proactively research and analyse emerging cyber threats, malware variants, and attacker Tactics, Techniques, and Procedures (TTPs) from various open and closed sources, including threat intelligence feeds, dark web monitoring, and open-source reporting. Develop and maintain comprehensive threat intelligence reports and briefings tailored for technical and non-technical audiences, translating complex information into actionable insights for informed decision-making. Lead or participate in incident response activities, including investigation, analysis of evidence, and collaboration with other teams like IT operations and forensics. Conduct advanced threat hunting to proactively identify hidden threats within the organisation's network, utilising advanced tools and techniques. Participate in vulnerability management activities, collaborating with the vulnerability management team to prioritise and remediate critical vulnerabilities identified through intelligence gathering and risk assessments. Contribute to the development and implementation of comprehensive security policies and procedures to strengthen the organisation's overall cyber defence posture. Stay up to date with the latest cyber security trends and developments through continuous learning and participation in industry conferences and training programs. Mentor and support junior cyber security analysts within the team. Analyse large volumes of complex data from security tools, logs, and incident reports to identify potential threats and assess their risk level. Professional Experience: Demonstrable understanding of the Cybersecurity Ecosystem and Infrastructure Technologies (e.g. firewall logs, network security tools, malware detonation devices, proxies, IPS/IDS). Experience in secured cloud architectures (Azure, AWS, or similar) and engineering solutions. An understanding of operating systems and their programming interfaces such as UNIX Shell and PowerShell. Experience with scripting languages (Python, Bash) and familiarity with APIs beneficial. An awareness of cyber security related standards and regulations, for example, NIST, CIS, ISO 27001 and PCI DSS. Experience leading teams and providing deputy support to Management. Experience designing a service, reviewing effectiveness of services, procurement, or business project work. Qualifications: One or more of the following industry certifications: SANS301/SANS401/FOR578, Crest CRTIA/CCTIM, Security+, or similar. Ideally a BSc or MSc in Cyber Security, preferably including modules on Ethical Hacking, Digital Forensics, Information Security or Threat Intelligence Please note you need to be eligible to undergo the Security Clearance process for this position. This means you will need to be a British national with 5 years residency in the UK. Click here for the list of benefits. Our Selection Process: We are committed to ensuring an equitable experience for all candidates, regardless of race, religion or belief, ethnic or national origin, disability, age, citizenship, marital, domestic or civil partnership status, sexual orientation, gender identity, or any other basis as protected by applicable law. Please do let us know if you'll need any reasonable adjustments as part of the selection process by highlighting these on your application form.
Join our dynamic team as a Cyber Security Analyst (Change Control) based in Faslane, Helensburgh. Enjoy the flexibility of our 4xFlex working pattern, with a condensed 4-day workweek (Monday to Thursday) and the option for hybrid working, typically spending 2 days onsite. Key responsibilities: Streamline and enhance Change Control processes. Collaborate on customer process enhancements aligned with ITIL4 practices. Deliver concise progress reports and compelling presentations to clients. Serve as a subject matter expert in Security Information and Event Management (SIEM), providing recommendations for product enhancements. Conduct thorough analysis of SIEM outputs, promptly identifying and escalating any incidents or breaches. Provide assurance support to team members on Secure by Design principles. Translate technical risks into understandable formats for non-technical stakeholders. Mentor junior team members. Effectively communicate with clients and managers across all levels. The successful candidate must be capable of achieving the appropriate level of security clearance (SC). For further information, please visit UK Security Vetting Clearance Levels Required skills, qualifications and experience Proven track record as a Cyber Security Analyst, Change Control Analyst, or related role. Preferred certification: Certified Information Systems Security Professional (CISSP). Experience in Government/Ministry of Defence settings is advantageous. Proficiency in implementing ITIL processes. Strong expertise in SIEM operations. Competence in Risk Management and NIST Cyber Security Controls. Client-facing experience with exceptional stakeholder management skills. Ability to thrive in a fast-paced environment, adapting to evolving priorities. Highly organized with a pragmatic approach, consistently meeting deadlines. Excellent interpersonal and communication skills, both written and verbal. Business Environment Lockheed Martin UK - Strategic Systems (LMUK SS) is the single contractor providing specialist Waterfront In-Service Support to one of the Royal Navy's Submarine Programs. The company provides the Ministry of Defence (MoD) with safe, efficient and responsive support. LMUK SS, as part of the ABL Alliance with AWE and Babcock, is also responsible for the management of operations at RNAD Coulport. Looking to the future, LMUK SS supports the joint US and UK submarine design efforts. Equal Opportunity Statement Lockheed Martin is proud to be an equal opportunity employer and is committed to maintaining a diverse and inclusive work environment. Diversity and inclusion are fundamental to our culture and reflect our values of doing what's right, respecting others and performing with excellence. By engaging with all our employees' diverse talents and experiences every day, we can innovate different and better, creating cutting edge solutions and unparalleled customer value. We know that diversity of thought leads to better solutions for our customers. Our top priority is finding the best candidate for the job and if you are interested in the position, we'd love to hear how you might contribute to our mission and our team and would encourage you to apply, even if you don't believe you meet every one of the criteria set out in our job advert. In addition, we are committed to inclusion of all individuals and will make reasonable adjustments to our applications process. If you require assistance or adjustments to participate in the job application or interview process, please contact or call (phone number removed). Disclaimer: This vacancy is being advertised by Optamor Limited. Optamor is a specialist Recruitment Process Outsourcing provider. We provide a flexible full recruitment solution which takes care of all recruitment requirements from planning to on-boarding. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically and strategically important industries in the UK and the world today. We will never send your CV without your permission.
Apr 25, 2024
Full time
Join our dynamic team as a Cyber Security Analyst (Change Control) based in Faslane, Helensburgh. Enjoy the flexibility of our 4xFlex working pattern, with a condensed 4-day workweek (Monday to Thursday) and the option for hybrid working, typically spending 2 days onsite. Key responsibilities: Streamline and enhance Change Control processes. Collaborate on customer process enhancements aligned with ITIL4 practices. Deliver concise progress reports and compelling presentations to clients. Serve as a subject matter expert in Security Information and Event Management (SIEM), providing recommendations for product enhancements. Conduct thorough analysis of SIEM outputs, promptly identifying and escalating any incidents or breaches. Provide assurance support to team members on Secure by Design principles. Translate technical risks into understandable formats for non-technical stakeholders. Mentor junior team members. Effectively communicate with clients and managers across all levels. The successful candidate must be capable of achieving the appropriate level of security clearance (SC). For further information, please visit UK Security Vetting Clearance Levels Required skills, qualifications and experience Proven track record as a Cyber Security Analyst, Change Control Analyst, or related role. Preferred certification: Certified Information Systems Security Professional (CISSP). Experience in Government/Ministry of Defence settings is advantageous. Proficiency in implementing ITIL processes. Strong expertise in SIEM operations. Competence in Risk Management and NIST Cyber Security Controls. Client-facing experience with exceptional stakeholder management skills. Ability to thrive in a fast-paced environment, adapting to evolving priorities. Highly organized with a pragmatic approach, consistently meeting deadlines. Excellent interpersonal and communication skills, both written and verbal. Business Environment Lockheed Martin UK - Strategic Systems (LMUK SS) is the single contractor providing specialist Waterfront In-Service Support to one of the Royal Navy's Submarine Programs. The company provides the Ministry of Defence (MoD) with safe, efficient and responsive support. LMUK SS, as part of the ABL Alliance with AWE and Babcock, is also responsible for the management of operations at RNAD Coulport. Looking to the future, LMUK SS supports the joint US and UK submarine design efforts. Equal Opportunity Statement Lockheed Martin is proud to be an equal opportunity employer and is committed to maintaining a diverse and inclusive work environment. Diversity and inclusion are fundamental to our culture and reflect our values of doing what's right, respecting others and performing with excellence. By engaging with all our employees' diverse talents and experiences every day, we can innovate different and better, creating cutting edge solutions and unparalleled customer value. We know that diversity of thought leads to better solutions for our customers. Our top priority is finding the best candidate for the job and if you are interested in the position, we'd love to hear how you might contribute to our mission and our team and would encourage you to apply, even if you don't believe you meet every one of the criteria set out in our job advert. In addition, we are committed to inclusion of all individuals and will make reasonable adjustments to our applications process. If you require assistance or adjustments to participate in the job application or interview process, please contact or call (phone number removed). Disclaimer: This vacancy is being advertised by Optamor Limited. Optamor is a specialist Recruitment Process Outsourcing provider. We provide a flexible full recruitment solution which takes care of all recruitment requirements from planning to on-boarding. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically and strategically important industries in the UK and the world today. We will never send your CV without your permission.
Cyber Defence Engineer Location: Full Time onsite in HerefordDuration: 6 MonthsRole Description:Role Description: Cyber Defence Engineer will join a growing security team responsible for the testing, implementation, deployment, maintenance, configuration and troubleshooting of the SOC's technology stack (hardware and software). The engineer will also assist with the continued development and maintenance of data pipelines and signature updates and the professional development of the system engineering team.Tasks: Perform system administration on specific cyber defence applications and systems to include installation, configuration, maintenance, troubleshooting, backup and restoration. Manage system/server resources including performance, capacity, availability, serviceability, and recoverability. Diagnose and resolve customer reported system incidents, problems, and events to ensure continuing operability. Coordinate with SOC and CTI Analysts to assist in the development of signatures which can be implemented on cyber defence network tools in response to new or observed threats within the network environment or enclave. Manage the compilation, cataloguing, distribution, and retrieval of data from a range of enterprise networks and data sources. Implement data management standards, requirements, and specifications. Develop data standards, policies, and procedures. Analyse data sources to provide actionable recommendations and facilitate data-gathering methods. To share knowledge, skills and experience, create and improve documentation, and train new members of the data engineering team.Knowledge: Knowledge of big data technologies and ecosystems (e.g., NiFi). Knowledge of current market and emerging leaders in data analytical and SIEM platforms. Knowledge of network security implementations (e.g., host-based IDS, IPS), including their function and placement in a network. Knowledge of intrusion detection systems and signature development. Knowledge of front-end collection systems, including network traffic collection, filtering, and selection. Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. Knowledge of cyber defence and information security policies, procedures and regulations. Knowledge of network security architecture concepts including topology, protocols, components and principles.Skills/Experience: Previous experience of Enterprise ICS/network architectures and technologies. Working with frameworks and technologies that support data-intensive distributed applications. Experience maintaining and administrating data analytical and SIEM platforms. Experience using host and network-based IDS/IPS Experience using packet capture solutions. Skill in developing and deploying signatures. Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Ability to provide technical and service leadership to junior SOC Engineers (mentor/coach).Desirable Qualifications/Certifications Red Hat System Administration I & II (RH124/RH134). Baseline Cyber Courses E.g. Cyber Foundation Pathway, SANS SEC 301 Intro to Information Security, SANS 401 Security Essentials Bootcamp. Certified engineer in a market leading data analysis/SIEM platform. SANS SEC501 Advanced Security Essentials Enterprise Defender. SANS SEC 511 Continuous Monitoring & Security Operations. SANS SEC555: SIEM with Tactical Analytics Carbon60, Lorien & SRG - The Impellam Group STEM Portfolio are acting as an Employment Business in relation to this vacancy.
Apr 23, 2024
Full time
Cyber Defence Engineer Location: Full Time onsite in HerefordDuration: 6 MonthsRole Description:Role Description: Cyber Defence Engineer will join a growing security team responsible for the testing, implementation, deployment, maintenance, configuration and troubleshooting of the SOC's technology stack (hardware and software). The engineer will also assist with the continued development and maintenance of data pipelines and signature updates and the professional development of the system engineering team.Tasks: Perform system administration on specific cyber defence applications and systems to include installation, configuration, maintenance, troubleshooting, backup and restoration. Manage system/server resources including performance, capacity, availability, serviceability, and recoverability. Diagnose and resolve customer reported system incidents, problems, and events to ensure continuing operability. Coordinate with SOC and CTI Analysts to assist in the development of signatures which can be implemented on cyber defence network tools in response to new or observed threats within the network environment or enclave. Manage the compilation, cataloguing, distribution, and retrieval of data from a range of enterprise networks and data sources. Implement data management standards, requirements, and specifications. Develop data standards, policies, and procedures. Analyse data sources to provide actionable recommendations and facilitate data-gathering methods. To share knowledge, skills and experience, create and improve documentation, and train new members of the data engineering team.Knowledge: Knowledge of big data technologies and ecosystems (e.g., NiFi). Knowledge of current market and emerging leaders in data analytical and SIEM platforms. Knowledge of network security implementations (e.g., host-based IDS, IPS), including their function and placement in a network. Knowledge of intrusion detection systems and signature development. Knowledge of front-end collection systems, including network traffic collection, filtering, and selection. Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. Knowledge of cyber defence and information security policies, procedures and regulations. Knowledge of network security architecture concepts including topology, protocols, components and principles.Skills/Experience: Previous experience of Enterprise ICS/network architectures and technologies. Working with frameworks and technologies that support data-intensive distributed applications. Experience maintaining and administrating data analytical and SIEM platforms. Experience using host and network-based IDS/IPS Experience using packet capture solutions. Skill in developing and deploying signatures. Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Ability to provide technical and service leadership to junior SOC Engineers (mentor/coach).Desirable Qualifications/Certifications Red Hat System Administration I & II (RH124/RH134). Baseline Cyber Courses E.g. Cyber Foundation Pathway, SANS SEC 301 Intro to Information Security, SANS 401 Security Essentials Bootcamp. Certified engineer in a market leading data analysis/SIEM platform. SANS SEC501 Advanced Security Essentials Enterprise Defender. SANS SEC 511 Continuous Monitoring & Security Operations. SANS SEC555: SIEM with Tactical Analytics Carbon60, Lorien & SRG - The Impellam Group STEM Portfolio are acting as an Employment Business in relation to this vacancy.
Cyber Defence Engineer (DV Cleared) Location: HerefordDuration: 6 Months + ExtensionsRate: Very good day rate Role Description: Cyber Defence Engineer will join a growing security team responsible for the testing, implementation, deployment, maintenance, configuration and troubleshooting of the SOC's technology stack (hardware and software). The engineer will also assist with the continued development and maintenance of data pipelines and signature updates and the professional development of the system engineering team. Skills/Experience: Previous experience of Enterprise ICS/network architectures and technologies. Working with frameworks and technologies that support data-intensive distributed applications. Experience maintaining and administrating data analytical and SIEM platforms. Experience using host and network-based IDS/IPS Experience using packet capture solutions. Skill in developing and deploying signatures. Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Ability to provide technical and service leadership to junior SOC Engineers (mentor/coach). Tasks: Perform system administration on specific cyber defence applications and systems to include installation, configuration, maintenance, troubleshooting, backup and restoration. Manage system/server resources including performance, capacity, availability, serviceability, and recoverability. Diagnose and resolve customer reported system incidents, problems, and events to ensure continuing operability. Coordinate with SOC and CTI Analysts to assist in the development of signatures which can be implemented on cyber defence network tools in response to new or observed threats within the network environment or enclave. Manage the compilation, cataloguing, distribution, and retrieval of data from a range of enterprise networks and data sources. Implement data management standards, requirements, and specifications. Develop data standards, policies, and procedures. Apply now to discuss further
Apr 23, 2024
Full time
Cyber Defence Engineer (DV Cleared) Location: HerefordDuration: 6 Months + ExtensionsRate: Very good day rate Role Description: Cyber Defence Engineer will join a growing security team responsible for the testing, implementation, deployment, maintenance, configuration and troubleshooting of the SOC's technology stack (hardware and software). The engineer will also assist with the continued development and maintenance of data pipelines and signature updates and the professional development of the system engineering team. Skills/Experience: Previous experience of Enterprise ICS/network architectures and technologies. Working with frameworks and technologies that support data-intensive distributed applications. Experience maintaining and administrating data analytical and SIEM platforms. Experience using host and network-based IDS/IPS Experience using packet capture solutions. Skill in developing and deploying signatures. Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Ability to provide technical and service leadership to junior SOC Engineers (mentor/coach). Tasks: Perform system administration on specific cyber defence applications and systems to include installation, configuration, maintenance, troubleshooting, backup and restoration. Manage system/server resources including performance, capacity, availability, serviceability, and recoverability. Diagnose and resolve customer reported system incidents, problems, and events to ensure continuing operability. Coordinate with SOC and CTI Analysts to assist in the development of signatures which can be implemented on cyber defence network tools in response to new or observed threats within the network environment or enclave. Manage the compilation, cataloguing, distribution, and retrieval of data from a range of enterprise networks and data sources. Implement data management standards, requirements, and specifications. Develop data standards, policies, and procedures. Apply now to discuss further
Junior Cyber Security Analyst. Location: London. On-premises. Office Based: Four days a week. Remote Working: One day a week. An exceptional career opportunity is available to work for a nationally recognised museum. The museum has recently invested significantly in advanced systems to detect, prevent and resolve emerging cyber threats. Additionally, the museum must comply with various regulatory frameworks and legislation such as PCI-DSS, GDPR, CAA and Cyber Essentials. The maintenance of these security systems requires dedicated security team resources. This vacancy is a fantastic opportunity for a junior-level cybersecurity enthusiast with practical blue team knowledge/experience to develop more cyber awareness and understanding. Junior Cyber Security Analyst Key Skills: We are eager to connect with aspiring Junior Cyber Security Analysts, Cyber Security Interns, Entry-Level Cyber Security Engineers, Junior IT Security Engineers, and other early-career professionals focusing on cyber and IT security. To excel in this position, you must possess many of the following: - A good understanding of Cyber and IT Security concepts and practices. - Some experience performing Antivirus audits and checks. - Good knowledge or practical experience of blue team activities, including daily monitoring and reporting cyber threats, hazards, or risks. - The ability to patch devices, systems, or networks against vulnerabilities. - Knowledge or experience of one or more of the following: Cyber Essentials, Darktrace, Qualys. - Experience working with any endpoint security tool or software, such as MS Defender, Sophos, ESET, Trellix, Symantec, etc. - Have excellent English communication skills (written and verbal). All applicants must reside in the UK and have the right to work. About the Junior Cyber Security Analyst position: You will be a member of the IT Security Team. You will track and report daily cyber threats, hazards, risks, controls, mitigations, and measures to safeguard our client's systems and personnel. You will proactively monitor all output from the various security systems to ensure minimal downtime, and the business will always be protected from cyber threats. You will ensure that all websites, services, servers, and employee devices have installed adequate vulnerability patches. Responsibilities include: - Harnessing the cutting-edge capabilities of Darktrace to detect, prevent, and monitor cyber threats in real-time. - Finding systemic cyber vulnerabilities to make sure security is preserved. - To oversee the patching of critical systems and infrastructure across the entire company, including those platforms maintained by third-party suppliers, in accordance with Cyber Essentials, and to make sure that all devices covered by the programme comply with the standard. - Investigating and researching attack methods to create defences against emerging threats. - Support and adhere to the IT Security Incident Response process as needed. - Assistance with cyber security risk assessments, yearly audits, and ongoing improvement of incident management. Salary and Benefits: Salary: To £30-38,000 Location: London. On-premises. Office Based: Four days a week. Remote Working: One day a week. Holiday: 25 days + Bank Holidays. Rising to 30 days after five years. Museum benefits: - 20% discount in all on-site shops - 25% discount in museum cafes - Free entry to a large number of other museums and galleries. - Enhanced maternity and paternity: Yes Other benefits: - Access to Childcare vouchers. - Access to in-house training programmes and development. For more information on this Junior Cyber Security Analyst position, please get in touch with us to discuss. Our client welcomes everyone. They celebrate difference and encourage everyone to join and be themselves at work.
Apr 23, 2024
Full time
Junior Cyber Security Analyst. Location: London. On-premises. Office Based: Four days a week. Remote Working: One day a week. An exceptional career opportunity is available to work for a nationally recognised museum. The museum has recently invested significantly in advanced systems to detect, prevent and resolve emerging cyber threats. Additionally, the museum must comply with various regulatory frameworks and legislation such as PCI-DSS, GDPR, CAA and Cyber Essentials. The maintenance of these security systems requires dedicated security team resources. This vacancy is a fantastic opportunity for a junior-level cybersecurity enthusiast with practical blue team knowledge/experience to develop more cyber awareness and understanding. Junior Cyber Security Analyst Key Skills: We are eager to connect with aspiring Junior Cyber Security Analysts, Cyber Security Interns, Entry-Level Cyber Security Engineers, Junior IT Security Engineers, and other early-career professionals focusing on cyber and IT security. To excel in this position, you must possess many of the following: - A good understanding of Cyber and IT Security concepts and practices. - Some experience performing Antivirus audits and checks. - Good knowledge or practical experience of blue team activities, including daily monitoring and reporting cyber threats, hazards, or risks. - The ability to patch devices, systems, or networks against vulnerabilities. - Knowledge or experience of one or more of the following: Cyber Essentials, Darktrace, Qualys. - Experience working with any endpoint security tool or software, such as MS Defender, Sophos, ESET, Trellix, Symantec, etc. - Have excellent English communication skills (written and verbal). All applicants must reside in the UK and have the right to work. About the Junior Cyber Security Analyst position: You will be a member of the IT Security Team. You will track and report daily cyber threats, hazards, risks, controls, mitigations, and measures to safeguard our client's systems and personnel. You will proactively monitor all output from the various security systems to ensure minimal downtime, and the business will always be protected from cyber threats. You will ensure that all websites, services, servers, and employee devices have installed adequate vulnerability patches. Responsibilities include: - Harnessing the cutting-edge capabilities of Darktrace to detect, prevent, and monitor cyber threats in real-time. - Finding systemic cyber vulnerabilities to make sure security is preserved. - To oversee the patching of critical systems and infrastructure across the entire company, including those platforms maintained by third-party suppliers, in accordance with Cyber Essentials, and to make sure that all devices covered by the programme comply with the standard. - Investigating and researching attack methods to create defences against emerging threats. - Support and adhere to the IT Security Incident Response process as needed. - Assistance with cyber security risk assessments, yearly audits, and ongoing improvement of incident management. Salary and Benefits: Salary: To £30-38,000 Location: London. On-premises. Office Based: Four days a week. Remote Working: One day a week. Holiday: 25 days + Bank Holidays. Rising to 30 days after five years. Museum benefits: - 20% discount in all on-site shops - 25% discount in museum cafes - Free entry to a large number of other museums and galleries. - Enhanced maternity and paternity: Yes Other benefits: - Access to Childcare vouchers. - Access to in-house training programmes and development. For more information on this Junior Cyber Security Analyst position, please get in touch with us to discuss. Our client welcomes everyone. They celebrate difference and encourage everyone to join and be themselves at work.
Junior Cyber Security Analyst. Location: Duxford, Cambridgeshire. On-premises. Office Based: Four days a week. Remote Working: One day a week. An exceptional career opportunity is available to work for a globally recognized museum. The museum has recently invested significantly in advanced systems to detect, prevent and resolve emerging cyber threats. Additionally, the museum must comply with various regulatory frameworks and legislation such as PCI-DSS, GDPR, CAA and Cyber Essentials. The maintenance of these security systems requires dedicated security team resources. This vacancy is a fantastic opportunity for a junior-level cybersecurity enthusiast with practical blue team knowledge/experience to develop more cyber awareness and understanding. Junior Cyber Security Analyst Key Skills: We are eager to connect with aspiring Junior Cyber Security Analysts, Cyber Security Interns, Entry-Level Cyber Security Engineers, Junior IT Security Engineers, and other early-career professionals focusing on cyber and IT security. To excel in this position, you must possess many of the following: - A good understanding of Cyber and IT Security concepts and practices. - Some experience performing Antivirus audits and checks. - Good knowledge or practical experience of blue team activities, including daily monitoring and reporting cyber threats, hazards, or risks. - The ability to patch devices, systems, or networks against vulnerabilities. - Knowledge or experience of one or more of the following: Cyber Essentials, Darktrace, Qualys. - Experience working with any endpoint security tool or software, such as MS Defender, Sophos, ESET, Trellix, Symantec, etc. - Have excellent English communication skills (written and verbal). All applicants must reside in the UK and have the right to work. About the Junior Cyber Security Analyst position: You will be a member of the IT Security Team. You will track and report daily cyber threats, hazards, risks, controls, mitigations, and measures to safeguard our client's systems and personnel. You will proactively monitor all output from the various security systems to ensure minimal downtime, and the business will always be protected from cyber threats. You will ensure that all websites, services, servers, and employee devices have installed adequate vulnerability patches. Responsibilities include: - Harnessing the cutting-edge capabilities of Darktrace to detect, prevent, and monitor cyber threats in real-time. - Finding systemic cyber vulnerabilities to make sure security is preserved. - To oversee the patching of critical systems and infrastructure across the entire company, including those platforms maintained by third-party suppliers, in accordance with Cyber Essentials, and to make sure that all devices covered by the programme comply with the standard. - Investigating and researching attack methods to create defences against emerging threats. - Support and adhere to the IT Security Incident Response process as needed. - Assistance with cyber security risk assessments, yearly audits, and ongoing improvement of incident management. Salary and Benefits: Salary: To £30-38,000 Location: Duxford, Cambridgeshire. On-premises. Office Based: Four days a week. Remote Working: One day a week. Holiday: 25 days + Bank Holidays. Rising to 30 days after five years. Museum benefits: - 20% discount in all on-site shops - 25% discount in museum cafes - Free entry to a large number of other museums and galleries. - Enhanced maternity and paternity: Yes Other benefits: - Access to Childcare vouchers. - Access to in-house training programmes and development. For more information on this Junior Cyber Security Analyst position, please get in touch with us to discuss. Our client welcomes everyone. They celebrate difference and encourage everyone to join and be themselves at work.
Apr 23, 2024
Full time
Junior Cyber Security Analyst. Location: Duxford, Cambridgeshire. On-premises. Office Based: Four days a week. Remote Working: One day a week. An exceptional career opportunity is available to work for a globally recognized museum. The museum has recently invested significantly in advanced systems to detect, prevent and resolve emerging cyber threats. Additionally, the museum must comply with various regulatory frameworks and legislation such as PCI-DSS, GDPR, CAA and Cyber Essentials. The maintenance of these security systems requires dedicated security team resources. This vacancy is a fantastic opportunity for a junior-level cybersecurity enthusiast with practical blue team knowledge/experience to develop more cyber awareness and understanding. Junior Cyber Security Analyst Key Skills: We are eager to connect with aspiring Junior Cyber Security Analysts, Cyber Security Interns, Entry-Level Cyber Security Engineers, Junior IT Security Engineers, and other early-career professionals focusing on cyber and IT security. To excel in this position, you must possess many of the following: - A good understanding of Cyber and IT Security concepts and practices. - Some experience performing Antivirus audits and checks. - Good knowledge or practical experience of blue team activities, including daily monitoring and reporting cyber threats, hazards, or risks. - The ability to patch devices, systems, or networks against vulnerabilities. - Knowledge or experience of one or more of the following: Cyber Essentials, Darktrace, Qualys. - Experience working with any endpoint security tool or software, such as MS Defender, Sophos, ESET, Trellix, Symantec, etc. - Have excellent English communication skills (written and verbal). All applicants must reside in the UK and have the right to work. About the Junior Cyber Security Analyst position: You will be a member of the IT Security Team. You will track and report daily cyber threats, hazards, risks, controls, mitigations, and measures to safeguard our client's systems and personnel. You will proactively monitor all output from the various security systems to ensure minimal downtime, and the business will always be protected from cyber threats. You will ensure that all websites, services, servers, and employee devices have installed adequate vulnerability patches. Responsibilities include: - Harnessing the cutting-edge capabilities of Darktrace to detect, prevent, and monitor cyber threats in real-time. - Finding systemic cyber vulnerabilities to make sure security is preserved. - To oversee the patching of critical systems and infrastructure across the entire company, including those platforms maintained by third-party suppliers, in accordance with Cyber Essentials, and to make sure that all devices covered by the programme comply with the standard. - Investigating and researching attack methods to create defences against emerging threats. - Support and adhere to the IT Security Incident Response process as needed. - Assistance with cyber security risk assessments, yearly audits, and ongoing improvement of incident management. Salary and Benefits: Salary: To £30-38,000 Location: Duxford, Cambridgeshire. On-premises. Office Based: Four days a week. Remote Working: One day a week. Holiday: 25 days + Bank Holidays. Rising to 30 days after five years. Museum benefits: - 20% discount in all on-site shops - 25% discount in museum cafes - Free entry to a large number of other museums and galleries. - Enhanced maternity and paternity: Yes Other benefits: - Access to Childcare vouchers. - Access to in-house training programmes and development. For more information on this Junior Cyber Security Analyst position, please get in touch with us to discuss. Our client welcomes everyone. They celebrate difference and encourage everyone to join and be themselves at work.
As a SOC Analyst, you will play a pivotal role in our client's cybersecurity operations, monitoring and analysing our clients' network infrastructure to detect and respond to potential security incidents. Leveraging cutting-edge tools and technologies, you will proactively identify threats, investigate security breaches, and implement effective countermeasures to mitigate risks. This role offers an exciting opportunity to work in a fast-paced environment, collaborating with skilled professionals to protect digital assets and uphold the highest standards of security. Key Responsibilities: Monitor security event alerts generated by various detection systems and respond promptly to potential threats. Conduct in-depth analysis of security incidents to determine their scope, impact, and root cause. Coordinate with internal teams and external stakeholders to escalate and remediate security breaches in a timely manner. Develop and maintain comprehensive documentation of security incidents, including incident reports and post-mortem analyses. Stay current with emerging cybersecurity threats, vulnerabilities, and industry best practices to continuously enhance our security posture. Participate in security incident response exercises and drills to test and refine our incident response procedures. Collaborate with cross-functional teams to implement security controls and measures to protect against known and emerging threats. Provide guidance and support to junior SOC analysts, sharing knowledge and best practices to build a strong and cohesive team. Qualifications: Experience in cybersecurity, particularly within a SOC. Solid understanding of network protocols, security architectures, and threat intelligence frameworks. Hands-on experience with SIEM tools, intrusion detection/prevention systems, and endpoint security technologies. Proficiency in scripting languages such as Python or PowerShell for automation and data analysis. Strong analytical skills with the ability to methodically investigate and resolve security incidents. Excellent communication skills, with the ability to convey technical information effectively to both technical and non-technical audiences. Relevant industry certifications such as CISSP, GIAC, or CompTIA Security+ are a plus. If you are passionate about cybersecurity and eager to contribute your skills and expertise to a dynamic team, we would love to hear from you!
Apr 23, 2024
Full time
As a SOC Analyst, you will play a pivotal role in our client's cybersecurity operations, monitoring and analysing our clients' network infrastructure to detect and respond to potential security incidents. Leveraging cutting-edge tools and technologies, you will proactively identify threats, investigate security breaches, and implement effective countermeasures to mitigate risks. This role offers an exciting opportunity to work in a fast-paced environment, collaborating with skilled professionals to protect digital assets and uphold the highest standards of security. Key Responsibilities: Monitor security event alerts generated by various detection systems and respond promptly to potential threats. Conduct in-depth analysis of security incidents to determine their scope, impact, and root cause. Coordinate with internal teams and external stakeholders to escalate and remediate security breaches in a timely manner. Develop and maintain comprehensive documentation of security incidents, including incident reports and post-mortem analyses. Stay current with emerging cybersecurity threats, vulnerabilities, and industry best practices to continuously enhance our security posture. Participate in security incident response exercises and drills to test and refine our incident response procedures. Collaborate with cross-functional teams to implement security controls and measures to protect against known and emerging threats. Provide guidance and support to junior SOC analysts, sharing knowledge and best practices to build a strong and cohesive team. Qualifications: Experience in cybersecurity, particularly within a SOC. Solid understanding of network protocols, security architectures, and threat intelligence frameworks. Hands-on experience with SIEM tools, intrusion detection/prevention systems, and endpoint security technologies. Proficiency in scripting languages such as Python or PowerShell for automation and data analysis. Strong analytical skills with the ability to methodically investigate and resolve security incidents. Excellent communication skills, with the ability to convey technical information effectively to both technical and non-technical audiences. Relevant industry certifications such as CISSP, GIAC, or CompTIA Security+ are a plus. If you are passionate about cybersecurity and eager to contribute your skills and expertise to a dynamic team, we would love to hear from you!
At Direct Line Group, insurance is just the start. Combining decades of industry experience with talented people in every field from data, technology, customer care and auto repair, to HR, finance and procurement , we're a customer-obsessed market powerhouse. And we all work together to be brilliant for customers, every single day. We're evolving, to be a more digitally-focused data-driven insurance company of the future - and your unique talent, skills and ideas can drive our success. Like us, you thrive on collaboration, exploration and innovation. And like you, we take tech seriously. That's why we're embracing the move to a more digital, flexible world. With constant investment in the newest tools, programmes and equipment for our teams, it all adds up to creating the best possible user experience for customers. And a great career for you. Join us. Own the evolution. We have an exciting opportunity for a Senior Security Operations Analyst to join our re-energised Cyber Defence team! Reporting into the Cyber Defence Security Operations Lead, you will act as the as a secondary contact and escalation point for the team. You'll manage a team of Security Analysts to oversee the day-to-day operational delivery of services provided by our third party 24x7 Security Operations Centre, and will take ownership of our security presence and identify any gaps by working with various stakeholders across the business. What else you'll be doing: Maintaining security oversight of the technical infrastructure delivered by third party suppliers and raising concerns/issues that pose a security risk to the organisation accordingly. You will also manage any operational risk remediation to conclusion and take ownership within the team. Managing development and improvements required for detection engineering and associated technologies. Responsible for the operational and threat malware analysis for the group. Providing security input and for maintaining relationships with the Service Management function in relation to change management, problem management and incident management. Responsible for the level 2 / 3 operational Cyber incident response. Escalating in a timely manner any incidents and anomalies that are detected within DLG and providing subject matter expertise and guidance for operational challenges. Monitoring and responding to emerging threat patterns, vulnerabilities and anomalies and providing escalations of any unknown threats to relevant areas within the company. Collating metrics on the status of technical information security controls across the DLG estate, highlighting risk areas and working to develop and manage remediation plans as required. Collaborating with all CISO teams to report appropriate operational issues that may be resolved at an architecture level Operational On-Call Requirement This role has a shared, rotational 24/7 on-call requirement and forms part of information security incident response capability. You will act as the single point of contact for all security related response actions and decisions, including management of each incident from a security perspective, interaction with IM/MIM teams (where required) and recording of all key security decisions. What you'll need: Knowledge and operational experience in firewalls, intrusion detection and prevention systems, anti-virus and content filtering, URL filtering, authentication solutions, switches, routers, Voice over IP (VoIP), firewall zoning. Ability to read and understand system data including security event logs, system logs, application logs, and device logs, etc. Knowledge and experience of enterprise grade technologies including operating systems, databases, and web applications. Knowledge and experience of performing network traffic analysis for identifying any developing patterns. Ability to assist with knowledge transfer and mentoring/up skilling of junior team members Security Analysis for CompTIA CySA+ or similar level of certification It would be beneficial if you have: Experience with any of the following technologies: Data Loss Prevention, Intrusion Prevention/Detection Systems, Firewalls, SIEM. Knowledge of reporting suites such as Power BI Good understanding of Microsoft security suites and associated qualifications Threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, CISA by a recognised professional body Technical certifications by a recognised professional body in network or systems engineering Fundamental Cloud Concepts for AWS. OWASP Top 10: API Security Playbook. Ways of Working This role is based out of our London Bridge office. Our hybrid model way of working offers a 'best of both worlds' approach combining the best parts of home and office-working, offering flexibility for everyone. When you'll be in the office depends on your role, but most colleagues are in 2 days a week, and we'll consider the flexible working options that work best for you. Read our flexible working approach here Benefits We wouldn't be where we are today without our people and the wide variety of perspectives and life experiences they bring. That's why we offer excellent benefits to suit your lifestyle and a flexible working model combining the best parts of home and office-working, varying with the nature of your role. Our core benefits include: 9% employer contributed pension Up to 10% bonus 50% off home, motor and pet insurance plus free travel insurance and Green Flag breakdown cover Additional optional Health and Dental insurance EV car scheme which allows all colleagues to lease a brand new electric or plug-in hybrid car in a tax efficient way. 25 days annual leave Buy as you earn share scheme Employee discounts and cashback Plus many more!
Apr 23, 2024
Full time
At Direct Line Group, insurance is just the start. Combining decades of industry experience with talented people in every field from data, technology, customer care and auto repair, to HR, finance and procurement , we're a customer-obsessed market powerhouse. And we all work together to be brilliant for customers, every single day. We're evolving, to be a more digitally-focused data-driven insurance company of the future - and your unique talent, skills and ideas can drive our success. Like us, you thrive on collaboration, exploration and innovation. And like you, we take tech seriously. That's why we're embracing the move to a more digital, flexible world. With constant investment in the newest tools, programmes and equipment for our teams, it all adds up to creating the best possible user experience for customers. And a great career for you. Join us. Own the evolution. We have an exciting opportunity for a Senior Security Operations Analyst to join our re-energised Cyber Defence team! Reporting into the Cyber Defence Security Operations Lead, you will act as the as a secondary contact and escalation point for the team. You'll manage a team of Security Analysts to oversee the day-to-day operational delivery of services provided by our third party 24x7 Security Operations Centre, and will take ownership of our security presence and identify any gaps by working with various stakeholders across the business. What else you'll be doing: Maintaining security oversight of the technical infrastructure delivered by third party suppliers and raising concerns/issues that pose a security risk to the organisation accordingly. You will also manage any operational risk remediation to conclusion and take ownership within the team. Managing development and improvements required for detection engineering and associated technologies. Responsible for the operational and threat malware analysis for the group. Providing security input and for maintaining relationships with the Service Management function in relation to change management, problem management and incident management. Responsible for the level 2 / 3 operational Cyber incident response. Escalating in a timely manner any incidents and anomalies that are detected within DLG and providing subject matter expertise and guidance for operational challenges. Monitoring and responding to emerging threat patterns, vulnerabilities and anomalies and providing escalations of any unknown threats to relevant areas within the company. Collating metrics on the status of technical information security controls across the DLG estate, highlighting risk areas and working to develop and manage remediation plans as required. Collaborating with all CISO teams to report appropriate operational issues that may be resolved at an architecture level Operational On-Call Requirement This role has a shared, rotational 24/7 on-call requirement and forms part of information security incident response capability. You will act as the single point of contact for all security related response actions and decisions, including management of each incident from a security perspective, interaction with IM/MIM teams (where required) and recording of all key security decisions. What you'll need: Knowledge and operational experience in firewalls, intrusion detection and prevention systems, anti-virus and content filtering, URL filtering, authentication solutions, switches, routers, Voice over IP (VoIP), firewall zoning. Ability to read and understand system data including security event logs, system logs, application logs, and device logs, etc. Knowledge and experience of enterprise grade technologies including operating systems, databases, and web applications. Knowledge and experience of performing network traffic analysis for identifying any developing patterns. Ability to assist with knowledge transfer and mentoring/up skilling of junior team members Security Analysis for CompTIA CySA+ or similar level of certification It would be beneficial if you have: Experience with any of the following technologies: Data Loss Prevention, Intrusion Prevention/Detection Systems, Firewalls, SIEM. Knowledge of reporting suites such as Power BI Good understanding of Microsoft security suites and associated qualifications Threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, CISA by a recognised professional body Technical certifications by a recognised professional body in network or systems engineering Fundamental Cloud Concepts for AWS. OWASP Top 10: API Security Playbook. Ways of Working This role is based out of our London Bridge office. Our hybrid model way of working offers a 'best of both worlds' approach combining the best parts of home and office-working, offering flexibility for everyone. When you'll be in the office depends on your role, but most colleagues are in 2 days a week, and we'll consider the flexible working options that work best for you. Read our flexible working approach here Benefits We wouldn't be where we are today without our people and the wide variety of perspectives and life experiences they bring. That's why we offer excellent benefits to suit your lifestyle and a flexible working model combining the best parts of home and office-working, varying with the nature of your role. Our core benefits include: 9% employer contributed pension Up to 10% bonus 50% off home, motor and pet insurance plus free travel insurance and Green Flag breakdown cover Additional optional Health and Dental insurance EV car scheme which allows all colleagues to lease a brand new electric or plug-in hybrid car in a tax efficient way. 25 days annual leave Buy as you earn share scheme Employee discounts and cashback Plus many more!
Crisis24, a GardaWorld company, is widely regarded as the leading integrated risk management, crisis response, consulting, and global protective solutions firm, serving the world's most influential people, disruptive brands, and prominent organizations. Championed by our advanced Global Operation Centers and our skilled team of intelligence analysts, we offer highly specialized services, security and consulting, with the technology and AI to power it all across the globe. At Crisis24, we go beyond mere employment; we pave the way to a realm where your skills become instrumental in shaping global security, guiding clients through a multifaceted and challenging landscape. Your journey with us will be deeply fulfilling, driven by a powerful sense of purpose and accomplishment. Within our thriving environment, you'll discover abundant chances for both personal and career advancement. Seize this moment to push your limits, broaden your expertise, and elevate your professional journey to unprecedented levels. Join the Crisis24 team today and be a part of something extraordinary where growth and impact converge. Crisis24's Crisis & Security Consulting (CSC) division, specifically the All-Hazards Response team, is on the lookout for a Senior Consultant. This role is ideally suited for candidates based in the UK or in mainland Europe. As a part of our dynamic and agile Response Group, the successful applicant will have the chance to enhance their skill set and knowledge, enabling them to contribute across various teams within the organization. Candidates should possess comprehensive experience in crisis management at both tactical and strategic levels and have a wide-ranging understanding of different industries. The position involves readiness to deploy globally at short notice, often in challenging situations, requiring confidence and the ability to provide immediate support and guidance to high-level / C-Suite stakeholders. What You Will Work On Summary You will deliver All Hazards Response services, providing expert advice and guidance to clients facing crises, from threats and violence to political and cyber-related issues. This role entails global deployment, often without prior notice, creating documentation in line with CSC's methodologies, conducting sensitive investigations, and potentially training as a subject matter expert for example as a crisis communications consultant. You will also support the development of junior team members and collaborate with the global consulting team on service delivery, maintaining accurate records across platforms such as Salesforce. Specifics Provide advice and guidance to clients in response to case activations on the following peril types: Active Assailant / Workplace Violence; Political Violence & Terrorism; Cyber Extortion; and Any other crisis-level event in which All-Hazard Response are engaged. Deployment globally in support of any new case activation, often with no notice. Produce all relevant documentation in support of assigned response cases, in line with CSC's doctrine and methodology. Coordinate and conduct sensitive investigational support to clients. Train as a Crisis Communications consultant. Support the development of more junior team members and work in cooperation with the wider global consulting team on all other aspects of consulting services delivery. Keep Salesforce and any other platforms used by Crisis24 up to date and accurate in relation to relevant accounts and proposals. Obtain the skill set and knowledge to actively respond as a Special Risks Response Consultant when required. Support to Insurance Partners Deliver onboarding briefings to new policy holders. Provide capability briefings in support of marketing the wider insurance policies. Assist in the delivery of update reports to insurance underwriters during ongoing cases. Generation of new response retainers, providing services to insurance partners or private clients. Direct engagement contracts for new response cases when insurance options are not present. Assist wider CSC team members in any business development briefings and activity when required. Support the implementation of a business development plan for the region. Scope, price, manage and/or oversee the development of client proposals and responses to RFPs. Represent CSC, Crisis24 and GardaWorld in client pitches/senior-level presentations/in-person meetings. Duty officer Following training, there may be a requirement to join the Duty Officer roster for All-Hazards Response activations. Account management Client liaison and account/client relationship management of new and existing consulting clients. Other Support the wider Crisis24 and GardaWorld business as required. Who You Will Work With Under the guidance of the Associate Director for All Hazards Response, you will collaborate on a variety of response cases and projects. These initiatives are diverse in terms of geography, industry, and complexity, necessitating effective management of pressures. You will be an integral part of both the Response Group and the wider CSC team, frequently assisting other teams within Crisis24 and GardaWorld. Owing to the sensitive nature of the case activity, All Hazards personnel are often visible to the highest levels of leadership within Crisis24 and GardaWorld. What You Will Bring Summary Candidates should have at least 10 years of experience in Crisis Management, preferably within a corporate or consulting environment, and a solid background in Security Risk and Crisis Management. You should be knowledgeable about crisis response processes, the specialist insurance market, and have a track record of developing new business opportunities. The role demands extensive global travel, often to high-risk areas, and requires strong analytical, problem-solving, and communication skills. Candidates must be adaptable, motivated to work irregular hours, and committed to continuous professional development. Specifics 10+ years of experience in Crisis Management, preferably in a corporate and/or consulting setting. Strong working knowledge of Security Risk and Crisis Management. In-depth knowledge and experience of crisis response processes. An understanding of specialist insurance markets. Demonstrable commercial experience developing new business opportunities. Extensive travel experience globally, including in high-threat/hostile environments. Strong analytical and problem-solving skills; a creative thinker who can apply initiative and create solutions to solve clients' problems. Ability to manage multiple cases simultaneously with strong attention to detail. Personable and able to communicate effectively at all levels with team members and clients, with the gravitas to influence at a very senior level, including verbal communications and presentations skills. Able to relate well to others with confidence and empathy, build trust and be calm and resourceful during difficult and emotive situations. The flexibility and motivation to work irregular hours and maintain quality delivery. Invested in development; maintains a high level of industry knowledge and awareness of geopolitical and security/crisis management issues and trends. The annual leave year runs from 1 January to 31 December. Your paid annual leave entitlement will be 25 days per annum (pro rata for part time hours). Group Life Insurance effective upon commencement of employment. Death in Service pays out at 4x base salary. Employee Assistance Program effective upon commencement of employment. Full details will be provided after joining the company. A Discretionary Bonus Scheme, effective in the year following your employment, and based on company performance in the previous fiscal year. Group Pension Scheme, to which you will be automatically enrolled from the beginning of the third month following start date: We will match your contributions up to 5%. The minimum contribution you can make to the scheme is 4%. You will be entitled to opt out should you wish. Information Security Protect the data and systems of Crisis24 and its stakeholders by adhering to policies, reporting incidents and potential problems, completing regular training, and identifying opportunities for improvement. Crisis24, A GardaWorld Company is dedicated to equal opportunity in employment. We are committed to a work environment that celebrates diversity. We do not discriminate against any individual based on race, color, sex, national origin, age, religion, marital or parental status, sexual orientation, gender identity, gender expression, military or veteran status, disability, or any factors protected by applicable laws.
Apr 23, 2024
Full time
Crisis24, a GardaWorld company, is widely regarded as the leading integrated risk management, crisis response, consulting, and global protective solutions firm, serving the world's most influential people, disruptive brands, and prominent organizations. Championed by our advanced Global Operation Centers and our skilled team of intelligence analysts, we offer highly specialized services, security and consulting, with the technology and AI to power it all across the globe. At Crisis24, we go beyond mere employment; we pave the way to a realm where your skills become instrumental in shaping global security, guiding clients through a multifaceted and challenging landscape. Your journey with us will be deeply fulfilling, driven by a powerful sense of purpose and accomplishment. Within our thriving environment, you'll discover abundant chances for both personal and career advancement. Seize this moment to push your limits, broaden your expertise, and elevate your professional journey to unprecedented levels. Join the Crisis24 team today and be a part of something extraordinary where growth and impact converge. Crisis24's Crisis & Security Consulting (CSC) division, specifically the All-Hazards Response team, is on the lookout for a Senior Consultant. This role is ideally suited for candidates based in the UK or in mainland Europe. As a part of our dynamic and agile Response Group, the successful applicant will have the chance to enhance their skill set and knowledge, enabling them to contribute across various teams within the organization. Candidates should possess comprehensive experience in crisis management at both tactical and strategic levels and have a wide-ranging understanding of different industries. The position involves readiness to deploy globally at short notice, often in challenging situations, requiring confidence and the ability to provide immediate support and guidance to high-level / C-Suite stakeholders. What You Will Work On Summary You will deliver All Hazards Response services, providing expert advice and guidance to clients facing crises, from threats and violence to political and cyber-related issues. This role entails global deployment, often without prior notice, creating documentation in line with CSC's methodologies, conducting sensitive investigations, and potentially training as a subject matter expert for example as a crisis communications consultant. You will also support the development of junior team members and collaborate with the global consulting team on service delivery, maintaining accurate records across platforms such as Salesforce. Specifics Provide advice and guidance to clients in response to case activations on the following peril types: Active Assailant / Workplace Violence; Political Violence & Terrorism; Cyber Extortion; and Any other crisis-level event in which All-Hazard Response are engaged. Deployment globally in support of any new case activation, often with no notice. Produce all relevant documentation in support of assigned response cases, in line with CSC's doctrine and methodology. Coordinate and conduct sensitive investigational support to clients. Train as a Crisis Communications consultant. Support the development of more junior team members and work in cooperation with the wider global consulting team on all other aspects of consulting services delivery. Keep Salesforce and any other platforms used by Crisis24 up to date and accurate in relation to relevant accounts and proposals. Obtain the skill set and knowledge to actively respond as a Special Risks Response Consultant when required. Support to Insurance Partners Deliver onboarding briefings to new policy holders. Provide capability briefings in support of marketing the wider insurance policies. Assist in the delivery of update reports to insurance underwriters during ongoing cases. Generation of new response retainers, providing services to insurance partners or private clients. Direct engagement contracts for new response cases when insurance options are not present. Assist wider CSC team members in any business development briefings and activity when required. Support the implementation of a business development plan for the region. Scope, price, manage and/or oversee the development of client proposals and responses to RFPs. Represent CSC, Crisis24 and GardaWorld in client pitches/senior-level presentations/in-person meetings. Duty officer Following training, there may be a requirement to join the Duty Officer roster for All-Hazards Response activations. Account management Client liaison and account/client relationship management of new and existing consulting clients. Other Support the wider Crisis24 and GardaWorld business as required. Who You Will Work With Under the guidance of the Associate Director for All Hazards Response, you will collaborate on a variety of response cases and projects. These initiatives are diverse in terms of geography, industry, and complexity, necessitating effective management of pressures. You will be an integral part of both the Response Group and the wider CSC team, frequently assisting other teams within Crisis24 and GardaWorld. Owing to the sensitive nature of the case activity, All Hazards personnel are often visible to the highest levels of leadership within Crisis24 and GardaWorld. What You Will Bring Summary Candidates should have at least 10 years of experience in Crisis Management, preferably within a corporate or consulting environment, and a solid background in Security Risk and Crisis Management. You should be knowledgeable about crisis response processes, the specialist insurance market, and have a track record of developing new business opportunities. The role demands extensive global travel, often to high-risk areas, and requires strong analytical, problem-solving, and communication skills. Candidates must be adaptable, motivated to work irregular hours, and committed to continuous professional development. Specifics 10+ years of experience in Crisis Management, preferably in a corporate and/or consulting setting. Strong working knowledge of Security Risk and Crisis Management. In-depth knowledge and experience of crisis response processes. An understanding of specialist insurance markets. Demonstrable commercial experience developing new business opportunities. Extensive travel experience globally, including in high-threat/hostile environments. Strong analytical and problem-solving skills; a creative thinker who can apply initiative and create solutions to solve clients' problems. Ability to manage multiple cases simultaneously with strong attention to detail. Personable and able to communicate effectively at all levels with team members and clients, with the gravitas to influence at a very senior level, including verbal communications and presentations skills. Able to relate well to others with confidence and empathy, build trust and be calm and resourceful during difficult and emotive situations. The flexibility and motivation to work irregular hours and maintain quality delivery. Invested in development; maintains a high level of industry knowledge and awareness of geopolitical and security/crisis management issues and trends. The annual leave year runs from 1 January to 31 December. Your paid annual leave entitlement will be 25 days per annum (pro rata for part time hours). Group Life Insurance effective upon commencement of employment. Death in Service pays out at 4x base salary. Employee Assistance Program effective upon commencement of employment. Full details will be provided after joining the company. A Discretionary Bonus Scheme, effective in the year following your employment, and based on company performance in the previous fiscal year. Group Pension Scheme, to which you will be automatically enrolled from the beginning of the third month following start date: We will match your contributions up to 5%. The minimum contribution you can make to the scheme is 4%. You will be entitled to opt out should you wish. Information Security Protect the data and systems of Crisis24 and its stakeholders by adhering to policies, reporting incidents and potential problems, completing regular training, and identifying opportunities for improvement. Crisis24, A GardaWorld Company is dedicated to equal opportunity in employment. We are committed to a work environment that celebrates diversity. We do not discriminate against any individual based on race, color, sex, national origin, age, religion, marital or parental status, sexual orientation, gender identity, gender expression, military or veteran status, disability, or any factors protected by applicable laws.
Junior SOC Analyst - Hybrid - 3 days on site - Nottinghamshire Main Responsibilities: - Triage, analyse and investigate alerts, log data and network traffic using security tools to identify cyber-attacks / security incidents. This includes the investigation and root cause analysis of potential security incidents. - Proactively investigate potential security breaches by utilising threat intelligence and internal and external security systems and provide subject matter expertise for technical responses to confirmed cyber security incidents. - Create and maintain the clients target cyber security architecture. - Deliver subject matter expertise to key stakeholders to drive the implementation of security controls to meet the target architecture. - Accountable for vulnerability scanning, including the prioritisation of unpatched vulnerabilities and reporting against agreed KPIs and KRIs. - Support the annual penetration testing schedule by arranging penetration testing, including tracking, and communicating penetration testing results. - Perform supplementary testing of clients detection and response controls by procuring, installing, and running penetration testing tooling. - Participate in process improvement work to automate and improve critical cyber security processes such as monitoring, patching, and hardening. - Develop and maintain process documentation for security architecture, vulnerability management, cyber incident response, and playbooks. - Provide security representation across multiple geographies, business units and teams to achieve objectives, including engagement with the Information Security Enhancement Office. Skills, Knowledge and Experience - Has obtained one or more of the following qualifications: CEH, CRTSA, and OSCP. - Qualifications such as CISSP and CISM would be advantageous. - Problem solving skills, and the ability to come up with new solutions to existing challenges. - Strengths in key 'soft skill' areas such as relationship management, communication, and presentation of technical security information to a variety of audiences. - Technical skills to investigate potential breaches through existing tools, packet capture and log file analysis. - A logical mindset, the ability to identify proportionate, appropriate mitigations to identified security incidents, and to prioritise incidents based on risk. - Capable of working independently/without ongoing supervision on projects and day to day tasks. Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants who are considered suitable for interview will be contacted. Proactive Appointments Limited operates as an employment agency and employment business and is an equal opportunities organisation We take our obligations to protect your personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on our website
Apr 23, 2024
Full time
Junior SOC Analyst - Hybrid - 3 days on site - Nottinghamshire Main Responsibilities: - Triage, analyse and investigate alerts, log data and network traffic using security tools to identify cyber-attacks / security incidents. This includes the investigation and root cause analysis of potential security incidents. - Proactively investigate potential security breaches by utilising threat intelligence and internal and external security systems and provide subject matter expertise for technical responses to confirmed cyber security incidents. - Create and maintain the clients target cyber security architecture. - Deliver subject matter expertise to key stakeholders to drive the implementation of security controls to meet the target architecture. - Accountable for vulnerability scanning, including the prioritisation of unpatched vulnerabilities and reporting against agreed KPIs and KRIs. - Support the annual penetration testing schedule by arranging penetration testing, including tracking, and communicating penetration testing results. - Perform supplementary testing of clients detection and response controls by procuring, installing, and running penetration testing tooling. - Participate in process improvement work to automate and improve critical cyber security processes such as monitoring, patching, and hardening. - Develop and maintain process documentation for security architecture, vulnerability management, cyber incident response, and playbooks. - Provide security representation across multiple geographies, business units and teams to achieve objectives, including engagement with the Information Security Enhancement Office. Skills, Knowledge and Experience - Has obtained one or more of the following qualifications: CEH, CRTSA, and OSCP. - Qualifications such as CISSP and CISM would be advantageous. - Problem solving skills, and the ability to come up with new solutions to existing challenges. - Strengths in key 'soft skill' areas such as relationship management, communication, and presentation of technical security information to a variety of audiences. - Technical skills to investigate potential breaches through existing tools, packet capture and log file analysis. - A logical mindset, the ability to identify proportionate, appropriate mitigations to identified security incidents, and to prioritise incidents based on risk. - Capable of working independently/without ongoing supervision on projects and day to day tasks. Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants who are considered suitable for interview will be contacted. Proactive Appointments Limited operates as an employment agency and employment business and is an equal opportunities organisation We take our obligations to protect your personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on our website
Cyber Defence Engineer - DV Clearance Required! The Cyber Defence Engineer will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extensions Corsham (4 days on site) What we're looking for: Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Experience using virtualisation software. Excellent communication skills Experience of writing Defence/Government documentation Someone hands on. Responsibilities include: Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and dashboards to give visibility of the Enterprise infrastructure. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further.
Apr 23, 2024
Contractor
Cyber Defence Engineer - DV Clearance Required! The Cyber Defence Engineer will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extensions Corsham (4 days on site) What we're looking for: Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Experience using virtualisation software. Excellent communication skills Experience of writing Defence/Government documentation Someone hands on. Responsibilities include: Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and dashboards to give visibility of the Enterprise infrastructure. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further.
Cyber Defence Engineer - DV Clearance Required! The Cyber Defence Engineer will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extensions Northallerton (4 days on site) What we're looking for: Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Experience using virtualisation software. Excellent communication skills Experience of writing Defence/Government documentation Someone hands on. Responsibilities include: Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and dashboards to give visibility of the Enterprise infrastructure. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further.
Apr 23, 2024
Contractor
Cyber Defence Engineer - DV Clearance Required! The Cyber Defence Engineer will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extensions Northallerton (4 days on site) What we're looking for: Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Experience using virtualisation software. Excellent communication skills Experience of writing Defence/Government documentation Someone hands on. Responsibilities include: Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and dashboards to give visibility of the Enterprise infrastructure. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further.
About Us: We've been on a mission to improve end user satisfaction since the day we were founded over 25 years ago. As champions of premium experience-led IT services, it is who we are. We constantly challenge old assumptions and inherited wisdom, and demonstrate there are other, better ways to do things. Based in the UK, with offices globally USA, South Africa, Sri Lanka, Kuala Lumpur and Macedonia, we now provide a huge range of market-leading managed services, Microsoft-centric business software and cloud solutions to over 300 ambitious mid-market organisations. And in response to our customers' changing needs, and the growing threats we all face, we've massively strengthened our well-established cybersecurity capabilities. Our mission is to unleash the potential of people through amazing IT experiences. Junior Infrastructure Analyst Role: As a 24-7 Infrastructure Analyst, you will play a key role in the delivery of high-quality technical support for Acora and the customer, whilst delivering customer satisfaction and a personalised service. This position requires troubleshooting, problem-solving and technical skills, using various diagnostic tools. In addition, you should have good inter-personal skills and a sense of initiative to provide high levels of resolution, support, escalation and customer satisfaction.This position is based at an Acora location and reports to a 24-7 Shift Manager. Shift Pattern: This will comprise of 2 Day shifts, 2 nights shifts and then 4 days off. There will be opportunities to work overtime when on standby. Key Responsibilities: Maximise the use of all in-house systems to be a key member of a highly customer focused and professional Service Desk function. Work with your colleagues to effectively monitor customer systems and network performance, to process alerts and manage Incidents and Service Requests. Work with a number of different infrastructure systems that may be On-Premise or Cloud based Be able to assess, triage and propose effective solutions for cases. To receive escalations and in turn know when to escalate cases to ensure timely actions are taken to effectively to achieve the highest level of customer service. Communicate effectively with customers throughout the ticket life cycle, ensuring that at all times the customer is fully aware of the status of their incident or service request. Provide the highest level of service by meeting or exceeding contractual SLAs and KPIs and by proactively identifying process improvement opportunities within the department. Provide Problem Management by using all the information to hand to identify, prevent or resolve either ongoing or potential issues that would adversely affect a customer. Work with the Change Management team to create and implement change requests to ensure minimum impact to the customer when undertaking essential work and maintenance. Work with your Line Manager to maintain a level of technological competence that remains current and fit-for-purpose in your role, agreeing any training needs where appropriate. Ensure where possible, or highlight where not, that Acora fulfils its contractual obligations to its contracted services customers. Develop, over time, a knowledge of our customers' businesses and organisation, including key users of technology and their needs. To highlight needed updates to documentation and identify knowledgebase articles that may be required. To endorse and co-operate fully with the Business Improvement process, participating in or contributing to, designated change projects as required. Any additional tasks or projects as may be required by the Board or management team, in support of the Company's commercial objective. Key Skills: Proven experience within infrastructure support team is essential. Technical knowledge of and previous experience of supporting: Windows Server Systems Office 365/Office Applications Messaging infrastructure and cloud platforms Virtualisation Knowledge of Networking (Firewalls, Routers and Switches) Privacy Policy: In general, you can visit online without telling us who you are or revealing any information about yourself. There are times, however, when we may need information such as your name and e-mail address, to correspond with you and fulfil your request. Acora is fully compliant with the General Data Protection Regulation 2016.
Jan 31, 2024
Full time
About Us: We've been on a mission to improve end user satisfaction since the day we were founded over 25 years ago. As champions of premium experience-led IT services, it is who we are. We constantly challenge old assumptions and inherited wisdom, and demonstrate there are other, better ways to do things. Based in the UK, with offices globally USA, South Africa, Sri Lanka, Kuala Lumpur and Macedonia, we now provide a huge range of market-leading managed services, Microsoft-centric business software and cloud solutions to over 300 ambitious mid-market organisations. And in response to our customers' changing needs, and the growing threats we all face, we've massively strengthened our well-established cybersecurity capabilities. Our mission is to unleash the potential of people through amazing IT experiences. Junior Infrastructure Analyst Role: As a 24-7 Infrastructure Analyst, you will play a key role in the delivery of high-quality technical support for Acora and the customer, whilst delivering customer satisfaction and a personalised service. This position requires troubleshooting, problem-solving and technical skills, using various diagnostic tools. In addition, you should have good inter-personal skills and a sense of initiative to provide high levels of resolution, support, escalation and customer satisfaction.This position is based at an Acora location and reports to a 24-7 Shift Manager. Shift Pattern: This will comprise of 2 Day shifts, 2 nights shifts and then 4 days off. There will be opportunities to work overtime when on standby. Key Responsibilities: Maximise the use of all in-house systems to be a key member of a highly customer focused and professional Service Desk function. Work with your colleagues to effectively monitor customer systems and network performance, to process alerts and manage Incidents and Service Requests. Work with a number of different infrastructure systems that may be On-Premise or Cloud based Be able to assess, triage and propose effective solutions for cases. To receive escalations and in turn know when to escalate cases to ensure timely actions are taken to effectively to achieve the highest level of customer service. Communicate effectively with customers throughout the ticket life cycle, ensuring that at all times the customer is fully aware of the status of their incident or service request. Provide the highest level of service by meeting or exceeding contractual SLAs and KPIs and by proactively identifying process improvement opportunities within the department. Provide Problem Management by using all the information to hand to identify, prevent or resolve either ongoing or potential issues that would adversely affect a customer. Work with the Change Management team to create and implement change requests to ensure minimum impact to the customer when undertaking essential work and maintenance. Work with your Line Manager to maintain a level of technological competence that remains current and fit-for-purpose in your role, agreeing any training needs where appropriate. Ensure where possible, or highlight where not, that Acora fulfils its contractual obligations to its contracted services customers. Develop, over time, a knowledge of our customers' businesses and organisation, including key users of technology and their needs. To highlight needed updates to documentation and identify knowledgebase articles that may be required. To endorse and co-operate fully with the Business Improvement process, participating in or contributing to, designated change projects as required. Any additional tasks or projects as may be required by the Board or management team, in support of the Company's commercial objective. Key Skills: Proven experience within infrastructure support team is essential. Technical knowledge of and previous experience of supporting: Windows Server Systems Office 365/Office Applications Messaging infrastructure and cloud platforms Virtualisation Knowledge of Networking (Firewalls, Routers and Switches) Privacy Policy: In general, you can visit online without telling us who you are or revealing any information about yourself. There are times, however, when we may need information such as your name and e-mail address, to correspond with you and fulfil your request. Acora is fully compliant with the General Data Protection Regulation 2016.
Global Technology Solutions Ltd
Milton Keynes, Buckinghamshire
SOC Engineer Hybrid position one day in Milton Keynes on site. £40,000 - £50,000 Mon-Fri 9am to 6pm The ideal candidate for this position will have previous experience as a Microsoft Engineer with a strong background in products such as Defender and Sentinel, ideally within a SOC environment. Your work will involve implementing technology and supporting our customers working alongside other engineers, SOC Analysts and other members of the delivery team. This role has strong potential for career and training development as we deliver industry leading solutions to our customers. Main Duties/Responsibilities: * Implementation and support of Microsoft Defender and Sentinel * Designing and refining engineering standards and best practices * Conduct periodic Microsoft healthcheck assessments, audits, and architecture reviews * Work alongside SOC Analysts to improve the detection of security incidents * Research and implement new technologies that can be used within the SOC * Deploy automation throughout the SOC to improve the overall operational effectiveness of the SOC * Assisting with the triage of incidents alongside others * Draft reports and customer-facing documents to a high standard * Stay up to date with the latest cyber vulnerabilities * Assist with the development of more junior members of the team where required Essential Skills & Experience: * Any relevant Microsoft Certifications: AZ-104, SC-200, AZ-500 * Solid background as a Security Engineer/SOC Engineer * Ability to lead and design automation/Scripting in SIEM Tools * Experience with SIEM solutions such as Azure Sentinel, Splunk, McAfee, Rapid7, LogRhythym etc * Ability to design and document security processes * Analysing cloud security risks and threats, performing cloud security audits and assessments, and recommending cloud security controls * A strong analytical mindset with prior experience with KQL and PowerBI * Excellent written and spoken English skills are vital for compiling high-quality reports and liaising with clients In applying for this position, you consent to your personal data being shared with the specified employer and for your details to remain with GTS for as long as is necessary to process your application. See our Privacy Notice for full information Global Technology Solutions is acting as an Employment Agency in relation to this vacancy.
Jan 29, 2024
Full time
SOC Engineer Hybrid position one day in Milton Keynes on site. £40,000 - £50,000 Mon-Fri 9am to 6pm The ideal candidate for this position will have previous experience as a Microsoft Engineer with a strong background in products such as Defender and Sentinel, ideally within a SOC environment. Your work will involve implementing technology and supporting our customers working alongside other engineers, SOC Analysts and other members of the delivery team. This role has strong potential for career and training development as we deliver industry leading solutions to our customers. Main Duties/Responsibilities: * Implementation and support of Microsoft Defender and Sentinel * Designing and refining engineering standards and best practices * Conduct periodic Microsoft healthcheck assessments, audits, and architecture reviews * Work alongside SOC Analysts to improve the detection of security incidents * Research and implement new technologies that can be used within the SOC * Deploy automation throughout the SOC to improve the overall operational effectiveness of the SOC * Assisting with the triage of incidents alongside others * Draft reports and customer-facing documents to a high standard * Stay up to date with the latest cyber vulnerabilities * Assist with the development of more junior members of the team where required Essential Skills & Experience: * Any relevant Microsoft Certifications: AZ-104, SC-200, AZ-500 * Solid background as a Security Engineer/SOC Engineer * Ability to lead and design automation/Scripting in SIEM Tools * Experience with SIEM solutions such as Azure Sentinel, Splunk, McAfee, Rapid7, LogRhythym etc * Ability to design and document security processes * Analysing cloud security risks and threats, performing cloud security audits and assessments, and recommending cloud security controls * A strong analytical mindset with prior experience with KQL and PowerBI * Excellent written and spoken English skills are vital for compiling high-quality reports and liaising with clients In applying for this position, you consent to your personal data being shared with the specified employer and for your details to remain with GTS for as long as is necessary to process your application. See our Privacy Notice for full information Global Technology Solutions is acting as an Employment Agency in relation to this vacancy.