deployment, migration, and upkeep of Microsoft 365 cloud services. Hyper-V and VMWare infrastructures, including clustering. implement, and manage network security solutions, including firewalls, intrusiondetection/prevention systems, VPNs, and secure access controls. regular security assessments and penetration testing to identify vulnerabilities and recommend remediation measures. network more »
actions taken, and recommendations for improvement. Maintain accurate records of incidents, investigations, and security-related activities. Configure, update, and maintain security tools, including firewalls, intrusiondetection/prevention systems, endpoint protection, and SIEM solutions. Who? I would be interested in speaking with both candidates with experience in cyber more »
related security issues required. Experience in project management and change management required. Knowledge of network infrastructure and security infrastructure components such as firewalls, VPNs, intrusiondetection, and wireless security required. Experience with security compliance regulations and standards such as HIPAA, HITECH, PCI DSS and/or ISO27000 required. more »
Rolling Meadows, Illinois, United States Hybrid / WFH Options
Epiq Solutions
/security customers throughout the world, providing solutions for multiple markets including embedded wireless transceivers, cellular survey, RF recording, technical surveillance countermeasures (TSCM), wireless intrusiondetection system (WIDS) and wireless cybersecurity. While the company has been steadily growing since its inception in 2009, its small business and team more »
Cramlington, Northumberland, North East, United Kingdom
Sterling Pharma Solutions Limited
of all network hardware and equipment, including routers, switches, wireless hubs and UPSs. Assisting with management of security solutions, including firewalls, anti-virus, and intrusiondetection systems. Investigating and troubleshooting network problems and performing LAN/WAN communication repair during and after hours. Monitoring and testing network performance. more »
to diagnose and resolve complex network issues. Relevant certifications (e.g., CCNA, CCNP, CISSP) preferred. Strong knowledge of network security principles and practices, including firewalls, intrusiondetection/prevention systems, and access control. If your interested and have prior Higher Education experience please apply now more »
Stone, Staffordshire, United Kingdom Hybrid / WFH Options
yolk recruitment
resolving hardware, software, and network-related problems to minimise downtime and ensure reliability. Implementing security best practices, such as access controls, encryption, firewalls, and intrusiondetection/prevention systems, to protect against cyber threats. The experience you will bring to the team: Experience in the design, build & maintenance more »
User-ID) Solid understanding of Cisco ASA/Firepower firewalls and configuration best practices Strong knowledge of network security principles and concepts (e.g., firewalls, intrusiondetection/prevention systems, VPNs) Familiarity with security protocols (e.g., IPSec, SSL/TLS) Excellent problem-solving and troubleshooting skills Strong analytical and more »
Brighton, England, United Kingdom Hybrid / WFH Options
15below
on what you need to achieve, whilst knowing how to have some fun Skills to impress: Network Security and devices (i.e. Web Application Firewalls, IntrusionDetection Systems and load balancers) Cloud concepts and technologies, preferably Microsoft Azure Containerisation and orchestration technologies e.g. Kubernetes Site to Site (L2L) and more »
Stafford, England, United Kingdom Hybrid / WFH Options
Yolk Recruitment Ltd
resolving hardware, software, and network-related problems to minimise downtime and ensure reliability. Implementing security best practices, such as access controls, encryption, firewalls, and intrusiondetection/prevention systems, to protect against cyber threats. The experience you will bring to the team: Experience in the design, build & maintenance more »
Proven experience in cyber security incident response, with a strong understanding of incident handling methodologies and best practices. Familiarity with network security monitoring tools, intrusiondetection/prevention systems, and forensic analysis tools. Knowledge of common cyber threats and attack vectors, including malware, phishing, and ransomware. Relevant certifications more »
City Of London, England, United Kingdom Hybrid / WFH Options
Computappoint
SD-WAN. Proficiency in utilizing network management and analysis tools, including LogicMonitor, Datadog, Solarwinds, Network Config Manager, and similar industry-standard products. Knowledgeable in intrusiondetection and prevention systems (IDS/IPS/AV) and other crucial network security measures. Services offered by Computappoint Limited are those of more »
assessments and threat modelling Be generally proficient in Linux operating systems (e.g., Red Hat, CentOS, Alma, ubuntu) Have familiarity with security technologies, including firewalls, intrusiondetection systems, and encryption techniques Possess professional certifications, such as CISSP, CISA, or CRISC, similar Have experience in the identification and capture of more »
and best practices. Security Architecture: develop and design the cybersecurity architecture for our automotive systems, considering secure communication protocols, access controls, authentication mechanisms, and intrusion detection. Risk Assessment: perform risk assessments to evaluate the potential impact of cybersecurity threats and develop risk mitigation strategies. Regulatory Compliance: ensure compliance with more »
change the landscape of FICO network operations.” – Senior Manager, Network Engineering. What You’ll Do Design and manage security solutions, including firewall, and network intrusiondetection systems. Manage all network hardware and equipment, including routers, switches, and UPSs. Implement and maintain all equipment, hardware, and software upgrades. Implement … operate worldwide: Credit Scoring — 150+ billion FICO Scores have been sold to date, making it the most used credit score in the world. Fraud Detection and Security — 2.6+ billion payment cards globally are protected by FICO fraud systems. Lending — 3/4 of US mortgages are approved using the more »
SOC experience and a knack for investigation Proficiency in Sentinel or Splunk SIEM Familiarity with Mitre Att&ck Framework Skilled in log analysis and intrusiondetection Detail-oriented with organizational prowess Ability to secure and maintain eSC level clearance Basic knowledge of networking and security tools Advance your more »
protocols, including TCP/IP, DNS, DHCP, VLANs, and routing protocols (e.g., OSPF, BGP). with network security technologies such as firewalls, VPNs, and intrusiondetection/prevention systems. in network monitoring and management tools (e.g., Wireshark, Nagios, Cisco Prime). If you’re interested, please apply now more »
LS1, Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Picture More Ltd
development and implementation of Azure security-related technologies An excellent understanding of infrastructure and application technologies An excellent understanding of security technologies: SIEM, firewalls, intrusiondetection/prevention systems, anti-virus software, authentication systems, log management, content filtering, etc. An excellent understanding of security approaches: ISMS, risk analysis more »
excellence. Maintain security measures to protect systems, networks, and data from unauthorised access, cyber threats, and malware, installing and maintaining firewalls, antivirus software, and intrusiondetection systems, and conducting security audits and assessments. Document and maintain accurate records of technical configurations, procedures, and troubleshooting steps. Stay current with more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »