technologies such as SIEM, firewalls, intrusion detection/prevention systems, anti-virus software, authentication systems, and log management. knowledge of security approaches including ISMS, riskanalysis and assessments, the CIA triad, attack vectors (including social engineering), cryptography, confidentiality issues, and best practices for cyber security incident response (including more »
SIEM, firewalls, intrusion detection/prevention systems, anti-virus software, authentication systems, log management, and content filtering. Solid grasp of security approaches including ISMS, riskanalysis and assessments, the CIA triad, social engineering, cryptography, confidentiality issues, and incident response best practices. Operate within an ITIL V3 and ISO27001 more »
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Matchtech
security technologies such as SIEM, firewalls, intrusion detection/prevention systems, antivirus software, authentication systems, and log management. Strong knowledge of security approaches, including riskanalysis, attack vectors, cryptography, and cyber security incident response best practices. If the above role sounds like the right step in your career more »
other cybersecurity-related tasks. Additionally, the Software Developer will assist various product development and product sustaining teams with security-related product requirements, design specifications, riskanalysis, and verification. You will also create work instructions for the maintenance and verification of product security. Requirements 3+ years commercial experience in more »
other cybersecurity-related tasks. Additionally, the Software Developer will assist various product development and product sustaining teams with security-related product requirements, design specifications, riskanalysis, and verification. You will also create work instructions for the maintenance and verification of product security. Requirements 3+ years commercial experience in more »
SQL 2012+, Linux appliances A demonstrated history of planning, development and implementation of Azure security related technologies An excellent understanding of security approaches: ISMS, riskanalysis and assessments, CIA triad, attack vectors including social engineering, confidentiality and cyber security The Cyber Security Lead should ideally have qualifications in more »