analytical and SIEM platforms. * Knowledge of network security implementations (e.g., host-based IDS, IPS), including their function and placement in a network. * Knowledge of intrusiondetection systems and signature development. * Knowledge of front-end collection systems, including network traffic collection, filtering, and selection. * Knowledge of system administration concepts more »
Cambridge, England, United Kingdom Hybrid / WFH Options
Opus Talent Solutions
on safeguarding sensitive data and intellectual property. Security Operations: Oversee the day-to-day management of security systems and protocols, including incident response, threat detection, and vulnerability management. Security Awareness: Develop and deliver comprehensive training programs to promote a culture of security awareness and best practices among employees. Vendor … of relevant regulatory frameworks, such as ISO, GDPR, HIPAA, and FDA regulations. Strong understanding of security technologies and methodologies, including encryption, access control, and intrusiondetection systems. Excellent communication and leadership skills, with the ability to collaborate effectively across diverse teams and stakeholders. Relevant certifications such as CISSP more »
Operations Security Center (NOSC) Cyber is a US Government program responsible to prevent, identify, contain and eradicate cyber threats to DHS networks through monitoring, intrusiondetection and protective security services to DHS information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection … minimum of a bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field PLUS two (2) years of experience in incident detection and response. Must have TS/SCI In addition to specific security clearance requirements all Department of Homeland Security SOC employees are required to more »
post-incident reviews. Enable threat hunting through the fusion of threat intelligence and business risk analysis. Requirements: Strong understanding of network protocols, firewalls, and intrusiondetection/prevention systems. Proficiency in securing operating systems such as Windows, Linux, and macOS. Knowledge of large-scale security technology deployments (SIEM more »
working in Information/Cyber Security, ideally in a technical hands on/engineering role. Hands-on experience with security tools such as firewalls, intrusiondetection/prevention systems, antivirus software, and SIEM solutions. Experience with cloud security principles and practices with either AWS or Azure. Experience implementing more »
working in Information/Cyber Security, ideally in a technical hands on/engineering role. Hands-on experience with security tools such as firewalls, intrusiondetection/prevention systems, antivirus software, and SIEM solutions. Experience with cloud security principles and practices with either AWS or Azure. Experience implementing more »
and safe practices Risk Assessment: Evaluate risks associated with new technologies or system changes Network Security: Advise in the configuration and maintenance of firewalls, intrusiondetection/prevention systems, and other security infrastructure Security Documentation: Maintain accurate records of security configurations, incidents, and procedures Security Policies: Help enforce more »
deployment, migration, and upkeep of Microsoft 365 cloud services. Hyper-V and VMWare infrastructures, including clustering. implement, and manage network security solutions, including firewalls, intrusiondetection/prevention systems, VPNs, and secure access controls. regular security assessments and penetration testing to identify vulnerabilities and recommend remediation measures. network more »
actions taken, and recommendations for improvement. Maintain accurate records of incidents, investigations, and security-related activities. Configure, update, and maintain security tools, including firewalls, intrusiondetection/prevention systems, endpoint protection, and SIEM solutions. Who? I would be interested in speaking with both candidates with experience in cyber more »
Oxfordshire, England, United Kingdom Hybrid / WFH Options
University of Oxford
collaboration with the Head of Information Security Operations and the rest of the team. OxCERT runs an on-premises Elasticsearch-based SIEM solution, an IntrusionDetection System (IDS), and a vulnerability scanning service as well as other open source and commercial tools. We are one of the first more »
on’ IT Security analysis and engineering experience including securing systems, networks and infrastructure; operational support, including on-call experience.3+ years’ experience including combination of intrusiondetection, malware analysis, forensics and/or incident response, particularly in cloud environments. Working knowledge of cloud environments such as AWS. Monitor, tune more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
security Interpret and assess impact from device scanning (device discovery, Operating System (OS) fingerprinting, service scanning), and passive (non-intrusive) scanning, monitoring and operating intrusiondetection systems Act as IS focal point for cyber incidents and lead IS response to security incidents and alerts Conduct vulnerability assessments and more »
access. Participates in the certification and accreditation processes; performs technical vulnerability assessments of computer security. Provides business continuity and disaster recovery support. Engages in intrusiondetection and prevention; provides incident reporting and response support. Conducts ongoing monitoring of computer security requirements and compliance, maintains system security plans and more »
to diagnose and resolve complex network issues. Relevant certifications (e.g., CCNA, CCNP, CISSP) preferred. Strong knowledge of network security principles and practices, including firewalls, intrusiondetection/prevention systems, and access control. If your interested and have prior Higher Education experience please apply now more »
incidents. Conduct regular risk assessments and vulnerability scans to identify potential security weaknesses and prioritize remediation efforts. Implement and manage security controls, including firewalls, intrusiondetection/prevention systems, endpoint protection, and encryption technologies. Develop and deliver cyber security awareness training and education programs for employees. Qualifications/ more »
Stone, Staffordshire, United Kingdom Hybrid / WFH Options
yolk recruitment
resolving hardware, software, and network-related problems to minimise downtime and ensure reliability. Implementing security best practices, such as access controls, encryption, firewalls, and intrusiondetection/prevention systems, to protect against cyber threats. The experience you will bring to the team: Experience in the design, build & maintenance more »
senior engineers to assess client requirements and develop tailored OT security solutions. Assist in the deployment and configuration of security technologies, such as firewalls, intrusiondetection systems, and security information and event management (SIEM) solutions. Conduct vulnerability assessments and penetration tests to identify potential weaknesses in OT environments. more »
2016+), IIS, SQL 2012+, Linux appliances, architecture and OS, Back-up technologies, Citrix, and Cisco networking An excellent understanding of security technologies: SIEM, firewalls, intrusiondetection/prevention systems, anti-virus software, authentication systems, log management, content filtering, etc. An excellent understanding of security approaches: ISMS, risk analysis more »
experience in cybersecurity, preferably in a database environment. • Strong understanding of security principles and best practices. • Experience with security tools and technologies, such as intrusiondetection systems, firewalls, and SIEM solutions. • Excellent problem-solving skills and attention to detail. • Strong communication and collaboration skills. Benefits: • Competitive salary reflecting more »
User-ID) Solid understanding of Cisco ASA/Firepower firewalls and configuration best practices Strong knowledge of network security principles and concepts (e.g., firewalls, intrusiondetection/prevention systems, VPNs) Familiarity with security protocols (e.g., IPSec, SSL/TLS) Excellent problem-solving and troubleshooting skills Strong analytical and more »
related security issues required. Experience in project management and change management required. Knowledge of network infrastructure and security infrastructure components such as firewalls, VPNs, intrusiondetection, and wireless security required. Experience with security compliance regulations and standards such as HIPAA, HITECH, PCI DSS and/or ISO27000 required. more »
Cramlington, Northumberland, North East, United Kingdom
Sterling Pharma Solutions Limited
of all network hardware and equipment, including routers, switches, wireless hubs and UPSs. Assisting with management of security solutions, including firewalls, anti-virus, and intrusiondetection systems. Investigating and troubleshooting network problems and performing LAN/WAN communication repair during and after hours. Monitoring and testing network performance. more »
and promptly respond to security incidents, implementing corrective actions to mitigate risks. Security Software Maintenance: Install and maintain security software and hardware, including firewalls, intrusiondetection systems, and encryption tools, to safeguard against cyber threats. Training Program Development : Assist in creating and delivering security awareness training programs for more »
Brighton, England, United Kingdom Hybrid / WFH Options
15below
on what you need to achieve, whilst knowing how to have some fun Skills to impress: Network Security and devices (i.e. Web Application Firewalls, IntrusionDetection Systems and load balancers) Cloud concepts and technologies, preferably Microsoft Azure Containerisation and orchestration technologies e.g. Kubernetes Site to Site (L2L) and more »
Proven experience in cyber security incident response, with a strong understanding of incident handling methodologies and best practices. Familiarity with network security monitoring tools, intrusiondetection/prevention systems, and forensic analysis tools. Knowledge of common cyber threats and attack vectors, including malware, phishing, and ransomware. Relevant certifications more »