CYBER DEFENCE ANALYST (DV Clearance required)

West Midlands  ‐ Onsite
This project has been archived and is not accepting more applications.
Browse open projects on our job board.

Keywords

Safety Principles Computer Security Vulnerability Management Research Alarm Devices Business Requirements Design Specifications Intrusion Detection and Prevention Maintenance Microsoft Servers Risk Analysis Security Analysis Security Studies Stakeholder Management Technology Architecture Security Systems Carry Out Assessments Tooling Assembly and Dismantling Vulnerability Analysis

Description

CYBER DEFENCE ANALYST (DV Clearance required)
12 month Contract Inside IR35
Hybrid working - West Midlands
DV Clearance is required
Contract start date: 5th October
Work with colleagues outside the SOC to provide feedback to assist with the maintenance and tuning of the security tooling and to provide support for reporting to the customer.
Gain experience in the range of security issues and attacks faced by global organisations as well as the use of leading security tools across a large estate.
Be provided with training both via internal training and external training and certification.
Support and deputise for the Head of IT Security Operations for day-to-day management of security tasks. Provide security training and advice to team members.
Identify, prioritise, and manage Security Incidents, bringing incidents to successful conclusions with thorough remediation plans. Prioritising and differentiating between potential intrusion activity and false alarms, conducting incident and investigation post-mortem briefings, analysis, and reporting.
Understand the Vulnerability Management end-to-end process and reporting, with working experience of Vulnerability Management tools. Notify requirements to address security deficiencies and conduct security analysis and risk assessment. Assess current technology architecture for weaknesses and for possible upgrades or improvements.
Arrange and conduct Security Assurance Reviews and Assessments, work with third-party peer testers, and produce Assessment Reports to present findings to stakeholders.
Work closely together with technical architects to produce design specifications according to information security policies, while fulfilling business needs.

Your skills and experience
In order to thrive in this role, the ideal candidate must have experience in security threats, compromise methods, Microsoft server and client technologies. A working knowledge of common network technologies and defensive security tools is also a must.

Though not detrimental, it would prove to be beneficial if candidates were to possess a practical knowledge of defensive security tools such as:
Intrusion Detection/Protection systems.
Endpoint security solutions.
Vulnerability scanning tools.

Start date
ASAP
Duration
12 months
From
Brookwood
Published at
09.08.2024
Project ID:
2783758
Contract type
Freelance
To apply to this project you must log in.
Register