London Jobs |
Manchester Jobs |
Liverpool Jobs |
Nottingham Jobs |
Birmingham Jobs |
Cambridge Jobs |
Glasgow Jobs |
Bristol Jobs |
Wales Jobs |
London Jobs |
Manchester Jobs |
Liverpool Jobs |
Nottingham Jobs |
Birmingham Jobs |
Cambridge Jobs |
Glasgow Jobs |
Bristol Jobs |
Wales Jobs |
Oil & Gas Jobs |
Banking Jobs |
Construction Jobs |
Top Management Jobs |
IT - Software Jobs |
Medical Healthcare Jobs |
Purchase / Logistics Jobs |
Sales |
Ajax Jobs |
Designing Jobs |
ASP .NET Jobs |
Java Jobs |
MySQL Jobs |
Sap hr Jobs |
Software Testing Jobs |
Html Jobs |
Job Location | Rochester |
Education | Not Mentioned |
Salary | £50,000 - £55,000 per annum |
Industry | Not Mentioned |
Functional Area | Not Mentioned |
Job Type | Permanent, full-time |
Cyber Security Analyst - Fin-Tech This opportunity will be 100% remote interview process with scope to start 100% remotely due to the current COVID 19 situation utilising Microsoft Teams. Opportunity: A leading FTSE250 financial organisation are currently hiring a Cyber Analyst who has strong capabilities analysing and preventing a range of criminal / malicious threats both internal and external across IT Infrastructure, Data and Business Systems. The chosen Cyber Analyst will be responsible for providing second - level monitoring and analysis of cyber events of interest in accordance with the Groups Cyber Response Plans and Playbooks. This a permanent career opportunity paying a basic salary between £50,000 - £55,000 with flexible / WFH opportunities. To be considered for this role you must be able to demonstrate strong experience leading cyber incident responses, conducting investigations and help our client with day to cyber security threats utilising the SIEM approach. Core role responsibilities:• Provide accurate and priority driven analysis on cyber activity and threats• Define and coordinate cyber incident response testing to assess capabilities and breach preparedness • Coordinate with IT to conduct investigations of cyber incidents or other security incidents utilising various tools and sources to reverse engineer malware and identify attack vectors to provide an accurate account• Apply IT Forensics methodologies and practices to preserve digital evidence for criminal investigations• Perform threat hunting within the corporate IT environments to detect historic or active malicious/unauthorised activity• Act as a trusted advisor to identify enhancements or new capabilities and technologies for identification, prevention, detection and recovery of cyber indents. • Perform regular operational health checks and monitor availability of cyber services and technologies to ensure effectiveness • Treat all instances of potential malware attachments, phishing e-mails and similar attempts to bypass perimeter or internal controls• Develop innovative monitoring and detection solutions using tools and advanced scripting• Maintain incident logs and tickets with timely status updates• Publish official reports and Exec summaries for all major cyber incidents• Identify and create appropriate controls within the SIEM and other security solution to prevent and detect security incidents.Experience Requirements• 7 years of Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Centre (CSIRC) or a Security Operations Centre (SOC) experience is essential• 5 years of experience with scripting in Perl/Python/Ruby/PowerShell is essential• Experience of SIEM• 4 years of experience with both desktop-based and server-based IT Forensics is essential• Strong understanding of TCP/IP Networking, Cloud services, Web Services, Databases, Windows Servers, virtualised platforms is essential• Basic experience with Metasploit framework is essential• GIAC Certifications ( GCIH , GCFE , GCFA , GREM , GICSP )Salary & Benefits: