guidance on information security matters to various stakeholders across the organization. 2. Security Operations & Incident Response: Oversee the day-to-day operation of security systems and tools, including firewalls, intrusiondetection/prevention systems (IDS/IPS), antivirus, anti-malware, SIEM (Security Information and Event Management), vulnerability scanners, and data encryption solutions. Manage vulnerability management programs, including regular … scanning, penetration testing, and remediation of identified weaknesses. Lead and manage security incident response, including detection, analysis, containment, eradication, recovery, and post-incident review. Develop and maintain robust disaster recovery and business continuity plans related to information security. Monitor security alerts, logs, and reports for suspicious activity and potential threats. 3. Compliance & Audit: Ensure the organization's adherence to … information security principles, frameworks (e.g., ISO 27001, NIST, Cyber Essentials), and best practices. Hands-on experience with security technologies such as firewalls, SIEM, IDS/IPS, vulnerability scanners, endpoint detection and response (EDR), and identity management solutions. Experience with cloud security (e.g., Azure Security). Proven experience in managing security incidents and conducting incident response. Familiarity with data privacy More ❯
to ensure the security of network infrastructure and data.- Manage risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusiondetection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor More ❯
is key to detecting, preventing, and responding to cybersecurity threats in a proactive and efficient manner. Key Responsibilities: Security Architecture & Implementation Design, deploy, and manage security solutions including firewalls, intrusiondetection/prevention systems, endpoint protection, SIEM, and identity management platforms. Implement secure network architecture and enforce segmentation and least-privilege access controls. Support secure cloud environments across … Azure, AWS, or GCP (e.g., IAM, security groups, encryption, KMS). Threat Detection & Incident Response Monitor and analyze security alerts and network traffic for threats or suspicious activity. Lead or support incident response activities: investigation, containment, eradication, recovery, and reporting. Conduct root cause analysis and implement security hardening improvements. Vulnerability & Risk Management Run regular vulnerability scans and penetration testing More ❯
Banbury, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
IT infrastructure, cloud services, and cyber security. Proven continuous development in both technical and soft domains. Proficiency with security tools and technologies such as SIEM, DLP, network protection, threat detection, and endpoint protection. An understanding of network infrastructure such as VPNs, firewalls, switches, routers, LANs, IntrusionDetection, and vulnerability scanning. Understanding of IT and cyber security frameworks More ❯
Hook Norton, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
IT infrastructure, cloud services, and cyber security. Proven continuous development in both technical and soft domains. Proficiency with security tools and technologies such as SIEM, DLP, network protection, threat detection, and endpoint protection. An understanding of network infrastructure such as VPNs, firewalls, switches, routers, LANs, IntrusionDetection, and vulnerability scanning. Understanding of IT and cyber security frameworks More ❯
support for network and communications infrastructure, resolving complex issues and coordinating with external suppliers when required. Monitor and enhance network security protocols, including firewall rules, access control lists, and intrusion prevention measures to safeguard systems and data. Drive the implementation of emerging network technologies and communication solutions, such as advanced VPN services and unified communications platforms. Ensure proactive maintenance … Local Area Networks (LAN), Wide Area Networks (WAN), Wireless Networks, and associated protocols (TCP/IP, MPLS, DNS, DHCP). Strong understanding of network security principles, including firewall configuration, intrusiondetection/prevention systems (IDS/IPS), Virtual Private Networks (VPNs), and encryption technologies Experience managing large-scale enterprise telecoms environments, including PBX systems, VoIP technologies, unified communications More ❯
london, south east england, united kingdom Hybrid/Remote Options
Growtoday AB
and attack artefacts. Proficiency with antivirus, vulnerability scanning and information security software. Detailed technical knowledge of database and operating system security. Hands on experience in security systems, including firewalls, intrusiondetection systems, anti-virus software, authentication systems, log management, content filtering, etc. Ability to discover and patch SQLi, XSS, CSRF, SSRF, authentication and authorization flaws, and other web More ❯
Conduct regular system audits to identify vulnerabilities and ensure compliance with security policies and regulations. Be involved in the deployment and maintenance of network security devices such as firewalls, intrusiondetection systems, and VPNs. Support the resolution of network security incidents, including conducting post-event analyses to prevent future incidents. Stay abreast of the latest cybersecurity threats and More ❯
Kent, South East, United Kingdom Hybrid/Remote Options
Nextech Group Limited
testing of routers, switches, firewalls and wireless access points. * Monitor network performance, highlight inefficiencies and recommend improvements. * Contribute to implementing and maintaining network security measures including firewalls, VPNs and intrusiondetection systems. * Help with routine maintenance such as firmware updates, patching and backups. * Maintain accurate documentation of network setups, diagrams and processes. * Work collaboratively with cross-functional teams More ❯
Kent, South East, United Kingdom Hybrid/Remote Options
Nextech Group Limited
and configuration of enterprise-level network equipment - routers, switches, firewalls, wireless access points, etc. * Monitor network performance and recommend optimisations. * Help implement and maintain network security measures (firewalls, VPNs, intrusiondetection, etc.). * Perform regular maintenance: firmware updates, patching, backups to ensure network availability and reliability. * Maintain accurate documentation: network configurations, diagrams, process notes. * Collaborate with internal teams More ❯
Systems Fiber Optic Cable Systems CCTV Systems Access Control Systems Public Address General Alarm Systems (PAGA) PABX, Hotline Systems Wireless/Microwave/TMR Radio Systems Perimeter/Fence IntrusionDetection Systems Key Responsibilities: Focus on safety, reliability, and quality in all telecom systems. Create Block Diagrams, Schematic Diagrams, Cable Schedules, datasheets, Interconnection and Wiring Diagrams, Cabinet General More ❯