Information Security Analyst Up to £53,000 per annum plus benefits This is remote based role but ideally looking for someone close to West Midlands or West Yorkshire as these are the two UK offices PLEASE NOTE Due to the volume we will receive on this role please do not call to follow up on your application. You will receive confirmation your CV has been received and we will be in touch within 7 days if you are shortlisted. This superb international FinTech corporate with UK offices in the West Midlands and West Yorkshire are seeking an Information Security Analyst to join their skilled Security Team, responsible for protecting the organisations IT systems and Data. This is a permanent role with a base salary up to £53,000 per annum plus benefits. The role can be home based but you will need to live within a commutable distance of their offices in either Solihull or Halifax. This role involves monitoring, analysing, and reporting on the performance of the security controls and security tooling that have been implemented in the Organisation. By utilising the security tools the business has implemented, the Information Security Analyst will be responsible for ensuring that these tools are being utilised correctly, providing the necessary management information (MI) and using this MI to produce regular reports to senior management. The Information Security Analyst will also provide support to the necessary business functions in responding to security incidents, implementing security measures, and ensuring compliance with security policies and regulations. Key Responsibilities will include: Configure and manage security tolls and technologies to monitor and defend against cyber threats Generate reports on security vulnerabilities and compliance status for management Collaborate with IT Teams to integrate security controls into infrastructure and applications Monitor security alerts and incidents, investigate security breaches, and implement incident response procedures Analyse security incidents to identify root causes and recommend corrective actions Provide security guidance and support to IT teams and business units Stay up to date on emerging security threats, vulnerabilities, and technologies Conduct security assessments and audits to identify vulnerabilities and weaknesses in systems and networks Skills and experience required: You must have previous experience working within a Cyber Security or Information Security role A sound understanding the cyber security landscape Understanding of regulatory compliance requirements such as GDPR, ISO27001, or PCI DSS (Payment Card Industry Data Security Standard) Experience with security tools such as SIEM (Security Information and Event Management), IDS/IPS (Intrusion Detection/Prevention System), and malware protection Developing security reporting packs for differing targeted audiences Knowledge of risk assessment tools, technologies and methods Ability to communicate security issues to peers and management Strong knowledge of networking protocols, operating systems, and security technologies Excellent analytical and problem-solving skills Strong communication and teamwork skills Ability to work independently and prioritize tasks in a fast-paced environment Experience with cloud security principles and technologies (eg, AWS, Azure)
18/04/2024
Full time
Information Security Analyst Up to £53,000 per annum plus benefits This is remote based role but ideally looking for someone close to West Midlands or West Yorkshire as these are the two UK offices PLEASE NOTE Due to the volume we will receive on this role please do not call to follow up on your application. You will receive confirmation your CV has been received and we will be in touch within 7 days if you are shortlisted. This superb international FinTech corporate with UK offices in the West Midlands and West Yorkshire are seeking an Information Security Analyst to join their skilled Security Team, responsible for protecting the organisations IT systems and Data. This is a permanent role with a base salary up to £53,000 per annum plus benefits. The role can be home based but you will need to live within a commutable distance of their offices in either Solihull or Halifax. This role involves monitoring, analysing, and reporting on the performance of the security controls and security tooling that have been implemented in the Organisation. By utilising the security tools the business has implemented, the Information Security Analyst will be responsible for ensuring that these tools are being utilised correctly, providing the necessary management information (MI) and using this MI to produce regular reports to senior management. The Information Security Analyst will also provide support to the necessary business functions in responding to security incidents, implementing security measures, and ensuring compliance with security policies and regulations. Key Responsibilities will include: Configure and manage security tolls and technologies to monitor and defend against cyber threats Generate reports on security vulnerabilities and compliance status for management Collaborate with IT Teams to integrate security controls into infrastructure and applications Monitor security alerts and incidents, investigate security breaches, and implement incident response procedures Analyse security incidents to identify root causes and recommend corrective actions Provide security guidance and support to IT teams and business units Stay up to date on emerging security threats, vulnerabilities, and technologies Conduct security assessments and audits to identify vulnerabilities and weaknesses in systems and networks Skills and experience required: You must have previous experience working within a Cyber Security or Information Security role A sound understanding the cyber security landscape Understanding of regulatory compliance requirements such as GDPR, ISO27001, or PCI DSS (Payment Card Industry Data Security Standard) Experience with security tools such as SIEM (Security Information and Event Management), IDS/IPS (Intrusion Detection/Prevention System), and malware protection Developing security reporting packs for differing targeted audiences Knowledge of risk assessment tools, technologies and methods Ability to communicate security issues to peers and management Strong knowledge of networking protocols, operating systems, and security technologies Excellent analytical and problem-solving skills Strong communication and teamwork skills Ability to work independently and prioritize tasks in a fast-paced environment Experience with cloud security principles and technologies (eg, AWS, Azure)
IT Cyber Security Analyst & Team Leader - CISSP or CySA+ or MSc Information Security Weymouth, Dorset, or London, South East UK or Stoke on Trent, Staffordshire £50,000pa + Hybrid & Flexi-Working & Training & Certifications Available Weymouth, Dorset, or London, South East UK, or Staffordshire + Hybrid and Flexible Working as Standard The Client: Are a well-known High St and Online retailer who are seeking a Senior IT Cyber Security Analyst who specialises in Microsoft/Wintel Servers and Virtualisation supporting a UK wide infrastructure. Objective: You will Lead 2 x Cyber Security Analysts, giving support to the Head of Cyber Security in delivering the Information Security service to the global business. You will lead all Cyber Security Operations function and be the first point of contact for technical information security related matters. Role Responsibilities: You will Lead 2 x Cyber Security Analysts, giving support to the Head of Cyber Security Act as the first point of action or escalation for the identification of security incidents and their investigation. Be responsible for the managed Security Operations Centre (SOC), Network Monitoring and Managed Detection and Response services and associated vendor relationships. Offer mentoring, advice and guidance to those in your Team Be the subject matter expert for technical security related queries, providing the Security Architect, IT Service and Delivery teams and business stakeholders with authoritative advice and defined security requirements. Be responsible for the Security Education and Awareness scheme. Ensure Cyber Security campaigns are conducted, and improvements implemented and ensure colleague queries around policies and requirements are appropriately answered in a timely manner. Be responsible for the Vulnerability Management process. Act on vulnerability information and conduct Cyber Security risk assessments and work with suppliers, partners, and internal teams to ensure security vulnerabilities are identified, assessed, and remediated in good time. Key Requirements you will need: In depth knowledge of Information Security concepts and principles, including cloud security capabilities. Experience with configuring and utilising security tooling, including SIEM, EDR, vulnerability scanners, CASB, network scanning, DLP. Hands-on IT experience with proven expertise in a previous Information Security role. Vendor management experience. A relevant intermediate or advanced Information Security based qualification (eg CISSP, CySA+, MSc Information Security) Ability to critically analyse information and make decisions based on judgement, knowledge, and experience. Business Knowledge: Knowledge of Retail and eCommerce is of great advantage but is not essential. Working knowledge of the Information Security elements of Data Protection regulations (eg GDPR, The Data Protection Act 2018) is essential. Knowledge of the NIST Cyber Security Framework is of advantage. Awareness of regulations that affect Retail, such as PCI DSS, is of great advantage but experience of maintaining compliance is not essential. CISSP or CySA+ or MSc Information Security Certifications will be advantageous. Call today!
18/04/2024
Full time
IT Cyber Security Analyst & Team Leader - CISSP or CySA+ or MSc Information Security Weymouth, Dorset, or London, South East UK or Stoke on Trent, Staffordshire £50,000pa + Hybrid & Flexi-Working & Training & Certifications Available Weymouth, Dorset, or London, South East UK, or Staffordshire + Hybrid and Flexible Working as Standard The Client: Are a well-known High St and Online retailer who are seeking a Senior IT Cyber Security Analyst who specialises in Microsoft/Wintel Servers and Virtualisation supporting a UK wide infrastructure. Objective: You will Lead 2 x Cyber Security Analysts, giving support to the Head of Cyber Security in delivering the Information Security service to the global business. You will lead all Cyber Security Operations function and be the first point of contact for technical information security related matters. Role Responsibilities: You will Lead 2 x Cyber Security Analysts, giving support to the Head of Cyber Security Act as the first point of action or escalation for the identification of security incidents and their investigation. Be responsible for the managed Security Operations Centre (SOC), Network Monitoring and Managed Detection and Response services and associated vendor relationships. Offer mentoring, advice and guidance to those in your Team Be the subject matter expert for technical security related queries, providing the Security Architect, IT Service and Delivery teams and business stakeholders with authoritative advice and defined security requirements. Be responsible for the Security Education and Awareness scheme. Ensure Cyber Security campaigns are conducted, and improvements implemented and ensure colleague queries around policies and requirements are appropriately answered in a timely manner. Be responsible for the Vulnerability Management process. Act on vulnerability information and conduct Cyber Security risk assessments and work with suppliers, partners, and internal teams to ensure security vulnerabilities are identified, assessed, and remediated in good time. Key Requirements you will need: In depth knowledge of Information Security concepts and principles, including cloud security capabilities. Experience with configuring and utilising security tooling, including SIEM, EDR, vulnerability scanners, CASB, network scanning, DLP. Hands-on IT experience with proven expertise in a previous Information Security role. Vendor management experience. A relevant intermediate or advanced Information Security based qualification (eg CISSP, CySA+, MSc Information Security) Ability to critically analyse information and make decisions based on judgement, knowledge, and experience. Business Knowledge: Knowledge of Retail and eCommerce is of great advantage but is not essential. Working knowledge of the Information Security elements of Data Protection regulations (eg GDPR, The Data Protection Act 2018) is essential. Knowledge of the NIST Cyber Security Framework is of advantage. Awareness of regulations that affect Retail, such as PCI DSS, is of great advantage but experience of maintaining compliance is not essential. CISSP or CySA+ or MSc Information Security Certifications will be advantageous. Call today!
Cyber Defence Analyst - DV Clearance Required! The Cyber Defence Analyst will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extension Northallerton What we're looking for: * Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks * Skilled in maintaining Microsoft directory services. * Experience using virtualisation software. * Excellent communication skills * Experience of writing Defence/Government documentation Responsibilities include: * Develop and integrate security event monitoring and incident management services. * Respond to security incidents as they occur as part of an incident response team. * Implement metrics and dashboards to give visibility of the Enterprise infrastructure. * Produce documentation to ensure the repeatability and standardisation of security operating procedures. * Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further.
18/04/2024
Project-based
Cyber Defence Analyst - DV Clearance Required! The Cyber Defence Analyst will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extension Northallerton What we're looking for: * Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks * Skilled in maintaining Microsoft directory services. * Experience using virtualisation software. * Excellent communication skills * Experience of writing Defence/Government documentation Responsibilities include: * Develop and integrate security event monitoring and incident management services. * Respond to security incidents as they occur as part of an incident response team. * Implement metrics and dashboards to give visibility of the Enterprise infrastructure. * Produce documentation to ensure the repeatability and standardisation of security operating procedures. * Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further.
Cyber Defence Analyst - DV Clearance Required! The Cyber Defence Analyst will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extensio Corsham What we're looking for: * Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks . Skilled in maintaining Microsoft directory services. . Experience using virtualisation software. . Excellent communication skills . Experience of writing Defence/Government documentation Responsibilities include: * Develop and integrate security event monitoring and incident management services. . Respond to security incidents as they occur as part of an incident response team. . Implement metrics and dashboards to give visibility of the Enterprise infrastructure. . Produce documentation to ensure the repeatability and standardisation of security operating procedures. . Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further.
18/04/2024
Project-based
Cyber Defence Analyst - DV Clearance Required! The Cyber Defence Analyst will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extensio Corsham What we're looking for: * Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks . Skilled in maintaining Microsoft directory services. . Experience using virtualisation software. . Excellent communication skills . Experience of writing Defence/Government documentation Responsibilities include: * Develop and integrate security event monitoring and incident management services. . Respond to security incidents as they occur as part of an incident response team. . Implement metrics and dashboards to give visibility of the Enterprise infrastructure. . Produce documentation to ensure the repeatability and standardisation of security operating procedures. . Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further.
Cyber Defence Analyst - DV Clearance Required! The Cyber Defence Analyst will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extensio Portsmouth What we're looking for: * Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks * Skilled in maintaining Microsoft directory services. * Experience using virtualisation software. * Excellent communication skills * Experience of writing Defence/Government documentation Responsibilities include: * Develop and integrate security event monitoring and incident management services. * Respond to security incidents as they occur as part of an incident response team. * Implement metrics and dashboards to give visibility of the Enterprise infrastructure. * Produce documentation to ensure the repeatability and standardisation of security operating procedures. * Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further.
18/04/2024
Project-based
Cyber Defence Analyst - DV Clearance Required! The Cyber Defence Analyst will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. We offer: Daily Rate - Market rate - flexible 12-Month Contract with Likely Extensio Portsmouth What we're looking for: * Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks * Skilled in maintaining Microsoft directory services. * Experience using virtualisation software. * Excellent communication skills * Experience of writing Defence/Government documentation Responsibilities include: * Develop and integrate security event monitoring and incident management services. * Respond to security incidents as they occur as part of an incident response team. * Implement metrics and dashboards to give visibility of the Enterprise infrastructure. * Produce documentation to ensure the repeatability and standardisation of security operating procedures. * Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Apply now to discuss this exciting opportunity further.
Cloud Support Lead - Azure Location: London/Hybrid Azure Support Lead , with significant experience managing applications within Azure is required for a prominent specialist insurer in the City of London. This would be a brand-new team engaged in transitioning and transforming the technology landscape of the organisation. Role Overview: The organisation are undergoing a generational transformation and are looking for an experienced 2nd or 3rd line support analyst who can act as the Azure expert for the organisation. You will come with strong knowledge reporting and fixing bugs within Azure and API support. You will have expert experience in Azure Logic Apps Service bus and Azure functions. Initially this will be working and supporting vendors but will grow to driving the internal Cloud Integration and Orchestration platform. You will also have experience in the cloud security element to ensure a robust cyber security element. Key Responsibilities: Support and maintain API services, ensuring seamless connectivity across applications. Act as an Azure SME and expert, able to fix bugs and issues within Azure provide second and third-line support, resolving incidents, and fulfilling requests in line with defined SLAs. Analyse technical and business requirements, designing enterprise solutions integrating various applications and systems. Work closely with third-party suppliers to troubleshoot integration issues and identify improvement opportunities. Maintain technical documentation and a knowledge base of solutions and procedures. Experience with Azure Logic Apps, Service Bus and Azure functions as well as Azure Logic Apps. Good knowledge of cloud security and Cyber Security principles. Desirable Skills: Familiarity with Azure Data Factory, ETL processes, and data manipulation. Experience within the Financial Services sector or Specialist insurance. Understanding of ITIL-based service management concepts (Incident Management, Problem Management, Change Management). Why Join: Collaborate on a major technical transition for a brand new team and business unit Hybrid work model with a City of London office presence. Contribute to a transformative journey in the insurance domain. Supportive and inclusive work environment valuing diverse perspectives. This is a brand new opening within a new team so apply now for consideration!
17/04/2024
Full time
Cloud Support Lead - Azure Location: London/Hybrid Azure Support Lead , with significant experience managing applications within Azure is required for a prominent specialist insurer in the City of London. This would be a brand-new team engaged in transitioning and transforming the technology landscape of the organisation. Role Overview: The organisation are undergoing a generational transformation and are looking for an experienced 2nd or 3rd line support analyst who can act as the Azure expert for the organisation. You will come with strong knowledge reporting and fixing bugs within Azure and API support. You will have expert experience in Azure Logic Apps Service bus and Azure functions. Initially this will be working and supporting vendors but will grow to driving the internal Cloud Integration and Orchestration platform. You will also have experience in the cloud security element to ensure a robust cyber security element. Key Responsibilities: Support and maintain API services, ensuring seamless connectivity across applications. Act as an Azure SME and expert, able to fix bugs and issues within Azure provide second and third-line support, resolving incidents, and fulfilling requests in line with defined SLAs. Analyse technical and business requirements, designing enterprise solutions integrating various applications and systems. Work closely with third-party suppliers to troubleshoot integration issues and identify improvement opportunities. Maintain technical documentation and a knowledge base of solutions and procedures. Experience with Azure Logic Apps, Service Bus and Azure functions as well as Azure Logic Apps. Good knowledge of cloud security and Cyber Security principles. Desirable Skills: Familiarity with Azure Data Factory, ETL processes, and data manipulation. Experience within the Financial Services sector or Specialist insurance. Understanding of ITIL-based service management concepts (Incident Management, Problem Management, Change Management). Why Join: Collaborate on a major technical transition for a brand new team and business unit Hybrid work model with a City of London office presence. Contribute to a transformative journey in the insurance domain. Supportive and inclusive work environment valuing diverse perspectives. This is a brand new opening within a new team so apply now for consideration!
Role: SNOC Analyst Salary: Up to £35,000 dependent on experience + benefits package Location: Onsite in London Candidates will be sponsored through SC and DV clearance for this role We are looking for a SNOC Analyst to join an established team triaging security related events and incidents. You will be joining a small team where there is opportunity for career development and progression. Skills required; + Security Information and Event Management (SIEM) tooling + Experience in a SOC environment + Basic understanding of networks and cyber security + Bonus skillsets: Juniper, general infrastructure skills ie virtualisations, windows Servers, SQL, Sharepoint If you are interested in discussing this SNOC Analyst role further, please apply or send a copy of your updated CV to (see below) CBSbutler is acting as an employment agency for this role.
17/04/2024
Full time
Role: SNOC Analyst Salary: Up to £35,000 dependent on experience + benefits package Location: Onsite in London Candidates will be sponsored through SC and DV clearance for this role We are looking for a SNOC Analyst to join an established team triaging security related events and incidents. You will be joining a small team where there is opportunity for career development and progression. Skills required; + Security Information and Event Management (SIEM) tooling + Experience in a SOC environment + Basic understanding of networks and cyber security + Bonus skillsets: Juniper, general infrastructure skills ie virtualisations, windows Servers, SQL, Sharepoint If you are interested in discussing this SNOC Analyst role further, please apply or send a copy of your updated CV to (see below) CBSbutler is acting as an employment agency for this role.
LA International Computer Consultants Ltd
Hereford, Herefordshire
DV Cleared Onsite in Hereford Duration: 6 months initially Market Rates via Umbrella Role Description: Cyber Defence Engineer will join a growing security team responsible for the testing, implementation, deployment, maintenance, configuration and troubleshooting of the SOC's technology stack (hardware and software). The engineer will also assist with the continued development and maintenance of data pipelines and signature updates and the professional development of the system engineering team. Tasks: * Perform system administration on specific cyber defence applications and systems to include installation, configuration, maintenance, troubleshooting, backup and restoration. * Manage system/server resources including performance, capacity, availability, serviceability, and recoverability. * Diagnose and resolve customer reported system incidents, problems, and events to ensure continuing operability. * Coordinate with SOC and CTI Analysts to assist in the development of signatures which can be implemented on cyber defence network tools in response to new or observed threats within the network environment or enclave. * Manage the compilation, cataloguing, distribution, and retrieval of data from a range of enterprise networks and data sources. * Implement data management standards, requirements, and specifications. * Develop data standards, policies, and procedures. * Analyse data sources to provide actionable recommendations and facilitate data-gathering methods. * To share knowledge, skills and experience, create and improve documentation, and train new members of the data engineering team. Knowledge: * Knowledge of big data technologies and ecosystems (eg, NiFi). * Knowledge of current market and emerging leaders in data analytical and SIEM platforms. * Knowledge of network security implementations (eg, host-based IDS, IPS), including their function and placement in a network. * Knowledge of intrusion detection systems and signature development. * Knowledge of Front End collection systems, including network traffic collection, filtering, and selection. * Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. * Knowledge of cyber defence and information security policies, procedures and regulations. * Knowledge of network security architecture concepts including topology, protocols, components and principles. Skills/Experience: * Previous experience of Enterprise ICS/network architectures and technologies. * Working with frameworks and technologies that support data-intensive distributed applications. * Experience maintaining and administrating data analytical and SIEM platforms. * Experience using host and network-based IDS/IPS. Experience using packet capture solutions. * Skill in developing and deploying signatures. * Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). * Ability to provide technical and service leadership to junior SOC Engineers (mentor/coach). Desirable Qualifications/Certifications * Red Hat System Administration I & II (RH124/RH134). * Baseline Cyber Courses eg Cyber Foundation Pathway, SANS SEC 301 Intro to Information Security, SANS 401 Security Essentials Bootcamp. * Certified engineer in a market leading data analysis/SIEM platform. * SANS SEC501 Advanced Security Essentials Enterprise Defender. * SANS SEC 511 Continuous Monitoring & Security Operations. * SANS SEC555: SIEM with Tactical Analytics Available locations: -Hereford -Northallerton -Corsham -Portsmouth Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to apply. Please note successful applicants will be required to be security cleared prior to appointment which can take up to a minimum 18 weeks. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.
17/04/2024
Project-based
DV Cleared Onsite in Hereford Duration: 6 months initially Market Rates via Umbrella Role Description: Cyber Defence Engineer will join a growing security team responsible for the testing, implementation, deployment, maintenance, configuration and troubleshooting of the SOC's technology stack (hardware and software). The engineer will also assist with the continued development and maintenance of data pipelines and signature updates and the professional development of the system engineering team. Tasks: * Perform system administration on specific cyber defence applications and systems to include installation, configuration, maintenance, troubleshooting, backup and restoration. * Manage system/server resources including performance, capacity, availability, serviceability, and recoverability. * Diagnose and resolve customer reported system incidents, problems, and events to ensure continuing operability. * Coordinate with SOC and CTI Analysts to assist in the development of signatures which can be implemented on cyber defence network tools in response to new or observed threats within the network environment or enclave. * Manage the compilation, cataloguing, distribution, and retrieval of data from a range of enterprise networks and data sources. * Implement data management standards, requirements, and specifications. * Develop data standards, policies, and procedures. * Analyse data sources to provide actionable recommendations and facilitate data-gathering methods. * To share knowledge, skills and experience, create and improve documentation, and train new members of the data engineering team. Knowledge: * Knowledge of big data technologies and ecosystems (eg, NiFi). * Knowledge of current market and emerging leaders in data analytical and SIEM platforms. * Knowledge of network security implementations (eg, host-based IDS, IPS), including their function and placement in a network. * Knowledge of intrusion detection systems and signature development. * Knowledge of Front End collection systems, including network traffic collection, filtering, and selection. * Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. * Knowledge of cyber defence and information security policies, procedures and regulations. * Knowledge of network security architecture concepts including topology, protocols, components and principles. Skills/Experience: * Previous experience of Enterprise ICS/network architectures and technologies. * Working with frameworks and technologies that support data-intensive distributed applications. * Experience maintaining and administrating data analytical and SIEM platforms. * Experience using host and network-based IDS/IPS. Experience using packet capture solutions. * Skill in developing and deploying signatures. * Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). * Ability to provide technical and service leadership to junior SOC Engineers (mentor/coach). Desirable Qualifications/Certifications * Red Hat System Administration I & II (RH124/RH134). * Baseline Cyber Courses eg Cyber Foundation Pathway, SANS SEC 301 Intro to Information Security, SANS 401 Security Essentials Bootcamp. * Certified engineer in a market leading data analysis/SIEM platform. * SANS SEC501 Advanced Security Essentials Enterprise Defender. * SANS SEC 511 Continuous Monitoring & Security Operations. * SANS SEC555: SIEM with Tactical Analytics Available locations: -Hereford -Northallerton -Corsham -Portsmouth Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to apply. Please note successful applicants will be required to be security cleared prior to appointment which can take up to a minimum 18 weeks. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.
DV Cleared SIEM/Incident SME Location: Northallerton/Corsham/Portsmouth Duration: 6 - 12 Months Rate to SSC: Market Rate MUST BE PAYE THROUGH UMBRELLA Role Description: The Cyber Defence Analyst will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and dashboards to give visibility of the Enterprise infrastructure. Use of the SOAR platform to assist with playbook automation and case management capabilities to streamline team processes and tools. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system security according to latest threat intelligence and evolving trends. Participate in root cause analysis of incidents in conjunction with engineers across the enterprise. Provide Subject Matter Expertise (SME) on a broad range of information security standards and best practices. Offer strategic and tactical security guidance including valuation requirement of technical controls. Be part of the CRM process Liaise with the SOC engineers to maintain up-to-date dashboards of security alerts, to allow the organisation to better respond to an incident. Document, validate and create operational processes and procedures to help develop the SOC. Assist in identifying, prioritising, and coordinating the protection of critical cyber defence infrastructure and key resources. Build, install, configure, and test dedicated cyber defence hardware. Support Junior Analysts to manage SOC systems. Previous experience of Enterprise ICS/network architectures and technologies Experience and knowledge of SIEM solutions; having the ability to identify use cases and their creation, their deployment and tuning. Experience as a mentor/coach to Junior Analysts Your profile Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Skilled in using virtualisation software. Knowledge of key security frameworks (eg ISO, NIST 800-53, 800-171, 800-172, C2M2) Excellent communication skills Experience of writing Defence/Government documentation Desirable Qualifications: Broad Spectrum Cyber Course (SANS SEC401 or SEC501 or equivalent) SIEM Design, Architecture and Analyst Course (SANS SEC455 or SEC555 or equivalent) Advanced Analyst Course (SANS SEC503 or equivalent)
15/04/2024
Project-based
DV Cleared SIEM/Incident SME Location: Northallerton/Corsham/Portsmouth Duration: 6 - 12 Months Rate to SSC: Market Rate MUST BE PAYE THROUGH UMBRELLA Role Description: The Cyber Defence Analyst will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and dashboards to give visibility of the Enterprise infrastructure. Use of the SOAR platform to assist with playbook automation and case management capabilities to streamline team processes and tools. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system security according to latest threat intelligence and evolving trends. Participate in root cause analysis of incidents in conjunction with engineers across the enterprise. Provide Subject Matter Expertise (SME) on a broad range of information security standards and best practices. Offer strategic and tactical security guidance including valuation requirement of technical controls. Be part of the CRM process Liaise with the SOC engineers to maintain up-to-date dashboards of security alerts, to allow the organisation to better respond to an incident. Document, validate and create operational processes and procedures to help develop the SOC. Assist in identifying, prioritising, and coordinating the protection of critical cyber defence infrastructure and key resources. Build, install, configure, and test dedicated cyber defence hardware. Support Junior Analysts to manage SOC systems. Previous experience of Enterprise ICS/network architectures and technologies Experience and knowledge of SIEM solutions; having the ability to identify use cases and their creation, their deployment and tuning. Experience as a mentor/coach to Junior Analysts Your profile Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Skilled in using virtualisation software. Knowledge of key security frameworks (eg ISO, NIST 800-53, 800-171, 800-172, C2M2) Excellent communication skills Experience of writing Defence/Government documentation Desirable Qualifications: Broad Spectrum Cyber Course (SANS SEC401 or SEC501 or equivalent) SIEM Design, Architecture and Analyst Course (SANS SEC455 or SEC555 or equivalent) Advanced Analyst Course (SANS SEC503 or equivalent)
Cyber Defence Engineer Location: Full Time onsite in Hereford Duration: 6 months MUST BE PAYE THROUGH UMBRELLA We are heading up a recruitment drive on behalf of a leading IT consultancy that require a DV cleared Cyber Defence Engineer to join their team on a major defence project that is based in Hereford. Role Description: Role Description: Cyber Defence Engineer will join a growing security team responsible for the testing, implementation, deployment, maintenance, configuration and troubleshooting of the SOC's technology stack (hardware and software). The engineer will also assist with the continued development and maintenance of data pipelines and signature updates and the professional development of the system engineering team. Tasks: Perform system administration on specific cyber defence applications and systems to include installation, configuration, maintenance, troubleshooting, backup and restoration. Manage system/server resources including performance, capacity, availability, serviceability, and recoverability. Diagnose and resolve customer reported system incidents, problems, and events to ensure continuing operability. Coordinate with SOC and CTI Analysts to assist in the development of signatures which can be implemented on cyber defence network tools in response to new or observed threats within the network environment or enclave. Manage the compilation, cataloguing, distribution, and retrieval of data from a range of enterprise networks and data sources. Implement data management standards, requirements, and specifications. Develop data standards, policies, and procedures. Analyse data sources to provide actionable recommendations and facilitate data-gathering methods. To share knowledge, skills and experience, create and improve documentation, and train new members of the data engineering team. Knowledge: Knowledge of big data technologies and ecosystems (eg, NiFi). Knowledge of current market and emerging leaders in data analytical and SIEM platforms. Knowledge of network security implementations (eg, host-based IDS, IPS), including their function and placement in a network. Knowledge of intrusion detection systems and signature development. Knowledge of Front End collection systems, including network traffic collection, filtering, and selection. Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. Knowledge of cyber defence and information security policies, procedures and regulations. Knowledge of network security architecture concepts including topology, protocols, components and principles. Skills/Experience: Previous experience of Enterprise ICS/network architectures and technologies. Working with frameworks and technologies that support data-intensive distributed applications. Experience maintaining and administrating data analytical and SIEM platforms. Experience using host and network-based IDS/IPS Experience using packet capture solutions. Skill in developing and deploying signatures. Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Ability to provide technical and service leadership to junior SOC Engineers (mentor/coach). Desirable Qualifications/Certifications Red Hat System Administration I & II (RH124/RH134). Baseline Cyber Courses eg Cyber Foundation Pathway, SANS SEC 301 Intro to Information Security, SANS 401 Security Essentials Bootcamp. Certified engineer in a market leading data analysis/SIEM platform. SANS SEC501 Advanced Security Essentials Enterprise Defender. SANS SEC 511 Continuous Monitoring & Security Operations. SANS SEC555: SIEM with Tactical Analytics
15/04/2024
Project-based
Cyber Defence Engineer Location: Full Time onsite in Hereford Duration: 6 months MUST BE PAYE THROUGH UMBRELLA We are heading up a recruitment drive on behalf of a leading IT consultancy that require a DV cleared Cyber Defence Engineer to join their team on a major defence project that is based in Hereford. Role Description: Role Description: Cyber Defence Engineer will join a growing security team responsible for the testing, implementation, deployment, maintenance, configuration and troubleshooting of the SOC's technology stack (hardware and software). The engineer will also assist with the continued development and maintenance of data pipelines and signature updates and the professional development of the system engineering team. Tasks: Perform system administration on specific cyber defence applications and systems to include installation, configuration, maintenance, troubleshooting, backup and restoration. Manage system/server resources including performance, capacity, availability, serviceability, and recoverability. Diagnose and resolve customer reported system incidents, problems, and events to ensure continuing operability. Coordinate with SOC and CTI Analysts to assist in the development of signatures which can be implemented on cyber defence network tools in response to new or observed threats within the network environment or enclave. Manage the compilation, cataloguing, distribution, and retrieval of data from a range of enterprise networks and data sources. Implement data management standards, requirements, and specifications. Develop data standards, policies, and procedures. Analyse data sources to provide actionable recommendations and facilitate data-gathering methods. To share knowledge, skills and experience, create and improve documentation, and train new members of the data engineering team. Knowledge: Knowledge of big data technologies and ecosystems (eg, NiFi). Knowledge of current market and emerging leaders in data analytical and SIEM platforms. Knowledge of network security implementations (eg, host-based IDS, IPS), including their function and placement in a network. Knowledge of intrusion detection systems and signature development. Knowledge of Front End collection systems, including network traffic collection, filtering, and selection. Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. Knowledge of cyber defence and information security policies, procedures and regulations. Knowledge of network security architecture concepts including topology, protocols, components and principles. Skills/Experience: Previous experience of Enterprise ICS/network architectures and technologies. Working with frameworks and technologies that support data-intensive distributed applications. Experience maintaining and administrating data analytical and SIEM platforms. Experience using host and network-based IDS/IPS Experience using packet capture solutions. Skill in developing and deploying signatures. Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Ability to provide technical and service leadership to junior SOC Engineers (mentor/coach). Desirable Qualifications/Certifications Red Hat System Administration I & II (RH124/RH134). Baseline Cyber Courses eg Cyber Foundation Pathway, SANS SEC 301 Intro to Information Security, SANS 401 Security Essentials Bootcamp. Certified engineer in a market leading data analysis/SIEM platform. SANS SEC501 Advanced Security Essentials Enterprise Defender. SANS SEC 511 Continuous Monitoring & Security Operations. SANS SEC555: SIEM with Tactical Analytics
Role: SNOC Analyst Salary: Up to £35,000 dependent on experience + benefits package Location: Onsite in London Candidates will be sponsored through SC and DV clearance for this role We are looking for a SNOC Analyst to join an established team triaging security related events and incidents. You will be joining a small team where there is opportunity for career development and progression. Skills required; + Security Information and Event Management (SIEM) tooling + Experience in a SOC environment + Basic understanding of networks and cyber security + Bonus skillsets: Juniper, general infrastructure skills ie virtualisations, windows Servers, SQL, Sharepoint If you are interested in discussing this SNOC Analyst role further, please apply or send a copy of your updated CV to (see below) CBSbutler is acting as an employment agency for this role.
15/04/2024
Full time
Role: SNOC Analyst Salary: Up to £35,000 dependent on experience + benefits package Location: Onsite in London Candidates will be sponsored through SC and DV clearance for this role We are looking for a SNOC Analyst to join an established team triaging security related events and incidents. You will be joining a small team where there is opportunity for career development and progression. Skills required; + Security Information and Event Management (SIEM) tooling + Experience in a SOC environment + Basic understanding of networks and cyber security + Bonus skillsets: Juniper, general infrastructure skills ie virtualisations, windows Servers, SQL, Sharepoint If you are interested in discussing this SNOC Analyst role further, please apply or send a copy of your updated CV to (see below) CBSbutler is acting as an employment agency for this role.
Security Engineer - SOAR One of our Global consultancy clients is looking for an experienced Security Engineer for one of its leading multinational Travel clients. This is an exciting contract opportunity which is initially until 31/12/24 with potential to extend. This role is hybrid with 3 days per week (may be flexible further down the line) being based out of the clients office in Villeneuve Loubet - 15 mins from Nice Airport. The end client works at the heart of the global travel industry and provides the technology which keeps the travel sector moving - from initial search to making a booking, from pricing to ticketing, from managing reservations to managing check-in and departure processes. Their products and solutions help to improve the business performance of their customers; travel agencies, corporations, airlines, ground handlers, hotels, railways, car rental companies, airports, cruise lines and ferry operators. Responsibilities: We are seeking a Security Orchestration and Automated Response (SOAR) engineer responsible for maintaining our SOAR solution, developing playbooks and implementing integrations within the SOC Platform Engineering team. The SOAR engineer will collaborate closely with cross-functional teams, leveraging various technologies to implement security automation and supporting our Incident Response Team in improving analyst productivity against cyber threats. Key Responsibilities: Maintain our SOAR platform at its optimum level, Update and enhance existing playbooks to adapt to organizational needs, Develop new playbooks to address specific security requirements, Collaborate with stakeholders to identify use cases, Develop and maintain automation scripts (Python), Support security analysts in automating incident response activities, Document processes and workflows for internal sharing, Participate in technical study. Requirements: 2 or more years of experience in developing playbooks and implementing integrations. Experience with SIEM or Cloud Infrastructure, such as Splunk or Microsoft Azure. Ideally a degree in IT or Computer Science Python Skill Level - Advanced Fluent in French and English
15/04/2024
Project-based
Security Engineer - SOAR One of our Global consultancy clients is looking for an experienced Security Engineer for one of its leading multinational Travel clients. This is an exciting contract opportunity which is initially until 31/12/24 with potential to extend. This role is hybrid with 3 days per week (may be flexible further down the line) being based out of the clients office in Villeneuve Loubet - 15 mins from Nice Airport. The end client works at the heart of the global travel industry and provides the technology which keeps the travel sector moving - from initial search to making a booking, from pricing to ticketing, from managing reservations to managing check-in and departure processes. Their products and solutions help to improve the business performance of their customers; travel agencies, corporations, airlines, ground handlers, hotels, railways, car rental companies, airports, cruise lines and ferry operators. Responsibilities: We are seeking a Security Orchestration and Automated Response (SOAR) engineer responsible for maintaining our SOAR solution, developing playbooks and implementing integrations within the SOC Platform Engineering team. The SOAR engineer will collaborate closely with cross-functional teams, leveraging various technologies to implement security automation and supporting our Incident Response Team in improving analyst productivity against cyber threats. Key Responsibilities: Maintain our SOAR platform at its optimum level, Update and enhance existing playbooks to adapt to organizational needs, Develop new playbooks to address specific security requirements, Collaborate with stakeholders to identify use cases, Develop and maintain automation scripts (Python), Support security analysts in automating incident response activities, Document processes and workflows for internal sharing, Participate in technical study. Requirements: 2 or more years of experience in developing playbooks and implementing integrations. Experience with SIEM or Cloud Infrastructure, such as Splunk or Microsoft Azure. Ideally a degree in IT or Computer Science Python Skill Level - Advanced Fluent in French and English
Junior SOC Analyst - Hybrid - 3 days on site - Nottinghamshire Main Responsibilities: - Triage, analyse and investigate alerts, log data and network traffic using security tools to identify cyber-attacks/security incidents. This includes the investigation and root cause analysis of potential security incidents. - Proactively investigate potential security breaches by utilising threat intelligence and internal and external security systems and provide subject matter expertise for technical responses to confirmed cyber security incidents. - Create and maintain the clients target cyber security architecture. - Deliver subject matter expertise to key stakeholders to drive the implementation of security controls to meet the target architecture. - Accountable for vulnerability scanning, including the prioritisation of unpatched vulnerabilities and reporting against agreed KPIs and KRIs. - Support the annual penetration testing schedule by arranging penetration testing, including tracking, and communicating penetration testing results. - Perform supplementary testing of clients detection and response controls by procuring, installing, and running penetration testing tooling. - Participate in process improvement work to automate and improve critical cyber security processes such as monitoring, patching, and hardening. - Develop and maintain process documentation for security architecture, vulnerability management, cyber incident response, and playbooks. - Provide security representation across multiple geographies, business units and teams to achieve objectives, including engagement with the Information Security Enhancement Office. Skills, Knowledge and Experience - Has obtained one or more of the following qualifications: CEH, CRTSA, and OSCP. - Qualifications such as CISSP and CISM would be advantageous. - Problem solving skills, and the ability to come up with new solutions to existing challenges. - Strengths in key 'soft skill' areas such as relationship management, communication, and presentation of technical security information to a variety of audiences. - Technical skills to investigate potential breaches through existing tools, packet capture and log file analysis. - A logical mindset, the ability to identify proportionate, appropriate mitigations to identified security incidents, and to prioritise incidents based on risk. - Capable of working independently/without ongoing supervision on projects and day to day tasks. Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants who are considered suitable for interview will be contacted. Proactive Appointments Limited operates as an employment agency and employment business and is an equal opportunities organisation We take our obligations to protect your personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on our website
12/04/2024
Full time
Junior SOC Analyst - Hybrid - 3 days on site - Nottinghamshire Main Responsibilities: - Triage, analyse and investigate alerts, log data and network traffic using security tools to identify cyber-attacks/security incidents. This includes the investigation and root cause analysis of potential security incidents. - Proactively investigate potential security breaches by utilising threat intelligence and internal and external security systems and provide subject matter expertise for technical responses to confirmed cyber security incidents. - Create and maintain the clients target cyber security architecture. - Deliver subject matter expertise to key stakeholders to drive the implementation of security controls to meet the target architecture. - Accountable for vulnerability scanning, including the prioritisation of unpatched vulnerabilities and reporting against agreed KPIs and KRIs. - Support the annual penetration testing schedule by arranging penetration testing, including tracking, and communicating penetration testing results. - Perform supplementary testing of clients detection and response controls by procuring, installing, and running penetration testing tooling. - Participate in process improvement work to automate and improve critical cyber security processes such as monitoring, patching, and hardening. - Develop and maintain process documentation for security architecture, vulnerability management, cyber incident response, and playbooks. - Provide security representation across multiple geographies, business units and teams to achieve objectives, including engagement with the Information Security Enhancement Office. Skills, Knowledge and Experience - Has obtained one or more of the following qualifications: CEH, CRTSA, and OSCP. - Qualifications such as CISSP and CISM would be advantageous. - Problem solving skills, and the ability to come up with new solutions to existing challenges. - Strengths in key 'soft skill' areas such as relationship management, communication, and presentation of technical security information to a variety of audiences. - Technical skills to investigate potential breaches through existing tools, packet capture and log file analysis. - A logical mindset, the ability to identify proportionate, appropriate mitigations to identified security incidents, and to prioritise incidents based on risk. - Capable of working independently/without ongoing supervision on projects and day to day tasks. Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants who are considered suitable for interview will be contacted. Proactive Appointments Limited operates as an employment agency and employment business and is an equal opportunities organisation We take our obligations to protect your personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on our website