Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Matchtech
in leading a technical security team. Demonstrated experience in planning, developing, and implementing Azure security technologies. Familiarity with security technologies such as SIEM, firewalls, intrusiondetection/prevention systems, antivirus software, authentication systems, and log management. Strong knowledge of security approaches, including risk analysis, attack vectors, cryptography, and more »
implement network infrastructure solutions based on business requirements and industry best practices. Solid knowledge of network security concepts, including firewall configuration, VPN setup, and intrusiondetection systems. Install, configure, and maintain network equipment including routers, switches, firewalls, and wireless controllers. Hands-on experience with network equipment such as more »
On technologies. Mobile device management: Covering 300+ deployed mobile devices, applying best practice and industry standards. Cyber security and information assurance: Managing and maintaining intrusiondetection apparatus, supporting queries/investigations and hardened configuration of IT equipment. DevSecOps and Site Reliability Engineering: Supporting enterprise software teams and their more »
related security issues required. Experience in project management and change management required. Knowledge of network infrastructure and security infrastructure components such as firewalls, VPNs, intrusiondetection, and wireless security required. Experience with security compliance regulations and standards such as HIPAA, HITECH, PCI DSS and/or ISO27000 required. more »
Hinckley, England, United Kingdom Hybrid / WFH Options
DP World
resource utilization Implement and manage multi-factor authentication solutions for enhanced security across various systems and applications. Manage and monitor Endpoint security Platforms including detection and respond to advanced threats. Implement and maintain web and reverse proxy solutions, ensuring secure and reliable access to internal and external resources. Implement … services. Implementing security measures and protocols to safeguard the organization's IT infrastructure from potential threats and cyberattacks. This may include setting up firewalls, intrusiondetection systems, and access controls. Investigating and resolving technical issues related to hardware, software, and network components. Troubleshooting may involve diagnosing problems, working … self starter, adaptable who welcomes challenge and problem solving Solid experience in managing and maintaining Windows Server environments, knowledge of Endpoint protection for threat detection and response. Exposure and experience in implementing various IT infrastructure in a fast paced challenging environment Proficiency in backup and replication technologies, such as more »
City Of London, England, United Kingdom Hybrid / WFH Options
Computappoint
SD-WAN. Proficiency in utilizing network management and analysis tools, including LogicMonitor, Datadog, Solarwinds, Network Config Manager, and similar industry-standard products. Knowledgeable in intrusiondetection and prevention systems (IDS/IPS/AV) and other crucial network security measures. Services offered by Computappoint Limited are those of more »
assessments and threat modelling Be generally proficient in Linux operating systems (e.g., Red Hat, CentOS, Alma, ubuntu) Have familiarity with security technologies, including firewalls, intrusiondetection systems, and encryption techniques Possess professional certifications, such as CISSP, CISA, or CRISC, similar Have experience in the identification and capture of more »
Stone, Staffordshire, United Kingdom Hybrid / WFH Options
yolk recruitment
resolving hardware, software, and network-related problems to minimise downtime and ensure reliability. Implementing security best practices, such as access controls, encryption, firewalls, and intrusiondetection/prevention systems, to protect against cyber threats. The experience you will bring to the team: Experience in the design, build & maintenance more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Delaney & Bourton
a network, phishing, port scanning, web application attacks, DDoS, lateral movement. Experience with security monitoring, incident response, and vulnerability management. Understanding of malware analysis, intrusiondetection/prevention systems, and endpoint security solutions. Ability to analyze and interpret security logs and data. Role can work hybrid, for a more »
Proven experience in cyber security incident response, with a strong understanding of incident handling methodologies and best practices. Familiarity with network security monitoring tools, intrusiondetection/prevention systems, and forensic analysis tools. Knowledge of common cyber threats and attack vectors, including malware, phishing, and ransomware. Relevant certifications more »
to have : Basic knowledge of ISO/SAE 21434 automotive cybersecurity standard. Expertise in IP based networks/communication protocols and net applications like IntrusionDetection System(IDS)* Personal Skills Strong problem-solving and debugging skills Good communication and teamwork skills Ability to work independently and remotely Ideally more »
the Information Security Manager, you will work with the IT teams to govern day-to-day information security compliance e.g. Malware Protection, Security Incidents, IntrusionDetection Systems, Patch management compliance etc. Other duties include; Conceptualise and implement an ISO 27001:2013 and GDPR compliant management system. Manage the more »
carriers RADIUS Private systems to authenticate network elements LVAC Understanding of AV/DC power autonomy Voice Systems Security systems Various vendors firewalls and intrusiondetection systems DCN Management infrastructure Desiredtechnical/professional qualifications: HNC/HND in Electronics or Engineering Full clean driving license IOSH CSCS EUSR more »
protocols, including TCP/IP, DNS, DHCP, VLANs, and routing protocols (e.g., OSPF, BGP). with network security technologies such as firewalls, VPNs, and intrusiondetection/prevention systems. in network monitoring and management tools (e.g., Wireshark, Nagios, Cisco Prime). If you’re interested, please apply now more »
Linux, Microsoft, or other network related fields are a plus Experience with scripting and automation tools are a plus Knowledge of system security (e.g. intrusiondetection systems) and data backup/recovery Crypto Quantique is committed to creating a diverse environment and is proud to be an equal more »
as : ASIS PSP , CSPM , Prince2, PMP Recognised qualifications in Security or Business Managemen t at degree level or equivalent Experience with physical access control, intrusiondetection, video management, PSIM and architecture. Detailed Knowledge of various leading security systems including but not limited to HID, Genetec, Mercury, Axis, Ibex more »
Royston, Hertfordshire, South East, United Kingdom
Johnson Matthey Plc
as : ASIS PSP , CSPM , Prince2, PMP Recognised qualifications in Security or Business Managemen t at degree level or equivalent Experience with physical access control, intrusiondetection, video management, PSIM and architecture. Detailed Knowledge of various leading security systems including but not limited to HID, Genetec, Mercury, Axis, Ibex more »
Billingham, County Durham, North East, United Kingdom
Johnson Matthey Plc
as : ASIS PSP , CSPM , Prince2, PMP Recognised qualifications in Security or Business Managemen t at degree level or equivalent Experience with physical access control, intrusiondetection, video management, PSIM and architecture. Detailed Knowledge of various leading security systems including but not limited to HID, Genetec, Mercury, Axis, Ibex more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »