an IT Security Analyst, with a focus on Microsoft technologies and SIEM tools. - In-depth knowledge of security principles, protocols, and technologies, including firewalls, intrusiondetection/prevention systems, and endpoint security solutions. - Hands-on experience with Microsoft Azure, Active Directory, and related security features. - Proficiency in configuring more »
in order to design solutions that consider impacts beyond the physical network. Participate in the implementation and maintaining of network security measures, including firewalls, intrusiondetection systems, access controls, and encryption, to safeguard sensitive data and ensure compliance with industry standards. Monitor network performance, proactively identify issues, and more »
Cambridge, England, United Kingdom Hybrid / WFH Options
Opus Talent Solutions
on safeguarding sensitive data and intellectual property. Security Operations: Oversee the day-to-day management of security systems and protocols, including incident response, threat detection, and vulnerability management. Security Awareness: Develop and deliver comprehensive training programs to promote a culture of security awareness and best practices among employees. Vendor … of relevant regulatory frameworks, such as ISO, GDPR, HIPAA, and FDA regulations. Strong understanding of security technologies and methodologies, including encryption, access control, and intrusiondetection systems. Excellent communication and leadership skills, with the ability to collaborate effectively across diverse teams and stakeholders. Relevant certifications such as CISSP more »
technologies, and network security. In particular Cisco products. Strong understanding of cybersecurity principles and best practices. Experience with network security technologies such as firewalls, intrusiondetection/prevention systems (IDS/IPS), and encryption protocols. CCNA, CCNP, or CISSP are highly desirable. Exceptional problem-solving and analytical skills more »
East London, London, United Kingdom Hybrid / WFH Options
MECS Communications Ltd
of the following as possible: * Security operations management * DevOps or software development roles, with a focus on security. * Security tools such as vulnerability scanners, intrusiondetection systems, & security information & event management (SIEM) solutions. * Multi cloud environments AWS & Azure etc. * Using & managing Splunk including defining data streams, indices & ingests more »
analytical and SIEM platforms. * Knowledge of network security implementations (e.g., host-based IDS, IPS), including their function and placement in a network. * Knowledge of intrusiondetection systems and signature development. * Knowledge of front-end collection systems, including network traffic collection, filtering, and selection. * Knowledge of system administration concepts more »
on’ IT Security analysis and engineering experience including securing systems, networks and infrastructure; operational support, including on-call experience.3+ years’ experience including combination of intrusiondetection, malware analysis, forensics and/or incident response, particularly in cloud environments. Working knowledge of cloud environments such as AWS. Monitor, tune more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
security Interpret and assess impact from device scanning (device discovery, Operating System (OS) fingerprinting, service scanning), and passive (non-intrusive) scanning, monitoring and operating intrusiondetection systems Act as IS focal point for cyber incidents and lead IS response to security incidents and alerts Conduct vulnerability assessments and more »
COBIT, and NIST. Strong knowledge of network security, operating systems, databases, web applications, and cloud computing. Strong understanding of security technologies, such as firewalls, intrusiondetection/prevention systems, SIEM, antivirus, and data loss prevention. Experience with security assessment tools and techniques, including vulnerability scanning and penetration testing. more »
post-incident reviews. Enable threat hunting through the fusion of threat intelligence and business risk analysis. Requirements: Strong understanding of network protocols, firewalls, and intrusiondetection/prevention systems. Proficiency in securing operating systems such as Windows, Linux, and macOS. Knowledge of large-scale security technology deployments (SIEM more »
protocols, technologies, and tools, including LAN, WAN, VPN, DNS, DHCP, TCP/IP, etc. Experience with network security protocols and practices, such as firewalls, intrusiondetection/prevention systems, and endpoint security. Proficiency in network monitoring and troubleshooting tools. Excellent communication and interpersonal skills, with the ability to more »
Borehamwood, Hertfordshire, South East, United Kingdom
Connexa
protocols, technologies, and tools, including LAN, WAN, VPN, DNS, DHCP, TCP/IP, etc. Experience with network security protocols and practices, such as firewalls, intrusiondetection/prevention systems, and endpoint security. Proficiency in network monitoring and troubleshooting tools. Excellent communication and interpersonal skills, with the ability to more »
analytical (RCA) skills. Good working knowledge of Cisco Meraki and associated technologies. Practical knowledge of Continual Service Improvement (CSI) methodologies. Vulnerability management and assessment. Intrusiondetection and prevention analysis/frameworks. Solid exposure to cloud based applications security and provisioning. Experience in writing policy, process, and standard playbooks. more »
senior engineers to assess client requirements and develop tailored OT security solutions. Assist in the deployment and configuration of security technologies, such as firewalls, intrusiondetection systems, and security information and event management (SIEM) solutions. Conduct vulnerability assessments and penetration tests to identify potential weaknesses in OT environments. more »
and safe practices Risk Assessment: Evaluate risks associated with new technologies or system changes Network Security: Advise in the configuration and maintenance of firewalls, intrusiondetection/prevention systems, and other security infrastructure Security Documentation: Maintain accurate records of security configurations, incidents, and procedures Security Policies: Help enforce more »
deployment, migration, and upkeep of Microsoft 365 cloud services. Hyper-V and VMWare infrastructures, including clustering. implement, and manage network security solutions, including firewalls, intrusiondetection/prevention systems, VPNs, and secure access controls. regular security assessments and penetration testing to identify vulnerabilities and recommend remediation measures. network more »
actions taken, and recommendations for improvement. Maintain accurate records of incidents, investigations, and security-related activities. Configure, update, and maintain security tools, including firewalls, intrusiondetection/prevention systems, endpoint protection, and SIEM solutions. Who? I would be interested in speaking with both candidates with experience in cyber more »
Cramlington, Northumberland, North East, United Kingdom
Sterling Pharma Solutions Limited
of all network hardware and equipment, including routers, switches, wireless hubs and UPSs. Assisting with management of security solutions, including firewalls, anti-virus, and intrusiondetection systems. Investigating and troubleshooting network problems and performing LAN/WAN communication repair during and after hours. Monitoring and testing network performance. more »
to diagnose and resolve complex network issues. Relevant certifications (e.g., CCNA, CCNP, CISSP) preferred. Strong knowledge of network security principles and practices, including firewalls, intrusiondetection/prevention systems, and access control. If your interested and have prior Higher Education experience please apply now more »
Stone, Staffordshire, United Kingdom Hybrid / WFH Options
yolk recruitment
resolving hardware, software, and network-related problems to minimise downtime and ensure reliability. Implementing security best practices, such as access controls, encryption, firewalls, and intrusiondetection/prevention systems, to protect against cyber threats. The experience you will bring to the team: Experience in the design, build & maintenance more »
Brighton, England, United Kingdom Hybrid / WFH Options
15below
on what you need to achieve, whilst knowing how to have some fun Skills to impress: Network Security and devices (i.e. Web Application Firewalls, IntrusionDetection Systems and load balancers) Cloud concepts and technologies, preferably Microsoft Azure Containerisation and orchestration technologies e.g. Kubernetes Site to Site (L2L) and more »
Stafford, England, United Kingdom Hybrid / WFH Options
Yolk Recruitment Ltd
resolving hardware, software, and network-related problems to minimise downtime and ensure reliability. Implementing security best practices, such as access controls, encryption, firewalls, and intrusiondetection/prevention systems, to protect against cyber threats. The experience you will bring to the team: Experience in the design, build & maintenance more »
City Of London, England, United Kingdom Hybrid / WFH Options
Computappoint
SD-WAN. Proficiency in utilizing network management and analysis tools, including LogicMonitor, Datadog, Solarwinds, Network Config Manager, and similar industry-standard products. Knowledgeable in intrusiondetection and prevention systems (IDS/IPS/AV) and other crucial network security measures. Services offered by Computappoint Limited are those of more »
assessments and threat modelling Be generally proficient in Linux operating systems (e.g., Red Hat, CentOS, Alma, ubuntu) Have familiarity with security technologies, including firewalls, intrusiondetection systems, and encryption techniques Possess professional certifications, such as CISSP, CISA, or CRISC, similar Have experience in the identification and capture of more »
and best practices. Security Architecture: develop and design the cybersecurity architecture for our automotive systems, considering secure communication protocols, access controls, authentication mechanisms, and intrusion detection. Risk Assessment: perform risk assessments to evaluate the potential impact of cybersecurity threats and develop risk mitigation strategies. Regulatory Compliance: ensure compliance with more »