Firewalls both on-premise and cloud based including Fortinet Good knowledge of application & content delivery platforms: f5 - BIG-IQ, AFM, ASM, LTM, GTM & DDoSmitigation Strong Knowledge of Application Level & Network Layer Security Protections Strong knowledge of dynamic routing protocols: BGP, OSPF Strong knowledge of packet more »
Firewalls both on-premise and cloud based including Fortinet Good knowledge of application & content delivery platforms: f5 - BIG-IQ, AFM, ASM, LTM, GTM & DDoSmitigation Strong Knowledge of Application Level & Network Layer Security Protections Strong knowledge of dynamic routing protocols: BGP, OSPF Strong knowledge of packet more »
London, England, United Kingdom Hybrid / WFH Options
Jisc
quickly as possible, providing advice on a one-on-one basis as we do so, whether that is to do with malware, phishing, DDoS or any other network or system related incident. About the role: You will assist the Lead Incident Investigator (CTI) with the ongoing monitoring, optimising … Backup Systems & Cloud Platforms. • Familiarity with a range of security tools and systems such as SIEMs, EDR’s SOAR, IDS, WAF, DLP and DDoSmitigation systems • Good understanding of common threat scenarios and vulnerability and malware analysis. • Knowledge of vulnerability scanning systems, including the understanding of more »
security skills related to the design and implementation of secure networking solutions. Experience with network security products including Firewalls, IDS/IPS, WAF, DDoSmitigation solutions. Akamai experience is desirable. In this role, you will be at the forefront of shaping secure connections that drive our more »
security skills related to the design and implementation of secure networking solutions. Experience with network security products including Firewalls, IDS/IPS, WAF, DDoSmitigation solutions. Akamai experience is desirable. In this role, you will be at the forefront of shaping secure connections that drive our more »
mining in support of the company's cyber goals and digital transformation. Develop and execute the cyber roadmap for platform development and threat mitigation, in alignment with the unit’s cyber vision and strategy. Lead complex technical deliverables, ensuring timely and budget-compliant completion. Work autonomously within a …/AD, etc. Advanced knowledge in Privileged Access Management (PAM) and associated tools. High proficiency in Vulnerability and Compliance Management, as well as DDOS protection. Hands-on experience in engineering Cyber Security solutions for cloud platforms (e.g., AWS, Azure) utilizing open-source tools, DevOps, and automation (e.g., Zabbix more »
mining in support of the company's cyber goals and digital transformation. Develop and execute the cyber roadmap for platform development and threat mitigation, in alignment with the unit’s cyber vision and strategy. Lead complex technical deliverables, ensuring timely and budget-compliant completion. Work autonomously within a …/AD, etc. Advanced knowledge in Privileged Access Management (PAM) and associated tools. High proficiency in Vulnerability and Compliance Management, as well as DDOS protection. Hands-on experience in engineering Cyber Security solutions for cloud platforms (e.g., AWS, Azure) utilizing open-source tools, DevOps, and automation (e.g., Zabbix more »