at least one year in a hands-on capacity *Strong understanding of cybersecurity principles and technologies. *Hands-on experience with security tools such as antivirus, content filtering, firewalls, and intrusiondetection systems. *Proficiency in Microsoft Azure and associated cloud security services. *Familiarity with Windows and Linux operating systems. *Experience with log management and security monitoring platforms. *Critical thinking … related subject. *Professional certifications such as CISSP, CompTIA Security+, or equivalent. *Experience with governance frameworks and risk management tools. Key Responsibilities *Operate and maintain security systems including firewalls, antivirus, intrusiondetection/prevention, and authentication platforms. *Monitor system logs and network traffic to identify suspicious activity and potential threats. *Respond to security incidents and support forensic investigations. *Develop … Adecco is acting as an Employment Agency. We are proud to be an equal opportunities employer. Keywords IT Security Specialist, Cybersecurity Analyst, SOC Analyst, Azure Security, Information Security, Firewalls, IntrusionDetection, Antivirus, ITIL, CISSP, Security Compliance, Vulnerability Management, Risk Register, Public Sector IT, Hybrid Role, Manchester Jobs, Security Awareness Training More ❯
across the lifecycle of integrated security systems. This includes oversight of Genetec, Lenel, and other VMS platforms, as well as POS integration, video analytics, facial recognition software, access control, intrusiondetection, and CCTV surveillance technologies. The SDM will work closely with internal functions (Service Desk, NOC, PMO, Engineering and Field Teams) to deliver consistent, high-quality outcomes. They … and Safety Systems Strong technical awareness of Genetec, Lenel, and other VMS platforms , as well as POS integrations, video analytics, and facial recognition software Knowledge of access control, CCTV, intrusiondetection, and integrated security platforms Experience developing t raining programmes and technical documentation , and delivering training to customer teams Strong service management and planning skills , with the ability More ❯
guidance on information security matters to various stakeholders across the organization. 2. Security Operations & Incident Response: Oversee the day-to-day operation of security systems and tools, including firewalls, intrusiondetection/prevention systems (IDS/IPS), antivirus, anti-malware, SIEM (Security Information and Event Management), vulnerability scanners, and data encryption solutions. Manage vulnerability management programs, including regular … scanning, penetration testing, and remediation of identified weaknesses. Lead and manage security incident response, including detection, analysis, containment, eradication, recovery, and post-incident review. Develop and maintain robust disaster recovery and business continuity plans related to information security. Monitor security alerts, logs, and reports for suspicious activity and potential threats. 3. Compliance & Audit: Ensure the organization's adherence to … information security principles, frameworks (e.g., ISO 27001, NIST, Cyber Essentials), and best practices. Hands-on experience with security technologies such as firewalls, SIEM, IDS/IPS, vulnerability scanners, endpoint detection and response (EDR), and identity management solutions. Experience with cloud security (e.g., Azure Security). Proven experience in managing security incidents and conducting incident response. Familiarity with data privacy More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
a wide variety of stakeholders to ensure, the Leidos CSOC, a Defensive Cyber Security capability, can support a customers Cyber Resilience, protecting them with a 24 x 7 Threat Detection and Response service, mitigating their risk of Cyber Attack. The successful candidate will be able to demonstrate experience from a CSOC background or be able to demonstrate sufficient transferable … within the environments. Respond to and correlate alerts from various detective and preventative Cyber Security tools such as Security Information Event Monitoring (SIEM), End Point Protection (EPP), End Point Detection and Response (EDR), XDR (Extended DR), Web Application Firewall (WAF), and Firewalls. Proactively detect suspicious activity, vulnerabilities, and security misconfigurations before they can be exploited by adversaries impacting Confidentiality … On-Premises solutions including but not limited to Firewalls, Network Access Control Lists, Network Security Groups, DDoS Protection, VPNs, Mail Gateways, Web Proxies, Load Balancers including Web Application Firewalls, Intrusion Prevention System, and IntrusionDetection Systems. Communication and Soft Skills Good verbal and written communication skills required for hand overs, reports, and documenting events during a Cyber More ❯
is key to detecting, preventing, and responding to cybersecurity threats in a proactive and efficient manner. Key Responsibilities: Security Architecture & Implementation Design, deploy, and manage security solutions including firewalls, intrusiondetection/prevention systems, endpoint protection, SIEM, and identity management platforms. Implement secure network architecture and enforce segmentation and least-privilege access controls. Support secure cloud environments across … Azure, AWS, or GCP (e.g., IAM, security groups, encryption, KMS). Threat Detection & Incident Response Monitor and analyze security alerts and network traffic for threats or suspicious activity. Lead or support incident response activities: investigation, containment, eradication, recovery, and reporting. Conduct root cause analysis and implement security hardening improvements. Vulnerability & Risk Management Run regular vulnerability scans and penetration testing More ❯
is key to detecting, preventing, and responding to cybersecurity threats in a proactive and efficient manner. Key Responsibilities: Security Architecture & Implementation Design, deploy, and manage security solutions including firewalls, intrusiondetection/prevention systems, endpoint protection, SIEM, and identity management platforms. Implement secure network architecture and enforce segmentation and least-privilege access controls. Support secure cloud environments across … Azure, AWS, or GCP (e.g., IAM, security groups, encryption, KMS). Threat Detection & Incident Response Monitor and analyze security alerts and network traffic for threats or suspicious activity. Lead or support incident response activities: investigation, containment, eradication, recovery, and reporting. Conduct root cause analysis and implement security hardening improvements. Vulnerability & Risk Management Run regular vulnerability scans and penetration testing More ❯
is key to detecting, preventing, and responding to cybersecurity threats in a proactive and efficient manner. Key Responsibilities: Security Architecture & Implementation Design, deploy, and manage security solutions including firewalls, intrusiondetection/prevention systems, endpoint protection, SIEM, and identity management platforms. Implement secure network architecture and enforce segmentation and least-privilege access controls. Support secure cloud environments across … Azure, AWS, or GCP (e.g., IAM, security groups, encryption, KMS). Threat Detection & Incident Response Monitor and analyze security alerts and network traffic for threats or suspicious activity. Lead or support incident response activities: investigation, containment, eradication, recovery, and reporting. Conduct root cause analysis and implement security hardening improvements. Vulnerability & Risk Management Run regular vulnerability scans and penetration testing More ❯
is key to detecting, preventing, and responding to cybersecurity threats in a proactive and efficient manner. Key Responsibilities: Security Architecture & Implementation Design, deploy, and manage security solutions including firewalls, intrusiondetection/prevention systems, endpoint protection, SIEM, and identity management platforms. Implement secure network architecture and enforce segmentation and least-privilege access controls. Support secure cloud environments across … Azure, AWS, or GCP (e.g., IAM, security groups, encryption, KMS). Threat Detection & Incident Response Monitor and analyze security alerts and network traffic for threats or suspicious activity. Lead or support incident response activities: investigation, containment, eradication, recovery, and reporting. Conduct root cause analysis and implement security hardening improvements. Vulnerability & Risk Management Run regular vulnerability scans and penetration testing More ❯
is key to detecting, preventing, and responding to cybersecurity threats in a proactive and efficient manner. Key Responsibilities: Security Architecture & Implementation Design, deploy, and manage security solutions including firewalls, intrusiondetection/prevention systems, endpoint protection, SIEM, and identity management platforms. Implement secure network architecture and enforce segmentation and least-privilege access controls. Support secure cloud environments across … Azure, AWS, or GCP (e.g., IAM, security groups, encryption, KMS). Threat Detection & Incident Response Monitor and analyze security alerts and network traffic for threats or suspicious activity. Lead or support incident response activities: investigation, containment, eradication, recovery, and reporting. Conduct root cause analysis and implement security hardening improvements. Vulnerability & Risk Management Run regular vulnerability scans and penetration testing More ❯
is key to detecting, preventing, and responding to cybersecurity threats in a proactive and efficient manner. Key Responsibilities: Security Architecture & Implementation Design, deploy, and manage security solutions including firewalls, intrusiondetection/prevention systems, endpoint protection, SIEM, and identity management platforms. Implement secure network architecture and enforce segmentation and least-privilege access controls. Support secure cloud environments across … Azure, AWS, or GCP (e.g., IAM, security groups, encryption, KMS). Threat Detection & Incident Response Monitor and analyze security alerts and network traffic for threats or suspicious activity. Lead or support incident response activities: investigation, containment, eradication, recovery, and reporting. Conduct root cause analysis and implement security hardening improvements. Vulnerability & Risk Management Run regular vulnerability scans and penetration testing More ❯
london (city of london), south east england, united kingdom
AGS
is key to detecting, preventing, and responding to cybersecurity threats in a proactive and efficient manner. Key Responsibilities: Security Architecture & Implementation Design, deploy, and manage security solutions including firewalls, intrusiondetection/prevention systems, endpoint protection, SIEM, and identity management platforms. Implement secure network architecture and enforce segmentation and least-privilege access controls. Support secure cloud environments across … Azure, AWS, or GCP (e.g., IAM, security groups, encryption, KMS). Threat Detection & Incident Response Monitor and analyze security alerts and network traffic for threats or suspicious activity. Lead or support incident response activities: investigation, containment, eradication, recovery, and reporting. Conduct root cause analysis and implement security hardening improvements. Vulnerability & Risk Management Run regular vulnerability scans and penetration testing More ❯
Banbury, Oxfordshire, United Kingdom Hybrid / WFH Options
Chiltern Railways
IT infrastructure, cloud services, and cyber security. Proven continuous development in both technical and soft domains. Proficiency with security tools and technologies such as SIEM, DLP, network protection, threat detection, and endpoint protection. An understanding of network infrastructure such as VPNs, firewalls, switches, routers, LANs, IntrusionDetection, and vulnerability scanning. Understanding of IT and cyber security frameworks More ❯
out cyber analysis . Working within the SOC, you will play a key role in helping to protect customer’s IT networks from cyber attack. Responsibilities : Monitor and analyse IntrusionDetection Systems (IDS), Anomaly Detection Systems (ADS), Firewall event logs, and Security Incident and Event Management (SIEM) toolset event logs to identify security attacks and threats for More ❯
leeds, west yorkshire, yorkshire and the humber, united kingdom
Talion Cyber Security
out cyber analysis . Working within the SOC, you will play a key role in helping to protect customer’s IT networks from cyber attack. Responsibilities : Monitor and analyse IntrusionDetection Systems (IDS), Anomaly Detection Systems (ADS), Firewall event logs, and Security Incident and Event Management (SIEM) toolset event logs to identify security attacks and threats for More ❯
to, and mitigating security threats across enterprise environment. Responsibilities will include: Monitor, analyze, and respond to security events and incidents using SIEM and other security tools. Develop and maintain detection rules, playbooks, and automation scripts to improve incident response efficiency. Perform threat hunting and forensic investigations across IT environment. Collaborate with infrastructure and application teams to ensure secure configurations … and compliance. Maintain and improve endpoint protection, intrusiondetection/prevention systems. Document incident response procedures and contribute to post-incident reviews. Create network diagrams and as-built documents. Develop and maintain a strong partnership with relevant global businesses and technical leaders and teams, including 3rd parties and affiliate businesses. Stay current with emerging threats, vulnerabilities, and security … Microsoft O365 products (Excel, PowerPoint, etc.). SEIM and SOAR technologies (Splunk, Cribl, Azure Sentinel). Configure and troubleshoot EDR/Microsoft Defender for Endpoint, vulnerability management, and threat detection systems, with focus on Linux OS. Azure Security Center and Office365 Compliance Portal. AWS and Azure (IAM, IaaS, PaaS). Knowledge in KQL queries in Sentinel and/or More ❯
to, and mitigating security threats across enterprise environment. Responsibilities will include: Monitor, analyze, and respond to security events and incidents using SIEM and other security tools. Develop and maintain detection rules, playbooks, and automation scripts to improve incident response efficiency. Perform threat hunting and forensic investigations across IT environment. Collaborate with infrastructure and application teams to ensure secure configurations … and compliance. Maintain and improve endpoint protection, intrusiondetection/prevention systems. Document incident response procedures and contribute to post-incident reviews. Create network diagrams and as-built documents. Develop and maintain a strong partnership with relevant global businesses and technical leaders and teams, including 3rd parties and affiliate businesses. Stay current with emerging threats, vulnerabilities, and security … Microsoft O365 products (Excel, PowerPoint, etc.). SEIM and SOAR technologies (Splunk, Cribl, Azure Sentinel). Configure and troubleshoot EDR/Microsoft Defender for Endpoint, vulnerability management, and threat detection systems, with focus on Linux OS. Azure Security Center and Office365 Compliance Portal. AWS and Azure (IAM, IaaS, PaaS). Knowledge in KQL queries in Sentinel and/or More ❯
to, and mitigating security threats across enterprise environment. Responsibilities will include: Monitor, analyze, and respond to security events and incidents using SIEM and other security tools. Develop and maintain detection rules, playbooks, and automation scripts to improve incident response efficiency. Perform threat hunting and forensic investigations across IT environment. Collaborate with infrastructure and application teams to ensure secure configurations … and compliance. Maintain and improve endpoint protection, intrusiondetection/prevention systems. Document incident response procedures and contribute to post-incident reviews. Create network diagrams and as-built documents. Develop and maintain a strong partnership with relevant global businesses and technical leaders and teams, including 3rd parties and affiliate businesses. Stay current with emerging threats, vulnerabilities, and security … Microsoft O365 products (Excel, PowerPoint, etc.). SEIM and SOAR technologies (Splunk, Cribl, Azure Sentinel). Configure and troubleshoot EDR/Microsoft Defender for Endpoint, vulnerability management, and threat detection systems, with focus on Linux OS. Azure Security Center and Office365 Compliance Portal. AWS and Azure (IAM, IaaS, PaaS). Knowledge in KQL queries in Sentinel and/or More ❯
to, and mitigating security threats across enterprise environment. Responsibilities will include: Monitor, analyze, and respond to security events and incidents using SIEM and other security tools. Develop and maintain detection rules, playbooks, and automation scripts to improve incident response efficiency. Perform threat hunting and forensic investigations across IT environment. Collaborate with infrastructure and application teams to ensure secure configurations … and compliance. Maintain and improve endpoint protection, intrusiondetection/prevention systems. Document incident response procedures and contribute to post-incident reviews. Create network diagrams and as-built documents. Develop and maintain a strong partnership with relevant global businesses and technical leaders and teams, including 3rd parties and affiliate businesses. Stay current with emerging threats, vulnerabilities, and security … Microsoft O365 products (Excel, PowerPoint, etc.). SEIM and SOAR technologies (Splunk, Cribl, Azure Sentinel). Configure and troubleshoot EDR/Microsoft Defender for Endpoint, vulnerability management, and threat detection systems, with focus on Linux OS. Azure Security Center and Office365 Compliance Portal. AWS and Azure (IAM, IaaS, PaaS). Knowledge in KQL queries in Sentinel and/or More ❯
to, and mitigating security threats across enterprise environment. Responsibilities will include: Monitor, analyze, and respond to security events and incidents using SIEM and other security tools. Develop and maintain detection rules, playbooks, and automation scripts to improve incident response efficiency. Perform threat hunting and forensic investigations across IT environment. Collaborate with infrastructure and application teams to ensure secure configurations … and compliance. Maintain and improve endpoint protection, intrusiondetection/prevention systems. Document incident response procedures and contribute to post-incident reviews. Create network diagrams and as-built documents. Develop and maintain a strong partnership with relevant global businesses and technical leaders and teams, including 3rd parties and affiliate businesses. Stay current with emerging threats, vulnerabilities, and security … Microsoft O365 products (Excel, PowerPoint, etc.). SEIM and SOAR technologies (Splunk, Cribl, Azure Sentinel). Configure and troubleshoot EDR/Microsoft Defender for Endpoint, vulnerability management, and threat detection systems, with focus on Linux OS. Azure Security Center and Office365 Compliance Portal. AWS and Azure (IAM, IaaS, PaaS). Knowledge in KQL queries in Sentinel and/or More ❯
london (city of london), south east england, united kingdom
Cantor Fitzgerald
to, and mitigating security threats across enterprise environment. Responsibilities will include: Monitor, analyze, and respond to security events and incidents using SIEM and other security tools. Develop and maintain detection rules, playbooks, and automation scripts to improve incident response efficiency. Perform threat hunting and forensic investigations across IT environment. Collaborate with infrastructure and application teams to ensure secure configurations … and compliance. Maintain and improve endpoint protection, intrusiondetection/prevention systems. Document incident response procedures and contribute to post-incident reviews. Create network diagrams and as-built documents. Develop and maintain a strong partnership with relevant global businesses and technical leaders and teams, including 3rd parties and affiliate businesses. Stay current with emerging threats, vulnerabilities, and security … Microsoft O365 products (Excel, PowerPoint, etc.). SEIM and SOAR technologies (Splunk, Cribl, Azure Sentinel). Configure and troubleshoot EDR/Microsoft Defender for Endpoint, vulnerability management, and threat detection systems, with focus on Linux OS. Azure Security Center and Office365 Compliance Portal. AWS and Azure (IAM, IaaS, PaaS). Knowledge in KQL queries in Sentinel and/or More ❯
requirements gathering through to procurement, budgeting, vendor management , and security assessments . Security, Compliance & Governance Partner with Information Security teams to enhance network security posture , addressing vulnerabilities and implementing intrusiondetection/prevention systems. Ensure ongoing compliance with ISO 27001, PCI-DSS , and other relevant regulatory standards. Drive a proactive approach to incident response, monitoring, and continuous threat … detection . Oversee audit readiness and maintain comprehensive network documentation and asset inventories. People & Stakeholder Leadership Build, develop, and mentor a high-performing network engineering team , fostering a culture of excellence, accountability, and continuous learning. Set clear objectives, manage performance, and align team skills with evolving business and technology needs. Act as the trusted technical adviser to senior stakeholders More ❯
requirements gathering through to procurement, budgeting, vendor management , and security assessments . Security, Compliance & Governance Partner with Information Security teams to enhance network security posture , addressing vulnerabilities and implementing intrusiondetection/prevention systems. Ensure ongoing compliance with ISO 27001, PCI-DSS , and other relevant regulatory standards. Drive a proactive approach to incident response, monitoring, and continuous threat … detection . Oversee audit readiness and maintain comprehensive network documentation and asset inventories. People & Stakeholder Leadership Build, develop, and mentor a high-performing network engineering team , fostering a culture of excellence, accountability, and continuous learning. Set clear objectives, manage performance, and align team skills with evolving business and technology needs. Act as the trusted technical adviser to senior stakeholders More ❯
requirements gathering through to procurement, budgeting, vendor management , and security assessments . Security, Compliance & Governance Partner with Information Security teams to enhance network security posture , addressing vulnerabilities and implementing intrusiondetection/prevention systems. Ensure ongoing compliance with ISO 27001, PCI-DSS , and other relevant regulatory standards. Drive a proactive approach to incident response, monitoring, and continuous threat … detection . Oversee audit readiness and maintain comprehensive network documentation and asset inventories. People & Stakeholder Leadership Build, develop, and mentor a high-performing network engineering team , fostering a culture of excellence, accountability, and continuous learning. Set clear objectives, manage performance, and align team skills with evolving business and technology needs. Act as the trusted technical adviser to senior stakeholders More ❯
requirements gathering through to procurement, budgeting, vendor management , and security assessments . Security, Compliance & Governance Partner with Information Security teams to enhance network security posture , addressing vulnerabilities and implementing intrusiondetection/prevention systems. Ensure ongoing compliance with ISO 27001, PCI-DSS , and other relevant regulatory standards. Drive a proactive approach to incident response, monitoring, and continuous threat … detection . Oversee audit readiness and maintain comprehensive network documentation and asset inventories. People & Stakeholder Leadership Build, develop, and mentor a high-performing network engineering team , fostering a culture of excellence, accountability, and continuous learning. Set clear objectives, manage performance, and align team skills with evolving business and technology needs. Act as the trusted technical adviser to senior stakeholders More ❯
london (city of london), south east england, united kingdom
AirSearch
requirements gathering through to procurement, budgeting, vendor management , and security assessments . Security, Compliance & Governance Partner with Information Security teams to enhance network security posture , addressing vulnerabilities and implementing intrusiondetection/prevention systems. Ensure ongoing compliance with ISO 27001, PCI-DSS , and other relevant regulatory standards. Drive a proactive approach to incident response, monitoring, and continuous threat … detection . Oversee audit readiness and maintain comprehensive network documentation and asset inventories. People & Stakeholder Leadership Build, develop, and mentor a high-performing network engineering team , fostering a culture of excellence, accountability, and continuous learning. Set clear objectives, manage performance, and align team skills with evolving business and technology needs. Act as the trusted technical adviser to senior stakeholders More ❯