Prev vacancy

Digital Security Specialist SC Clearance

Next vacancy
  • Remote working
  • to £650 per day (Within IR35)
  • Contract , 9 months
  • Full time

Contract Length: 31-03-23  

Location: remote  

IR35: Inside  

Pay Rate to Candidate: £550 – £650 MAX  

Minimum Requirement: Essential  

Information Security Management  

Highly developed specialist knowledge of the processes, tools and techniques of information security management, ability to deploy and monitor information security systems, as well as detect, resolve and prevent violations of IT security, to protect organizational data.  

 

Information Security Technologies  

In-depth knowledge of technologies and technology-based solutions dealing with information security issues; ability to apply these in protecting information security across the organization.  

 

Information Security Operation Centre (ISOC)  

In-depth knowledge of modules, processes and technologies of Information Security Operation Centre (ISOC); ability to detect, response and utilize related platform and applications to perform cyber security initiatives.  

 

Security Information and Event Management (SIEM)  

Extensive knowledge of concept, procedures and processes of Security Information and Event Management (SIEM); ability to utilize related applications to protect organizational networks from cyber risks.  

Intrusion Detection and Prevention  

Demonstrable knowledge of tools, techniques and processes of intrusion detection and prevention; ability to detect, resolve and prevent intrusion behaviours to protect organizational networks.  

 

In addition, we expect the Post Holder to specialise in one of the following areas:  

Cyber Security - Use Case Factory  

Application Security  

Proven knowledge of the tools and processes for maintaining application security; ability to design and implement security programs to prevent data loss and access intrusion from web and mobile applications.  

 

Information Security Architecture  

Working knowledge of the tools and techniques used for creating software, hardware, networking and application infrastructure; ability to meet information security objectives while using these.  

 

Mobile Security  

Demonstrable knowledge of the threats, measures and practices of mobile security; ability to reduce mobile risks and protect personal and organizational data and information.  

 

Innovation  

Proven understanding of the value of innovation and ability to develop new ideas and initiatives that improve the performance of the organization. Cyber Security – Engineer  

Application Security  

Demonstrable knowledge of the tools and processes for maintaining application security; ability to design and implement security programs to prevent data loss and access intrusion from web and mobile applications.  

 

Information Security Architecture  

Proven knowledge of the tools and techniques used for creating software, hardware, networking and application infrastructure; ability to meet information security objectives while using these.  

 

System Testing Tools  

Demonstrable knowledge of and ability to use a variety of tools and techniques for conducting, automating, simplifying and enhancing system testing.  

 

Systems Programming  

Extensive knowledge of and ability to design, develop and implement operating systems architecture and components.  

 

Mobile Security  

Working knowledge of the threats, measures and practices of mobile security; ability to reduce mobile risks and protect personal and organizational data and information.  

 

Innovation  

Proven understanding of the value of innovation and ability to develop new ideas and initiatives that improve the performance of the organization. Cyber Security – Engineer  

Application Security  

Demonstrable knowledge of the tools and processes for maintaining application security; ability to design and implement security programs to prevent data loss and access intrusion from web and mobile applications.  

 

Information Security Architecture  

Proven knowledge of the tools and techniques used for creating software, hardware, networking and application infrastructure; ability to meet information security objectives while using these.  

 

System Testing Tools  

Demonstrable knowledge of and ability to use a variety of tools and techniques for conducting, automating, simplifying and enhancing system testing.  

 

Systems Programming  

Extensive knowledge of and ability to design, develop and implement operating systems architecture and components.  

 

Mobile Security  

Working knowledge of the threats, measures and practices of mobile security; ability to reduce mobile risks and protect personal and organizational data and information.  

 

Innovation  

Demonstrable understanding of the value of innovation and ability to develop new ideas and initiatives that improve the performance of the organization.  

 

Cyber Security Principal Analyst CSIRT  

Digital Forensic Tools  

Expert knowledge of and ability to utilize a variety of specific tools for collecting, analysing, and presenting digital-related evidence.  

 

Computer Forensics  

In-depth knowledge of technologies, methods and tools of forensics investigations for IT security violations or potential threats; ability to identify, uncover and evaluate violations, warning reports, suspected incidents and insidious events.  

 

Information Security Audits  

Working knowledge of and the ability to utilize tools and techniques for assessing the effectiveness of information security measures, identifying potential risk exposures, and protecting the availability, confidentiality and audit trails of information from destruction or manipulation.  

 

Information Security Administration  

Proven knowledge of and ability to develop and implement policies, standards and procedures to ensure the integrity and safety of information.  

 

Digital Threat Management  

Extensive knowledge of techniques, approaches and processes of digital threats; ability to detect, monitor, analyse and prevent digital threats.  

 

Endpoint Security  

Working knowledge of concepts, issues and techniques of endpoint security; ability to ensure security compliance of endpoint devices in various circumstances.  

 

IT Incident Management  

Highly developed specialist knowledge of and ability to investigate, troubleshoot, resolve and prevent the recurrence of incidents that interfere with the normal delivery of IT services.  

 

Information Security Law  

Demonstrable knowledge of domestic and international laws governing information security; ability to interpret and take action on the aspects of information security laws that impact the business.  

 

Risk Management  

Working knowledge of processes, tools and techniques for assessing and controlling an organization's exposure to risks of various kinds; ability to apply this knowledge appropriately to diverse situations.  

 

Cyber Security Principal Analyst Ops  

Information Technology Security Policies  

Proven knowledge of IT security policies, standards, and procedures; ability to utilize a variety of administrative skill sets and technical knowledge to ensure cyber security compliance.  

 

Digital Forensic Tools  

Expert knowledge of and ability to utilize a variety of specific tools for collecting, analysing, and presenting digital-related evidence.  

 

Information Security Audits  

Working knowledge of and the ability to utilize tools and techniques for assessing the effectiveness of information security measures, identifying potential risk exposures, and protecting the availability, confidentiality and audit trails of information from destruction or manipulation.  

 

Information Security Administration  

Proven knowledge of and ability to develop and implement policies, standards and procedures to ensure the integrity and safety of information.  

 

Digital Threat Management  

Extensive knowledge of techniques, approaches and processes of digital threats; ability to detect, monitor, analyse and prevent digital threats.  

 

Endpoint Security  

Working knowledge of concepts, issues and techniques of endpoint security; ability to ensure security compliance of endpoint devices in various circumstances.  

 

IT Incident Management  

Highly developed specialist knowledge of and ability to investigate, troubleshoot, resolve and prevent the recurrence of incidents that interfere with the normal delivery of IT services.  

 

Information Security Law  

Demonstrable knowledge of domestic and international laws governing information security; ability to interpret and take action on the aspects of information security laws that impact the business.  

 

Risk Management  

Working knowledge of processes, tools and techniques for assessing and controlling an organization's exposure to risks of various kinds; ability to apply this knowledge appropriately to diverse situations.  

 

Cyber Security Principal Analyst Ops  

Information Technology Security Policies  

Proven knowledge of IT security policies, standards, and procedures; ability to utilize a variety of administrative skill sets and technical knowledge to ensure cyber security compliance.  

 

Digital Forensic Tools  

Expert knowledge of and ability to utilize a variety of specific tools for collecting, analysing, and presenting digital-related evidence.  

 

Information Security Audits  

Working knowledge of and the ability to utilize tools and techniques for assessing the effectiveness of information security measures, identifying potential risk exposures, and protecting the availability, confidentiality and audit trails of information from destruction or manipulation.  

 

Information Assurance  

Proven knowledge of and the ability to protect information and information systems while ensuring their confidentiality, integrity and availability.  

 

Digital Threat Management  

Extensive knowledge of techniques, approaches and processes of digital threats; ability to detect, monitor, analyse and prevent digital threats.  

 

Data Privacy  

Working knowledge of and ability to protect an organization's data to ensure privacy during the process of storage and communication.  

 

Big Data Computing  

Proven knowledge of and experience with capturing, manipulating, sharing and interpreting large amounts of data from multiple and diverse sources.  

 

Innovation  

Demonstrable understanding of the value of innovation and ability to develop new ideas and initiatives that improve the performance of the organization.  

 

 

Qualifications  

Essential  

• Masters level degree or equivalent level of experience.  

In addition, we expect the Post Holder to specialise in one of the following areas:  

Cyber Security - Use Case Factory  

• Splunk ES Certified Administrators  

• SANS SEC487  

• SANS SEC504  

• SANS SEC511  

• SANS FOR578  

Cyber Security Principal Analyst CSIRT  

• CREST  

• SANS GIAC  

• SANS GCIH  

• CeH  

• SANS SEC504  

• SANS FOR500  

• SANS FOR508  

• SANS FOR572  

• GIAC GREM  

• GIAC GCED  

 

 

 

Security Clearance: SC Clearance

Skills


• Some of the keywords we are after: Kusto Query Language
• Microsoft Defender for Endpoint
• Sentinel
• Azure
• Azure Sentinel
• Splunk Query Language
• Splunk
• SPL and detection engineering. With recent proven experience in that field and if possible evident qualifications.
  • Contact: Varunav Modi
    020 7531 5757 (Offline)
  • Date: 17.06.2022
  • Deadline: 01.07.2022
  • Quote ref: 990045/57651

Similar jobs

Technical Project Assurance Officer
Corsham, UK
to £450 per day, Contract

Technical Project Assurance Officer

Location: Flexible working. Must be able to spend 2 days a week (or 2 days a fortnight if live bit further away) in...
ERP Technical Risk and Controls Analyst
London, UK
to £600 per day, Contract

ERP Technical Risk and Controls Analyst

The FCDO are launching their new Cloud based Enterprise Resource Planning system Hera. This is a flagship programme...
This website uses cookies to enhance your user experience. By continuing to use this site, you consent to our use of these cookies. See our Cookie Policy.