SECURITY INCIDENT / IR / APT / Malware / Cyber Consultant - London, to £80k plus package. Really great role.
Cyber security, Infosec, IR, Incident response, post-incident, investigation, situation management, escalation, wireshark, malware, technical lead,
I'm a dedicated security specialist recruiter, looking to make contact with a highly skilled lead IR / Cyber / Malware Consultant. You may have some experience in APT / intrusion analyst / malware / SOC security and feel ready to step up for a very interesting role. It's a very client / dynamic, interactive role, with some technical ownership and growth of a great service line.
The role is very dynamic, and will need you to have pretty strong experience in deep understanding of network intrusion, threats, and associated toolsets, client needs and steps to follow, and being able to advise and help the client through a clean up and creating plans to avoid such issues in the fiture .
You'll need very strong network protocol knowledge, and experience with some common tools, like Wireshark, TCP Dump, Snort etc. Some background in programming would also be very useful, and some knowledge of SQL, although you might not need these skills daily.
This role would REALLY suit someone from a similar role in government or private enterprise, with experience in some parts of the role (if you are very network / host analysis-able, or malware heavy, we'd like to hear from you!
Please apply in confidence to an experienced, mature recruitmet consultant with 14 years in the industry. I won't waste your time, and i love to hear from other UK based security people, through my linkedIn account. Tariq Dirania.
Regards and happy job hunting! :-)
Circle Recruitment is acting as an Employment Agency in relation to this vacancy. Earn yourself a referral bonus if you refer somebody else who fills the role! We also offer an iPad if you refer a new client to us and we recruit for them. Follow us on Facebook - Circle Recruitment , Twitter - @Circle_Rec and LinkedIn - Circle Recruitment.
- Incident Response
- Network Protocols
- intrusion attempt
- attack vectors
- TCP Dump
- Reverse engineering