Junior IT Support Analyst 4 days onsite Our client, a small financial services organisation have an exciting opportunity for a Junior IT Support Analyst who is looking to enhance their skillset and career by working alongside a talented IT Manager, supporting the wider business needs. This role requires some commercial IT Support/Helpdesk experience but would be the ideal fit for a curious and enthusiastic individual who is eager to learn and pick up new skills within the financial services sector. You will be based in their head office a short walk from Bank station with the ability to work from home, once up to speed, on Fridays. Role responsibilities: Ensure overnight backups have run successfully Check any other overnight routines and batch file updates etc. Ensure network resilience Monitor server and firewall status Ensure constant internet availability Address outstanding IT issues, log items and provide helpdesk support to users Perform system maintenance routines Run reports as required Maintain Password Policy in accordance with Company Handbook On-going maintenance of other hardware to include ancillary items, including the telephone network, printers etc. Skills required: 1st Line support on Microsoft Windows environment. Hardware and Software support Windows 10/11 and server 2019 and above support. Maintain Windows updates. O365 support including basic understanding on Azure Cloud Services. Azure AD Support Basic understanding of Network devices such as Switches/ WiFi Mesh Printer (Canon) and PaperCut Support. Backup Veeam Support (Backup and Replication). Security Firewall Basic understanding of Cisco Firewall is preferable. Cyber Security Good understanding of cybersecurity and ensuring cyber essential is kept up to date. Auditing Use software to audit the network environment and permissions. Auditing shared drives. Database SQL Server DB Support with SSRS would be preferable. Telephony BT One phone support (preferable). Junior IT Support Analyst Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants who are considered suitable for interview will be contacted. Proactive Appointments Limited operates as an employment agency and employment business and is an equal opportunities organisation We take our obligations to protect your personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on our website (url removed)
May 04, 2024
Full time
Junior IT Support Analyst 4 days onsite Our client, a small financial services organisation have an exciting opportunity for a Junior IT Support Analyst who is looking to enhance their skillset and career by working alongside a talented IT Manager, supporting the wider business needs. This role requires some commercial IT Support/Helpdesk experience but would be the ideal fit for a curious and enthusiastic individual who is eager to learn and pick up new skills within the financial services sector. You will be based in their head office a short walk from Bank station with the ability to work from home, once up to speed, on Fridays. Role responsibilities: Ensure overnight backups have run successfully Check any other overnight routines and batch file updates etc. Ensure network resilience Monitor server and firewall status Ensure constant internet availability Address outstanding IT issues, log items and provide helpdesk support to users Perform system maintenance routines Run reports as required Maintain Password Policy in accordance with Company Handbook On-going maintenance of other hardware to include ancillary items, including the telephone network, printers etc. Skills required: 1st Line support on Microsoft Windows environment. Hardware and Software support Windows 10/11 and server 2019 and above support. Maintain Windows updates. O365 support including basic understanding on Azure Cloud Services. Azure AD Support Basic understanding of Network devices such as Switches/ WiFi Mesh Printer (Canon) and PaperCut Support. Backup Veeam Support (Backup and Replication). Security Firewall Basic understanding of Cisco Firewall is preferable. Cyber Security Good understanding of cybersecurity and ensuring cyber essential is kept up to date. Auditing Use software to audit the network environment and permissions. Auditing shared drives. Database SQL Server DB Support with SSRS would be preferable. Telephony BT One phone support (preferable). Junior IT Support Analyst Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants who are considered suitable for interview will be contacted. Proactive Appointments Limited operates as an employment agency and employment business and is an equal opportunities organisation We take our obligations to protect your personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on our website (url removed)
Junior IT Support Analyst 4 days onsite Our client, a small financial services organisation have an exciting opportunity for a Junior IT Support Analyst who is looking to enhance their skillset and career by working alongside a talented IT Manager, supporting the wider business needs. This role requires some commercial IT Support/Helpdesk experience but would be the ideal fit for a curious and enthusiastic individual who is eager to learn and pick up new skills within the financial services sector. You will be based in their head office a short walk from Bank station with the ability to work from home, once up to speed, on Fridays. Role responsibilities: Ensure overnight backups have run successfully Check any other overnight routines and batch file updates etc. Ensure network resilience Monitor server and firewall status Ensure constant internet availability Address outstanding IT issues, log items and provide helpdesk support to users Perform system maintenance routines Run reports as required Maintain "Password Policy" in accordance with Company Handbook On-going maintenance of other hardware to include ancillary items, including the telephone network, printers etc. Skills required: 1st Line support on Microsoft Windows environment. Hardware and Software support Windows 10/11 and server 2019 and above support. Maintain Windows updates. O365 support including basic understanding on Azure Cloud Services. Azure AD Support Basic understanding of Network devices such as Switches/ WiFi Mesh Printer (Canon) and PaperCut Support. Backup - Veeam Support (Backup and Replication). Security - Firewall Basic understanding of Cisco Firewall is preferable. Cyber Security - Good understanding of cybersecurity and ensuring cyber essential is kept up to date. Auditing - Use software to audit the network environment and permissions. Auditing - shared drives. Database - SQL Server DB Support with SSRS would be preferable. Telephony - BT One phone support (preferable). Junior IT Support Analyst Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants who are considered suitable for interview will be contacted. Proactive Appointments Limited operates as an employment agency and employment business and is an equal opportunities organisation We take our obligations to protect your personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on our website
May 03, 2024
Full time
Junior IT Support Analyst 4 days onsite Our client, a small financial services organisation have an exciting opportunity for a Junior IT Support Analyst who is looking to enhance their skillset and career by working alongside a talented IT Manager, supporting the wider business needs. This role requires some commercial IT Support/Helpdesk experience but would be the ideal fit for a curious and enthusiastic individual who is eager to learn and pick up new skills within the financial services sector. You will be based in their head office a short walk from Bank station with the ability to work from home, once up to speed, on Fridays. Role responsibilities: Ensure overnight backups have run successfully Check any other overnight routines and batch file updates etc. Ensure network resilience Monitor server and firewall status Ensure constant internet availability Address outstanding IT issues, log items and provide helpdesk support to users Perform system maintenance routines Run reports as required Maintain "Password Policy" in accordance with Company Handbook On-going maintenance of other hardware to include ancillary items, including the telephone network, printers etc. Skills required: 1st Line support on Microsoft Windows environment. Hardware and Software support Windows 10/11 and server 2019 and above support. Maintain Windows updates. O365 support including basic understanding on Azure Cloud Services. Azure AD Support Basic understanding of Network devices such as Switches/ WiFi Mesh Printer (Canon) and PaperCut Support. Backup - Veeam Support (Backup and Replication). Security - Firewall Basic understanding of Cisco Firewall is preferable. Cyber Security - Good understanding of cybersecurity and ensuring cyber essential is kept up to date. Auditing - Use software to audit the network environment and permissions. Auditing - shared drives. Database - SQL Server DB Support with SSRS would be preferable. Telephony - BT One phone support (preferable). Junior IT Support Analyst Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants who are considered suitable for interview will be contacted. Proactive Appointments Limited operates as an employment agency and employment business and is an equal opportunities organisation We take our obligations to protect your personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on our website
Junior Cyber Security Analyst. Location: Duxford, Cambridgeshire. On-premises. Office Based: Four days a week. Remote Working: One day a week. An exceptional career opportunity is available to work for a globally recognized museum. The museum has recently invested significantly in advanced systems to detect, prevent and resolve emerging cyber threats. Additionally, the museum must comply with various regulatory frameworks and legislation such as PCI-DSS, GDPR, CAA and Cyber Essentials. The maintenance of these security systems requires dedicated security team resources. This vacancy is a fantastic opportunity for a junior-level cybersecurity enthusiast with practical blue team knowledge/experience to develop more cyber awareness and understanding. Junior Cyber Security Analyst Key Skills: We are eager to connect with aspiring Junior Cyber Security Analysts, Cyber Security Interns, Entry-Level Cyber Security Engineers, Junior IT Security Engineers, and other early-career professionals focusing on cyber and IT security. To excel in this position, you must possess many of the following: - A good understanding of Cyber and IT Security concepts and practices. - Some experience performing Antivirus audits and checks. - Good knowledge or practical experience of blue team activities, including daily monitoring and reporting cyber threats, hazards, or risks. - The ability to patch devices, systems, or networks against vulnerabilities. - Knowledge or experience of one or more of the following: Cyber Essentials, Darktrace, Qualys. - Experience working with any endpoint security tool or software, such as MS Defender, Sophos, ESET, Trellix, Symantec, etc. - Have excellent English communication skills (written and verbal). All applicants must reside in the UK and have the right to work. About the Junior Cyber Security Analyst position: You will be a member of the IT Security Team. You will track and report daily cyber threats, hazards, risks, controls, mitigations, and measures to safeguard our client's systems and personnel. You will proactively monitor all output from the various security systems to ensure minimal downtime, and the business will always be protected from cyber threats. You will ensure that all websites, services, servers, and employee devices have installed adequate vulnerability patches. Responsibilities include: - Harnessing the cutting-edge capabilities of Darktrace to detect, prevent, and monitor cyber threats in real-time. - Finding systemic cyber vulnerabilities to make sure security is preserved. - To oversee the patching of critical systems and infrastructure across the entire company, including those platforms maintained by third-party suppliers, in accordance with Cyber Essentials, and to make sure that all devices covered by the programme comply with the standard. - Investigating and researching attack methods to create defences against emerging threats. - Support and adhere to the IT Security Incident Response process as needed. - Assistance with cyber security risk assessments, yearly audits, and ongoing improvement of incident management. Salary and Benefits: Salary: To £30-38,000 Location: Duxford, Cambridgeshire. On-premises. Office Based: Four days a week. Remote Working: One day a week. Holiday: 25 days + Bank Holidays. Rising to 30 days after five years. Museum benefits: - 20% discount in all on-site shops - 25% discount in museum cafes - Free entry to a large number of other museums and galleries. - Enhanced maternity and paternity: Yes Other benefits: - Access to Childcare vouchers. - Access to in-house training programmes and development. For more information on this Junior Cyber Security Analyst position, please get in touch with us to discuss. Our client welcomes everyone. They celebrate difference and encourage everyone to join and be themselves at work.
May 03, 2024
Full time
Junior Cyber Security Analyst. Location: Duxford, Cambridgeshire. On-premises. Office Based: Four days a week. Remote Working: One day a week. An exceptional career opportunity is available to work for a globally recognized museum. The museum has recently invested significantly in advanced systems to detect, prevent and resolve emerging cyber threats. Additionally, the museum must comply with various regulatory frameworks and legislation such as PCI-DSS, GDPR, CAA and Cyber Essentials. The maintenance of these security systems requires dedicated security team resources. This vacancy is a fantastic opportunity for a junior-level cybersecurity enthusiast with practical blue team knowledge/experience to develop more cyber awareness and understanding. Junior Cyber Security Analyst Key Skills: We are eager to connect with aspiring Junior Cyber Security Analysts, Cyber Security Interns, Entry-Level Cyber Security Engineers, Junior IT Security Engineers, and other early-career professionals focusing on cyber and IT security. To excel in this position, you must possess many of the following: - A good understanding of Cyber and IT Security concepts and practices. - Some experience performing Antivirus audits and checks. - Good knowledge or practical experience of blue team activities, including daily monitoring and reporting cyber threats, hazards, or risks. - The ability to patch devices, systems, or networks against vulnerabilities. - Knowledge or experience of one or more of the following: Cyber Essentials, Darktrace, Qualys. - Experience working with any endpoint security tool or software, such as MS Defender, Sophos, ESET, Trellix, Symantec, etc. - Have excellent English communication skills (written and verbal). All applicants must reside in the UK and have the right to work. About the Junior Cyber Security Analyst position: You will be a member of the IT Security Team. You will track and report daily cyber threats, hazards, risks, controls, mitigations, and measures to safeguard our client's systems and personnel. You will proactively monitor all output from the various security systems to ensure minimal downtime, and the business will always be protected from cyber threats. You will ensure that all websites, services, servers, and employee devices have installed adequate vulnerability patches. Responsibilities include: - Harnessing the cutting-edge capabilities of Darktrace to detect, prevent, and monitor cyber threats in real-time. - Finding systemic cyber vulnerabilities to make sure security is preserved. - To oversee the patching of critical systems and infrastructure across the entire company, including those platforms maintained by third-party suppliers, in accordance with Cyber Essentials, and to make sure that all devices covered by the programme comply with the standard. - Investigating and researching attack methods to create defences against emerging threats. - Support and adhere to the IT Security Incident Response process as needed. - Assistance with cyber security risk assessments, yearly audits, and ongoing improvement of incident management. Salary and Benefits: Salary: To £30-38,000 Location: Duxford, Cambridgeshire. On-premises. Office Based: Four days a week. Remote Working: One day a week. Holiday: 25 days + Bank Holidays. Rising to 30 days after five years. Museum benefits: - 20% discount in all on-site shops - 25% discount in museum cafes - Free entry to a large number of other museums and galleries. - Enhanced maternity and paternity: Yes Other benefits: - Access to Childcare vouchers. - Access to in-house training programmes and development. For more information on this Junior Cyber Security Analyst position, please get in touch with us to discuss. Our client welcomes everyone. They celebrate difference and encourage everyone to join and be themselves at work.
Junior SOC Analyst - Hybrid - 3 days on site - Nottinghamshire Main Responsibilities: - Triage, analyse and investigate alerts, log data and network traffic using security tools to identify cyber-attacks / security incidents. This includes the investigation and root cause analysis of potential security incidents. - Proactively investigate potential security breaches by utilising threat intelligence and internal and external security systems and provide subject matter expertise for technical responses to confirmed cyber security incidents. - Create and maintain the clients target cyber security architecture. - Deliver subject matter expertise to key stakeholders to drive the implementation of security controls to meet the target architecture. - Accountable for vulnerability scanning, including the prioritisation of unpatched vulnerabilities and reporting against agreed KPIs and KRIs. - Support the annual penetration testing schedule by arranging penetration testing, including tracking, and communicating penetration testing results. - Perform supplementary testing of clients detection and response controls by procuring, installing, and running penetration testing tooling. - Participate in process improvement work to automate and improve critical cyber security processes such as monitoring, patching, and hardening. - Develop and maintain process documentation for security architecture, vulnerability management, cyber incident response, and playbooks. - Provide security representation across multiple geographies, business units and teams to achieve objectives, including engagement with the Information Security Enhancement Office. Skills, Knowledge and Experience - Has obtained one or more of the following qualifications: CEH, CRTSA, and OSCP. - Qualifications such as CISSP and CISM would be advantageous. - Problem solving skills, and the ability to come up with new solutions to existing challenges. - Strengths in key soft skill areas such as relationship management, communication, and presentation of technical security information to a variety of audiences. - Technical skills to investigate potential breaches through existing tools, packet capture and log file analysis. - A logical mindset, the ability to identify proportionate, appropriate mitigations to identified security incidents, and to prioritise incidents based on risk. - Capable of working independently/without ongoing supervision on projects and day to day tasks. Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants who are considered suitable for interview will be contacted. Proactive Appointments Limited operates as an employment agency and employment business and is an equal opportunities organisation We take our obligations to protect your personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on our website (url removed)
May 03, 2024
Full time
Junior SOC Analyst - Hybrid - 3 days on site - Nottinghamshire Main Responsibilities: - Triage, analyse and investigate alerts, log data and network traffic using security tools to identify cyber-attacks / security incidents. This includes the investigation and root cause analysis of potential security incidents. - Proactively investigate potential security breaches by utilising threat intelligence and internal and external security systems and provide subject matter expertise for technical responses to confirmed cyber security incidents. - Create and maintain the clients target cyber security architecture. - Deliver subject matter expertise to key stakeholders to drive the implementation of security controls to meet the target architecture. - Accountable for vulnerability scanning, including the prioritisation of unpatched vulnerabilities and reporting against agreed KPIs and KRIs. - Support the annual penetration testing schedule by arranging penetration testing, including tracking, and communicating penetration testing results. - Perform supplementary testing of clients detection and response controls by procuring, installing, and running penetration testing tooling. - Participate in process improvement work to automate and improve critical cyber security processes such as monitoring, patching, and hardening. - Develop and maintain process documentation for security architecture, vulnerability management, cyber incident response, and playbooks. - Provide security representation across multiple geographies, business units and teams to achieve objectives, including engagement with the Information Security Enhancement Office. Skills, Knowledge and Experience - Has obtained one or more of the following qualifications: CEH, CRTSA, and OSCP. - Qualifications such as CISSP and CISM would be advantageous. - Problem solving skills, and the ability to come up with new solutions to existing challenges. - Strengths in key soft skill areas such as relationship management, communication, and presentation of technical security information to a variety of audiences. - Technical skills to investigate potential breaches through existing tools, packet capture and log file analysis. - A logical mindset, the ability to identify proportionate, appropriate mitigations to identified security incidents, and to prioritise incidents based on risk. - Capable of working independently/without ongoing supervision on projects and day to day tasks. Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants who are considered suitable for interview will be contacted. Proactive Appointments Limited operates as an employment agency and employment business and is an equal opportunities organisation We take our obligations to protect your personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on our website (url removed)
Junior Cyber Security Analyst. Location: London. On-premises. Office Based: Four days a week. Remote Working: One day a week. An exceptional career opportunity is available to work for a nationally recognised museum. The museum has recently invested significantly in advanced systems to detect, prevent and resolve emerging cyber threats. Additionally, the museum must comply with various regulatory frameworks and legislation such as PCI-DSS, GDPR, CAA and Cyber Essentials. The maintenance of these security systems requires dedicated security team resources. This vacancy is a fantastic opportunity for a junior-level cybersecurity enthusiast with practical blue team knowledge/experience to develop more cyber awareness and understanding. Junior Cyber Security Analyst Key Skills: We are eager to connect with aspiring Junior Cyber Security Analysts, Cyber Security Interns, Entry-Level Cyber Security Engineers, Junior IT Security Engineers, and other early-career professionals focusing on cyber and IT security. To excel in this position, you must possess many of the following: - A good understanding of Cyber and IT Security concepts and practices. - Some experience performing Antivirus audits and checks. - Good knowledge or practical experience of blue team activities, including daily monitoring and reporting cyber threats, hazards, or risks. - The ability to patch devices, systems, or networks against vulnerabilities. - Knowledge or experience of one or more of the following: Cyber Essentials, Darktrace, Qualys. - Experience working with any endpoint security tool or software, such as MS Defender, Sophos, ESET, Trellix, Symantec, etc. - Have excellent English communication skills (written and verbal). All applicants must reside in the UK and have the right to work. About the Junior Cyber Security Analyst position: You will be a member of the IT Security Team. You will track and report daily cyber threats, hazards, risks, controls, mitigations, and measures to safeguard our client's systems and personnel. You will proactively monitor all output from the various security systems to ensure minimal downtime, and the business will always be protected from cyber threats. You will ensure that all websites, services, servers, and employee devices have installed adequate vulnerability patches. Responsibilities include: - Harnessing the cutting-edge capabilities of Darktrace to detect, prevent, and monitor cyber threats in real-time. - Finding systemic cyber vulnerabilities to make sure security is preserved. - To oversee the patching of critical systems and infrastructure across the entire company, including those platforms maintained by third-party suppliers, in accordance with Cyber Essentials, and to make sure that all devices covered by the programme comply with the standard. - Investigating and researching attack methods to create defences against emerging threats. - Support and adhere to the IT Security Incident Response process as needed. - Assistance with cyber security risk assessments, yearly audits, and ongoing improvement of incident management. Salary and Benefits: Salary: To £30-38,000 Location: London. On-premises. Office Based: Four days a week. Remote Working: One day a week. Holiday: 25 days + Bank Holidays. Rising to 30 days after five years. Museum benefits: - 20% discount in all on-site shops - 25% discount in museum cafes - Free entry to a large number of other museums and galleries. - Enhanced maternity and paternity: Yes Other benefits: - Access to Childcare vouchers. - Access to in-house training programmes and development. For more information on this Junior Cyber Security Analyst position, please get in touch with us to discuss. Our client welcomes everyone. They celebrate difference and encourage everyone to join and be themselves at work.
May 03, 2024
Full time
Junior Cyber Security Analyst. Location: London. On-premises. Office Based: Four days a week. Remote Working: One day a week. An exceptional career opportunity is available to work for a nationally recognised museum. The museum has recently invested significantly in advanced systems to detect, prevent and resolve emerging cyber threats. Additionally, the museum must comply with various regulatory frameworks and legislation such as PCI-DSS, GDPR, CAA and Cyber Essentials. The maintenance of these security systems requires dedicated security team resources. This vacancy is a fantastic opportunity for a junior-level cybersecurity enthusiast with practical blue team knowledge/experience to develop more cyber awareness and understanding. Junior Cyber Security Analyst Key Skills: We are eager to connect with aspiring Junior Cyber Security Analysts, Cyber Security Interns, Entry-Level Cyber Security Engineers, Junior IT Security Engineers, and other early-career professionals focusing on cyber and IT security. To excel in this position, you must possess many of the following: - A good understanding of Cyber and IT Security concepts and practices. - Some experience performing Antivirus audits and checks. - Good knowledge or practical experience of blue team activities, including daily monitoring and reporting cyber threats, hazards, or risks. - The ability to patch devices, systems, or networks against vulnerabilities. - Knowledge or experience of one or more of the following: Cyber Essentials, Darktrace, Qualys. - Experience working with any endpoint security tool or software, such as MS Defender, Sophos, ESET, Trellix, Symantec, etc. - Have excellent English communication skills (written and verbal). All applicants must reside in the UK and have the right to work. About the Junior Cyber Security Analyst position: You will be a member of the IT Security Team. You will track and report daily cyber threats, hazards, risks, controls, mitigations, and measures to safeguard our client's systems and personnel. You will proactively monitor all output from the various security systems to ensure minimal downtime, and the business will always be protected from cyber threats. You will ensure that all websites, services, servers, and employee devices have installed adequate vulnerability patches. Responsibilities include: - Harnessing the cutting-edge capabilities of Darktrace to detect, prevent, and monitor cyber threats in real-time. - Finding systemic cyber vulnerabilities to make sure security is preserved. - To oversee the patching of critical systems and infrastructure across the entire company, including those platforms maintained by third-party suppliers, in accordance with Cyber Essentials, and to make sure that all devices covered by the programme comply with the standard. - Investigating and researching attack methods to create defences against emerging threats. - Support and adhere to the IT Security Incident Response process as needed. - Assistance with cyber security risk assessments, yearly audits, and ongoing improvement of incident management. Salary and Benefits: Salary: To £30-38,000 Location: London. On-premises. Office Based: Four days a week. Remote Working: One day a week. Holiday: 25 days + Bank Holidays. Rising to 30 days after five years. Museum benefits: - 20% discount in all on-site shops - 25% discount in museum cafes - Free entry to a large number of other museums and galleries. - Enhanced maternity and paternity: Yes Other benefits: - Access to Childcare vouchers. - Access to in-house training programmes and development. For more information on this Junior Cyber Security Analyst position, please get in touch with us to discuss. Our client welcomes everyone. They celebrate difference and encourage everyone to join and be themselves at work.
Join our dynamic team as a Cyber Security Analyst (Change Control) based in Faslane, Helensburgh. Enjoy the flexibility of our 4xFlex working pattern, with a condensed 4-day workweek (Monday to Thursday) and the option for hybrid working, typically spending 2 days onsite. Key responsibilities: Streamline and enhance Change Control processes. Collaborate on customer process enhancements aligned with ITIL4 practices. Deliver concise progress reports and compelling presentations to clients. Serve as a subject matter expert in Security Information and Event Management (SIEM), providing recommendations for product enhancements. Conduct thorough analysis of SIEM outputs, promptly identifying and escalating any incidents or breaches. Provide assurance support to team members on Secure by Design principles. Translate technical risks into understandable formats for non-technical stakeholders. Mentor junior team members. Effectively communicate with clients and managers across all levels. The successful candidate must be capable of achieving the appropriate level of security clearance (SC). For further information, please visit UK Security Vetting Clearance Levels Required skills, qualifications and experience Proven track record as a Cyber Security Analyst, Change Control Analyst, or related role. Preferred certification: Certified Information Systems Security Professional (CISSP). Experience in Government/Ministry of Defence settings is advantageous. Proficiency in implementing ITIL processes. Strong expertise in SIEM operations. Competence in Risk Management and NIST Cyber Security Controls. Client-facing experience with exceptional stakeholder management skills. Ability to thrive in a fast-paced environment, adapting to evolving priorities. Highly organized with a pragmatic approach, consistently meeting deadlines. Excellent interpersonal and communication skills, both written and verbal. Business Environment Lockheed Martin UK - Strategic Systems (LMUK SS) is the single contractor providing specialist Waterfront In-Service Support to one of the Royal Navy's Submarine Programs. The company provides the Ministry of Defence (MoD) with safe, efficient and responsive support. LMUK SS, as part of the ABL Alliance with AWE and Babcock, is also responsible for the management of operations at RNAD Coulport. Looking to the future, LMUK SS supports the joint US and UK submarine design efforts. Equal Opportunity Statement Lockheed Martin is proud to be an equal opportunity employer and is committed to maintaining a diverse and inclusive work environment. Diversity and inclusion are fundamental to our culture and reflect our values of doing what's right, respecting others and performing with excellence. By engaging with all our employees' diverse talents and experiences every day, we can innovate different and better, creating cutting edge solutions and unparalleled customer value. We know that diversity of thought leads to better solutions for our customers. Our top priority is finding the best candidate for the job and if you are interested in the position, we'd love to hear how you might contribute to our mission and our team and would encourage you to apply, even if you don't believe you meet every one of the criteria set out in our job advert. In addition, we are committed to inclusion of all individuals and will make reasonable adjustments to our applications process. If you require assistance or adjustments to participate in the job application or interview process, please contact or call (phone number removed). Disclaimer: This vacancy is being advertised by Optamor Limited. Optamor is a specialist Recruitment Process Outsourcing provider. We provide a flexible full recruitment solution which takes care of all recruitment requirements from planning to on-boarding. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically and strategically important industries in the UK and the world today. We will never send your CV without your permission.
May 03, 2024
Full time
Join our dynamic team as a Cyber Security Analyst (Change Control) based in Faslane, Helensburgh. Enjoy the flexibility of our 4xFlex working pattern, with a condensed 4-day workweek (Monday to Thursday) and the option for hybrid working, typically spending 2 days onsite. Key responsibilities: Streamline and enhance Change Control processes. Collaborate on customer process enhancements aligned with ITIL4 practices. Deliver concise progress reports and compelling presentations to clients. Serve as a subject matter expert in Security Information and Event Management (SIEM), providing recommendations for product enhancements. Conduct thorough analysis of SIEM outputs, promptly identifying and escalating any incidents or breaches. Provide assurance support to team members on Secure by Design principles. Translate technical risks into understandable formats for non-technical stakeholders. Mentor junior team members. Effectively communicate with clients and managers across all levels. The successful candidate must be capable of achieving the appropriate level of security clearance (SC). For further information, please visit UK Security Vetting Clearance Levels Required skills, qualifications and experience Proven track record as a Cyber Security Analyst, Change Control Analyst, or related role. Preferred certification: Certified Information Systems Security Professional (CISSP). Experience in Government/Ministry of Defence settings is advantageous. Proficiency in implementing ITIL processes. Strong expertise in SIEM operations. Competence in Risk Management and NIST Cyber Security Controls. Client-facing experience with exceptional stakeholder management skills. Ability to thrive in a fast-paced environment, adapting to evolving priorities. Highly organized with a pragmatic approach, consistently meeting deadlines. Excellent interpersonal and communication skills, both written and verbal. Business Environment Lockheed Martin UK - Strategic Systems (LMUK SS) is the single contractor providing specialist Waterfront In-Service Support to one of the Royal Navy's Submarine Programs. The company provides the Ministry of Defence (MoD) with safe, efficient and responsive support. LMUK SS, as part of the ABL Alliance with AWE and Babcock, is also responsible for the management of operations at RNAD Coulport. Looking to the future, LMUK SS supports the joint US and UK submarine design efforts. Equal Opportunity Statement Lockheed Martin is proud to be an equal opportunity employer and is committed to maintaining a diverse and inclusive work environment. Diversity and inclusion are fundamental to our culture and reflect our values of doing what's right, respecting others and performing with excellence. By engaging with all our employees' diverse talents and experiences every day, we can innovate different and better, creating cutting edge solutions and unparalleled customer value. We know that diversity of thought leads to better solutions for our customers. Our top priority is finding the best candidate for the job and if you are interested in the position, we'd love to hear how you might contribute to our mission and our team and would encourage you to apply, even if you don't believe you meet every one of the criteria set out in our job advert. In addition, we are committed to inclusion of all individuals and will make reasonable adjustments to our applications process. If you require assistance or adjustments to participate in the job application or interview process, please contact or call (phone number removed). Disclaimer: This vacancy is being advertised by Optamor Limited. Optamor is a specialist Recruitment Process Outsourcing provider. We provide a flexible full recruitment solution which takes care of all recruitment requirements from planning to on-boarding. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically and strategically important industries in the UK and the world today. We will never send your CV without your permission.
Senior Threat Intelligence Analyst About Us: We are the tech company with people at heart. At Advania, we believe in empowering people to create sustainable value through the clever use of technology. As one of Microsoft's leading partners in the UK, specialising in Azure, Security, Dynamics 365, and Microsoft 365, we have a proven track record of success in delivering transformational IT services. Position Overview: As a Senior Cyber Threat Intelligence Analyst, you will be responsible for the day-today delivery of Cyber Threat Intelligence to clients spanning multiple industries, as well as leadership and coaching of junior analysts, and ongoing development of our service. This is a hands-on role and requires both a broad technical knowledge of Cyber Security, as well as specific focused knowledge of CTI tools and processes. Knowledge and/or experience of modern IT Systems, particularly Microsoft solutions and network infrastructure is advantageous. Responsibilities: Proactively research and analyse emerging cyber threats, malware variants, and attacker Tactics, Techniques, and Procedures (TTPs) from various open and closed sources, including threat intelligence feeds, dark web monitoring, and open-source reporting. Develop and maintain comprehensive threat intelligence reports and briefings tailored for technical and non-technical audiences, translating complex information into actionable insights for informed decision-making. Lead or participate in incident response activities, including investigation, analysis of evidence, and collaboration with other teams like IT operations and forensics. Conduct advanced threat hunting to proactively identify hidden threats within the organisation's network, utilising advanced tools and techniques. Participate in vulnerability management activities, collaborating with the vulnerability management team to prioritise and remediate critical vulnerabilities identified through intelligence gathering and risk assessments. Contribute to the development and implementation of comprehensive security policies and procedures to strengthen the organisation's overall cyber defence posture. Stay up to date with the latest cyber security trends and developments through continuous learning and participation in industry conferences and training programs. Mentor and support junior cyber security analysts within the team. Analyse large volumes of complex data from security tools, logs, and incident reports to identify potential threats and assess their risk level. Professional Experience: Demonstrable understanding of the Cybersecurity Ecosystem and Infrastructure Technologies (e.g. firewall logs, network security tools, malware detonation devices, proxies, IPS/IDS). Experience in secured cloud architectures (Azure, AWS, or similar) and engineering solutions. An understanding of operating systems and their programming interfaces such as UNIX Shell and PowerShell. Experience with scripting languages (Python, Bash) and familiarity with APIs beneficial. An awareness of cyber security related standards and regulations, for example, NIST, CIS, ISO 27001 and PCI DSS. Experience leading teams and providing deputy support to Management. Experience designing a service, reviewing effectiveness of services, procurement, or business project work. Qualifications: One or more of the following industry certifications: SANS301/SANS401/FOR578, Crest CRTIA/CCTIM, Security+, or similar. Ideally a BSc or MSc in Cyber Security, preferably including modules on Ethical Hacking, Digital Forensics, Information Security or Threat Intelligence Please note you need to be eligible to undergo the Security Clearance process for this position. This means you will need to be a British national with 5 years residency in the UK. Click here for the list of benefits. Our Selection Process: We are committed to ensuring an equitable experience for all candidates, regardless of race, religion or belief, ethnic or national origin, disability, age, citizenship, marital, domestic or civil partnership status, sexual orientation, gender identity, or any other basis as protected by applicable law. Please do let us know if you'll need any reasonable adjustments as part of the selection process by highlighting these on your application form.
May 03, 2024
Full time
Senior Threat Intelligence Analyst About Us: We are the tech company with people at heart. At Advania, we believe in empowering people to create sustainable value through the clever use of technology. As one of Microsoft's leading partners in the UK, specialising in Azure, Security, Dynamics 365, and Microsoft 365, we have a proven track record of success in delivering transformational IT services. Position Overview: As a Senior Cyber Threat Intelligence Analyst, you will be responsible for the day-today delivery of Cyber Threat Intelligence to clients spanning multiple industries, as well as leadership and coaching of junior analysts, and ongoing development of our service. This is a hands-on role and requires both a broad technical knowledge of Cyber Security, as well as specific focused knowledge of CTI tools and processes. Knowledge and/or experience of modern IT Systems, particularly Microsoft solutions and network infrastructure is advantageous. Responsibilities: Proactively research and analyse emerging cyber threats, malware variants, and attacker Tactics, Techniques, and Procedures (TTPs) from various open and closed sources, including threat intelligence feeds, dark web monitoring, and open-source reporting. Develop and maintain comprehensive threat intelligence reports and briefings tailored for technical and non-technical audiences, translating complex information into actionable insights for informed decision-making. Lead or participate in incident response activities, including investigation, analysis of evidence, and collaboration with other teams like IT operations and forensics. Conduct advanced threat hunting to proactively identify hidden threats within the organisation's network, utilising advanced tools and techniques. Participate in vulnerability management activities, collaborating with the vulnerability management team to prioritise and remediate critical vulnerabilities identified through intelligence gathering and risk assessments. Contribute to the development and implementation of comprehensive security policies and procedures to strengthen the organisation's overall cyber defence posture. Stay up to date with the latest cyber security trends and developments through continuous learning and participation in industry conferences and training programs. Mentor and support junior cyber security analysts within the team. Analyse large volumes of complex data from security tools, logs, and incident reports to identify potential threats and assess their risk level. Professional Experience: Demonstrable understanding of the Cybersecurity Ecosystem and Infrastructure Technologies (e.g. firewall logs, network security tools, malware detonation devices, proxies, IPS/IDS). Experience in secured cloud architectures (Azure, AWS, or similar) and engineering solutions. An understanding of operating systems and their programming interfaces such as UNIX Shell and PowerShell. Experience with scripting languages (Python, Bash) and familiarity with APIs beneficial. An awareness of cyber security related standards and regulations, for example, NIST, CIS, ISO 27001 and PCI DSS. Experience leading teams and providing deputy support to Management. Experience designing a service, reviewing effectiveness of services, procurement, or business project work. Qualifications: One or more of the following industry certifications: SANS301/SANS401/FOR578, Crest CRTIA/CCTIM, Security+, or similar. Ideally a BSc or MSc in Cyber Security, preferably including modules on Ethical Hacking, Digital Forensics, Information Security or Threat Intelligence Please note you need to be eligible to undergo the Security Clearance process for this position. This means you will need to be a British national with 5 years residency in the UK. Click here for the list of benefits. Our Selection Process: We are committed to ensuring an equitable experience for all candidates, regardless of race, religion or belief, ethnic or national origin, disability, age, citizenship, marital, domestic or civil partnership status, sexual orientation, gender identity, or any other basis as protected by applicable law. Please do let us know if you'll need any reasonable adjustments as part of the selection process by highlighting these on your application form.
Crisis24, a GardaWorld company, is widely regarded as the leading integrated risk management, crisis response, consulting, and global protective solutions firm, serving the world's most influential people, disruptive brands, and prominent organizations. Championed by our advanced Global Operation Centers and our skilled team of intelligence analysts, we offer highly specialized services, security and consulting, with the technology and AI to power it all across the globe. At Crisis24, we go beyond mere employment; we pave the way to a realm where your skills become instrumental in shaping global security, guiding clients through a multifaceted and challenging landscape. Your journey with us will be deeply fulfilling, driven by a powerful sense of purpose and accomplishment. Within our thriving environment, you'll discover abundant chances for both personal and career advancement. Seize this moment to push your limits, broaden your expertise, and elevate your professional journey to unprecedented levels. Join the Crisis24 team today and be a part of something extraordinary where growth and impact converge. Crisis24's Crisis & Security Consulting (CSC) division, specifically the All-Hazards Response team, is on the lookout for a Senior Consultant. This role is ideally suited for candidates based in the UK or in mainland Europe. As a part of our dynamic and agile Response Group, the successful applicant will have the chance to enhance their skill set and knowledge, enabling them to contribute across various teams within the organization. Candidates should possess comprehensive experience in crisis management at both tactical and strategic levels and have a wide-ranging understanding of different industries. The position involves readiness to deploy globally at short notice, often in challenging situations, requiring confidence and the ability to provide immediate support and guidance to high-level / C-Suite stakeholders. What You Will Work On Summary You will deliver All Hazards Response services, providing expert advice and guidance to clients facing crises, from threats and violence to political and cyber-related issues. This role entails global deployment, often without prior notice, creating documentation in line with CSC's methodologies, conducting sensitive investigations, and potentially training as a subject matter expert for example as a crisis communications consultant. You will also support the development of junior team members and collaborate with the global consulting team on service delivery, maintaining accurate records across platforms such as Salesforce. Specifics Provide advice and guidance to clients in response to case activations on the following peril types: Active Assailant / Workplace Violence; Political Violence & Terrorism; Cyber Extortion; and Any other crisis-level event in which All-Hazard Response are engaged. Deployment globally in support of any new case activation, often with no notice. Produce all relevant documentation in support of assigned response cases, in line with CSC's doctrine and methodology. Coordinate and conduct sensitive investigational support to clients. Train as a Crisis Communications consultant. Support the development of more junior team members and work in cooperation with the wider global consulting team on all other aspects of consulting services delivery. Keep Salesforce and any other platforms used by Crisis24 up to date and accurate in relation to relevant accounts and proposals. Obtain the skill set and knowledge to actively respond as a Special Risks Response Consultant when required. Support to Insurance Partners Deliver onboarding briefings to new policy holders. Provide capability briefings in support of marketing the wider insurance policies. Assist in the delivery of update reports to insurance underwriters during ongoing cases. Generation of new response retainers, providing services to insurance partners or private clients. Direct engagement contracts for new response cases when insurance options are not present. Assist wider CSC team members in any business development briefings and activity when required. Support the implementation of a business development plan for the region. Scope, price, manage and/or oversee the development of client proposals and responses to RFPs. Represent CSC, Crisis24 and GardaWorld in client pitches/senior-level presentations/in-person meetings. Duty officer Following training, there may be a requirement to join the Duty Officer roster for All-Hazards Response activations. Account management Client liaison and account/client relationship management of new and existing consulting clients. Other Support the wider Crisis24 and GardaWorld business as required. Who You Will Work With Under the guidance of the Associate Director for All Hazards Response, you will collaborate on a variety of response cases and projects. These initiatives are diverse in terms of geography, industry, and complexity, necessitating effective management of pressures. You will be an integral part of both the Response Group and the wider CSC team, frequently assisting other teams within Crisis24 and GardaWorld. Owing to the sensitive nature of the case activity, All Hazards personnel are often visible to the highest levels of leadership within Crisis24 and GardaWorld. What You Will Bring Summary Candidates should have at least 10 years of experience in Crisis Management, preferably within a corporate or consulting environment, and a solid background in Security Risk and Crisis Management. You should be knowledgeable about crisis response processes, the specialist insurance market, and have a track record of developing new business opportunities. The role demands extensive global travel, often to high-risk areas, and requires strong analytical, problem-solving, and communication skills. Candidates must be adaptable, motivated to work irregular hours, and committed to continuous professional development. Specifics 10+ years of experience in Crisis Management, preferably in a corporate and/or consulting setting. Strong working knowledge of Security Risk and Crisis Management. In-depth knowledge and experience of crisis response processes. An understanding of specialist insurance markets. Demonstrable commercial experience developing new business opportunities. Extensive travel experience globally, including in high-threat/hostile environments. Strong analytical and problem-solving skills; a creative thinker who can apply initiative and create solutions to solve clients' problems. Ability to manage multiple cases simultaneously with strong attention to detail. Personable and able to communicate effectively at all levels with team members and clients, with the gravitas to influence at a very senior level, including verbal communications and presentations skills. Able to relate well to others with confidence and empathy, build trust and be calm and resourceful during difficult and emotive situations. The flexibility and motivation to work irregular hours and maintain quality delivery. Invested in development; maintains a high level of industry knowledge and awareness of geopolitical and security/crisis management issues and trends. The annual leave year runs from 1 January to 31 December. Your paid annual leave entitlement will be 25 days per annum (pro rata for part time hours). Group Life Insurance effective upon commencement of employment. Death in Service pays out at 4x base salary. Employee Assistance Program effective upon commencement of employment. Full details will be provided after joining the company. A Discretionary Bonus Scheme, effective in the year following your employment, and based on company performance in the previous fiscal year. Group Pension Scheme, to which you will be automatically enrolled from the beginning of the third month following start date: We will match your contributions up to 5%. The minimum contribution you can make to the scheme is 4%. You will be entitled to opt out should you wish. Information Security Protect the data and systems of Crisis24 and its stakeholders by adhering to policies, reporting incidents and potential problems, completing regular training, and identifying opportunities for improvement. Crisis24, A GardaWorld Company is dedicated to equal opportunity in employment. We are committed to a work environment that celebrates diversity. We do not discriminate against any individual based on race, color, sex, national origin, age, religion, marital or parental status, sexual orientation, gender identity, gender expression, military or veteran status, disability, or any factors protected by applicable laws.
May 03, 2024
Full time
Crisis24, a GardaWorld company, is widely regarded as the leading integrated risk management, crisis response, consulting, and global protective solutions firm, serving the world's most influential people, disruptive brands, and prominent organizations. Championed by our advanced Global Operation Centers and our skilled team of intelligence analysts, we offer highly specialized services, security and consulting, with the technology and AI to power it all across the globe. At Crisis24, we go beyond mere employment; we pave the way to a realm where your skills become instrumental in shaping global security, guiding clients through a multifaceted and challenging landscape. Your journey with us will be deeply fulfilling, driven by a powerful sense of purpose and accomplishment. Within our thriving environment, you'll discover abundant chances for both personal and career advancement. Seize this moment to push your limits, broaden your expertise, and elevate your professional journey to unprecedented levels. Join the Crisis24 team today and be a part of something extraordinary where growth and impact converge. Crisis24's Crisis & Security Consulting (CSC) division, specifically the All-Hazards Response team, is on the lookout for a Senior Consultant. This role is ideally suited for candidates based in the UK or in mainland Europe. As a part of our dynamic and agile Response Group, the successful applicant will have the chance to enhance their skill set and knowledge, enabling them to contribute across various teams within the organization. Candidates should possess comprehensive experience in crisis management at both tactical and strategic levels and have a wide-ranging understanding of different industries. The position involves readiness to deploy globally at short notice, often in challenging situations, requiring confidence and the ability to provide immediate support and guidance to high-level / C-Suite stakeholders. What You Will Work On Summary You will deliver All Hazards Response services, providing expert advice and guidance to clients facing crises, from threats and violence to political and cyber-related issues. This role entails global deployment, often without prior notice, creating documentation in line with CSC's methodologies, conducting sensitive investigations, and potentially training as a subject matter expert for example as a crisis communications consultant. You will also support the development of junior team members and collaborate with the global consulting team on service delivery, maintaining accurate records across platforms such as Salesforce. Specifics Provide advice and guidance to clients in response to case activations on the following peril types: Active Assailant / Workplace Violence; Political Violence & Terrorism; Cyber Extortion; and Any other crisis-level event in which All-Hazard Response are engaged. Deployment globally in support of any new case activation, often with no notice. Produce all relevant documentation in support of assigned response cases, in line with CSC's doctrine and methodology. Coordinate and conduct sensitive investigational support to clients. Train as a Crisis Communications consultant. Support the development of more junior team members and work in cooperation with the wider global consulting team on all other aspects of consulting services delivery. Keep Salesforce and any other platforms used by Crisis24 up to date and accurate in relation to relevant accounts and proposals. Obtain the skill set and knowledge to actively respond as a Special Risks Response Consultant when required. Support to Insurance Partners Deliver onboarding briefings to new policy holders. Provide capability briefings in support of marketing the wider insurance policies. Assist in the delivery of update reports to insurance underwriters during ongoing cases. Generation of new response retainers, providing services to insurance partners or private clients. Direct engagement contracts for new response cases when insurance options are not present. Assist wider CSC team members in any business development briefings and activity when required. Support the implementation of a business development plan for the region. Scope, price, manage and/or oversee the development of client proposals and responses to RFPs. Represent CSC, Crisis24 and GardaWorld in client pitches/senior-level presentations/in-person meetings. Duty officer Following training, there may be a requirement to join the Duty Officer roster for All-Hazards Response activations. Account management Client liaison and account/client relationship management of new and existing consulting clients. Other Support the wider Crisis24 and GardaWorld business as required. Who You Will Work With Under the guidance of the Associate Director for All Hazards Response, you will collaborate on a variety of response cases and projects. These initiatives are diverse in terms of geography, industry, and complexity, necessitating effective management of pressures. You will be an integral part of both the Response Group and the wider CSC team, frequently assisting other teams within Crisis24 and GardaWorld. Owing to the sensitive nature of the case activity, All Hazards personnel are often visible to the highest levels of leadership within Crisis24 and GardaWorld. What You Will Bring Summary Candidates should have at least 10 years of experience in Crisis Management, preferably within a corporate or consulting environment, and a solid background in Security Risk and Crisis Management. You should be knowledgeable about crisis response processes, the specialist insurance market, and have a track record of developing new business opportunities. The role demands extensive global travel, often to high-risk areas, and requires strong analytical, problem-solving, and communication skills. Candidates must be adaptable, motivated to work irregular hours, and committed to continuous professional development. Specifics 10+ years of experience in Crisis Management, preferably in a corporate and/or consulting setting. Strong working knowledge of Security Risk and Crisis Management. In-depth knowledge and experience of crisis response processes. An understanding of specialist insurance markets. Demonstrable commercial experience developing new business opportunities. Extensive travel experience globally, including in high-threat/hostile environments. Strong analytical and problem-solving skills; a creative thinker who can apply initiative and create solutions to solve clients' problems. Ability to manage multiple cases simultaneously with strong attention to detail. Personable and able to communicate effectively at all levels with team members and clients, with the gravitas to influence at a very senior level, including verbal communications and presentations skills. Able to relate well to others with confidence and empathy, build trust and be calm and resourceful during difficult and emotive situations. The flexibility and motivation to work irregular hours and maintain quality delivery. Invested in development; maintains a high level of industry knowledge and awareness of geopolitical and security/crisis management issues and trends. The annual leave year runs from 1 January to 31 December. Your paid annual leave entitlement will be 25 days per annum (pro rata for part time hours). Group Life Insurance effective upon commencement of employment. Death in Service pays out at 4x base salary. Employee Assistance Program effective upon commencement of employment. Full details will be provided after joining the company. A Discretionary Bonus Scheme, effective in the year following your employment, and based on company performance in the previous fiscal year. Group Pension Scheme, to which you will be automatically enrolled from the beginning of the third month following start date: We will match your contributions up to 5%. The minimum contribution you can make to the scheme is 4%. You will be entitled to opt out should you wish. Information Security Protect the data and systems of Crisis24 and its stakeholders by adhering to policies, reporting incidents and potential problems, completing regular training, and identifying opportunities for improvement. Crisis24, A GardaWorld Company is dedicated to equal opportunity in employment. We are committed to a work environment that celebrates diversity. We do not discriminate against any individual based on race, color, sex, national origin, age, religion, marital or parental status, sexual orientation, gender identity, gender expression, military or veteran status, disability, or any factors protected by applicable laws.
The demand for newly trained and qualified Cyber Security professionals has never been greater and this boasts excellent opportunities for growth amongst other benefits; due to the fact that companies across the globe try to protect themselves from an increase in cyber attacks We can help you develop the skills alongside industry certifications employers are looking for and launch your new career in Cyber Security. Newto Training can support you at any stage of your career journey whether you're new to the industry or looking to exchange your skills, this Cyber Security course is designed to get you role-ready if you're considering a career in Cyber Security. This is a training course which leads to guaranteed interviews upon completion. Fees apply. Within our Cyber Security training programme you will cover the following certifications: CompTIA Network+: Network+ certifies the essential skills needed to confidently design, configure, manage and troubleshoot any wired and wireless devices. CompTIA Security+: Security+ provides a global benchmark for best practices in IT network and operational security, one of the fastest-growing fields in IT. Microsoft Azure Foundations.: This provides you with the fundamental knowledge of cloud concepts, along with Azure services, workloads, security, privacy and support. CompTIA CySA+ Cybersecurity Analyst (CySA+): applies behavioral analytics to the IT security field to improve the overall state of IT security. CompTIA PenTest+: CompTIA PenTest+ is for intermediate level cybersecurity professionals who are tasked with penetration testing to manage vulnerabilities on a network. Upon completion of your course we'll put you in touch with our partner companies to get you interviews for a role in I.T. Course cost - £1795, or, £179.50 per month No prior industry experience required - No matter your background, previous studies or work history - if you think you have the base-line skills needed then we can help you launch the career you want. APPLY NOW for more information.
May 02, 2024
Full time
The demand for newly trained and qualified Cyber Security professionals has never been greater and this boasts excellent opportunities for growth amongst other benefits; due to the fact that companies across the globe try to protect themselves from an increase in cyber attacks We can help you develop the skills alongside industry certifications employers are looking for and launch your new career in Cyber Security. Newto Training can support you at any stage of your career journey whether you're new to the industry or looking to exchange your skills, this Cyber Security course is designed to get you role-ready if you're considering a career in Cyber Security. This is a training course which leads to guaranteed interviews upon completion. Fees apply. Within our Cyber Security training programme you will cover the following certifications: CompTIA Network+: Network+ certifies the essential skills needed to confidently design, configure, manage and troubleshoot any wired and wireless devices. CompTIA Security+: Security+ provides a global benchmark for best practices in IT network and operational security, one of the fastest-growing fields in IT. Microsoft Azure Foundations.: This provides you with the fundamental knowledge of cloud concepts, along with Azure services, workloads, security, privacy and support. CompTIA CySA+ Cybersecurity Analyst (CySA+): applies behavioral analytics to the IT security field to improve the overall state of IT security. CompTIA PenTest+: CompTIA PenTest+ is for intermediate level cybersecurity professionals who are tasked with penetration testing to manage vulnerabilities on a network. Upon completion of your course we'll put you in touch with our partner companies to get you interviews for a role in I.T. Course cost - £1795, or, £179.50 per month No prior industry experience required - No matter your background, previous studies or work history - if you think you have the base-line skills needed then we can help you launch the career you want. APPLY NOW for more information.
Senior SOC Analyst This is a chance for an individual to be in 'at the ground up' at the start of the development of the SOC and will play a leading role in the day-to-day activity of the SOC and influence of the SOC on an operational, technical and strategic level. The role will require SC Security Clearance and therefore candidate must only be UK nationals ( duel nationality isn't accepted unfortunately) £50000 - £60000 per annum + Remote working London, Central What will you be doing? Primarily the role will be concerned with selecting and standing up an appropriate SIEM platform to service our client's needs. Once the tool is embedded and processes are in place to ensure Business as Usual running, the role will then involve leading security monitoring efforts, conducting in-depth investigations, and actively participating in incident response activities. Duties & Responsibilities:Security Monitoring: Oversee and enhance security monitoring systems to detect and analyse potential security incidents. Conduct real-time analysis of security alerts and escalate incidents as necessary. Incident Response: Lead and coordinate incident response activities to effectively contain, eradicate, and recover from security incidents. Develop and maintain incident response plans, ensuring they align with industry best practices. Threat Intelligence: Stay abreast of the latest cybersecurity threats and vulnerabilities, integrating threat intelligence into security monitoring processes. Contribute to the development of threat intelligence feeds to enhance proactive threat detection. Investigations: Perform in-depth investigations into incidents, determining the root cause and impact. Document findings and lessons learned to improve incident response procedures. Collaboration: Collaborate with cross-functional teams, including IT, legal, and management, to address security incidents and implement preventive measures. Provide expertise and guidance to other analysts. Security Tool Management: Manage and optimise security tools, ensuring they are properly configured and updated to maximize effectiveness. Evaluate new security technologies and recommend enhancements to the security infrastructure. Security Awareness: Contribute to security awareness training programs for employees to promote a culture of cybersecurity vigilance. Provide guidance on security best practices to various teams within the organization. Documentation: Maintain accurate and up-to-date documentation of security procedures, incident response plans, and analysis reports. Create post-incident reports for management and stakeholders. Create monthly reporting packs as per contractual requirements. Create and document robust event and incident management processes Essential Skills and Experience: Analytical mindset with the ability to troubleshoot and solve complex security issues. Excellent communication and interpersonal skills for collaborating with diverse teams. Leadership qualities to guide junior analysts and drive security initiatives. Up-to-date knowledge of cybersecurity trends and threats. Full understanding of SIEM systems - IBM QRadar, FortiSIEM, Splunk, Sentinel etc IT Security Management, Policies, Procedures, Standards and Guidelines Risk Assessment Privacy and Compliance Conversant with security best practices (including ISO27001) and relevant security legislation Security Operations and Incident Handling IT Security Architecture If you are interested in hearing more please apply below or ring or send your CV to
May 01, 2024
Full time
Senior SOC Analyst This is a chance for an individual to be in 'at the ground up' at the start of the development of the SOC and will play a leading role in the day-to-day activity of the SOC and influence of the SOC on an operational, technical and strategic level. The role will require SC Security Clearance and therefore candidate must only be UK nationals ( duel nationality isn't accepted unfortunately) £50000 - £60000 per annum + Remote working London, Central What will you be doing? Primarily the role will be concerned with selecting and standing up an appropriate SIEM platform to service our client's needs. Once the tool is embedded and processes are in place to ensure Business as Usual running, the role will then involve leading security monitoring efforts, conducting in-depth investigations, and actively participating in incident response activities. Duties & Responsibilities:Security Monitoring: Oversee and enhance security monitoring systems to detect and analyse potential security incidents. Conduct real-time analysis of security alerts and escalate incidents as necessary. Incident Response: Lead and coordinate incident response activities to effectively contain, eradicate, and recover from security incidents. Develop and maintain incident response plans, ensuring they align with industry best practices. Threat Intelligence: Stay abreast of the latest cybersecurity threats and vulnerabilities, integrating threat intelligence into security monitoring processes. Contribute to the development of threat intelligence feeds to enhance proactive threat detection. Investigations: Perform in-depth investigations into incidents, determining the root cause and impact. Document findings and lessons learned to improve incident response procedures. Collaboration: Collaborate with cross-functional teams, including IT, legal, and management, to address security incidents and implement preventive measures. Provide expertise and guidance to other analysts. Security Tool Management: Manage and optimise security tools, ensuring they are properly configured and updated to maximize effectiveness. Evaluate new security technologies and recommend enhancements to the security infrastructure. Security Awareness: Contribute to security awareness training programs for employees to promote a culture of cybersecurity vigilance. Provide guidance on security best practices to various teams within the organization. Documentation: Maintain accurate and up-to-date documentation of security procedures, incident response plans, and analysis reports. Create post-incident reports for management and stakeholders. Create monthly reporting packs as per contractual requirements. Create and document robust event and incident management processes Essential Skills and Experience: Analytical mindset with the ability to troubleshoot and solve complex security issues. Excellent communication and interpersonal skills for collaborating with diverse teams. Leadership qualities to guide junior analysts and drive security initiatives. Up-to-date knowledge of cybersecurity trends and threats. Full understanding of SIEM systems - IBM QRadar, FortiSIEM, Splunk, Sentinel etc IT Security Management, Policies, Procedures, Standards and Guidelines Risk Assessment Privacy and Compliance Conversant with security best practices (including ISO27001) and relevant security legislation Security Operations and Incident Handling IT Security Architecture If you are interested in hearing more please apply below or ring or send your CV to
Cyber Defence Engineer - DV Clearance Required! The Cyber Defence Engineer will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extensions Corsham (4 days on site) What we're looking for: Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Experience using virtualisation software. Excellent communication skills Experience of writing Defence/Government documentation Someone hands on. Responsibilities include: Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and dashboards to give visibility of the Enterprise infrastructure. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further.
May 01, 2024
Full time
Cyber Defence Engineer - DV Clearance Required! The Cyber Defence Engineer will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extensions Corsham (4 days on site) What we're looking for: Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Experience using virtualisation software. Excellent communication skills Experience of writing Defence/Government documentation Someone hands on. Responsibilities include: Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and dashboards to give visibility of the Enterprise infrastructure. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further.
Key Responsibilities Lead on security activities for large client engagements through creating and maintaining strong stakeholder relationships (customer and internal), developing a solution that align with overall objectives and contractual obligations Identify and understand customer requirements and demonstrate creativity and innovation in applying solutions for the benefit of the customer Identify and design solutions that understand customer requirements and apply industry best practice in solutions for the benefit of the customer Collaborate with other team members to identify potential cyber risks, assess their impact and develop technical mitigation strategies Working with Security Architecture to inform focused security solution design for SOC/SIEM solutions Formulate security strategy, creatively applying a wide range of technical and/or management principles Stay up to date with the latest cybersecurity threats, vulnerabilities, and industry standard methodologies, and provide recommendations for improvements Lead security aspects of bid responses and opportunity identification Demonstrate awareness of the latest cybersecurity threats, vulnerabilities and industry standard methodologies Enable the development and growth of the Cyber Security team through mentoring of junior team members, supporting recruitment activities and encouraging engagement with the Cyber Security Community of Expertise. Essential Skills Successful track record leading teams within Security Engineering coupled with experience of leading large client engagements Strong client management and relationship building experience Ability to absorb complex information and communicate effectively at all levels to both technical and non-technical audiences, assess and evaluate risk and understand the implications of new technologies. Good project management skills, with the ability to balance multiple initiatives and priorities simultaneously SIEM experience with Azure Sentinel, Splunk & QRadar Experience of running simulated or reacting to actual incidents, following procedures and good practice to limit, reduce and remediate Strong leadership, influencing and people management skills Excellent analytical and problem-solving skills coupled with ability to assess complex situations, identify risks, and recommend effective solutions Excellent communication skills, both written and verbal, at all levels from Executives to end users Demonstrate significant personal responsibility or autonomy, with little need for escalation CISSP-ISSEP (Information Systems Security Engineering Professional) Other Cyber/information Security qualification (e.g. CISSP, CCSP, CCNA, SABSA) Desirable Skills Knowledge of; Cloud, on-prem, SaaS, PaaS, IaaS environments Security incident response, code / malware analysis Strong coding skills
May 01, 2024
Full time
Key Responsibilities Lead on security activities for large client engagements through creating and maintaining strong stakeholder relationships (customer and internal), developing a solution that align with overall objectives and contractual obligations Identify and understand customer requirements and demonstrate creativity and innovation in applying solutions for the benefit of the customer Identify and design solutions that understand customer requirements and apply industry best practice in solutions for the benefit of the customer Collaborate with other team members to identify potential cyber risks, assess their impact and develop technical mitigation strategies Working with Security Architecture to inform focused security solution design for SOC/SIEM solutions Formulate security strategy, creatively applying a wide range of technical and/or management principles Stay up to date with the latest cybersecurity threats, vulnerabilities, and industry standard methodologies, and provide recommendations for improvements Lead security aspects of bid responses and opportunity identification Demonstrate awareness of the latest cybersecurity threats, vulnerabilities and industry standard methodologies Enable the development and growth of the Cyber Security team through mentoring of junior team members, supporting recruitment activities and encouraging engagement with the Cyber Security Community of Expertise. Essential Skills Successful track record leading teams within Security Engineering coupled with experience of leading large client engagements Strong client management and relationship building experience Ability to absorb complex information and communicate effectively at all levels to both technical and non-technical audiences, assess and evaluate risk and understand the implications of new technologies. Good project management skills, with the ability to balance multiple initiatives and priorities simultaneously SIEM experience with Azure Sentinel, Splunk & QRadar Experience of running simulated or reacting to actual incidents, following procedures and good practice to limit, reduce and remediate Strong leadership, influencing and people management skills Excellent analytical and problem-solving skills coupled with ability to assess complex situations, identify risks, and recommend effective solutions Excellent communication skills, both written and verbal, at all levels from Executives to end users Demonstrate significant personal responsibility or autonomy, with little need for escalation CISSP-ISSEP (Information Systems Security Engineering Professional) Other Cyber/information Security qualification (e.g. CISSP, CCSP, CCNA, SABSA) Desirable Skills Knowledge of; Cloud, on-prem, SaaS, PaaS, IaaS environments Security incident response, code / malware analysis Strong coding skills
Join Police Digital Service in a NMC Senior Cyber Threat Intelligence Specialist role (Hybrid/Lancashire) £55,000-£60,000 Police Digital Service are looking to hire a Senior Cyber Threat Intelligence (CTI) Specialist. This role is recommended for those with significant cyber threat intelligence experience As a member of the Threat Intelligence team, you'll be involved with: Developing awareness for the policing community of the cyber risks to critical services by continually assessing the threat landscape and informing stakeholders. Reporting cyber risks to service, executive, and operational stakeholders for mitigation decisions. Limiting the impact of known cyber risks by engaging forces in pre-incident planning and preparatory activities. Constraining attack surfaces through proactive threat intelligence working directly alongside the threat hunting and malware service. About Police Digital Service We exist to harness the power of digital, data and technology to enable UK policing to better protect the communities it serves. Ours is a team of experts in commercial services, technical assurance, data, digital transformation and innovation, with a unique experience in policing and national programme delivery. The National Management Centre will provide visibility and control of information risks for Policing. It will support the 24x7x365 nature of the police operations, providing a threat detection and response capability for digital services before, during and after cyber attacks, enabling stakeholders to understand and proactively manage risk across the technology estate at both the national and force level. Why Join us? You can find out more here:Benefits - Police Digital Service (pds.police.uk) Key Responsibilities Providing expertise and support through the use of analytical products to assist mitigation practices at a tactical and operational level. Analysis of advanced persistent threats including the tactics, techniques, and procedures (TTPs) of attackers. Conducting analysis at a tactical and operational level, identifying and using appropriate analytical tools and techniques to interpret gaps, patterns and trends, assess threat, risk and harm and make recommendations in support of decision making, prioritisation and resource allocation. Correlating intelligence from a variety of sources, to develop and lead understanding and analysis of contextually relevant threats. Performing a broad range of tasks, bringing together output from stakeholders within Cyber SOC, Malware, Threat Hunting and Vulnerability teams. Preparing and delivering analytical alerts, reports, and briefings to stakeholders to provide a clear and concise evidence-based understanding of the subject matter, including providing advice and guidance. Working proactively to serve the policing community with limited direct oversight (depending on role and capabilities), and to take ownership of deliverables. Identifying, developing and training other CTI analysts using appropriate analytical tools and techniques. What you need to succeed in the role Essential : Ability to acquire SC and NPPV3 level clearances Strong interest in cyber security and threat actors Insatiable thirst for knowledge Ability to translate complex cyber issues to relevant audiences, both verbally and written Experience in internal and external stakeholder management and engagement Knowledge of current threat landscape including specific awareness of adversarial cyber actors, including their TTPs Experience in utilising open-source intelligence and the development of tools to assist with this Experience in conducting malware, phishing, and SIEM log analysis Knowledge of relevant CTI sources Excellent knowledge of adversarial cyber actors, including their TTPs and the adversary lifecycle Comprehensive experience in conducting malware, phishing, and SIEM log analysis Experience with threat modelling systems and risk assessment models Extensive experience in utilising open-source intelligence Experienced CTI analyst with the ability to progress service provided to police forces, lead development, and train juniors Demonstrated ability to manage customer relationships Strong leadership skills with the ability to prioritise and operate in a methodical and disciplined manner Ability to operate in high-pressured environments with proven experience of support provided during cyber incidents Desirable: Relevant qualifications including: CREST Registered Threat Intelligence Analyst, GIAC Cyber Threat Intelligence (GCTI), and/or Completed Intelligence Analysis course (e.g. NIAT, RISC UK or similar) Demonstrated experience in developing and delivering cybercrime or risk reduction recommendations and / or strategies Understanding of UK Police cyber and IT environments Working Arrangements At the NMC, you will benefit from hybrid working, getting the advantages of both face-to-face team engagement and home working. NMC employees have the opportunity to work in our modern office environment for in-person collaboration, however you will also get the opportunity to work from home 2 days a week.
May 01, 2024
Full time
Join Police Digital Service in a NMC Senior Cyber Threat Intelligence Specialist role (Hybrid/Lancashire) £55,000-£60,000 Police Digital Service are looking to hire a Senior Cyber Threat Intelligence (CTI) Specialist. This role is recommended for those with significant cyber threat intelligence experience As a member of the Threat Intelligence team, you'll be involved with: Developing awareness for the policing community of the cyber risks to critical services by continually assessing the threat landscape and informing stakeholders. Reporting cyber risks to service, executive, and operational stakeholders for mitigation decisions. Limiting the impact of known cyber risks by engaging forces in pre-incident planning and preparatory activities. Constraining attack surfaces through proactive threat intelligence working directly alongside the threat hunting and malware service. About Police Digital Service We exist to harness the power of digital, data and technology to enable UK policing to better protect the communities it serves. Ours is a team of experts in commercial services, technical assurance, data, digital transformation and innovation, with a unique experience in policing and national programme delivery. The National Management Centre will provide visibility and control of information risks for Policing. It will support the 24x7x365 nature of the police operations, providing a threat detection and response capability for digital services before, during and after cyber attacks, enabling stakeholders to understand and proactively manage risk across the technology estate at both the national and force level. Why Join us? You can find out more here:Benefits - Police Digital Service (pds.police.uk) Key Responsibilities Providing expertise and support through the use of analytical products to assist mitigation practices at a tactical and operational level. Analysis of advanced persistent threats including the tactics, techniques, and procedures (TTPs) of attackers. Conducting analysis at a tactical and operational level, identifying and using appropriate analytical tools and techniques to interpret gaps, patterns and trends, assess threat, risk and harm and make recommendations in support of decision making, prioritisation and resource allocation. Correlating intelligence from a variety of sources, to develop and lead understanding and analysis of contextually relevant threats. Performing a broad range of tasks, bringing together output from stakeholders within Cyber SOC, Malware, Threat Hunting and Vulnerability teams. Preparing and delivering analytical alerts, reports, and briefings to stakeholders to provide a clear and concise evidence-based understanding of the subject matter, including providing advice and guidance. Working proactively to serve the policing community with limited direct oversight (depending on role and capabilities), and to take ownership of deliverables. Identifying, developing and training other CTI analysts using appropriate analytical tools and techniques. What you need to succeed in the role Essential : Ability to acquire SC and NPPV3 level clearances Strong interest in cyber security and threat actors Insatiable thirst for knowledge Ability to translate complex cyber issues to relevant audiences, both verbally and written Experience in internal and external stakeholder management and engagement Knowledge of current threat landscape including specific awareness of adversarial cyber actors, including their TTPs Experience in utilising open-source intelligence and the development of tools to assist with this Experience in conducting malware, phishing, and SIEM log analysis Knowledge of relevant CTI sources Excellent knowledge of adversarial cyber actors, including their TTPs and the adversary lifecycle Comprehensive experience in conducting malware, phishing, and SIEM log analysis Experience with threat modelling systems and risk assessment models Extensive experience in utilising open-source intelligence Experienced CTI analyst with the ability to progress service provided to police forces, lead development, and train juniors Demonstrated ability to manage customer relationships Strong leadership skills with the ability to prioritise and operate in a methodical and disciplined manner Ability to operate in high-pressured environments with proven experience of support provided during cyber incidents Desirable: Relevant qualifications including: CREST Registered Threat Intelligence Analyst, GIAC Cyber Threat Intelligence (GCTI), and/or Completed Intelligence Analysis course (e.g. NIAT, RISC UK or similar) Demonstrated experience in developing and delivering cybercrime or risk reduction recommendations and / or strategies Understanding of UK Police cyber and IT environments Working Arrangements At the NMC, you will benefit from hybrid working, getting the advantages of both face-to-face team engagement and home working. NMC employees have the opportunity to work in our modern office environment for in-person collaboration, however you will also get the opportunity to work from home 2 days a week.
Join our dynamic team as a Cyber Security Analyst (Change Control) based in Faslane, Helensburgh. Enjoy the flexibility of our 4xFlex working pattern, with a condensed 4-day workweek (Monday to Thursday) and the option for hybrid working, typically spending 2 days onsite.Key responsibilities: Streamline and enhance Change Control processes. Collaborate on customer process enhancements aligned with ITIL4 practices. Deliver concise progress reports and compelling presentations to clients. Serve as a subject matter expert in Security Information and Event Management (SIEM), providing recommendations for product enhancements. Conduct thorough analysis of SIEM outputs, promptly identifying and escalating any incidents or breaches. Provide assurance support to team members on Secure by Design principles. Translate technical risks into understandable formats for non-technical stakeholders. Mentor junior team members. Effectively communicate with clients and managers across all levels. The successful candidate must be capable of achieving the appropriate level of security clearance (SC). For further information, please visit UK Security Vetting Clearance Levels Required skills, qualifications and experience Proven track record as a Cyber Security Analyst, Change Control Analyst, or related role. Preferred certification: Certified Information Systems Security Professional (CISSP). Experience in Government/Ministry of Defence settings is advantageous. Proficiency in implementing ITIL processes. Strong expertise in SIEM operations. Competence in Risk Management and NIST Cyber Security Controls. Client-facing experience with exceptional stakeholder management skills. Ability to thrive in a fast-paced environment, adapting to evolving priorities. Highly organized with a pragmatic approach, consistently meeting deadlines. Excellent interpersonal and communication skills, both written and verbal. Business Environment Lockheed Martin UK - Strategic Systems (LMUK SS) is the single contractor providing specialist Waterfront In-Service Support to one of the Royal Navy's Submarine Programs. The company provides the Ministry of Defence (MoD) with safe, efficient and responsive support. LMUK SS, as part of the ABL Alliance with AWE and Babcock, is also responsible for the management of operations at RNAD Coulport. Looking to the future, LMUK SS supports the joint US and UK submarine design efforts. Equal Opportunity Statement Lockheed Martin is proud to be an equal opportunity employer and is committed to maintaining a diverse and inclusive work environment. Diversity and inclusion are fundamental to our culture and reflect our values of doing what's right, respecting others and performing with excellence. By engaging with all our employees' diverse talents and experiences every day, we can innovate different and better, creating cutting edge solutions and unparalleled customer value. We know that diversity of thought leads to better solutions for our customers. Our top priority is finding the best candidate for the job and if you are interested in the position, we'd love to hear how you might contribute to our mission and our team and would encourage you to apply, even if you don't believe you meet every one of the criteria set out in our job advert. In addition, we are committed to inclusion of all individuals and will make reasonable adjustments to our applications process. If you require assistance or adjustments to participate in the job application or interview process, please contact or call . Disclaimer: This vacancy is being advertised by Optamor Limited. Optamor is a specialist Recruitment Process Outsourcing provider. We provide a flexible full recruitment solution which takes care of all recruitment requirements from planning to on-boarding. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically and strategically important industries in the UK and the world today. We will never send your CV without your permission.
May 01, 2024
Full time
Join our dynamic team as a Cyber Security Analyst (Change Control) based in Faslane, Helensburgh. Enjoy the flexibility of our 4xFlex working pattern, with a condensed 4-day workweek (Monday to Thursday) and the option for hybrid working, typically spending 2 days onsite.Key responsibilities: Streamline and enhance Change Control processes. Collaborate on customer process enhancements aligned with ITIL4 practices. Deliver concise progress reports and compelling presentations to clients. Serve as a subject matter expert in Security Information and Event Management (SIEM), providing recommendations for product enhancements. Conduct thorough analysis of SIEM outputs, promptly identifying and escalating any incidents or breaches. Provide assurance support to team members on Secure by Design principles. Translate technical risks into understandable formats for non-technical stakeholders. Mentor junior team members. Effectively communicate with clients and managers across all levels. The successful candidate must be capable of achieving the appropriate level of security clearance (SC). For further information, please visit UK Security Vetting Clearance Levels Required skills, qualifications and experience Proven track record as a Cyber Security Analyst, Change Control Analyst, or related role. Preferred certification: Certified Information Systems Security Professional (CISSP). Experience in Government/Ministry of Defence settings is advantageous. Proficiency in implementing ITIL processes. Strong expertise in SIEM operations. Competence in Risk Management and NIST Cyber Security Controls. Client-facing experience with exceptional stakeholder management skills. Ability to thrive in a fast-paced environment, adapting to evolving priorities. Highly organized with a pragmatic approach, consistently meeting deadlines. Excellent interpersonal and communication skills, both written and verbal. Business Environment Lockheed Martin UK - Strategic Systems (LMUK SS) is the single contractor providing specialist Waterfront In-Service Support to one of the Royal Navy's Submarine Programs. The company provides the Ministry of Defence (MoD) with safe, efficient and responsive support. LMUK SS, as part of the ABL Alliance with AWE and Babcock, is also responsible for the management of operations at RNAD Coulport. Looking to the future, LMUK SS supports the joint US and UK submarine design efforts. Equal Opportunity Statement Lockheed Martin is proud to be an equal opportunity employer and is committed to maintaining a diverse and inclusive work environment. Diversity and inclusion are fundamental to our culture and reflect our values of doing what's right, respecting others and performing with excellence. By engaging with all our employees' diverse talents and experiences every day, we can innovate different and better, creating cutting edge solutions and unparalleled customer value. We know that diversity of thought leads to better solutions for our customers. Our top priority is finding the best candidate for the job and if you are interested in the position, we'd love to hear how you might contribute to our mission and our team and would encourage you to apply, even if you don't believe you meet every one of the criteria set out in our job advert. In addition, we are committed to inclusion of all individuals and will make reasonable adjustments to our applications process. If you require assistance or adjustments to participate in the job application or interview process, please contact or call . Disclaimer: This vacancy is being advertised by Optamor Limited. Optamor is a specialist Recruitment Process Outsourcing provider. We provide a flexible full recruitment solution which takes care of all recruitment requirements from planning to on-boarding. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically and strategically important industries in the UK and the world today. We will never send your CV without your permission.
Would you like to join a brand new SOC team for a highly secure managed service for the government? Have real i nfluence on the set up from an operational, technical and strategic view point e.g. SIEM Selection? Work for a recognised specialist in Security? This could be the role for you Role - Senior SOC Analyst aka Security Analyst, Security Engineer etc Location - London / Hybrid 1 day in the office Salary - 60 - 70K + 6% Pension, Private Health, 25 days rising on service, Life, Gym etc The role As the first member of the SOC you will be involved in the selection and standing up of the SIEM platform before evolving into more of an Operation Role (Monitoring, Incident Management, Investigations) while providing leadership to more junior analysts. You Experience of SIEM Systems e.g. IBM QRadar, FortiSIEM, Splunk, Sentinel etc Up to date knowledge of Cyber Security trends and threats Excellent communication an interpersonal skills, leadership qualities Knowledge of best practice e.g. ISO27001 Understanding of IT Security Policies, Procedures, Standards, Guidelines etc SecOps and Incident Handling Risk Assessment As you are working on a secure government platform, SC Clearence would be a bonus and you are likely to be able to go through it at some point. For that you will have needed to have lived in the UK for the past 5 years hold a UK Passport and not be a joint national. Keen to get on board with this great opportunity? Please send your cv asap for a swift response!
May 01, 2024
Full time
Would you like to join a brand new SOC team for a highly secure managed service for the government? Have real i nfluence on the set up from an operational, technical and strategic view point e.g. SIEM Selection? Work for a recognised specialist in Security? This could be the role for you Role - Senior SOC Analyst aka Security Analyst, Security Engineer etc Location - London / Hybrid 1 day in the office Salary - 60 - 70K + 6% Pension, Private Health, 25 days rising on service, Life, Gym etc The role As the first member of the SOC you will be involved in the selection and standing up of the SIEM platform before evolving into more of an Operation Role (Monitoring, Incident Management, Investigations) while providing leadership to more junior analysts. You Experience of SIEM Systems e.g. IBM QRadar, FortiSIEM, Splunk, Sentinel etc Up to date knowledge of Cyber Security trends and threats Excellent communication an interpersonal skills, leadership qualities Knowledge of best practice e.g. ISO27001 Understanding of IT Security Policies, Procedures, Standards, Guidelines etc SecOps and Incident Handling Risk Assessment As you are working on a secure government platform, SC Clearence would be a bonus and you are likely to be able to go through it at some point. For that you will have needed to have lived in the UK for the past 5 years hold a UK Passport and not be a joint national. Keen to get on board with this great opportunity? Please send your cv asap for a swift response!
At Direct Line Group, insurance is just the start. Combining decades of industry experience with talented people in every field from data, technology, customer care and auto repair, to HR, finance and procurement , we're a customer-obsessed market powerhouse. And we all work together to be brilliant for customers, every single day. We're evolving, to be a more digitally-focused data-driven insurance company of the future - and your unique talent, skills and ideas can drive our success. Like us, you thrive on collaboration, exploration and innovation. And like you, we take tech seriously. That's why we're embracing the move to a more digital, flexible world. With constant investment in the newest tools, programmes and equipment for our teams, it all adds up to creating the best possible user experience for customers. And a great career for you. Join us. Own the evolution. We have an exciting opportunity for a Senior Security Operations Analyst to join our re-energised Cyber Defence team! Reporting into the Cyber Defence Security Operations Lead, you will act as the as a secondary contact and escalation point for the team. You'll manage a team of Security Analysts to oversee the day-to-day operational delivery of services provided by our third party 24x7 Security Operations Centre, and will take ownership of our security presence and identify any gaps by working with various stakeholders across the business. What else you'll be doing: Maintaining security oversight of the technical infrastructure delivered by third party suppliers and raising concerns/issues that pose a security risk to the organisation accordingly. You will also manage any operational risk remediation to conclusion and take ownership within the team. Managing development and improvements required for detection engineering and associated technologies. Responsible for the operational and threat malware analysis for the group. Providing security input and for maintaining relationships with the Service Management function in relation to change management, problem management and incident management. Responsible for the level 2 / 3 operational Cyber incident response. Escalating in a timely manner any incidents and anomalies that are detected within DLG and providing subject matter expertise and guidance for operational challenges. Monitoring and responding to emerging threat patterns, vulnerabilities and anomalies and providing escalations of any unknown threats to relevant areas within the company. Collating metrics on the status of technical information security controls across the DLG estate, highlighting risk areas and working to develop and manage remediation plans as required. Collaborating with all CISO teams to report appropriate operational issues that may be resolved at an architecture level Operational On-Call Requirement This role has a shared, rotational 24/7 on-call requirement and forms part of information security incident response capability. You will act as the single point of contact for all security related response actions and decisions, including management of each incident from a security perspective, interaction with IM/MIM teams (where required) and recording of all key security decisions. What you'll need: Knowledge and operational experience in firewalls, intrusion detection and prevention systems, anti-virus and content filtering, URL filtering, authentication solutions, switches, routers, Voice over IP (VoIP), firewall zoning. Ability to read and understand system data including security event logs, system logs, application logs, and device logs, etc. Knowledge and experience of enterprise grade technologies including operating systems, databases, and web applications. Knowledge and experience of performing network traffic analysis for identifying any developing patterns. Ability to assist with knowledge transfer and mentoring/up skilling of junior team members Security Analysis for CompTIA CySA+ or similar level of certification It would be beneficial if you have: Experience with any of the following technologies: Data Loss Prevention, Intrusion Prevention/Detection Systems, Firewalls, SIEM. Knowledge of reporting suites such as Power BI Good understanding of Microsoft security suites and associated qualifications Threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, CISA by a recognised professional body Technical certifications by a recognised professional body in network or systems engineering Fundamental Cloud Concepts for AWS. OWASP Top 10: API Security Playbook. Ways of Working This role is based out of our London Bridge office. Our hybrid model way of working offers a 'best of both worlds' approach combining the best parts of home and office-working, offering flexibility for everyone. When you'll be in the office depends on your role, but most colleagues are in 2 days a week, and we'll consider the flexible working options that work best for you. Read our flexible working approach here Benefits We wouldn't be where we are today without our people and the wide variety of perspectives and life experiences they bring. That's why we offer excellent benefits to suit your lifestyle and a flexible working model combining the best parts of home and office-working, varying with the nature of your role. Our core benefits include: 9% employer contributed pension Up to 10% bonus 50% off home, motor and pet insurance plus free travel insurance and Green Flag breakdown cover Additional optional Health and Dental insurance EV car scheme which allows all colleagues to lease a brand new electric or plug-in hybrid car in a tax efficient way. 25 days annual leave Buy as you earn share scheme Employee discounts and cashback Plus many more!
Apr 30, 2024
Full time
At Direct Line Group, insurance is just the start. Combining decades of industry experience with talented people in every field from data, technology, customer care and auto repair, to HR, finance and procurement , we're a customer-obsessed market powerhouse. And we all work together to be brilliant for customers, every single day. We're evolving, to be a more digitally-focused data-driven insurance company of the future - and your unique talent, skills and ideas can drive our success. Like us, you thrive on collaboration, exploration and innovation. And like you, we take tech seriously. That's why we're embracing the move to a more digital, flexible world. With constant investment in the newest tools, programmes and equipment for our teams, it all adds up to creating the best possible user experience for customers. And a great career for you. Join us. Own the evolution. We have an exciting opportunity for a Senior Security Operations Analyst to join our re-energised Cyber Defence team! Reporting into the Cyber Defence Security Operations Lead, you will act as the as a secondary contact and escalation point for the team. You'll manage a team of Security Analysts to oversee the day-to-day operational delivery of services provided by our third party 24x7 Security Operations Centre, and will take ownership of our security presence and identify any gaps by working with various stakeholders across the business. What else you'll be doing: Maintaining security oversight of the technical infrastructure delivered by third party suppliers and raising concerns/issues that pose a security risk to the organisation accordingly. You will also manage any operational risk remediation to conclusion and take ownership within the team. Managing development and improvements required for detection engineering and associated technologies. Responsible for the operational and threat malware analysis for the group. Providing security input and for maintaining relationships with the Service Management function in relation to change management, problem management and incident management. Responsible for the level 2 / 3 operational Cyber incident response. Escalating in a timely manner any incidents and anomalies that are detected within DLG and providing subject matter expertise and guidance for operational challenges. Monitoring and responding to emerging threat patterns, vulnerabilities and anomalies and providing escalations of any unknown threats to relevant areas within the company. Collating metrics on the status of technical information security controls across the DLG estate, highlighting risk areas and working to develop and manage remediation plans as required. Collaborating with all CISO teams to report appropriate operational issues that may be resolved at an architecture level Operational On-Call Requirement This role has a shared, rotational 24/7 on-call requirement and forms part of information security incident response capability. You will act as the single point of contact for all security related response actions and decisions, including management of each incident from a security perspective, interaction with IM/MIM teams (where required) and recording of all key security decisions. What you'll need: Knowledge and operational experience in firewalls, intrusion detection and prevention systems, anti-virus and content filtering, URL filtering, authentication solutions, switches, routers, Voice over IP (VoIP), firewall zoning. Ability to read and understand system data including security event logs, system logs, application logs, and device logs, etc. Knowledge and experience of enterprise grade technologies including operating systems, databases, and web applications. Knowledge and experience of performing network traffic analysis for identifying any developing patterns. Ability to assist with knowledge transfer and mentoring/up skilling of junior team members Security Analysis for CompTIA CySA+ or similar level of certification It would be beneficial if you have: Experience with any of the following technologies: Data Loss Prevention, Intrusion Prevention/Detection Systems, Firewalls, SIEM. Knowledge of reporting suites such as Power BI Good understanding of Microsoft security suites and associated qualifications Threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, CISA by a recognised professional body Technical certifications by a recognised professional body in network or systems engineering Fundamental Cloud Concepts for AWS. OWASP Top 10: API Security Playbook. Ways of Working This role is based out of our London Bridge office. Our hybrid model way of working offers a 'best of both worlds' approach combining the best parts of home and office-working, offering flexibility for everyone. When you'll be in the office depends on your role, but most colleagues are in 2 days a week, and we'll consider the flexible working options that work best for you. Read our flexible working approach here Benefits We wouldn't be where we are today without our people and the wide variety of perspectives and life experiences they bring. That's why we offer excellent benefits to suit your lifestyle and a flexible working model combining the best parts of home and office-working, varying with the nature of your role. Our core benefits include: 9% employer contributed pension Up to 10% bonus 50% off home, motor and pet insurance plus free travel insurance and Green Flag breakdown cover Additional optional Health and Dental insurance EV car scheme which allows all colleagues to lease a brand new electric or plug-in hybrid car in a tax efficient way. 25 days annual leave Buy as you earn share scheme Employee discounts and cashback Plus many more!
Cyber Defence Analyst - DV Clearance Required! The Cyber Defence Analyst will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extensio Portsmouth What we're looking for: Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Experience using virtualisation software. Excellent communication skills Experience of writing Defence/Government documentation Responsibilities include: Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and dashboards to give visibility of the Enterprise infrastructure. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further. JBRP1_UKTJ
Apr 30, 2024
Full time
Cyber Defence Analyst - DV Clearance Required! The Cyber Defence Analyst will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extensio Portsmouth What we're looking for: Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Experience using virtualisation software. Excellent communication skills Experience of writing Defence/Government documentation Responsibilities include: Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and dashboards to give visibility of the Enterprise infrastructure. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further. JBRP1_UKTJ
Cyber Defence Analyst - DV Clearance Required! The Cyber Defence Analyst will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extensio Corsham What we're looking for: Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Experience using virtualisation software. Excellent communication skills Experience of writing Defence/Government documentation Responsibilities include: Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and dashboards to give visibility of the Enterprise infrastructure. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further. JBRP1_UKTJ
Apr 30, 2024
Full time
Cyber Defence Analyst - DV Clearance Required! The Cyber Defence Analyst will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extensio Corsham What we're looking for: Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Experience using virtualisation software. Excellent communication skills Experience of writing Defence/Government documentation Responsibilities include: Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and dashboards to give visibility of the Enterprise infrastructure. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further. JBRP1_UKTJ
As a SOC Analyst, you will play a pivotal role in our client's cybersecurity operations, monitoring and analysing our clients' network infrastructure to detect and respond to potential security incidents. Leveraging cutting-edge tools and technologies, you will proactively identify threats, investigate security breaches, and implement effective countermeasures to mitigate risks. This role offers an exciting opportunity to work in a fast-paced environment, collaborating with skilled professionals to protect digital assets and uphold the highest standards of security. Key Responsibilities: Monitor security event alerts generated by various detection systems and respond promptly to potential threats. Conduct in-depth analysis of security incidents to determine their scope, impact, and root cause. Coordinate with internal teams and external stakeholders to escalate and remediate security breaches in a timely manner. Develop and maintain comprehensive documentation of security incidents, including incident reports and post-mortem analyses. Stay current with emerging cybersecurity threats, vulnerabilities, and industry best practices to continuously enhance our security posture. Participate in security incident response exercises and drills to test and refine our incident response procedures. Collaborate with cross-functional teams to implement security controls and measures to protect against known and emerging threats. Provide guidance and support to junior SOC analysts, sharing knowledge and best practices to build a strong and cohesive team. Qualifications: Experience in cybersecurity, particularly within a SOC. Solid understanding of network protocols, security architectures, and threat intelligence frameworks. Hands-on experience with SIEM tools, intrusion detection/prevention systems, and endpoint security technologies. Proficiency in scripting languages such as Python or PowerShell for automation and data analysis. Strong analytical skills with the ability to methodically investigate and resolve security incidents. Excellent communication skills, with the ability to convey technical information effectively to both technical and non-technical audiences. Relevant industry certifications such as CISSP, GIAC, or CompTIA Security+ are a plus. If you are passionate about cybersecurity and eager to contribute your skills and expertise to a dynamic team, we would love to hear from you!
Apr 29, 2024
Full time
As a SOC Analyst, you will play a pivotal role in our client's cybersecurity operations, monitoring and analysing our clients' network infrastructure to detect and respond to potential security incidents. Leveraging cutting-edge tools and technologies, you will proactively identify threats, investigate security breaches, and implement effective countermeasures to mitigate risks. This role offers an exciting opportunity to work in a fast-paced environment, collaborating with skilled professionals to protect digital assets and uphold the highest standards of security. Key Responsibilities: Monitor security event alerts generated by various detection systems and respond promptly to potential threats. Conduct in-depth analysis of security incidents to determine their scope, impact, and root cause. Coordinate with internal teams and external stakeholders to escalate and remediate security breaches in a timely manner. Develop and maintain comprehensive documentation of security incidents, including incident reports and post-mortem analyses. Stay current with emerging cybersecurity threats, vulnerabilities, and industry best practices to continuously enhance our security posture. Participate in security incident response exercises and drills to test and refine our incident response procedures. Collaborate with cross-functional teams to implement security controls and measures to protect against known and emerging threats. Provide guidance and support to junior SOC analysts, sharing knowledge and best practices to build a strong and cohesive team. Qualifications: Experience in cybersecurity, particularly within a SOC. Solid understanding of network protocols, security architectures, and threat intelligence frameworks. Hands-on experience with SIEM tools, intrusion detection/prevention systems, and endpoint security technologies. Proficiency in scripting languages such as Python or PowerShell for automation and data analysis. Strong analytical skills with the ability to methodically investigate and resolve security incidents. Excellent communication skills, with the ability to convey technical information effectively to both technical and non-technical audiences. Relevant industry certifications such as CISSP, GIAC, or CompTIA Security+ are a plus. If you are passionate about cybersecurity and eager to contribute your skills and expertise to a dynamic team, we would love to hear from you!
Junior Cyber Security Analyst. Location: London. On-premises. Office Based: Four days a week. Remote Working: One day a week. An exceptional career opportunity is available to work for a nationally recognised museum. The museum has recently invested significantly in advanced systems to detect, prevent and resolve emerging cyber threats. Additionally, the museum must comply with various regulatory frameworks and legislation such as PCI-DSS, GDPR, CAA and Cyber Essentials. The maintenance of these security systems requires dedicated security team resources. This vacancy is a fantastic opportunity for a junior-level cybersecurity enthusiast with practical blue team knowledge/experience to develop more cyber awareness and understanding. Junior Cyber Security Analyst Key Skills: We are eager to connect with aspiring Junior Cyber Security Analysts, Cyber Security Interns, Entry-Level Cyber Security Engineers, Junior IT Security Engineers, and other early-career professionals focusing on cyber and IT security. To excel in this position, you must possess many of the following: - A good understanding of Cyber and IT Security concepts and practices. - Some experience performing Antivirus audits and checks. - Good knowledge or practical experience of blue team activities, including daily monitoring and reporting cyber threats, hazards, or risks. - The ability to patch devices, systems, or networks against vulnerabilities. - Knowledge or experience of one or more of the following: Cyber Essentials, Darktrace, Qualys. - Experience working with any endpoint security tool or software, such as MS Defender, Sophos, ESET, Trellix, Symantec, etc. - Have excellent English communication skills (written and verbal). All applicants must reside in the UK and have the right to work. About the Junior Cyber Security Analyst position: You will be a member of the IT Security Team. You will track and report daily cyber threats, hazards, risks, controls, mitigations, and measures to safeguard our client's systems and personnel. You will proactively monitor all output from the various security systems to ensure minimal downtime, and the business will always be protected from cyber threats. You will ensure that all websites, services, servers, and employee devices have installed adequate vulnerability patches. Responsibilities include: - Harnessing the cutting-edge capabilities of Darktrace to detect, prevent, and monitor cyber threats in real-time. - Finding systemic cyber vulnerabilities to make sure security is preserved. - To oversee the patching of critical systems and infrastructure across the entire company, including those platforms maintained by third-party suppliers, in accordance with Cyber Essentials, and to make sure that all devices covered by the programme comply with the standard. - Investigating and researching attack methods to create defences against emerging threats. - Support and adhere to the IT Security Incident Response process as needed. - Assistance with cyber security risk assessments, yearly audits, and ongoing improvement of incident management. Salary and Benefits: Salary: To £30-38,000 Location: London. On-premises. Office Based: Four days a week. Remote Working: One day a week. Holiday: 25 days + Bank Holidays. Rising to 30 days after five years. Museum benefits: - 20% discount in all on-site shops - 25% discount in museum cafes - Free entry to a large number of other museums and galleries. - Enhanced maternity and paternity: Yes Other benefits: - Access to Childcare vouchers. - Access to in-house training programmes and development. For more information on this Junior Cyber Security Analyst position, please get in touch with us to discuss. Our client welcomes everyone. They celebrate difference and encourage everyone to join and be themselves at work.
Apr 29, 2024
Full time
Junior Cyber Security Analyst. Location: London. On-premises. Office Based: Four days a week. Remote Working: One day a week. An exceptional career opportunity is available to work for a nationally recognised museum. The museum has recently invested significantly in advanced systems to detect, prevent and resolve emerging cyber threats. Additionally, the museum must comply with various regulatory frameworks and legislation such as PCI-DSS, GDPR, CAA and Cyber Essentials. The maintenance of these security systems requires dedicated security team resources. This vacancy is a fantastic opportunity for a junior-level cybersecurity enthusiast with practical blue team knowledge/experience to develop more cyber awareness and understanding. Junior Cyber Security Analyst Key Skills: We are eager to connect with aspiring Junior Cyber Security Analysts, Cyber Security Interns, Entry-Level Cyber Security Engineers, Junior IT Security Engineers, and other early-career professionals focusing on cyber and IT security. To excel in this position, you must possess many of the following: - A good understanding of Cyber and IT Security concepts and practices. - Some experience performing Antivirus audits and checks. - Good knowledge or practical experience of blue team activities, including daily monitoring and reporting cyber threats, hazards, or risks. - The ability to patch devices, systems, or networks against vulnerabilities. - Knowledge or experience of one or more of the following: Cyber Essentials, Darktrace, Qualys. - Experience working with any endpoint security tool or software, such as MS Defender, Sophos, ESET, Trellix, Symantec, etc. - Have excellent English communication skills (written and verbal). All applicants must reside in the UK and have the right to work. About the Junior Cyber Security Analyst position: You will be a member of the IT Security Team. You will track and report daily cyber threats, hazards, risks, controls, mitigations, and measures to safeguard our client's systems and personnel. You will proactively monitor all output from the various security systems to ensure minimal downtime, and the business will always be protected from cyber threats. You will ensure that all websites, services, servers, and employee devices have installed adequate vulnerability patches. Responsibilities include: - Harnessing the cutting-edge capabilities of Darktrace to detect, prevent, and monitor cyber threats in real-time. - Finding systemic cyber vulnerabilities to make sure security is preserved. - To oversee the patching of critical systems and infrastructure across the entire company, including those platforms maintained by third-party suppliers, in accordance with Cyber Essentials, and to make sure that all devices covered by the programme comply with the standard. - Investigating and researching attack methods to create defences against emerging threats. - Support and adhere to the IT Security Incident Response process as needed. - Assistance with cyber security risk assessments, yearly audits, and ongoing improvement of incident management. Salary and Benefits: Salary: To £30-38,000 Location: London. On-premises. Office Based: Four days a week. Remote Working: One day a week. Holiday: 25 days + Bank Holidays. Rising to 30 days after five years. Museum benefits: - 20% discount in all on-site shops - 25% discount in museum cafes - Free entry to a large number of other museums and galleries. - Enhanced maternity and paternity: Yes Other benefits: - Access to Childcare vouchers. - Access to in-house training programmes and development. For more information on this Junior Cyber Security Analyst position, please get in touch with us to discuss. Our client welcomes everyone. They celebrate difference and encourage everyone to join and be themselves at work.