Networking & Cloud Security: Deep expertise in TCP/IP, DNS, Load Balancers, network firewalls, SSL/TLS/mTLS, along with AWS Shield for DDoS protection, AWS WAF for web security, VPC segmentation, and automated vulnerability scanning. Container Security & Orchestration: Expertise in Docker, ECS, EKS, Kubernetes, implementing security best practices More ❯
London, England, United Kingdom Hybrid / WFH Options
Whitehall Resources Ltd
Networking & Cloud Security: Deep expertise in TCP/IP, DNS, Load Balancers, network firewalls, SSL/TLS/mTLS, along with AWS Shield for DDoS protection, AWS WAF for web security, VPC segmentation, and automated vulnerability scanning. • Container Security & Orchestration: Expertise in Docker, ECS, EKS, Kubernetes, implementing security best practices More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
TipTopJob
Role: Senior Java Developer Salary/Rate: GBP market rates per day (inside IR35) Location: Hybrid - 2 days per week on site in Leeds or London as preferred Contract Duration: 12 months We are currently looking for a Senior Java More ❯
Virtual Private Clouds (VPCs), Subnets, Security Groups, and Network ACLs. Expertise in implementing and managing Content Delivery Networks (CDNs), Web Application Firewalls (WAF), and DDoS protection. Ability to design and enforce security policies that align with best practices for cloud networking and ensure secure application delivery. I nfrastructure & Compliance as More ❯
LDAP/AD, etc. Advanced knowledge in Privileged Access Management (PAM) and associated tools. High proficiency in Vulnerability and Compliance Management, as well as DDOS protection. Hands-on experience in engineering Cyber Security solutions for cloud platforms (e.g., AWS, Azure) utilizing open-source tools, DevOps, and automation (e.g., Zabbix, ELK More ❯
Networking & Cloud Security: Deep expertise in TCP/IP, DNS, Load Balancers, network firewalls, SSL/TLS/mTLS, along with AWS Shield for DDoS protection, AWS WAF for web security, VPC segmentation, and automated vulnerability scanning Container Security & Orchestration: Expertise in Docker, ECS, EKS, Kubernetes, implementing security best practices More ❯
such as CCNA, CCNP, JNCIA, or DevNet Associate are advantageous Bonus Qualifications: Experience with Cloud Networking (AWS, Azure, or GCP) Experience with cloud-based DDoS protection solutions Experience in containerized networking environments (Docker, Kubernetes) Exposure to SDN (Software Defined Networking) and SD-WAN solutions Experience with overlay networks (EVPN, VxLAN More ❯
Networking & Cloud Security: Deep expertise in TCP/IP, DNS, Load Balancers, network firewalls, SSL/TLS/mTLS, along with AWS Shield for DDoS protection, AWS WAF for web security, VPC segmentation, and automated vulnerability scanning Container Security & Orchestration: Expertise in Docker, ECS, EKS, Kubernetes, implementing security best practices More ❯
Azure Firewall, VPN Gateway, Application Gateway, ExpressRoute, Private Link, and hybrid connectivity. Experience with Azure Security Services: Microsoft Defender for Cloud, Sentinel, Azure WAF, DDoS Protection, Microsoft Purview, and Security Center. Familiarity with cloud routing, DNS, IP address management, and network segmentation in Azure. Experience with security and monitoring tools More ❯
London, England, United Kingdom Hybrid / WFH Options
Gama Aviation
compliance. Plan and lead annual Business Continuity and Disaster Recovery tests , reporting outcomes and driving improvements. Evaluate and configure Azure security tooling , including firewall, DDoS, and WAF services. Contribute to governance processes , reviewing change requests for potential impact on security, privacy, and service availability. Collaborate with the Group More ❯
Farnborough, England, United Kingdom Hybrid / WFH Options
myairops
compliance. Plan and lead annual Business Continuity and Disaster Recovery tests , reporting outcomes and driving improvements. Evaluate and configure Azure security tooling , including firewall, DDoS, and WAF services. Contribute to governance processes , reviewing change requests for potential impact on security, privacy, and service availability. Collaborate with the Group More ❯
encryption (KMS), network security, VPC design, and implementation of cloud security controls and guardrails. Advanced Threat Protection: Proficiency in security monitoring, logging, DDoS protection, WAF configuration, and container/serverless security. Security Automation and DevSecOps: Strong skills in Infrastructure as Code (CloudFormation/Terraform), security automation, and orchestration More ❯
Experience with networking in complex, multi-site, multinational environments. Knowledge of security technologies such as NDR, content filtering, firewalls, IPS/IDS, DDoS mitigation, EDR/MDR, DAST/SAST, IAM, SIEM, and SOAR. Experience in cyber defense operations and as a Cyber Security Engineer; experience as a More ❯
trends. Experience with networking in multi-site, multinational environments. Knowledge of security technologies such as NDR, content filtering, firewalls, IPS/IDS, DDoS mitigation, EDR/MDR, DAST/SAST, IAM, SIEM, and SOAR. Experience in cyber defense operations and as a Cyber Security Engineer; background as a More ❯
Experience with networking in complex, multi-site, international environments. Knowledge of security technologies such as NDR, content filtering, firewalls, IPS/IDS, DDoS mitigation, EDR/MDR, DAST/SAST, IAM, SIEM, SOAR, and log management. Experience in cyber defense operations. Previous experience as a Cyber Security Engineer More ❯
Experience with networking in complex, multi-site, multinational environments. Knowledge of security technologies such as NDR, content filtering, firewalls, IPS/IDS, DDoS mitigation, EDR/MDR, DAST/SAST, IAM, SIEM, and SOAR. Experience in cyber defense operations and as a Cyber Security Engineer; experience as a More ❯
techniques, and trends. Experience with networking in multi-site, multinational environments. Familiarity with security technologies such as NDR, content filtering, firewalls, IPS/IDS, DDoS mitigation, EDR/MDR, DAST/SAST, IAM, SIEM, and SOAR. Experience in cyber defense operations. Previous experience as a Cyber Security Engineer or related More ❯
Experience with networking in complex, multi-site, multinational environments. Knowledge of security technologies such as NDR, content filtering, firewalls, IPS/IDS, DDoS mitigation, EDR/MDR, DAST/SAST, IAM, SIEM, SOAR, and log management. Experience in cyber defense operations; previous roles as a Cyber Security Engineer More ❯
other similar incident response experience Fundamental understanding of security tools such as SIEM, IDS/IPS, web proxies, DLP, SIEM, DNS security, DDoS protection, and firewalls Knowledge of MITRE ATT&CK security framework, Cyber Kill Chain analysis, and/or other useful threat analysis models Knowledge More ❯
trends. Experience with networking in multi-site, multinational environments. Knowledge of security technologies such as NDR, content filtering, firewalls, IPS/IDS, DDoS mitigation, EDR/MDR, DAST/SAST, IAM, SIEM, and SOAR. Experience in cyber defense operations and as a Cyber Security Engineer; background as a More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Infinigate Group
management process, through Root Cause Analysis. Responding to and resolving security incidents and events, such as malware infections, phishing attempts, denial-of-service attacks, data breaches, etc. Liaise with stakeholders in relation to cyber security issues and provide recommendations. Maintain an information security risk More ❯
management process, through Root Cause Analysis. Responding to and resolving security incidents and events, such as malware infections, phishing attempts, denial-of-service attacks, data breaches, etc. Liaise with stakeholders in relation to cyber security issues and provide recommendations. Maintain an information security risk More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Infinigate Group
management process, through Root Cause Analysis. Responding to and resolving security incidents and events, such as malware infections, phishing attempts, denial-of-service attacks, data breaches, etc. Liaise with stakeholders in relation to cyber security issues and provide recommendations. Maintain an information security risk More ❯