controls and solutions. Experience with security tools outside of the Microsoft eco-system , such as IDS/IPS, vulnerability scanners, web and email filtering, webapp firewalls and DDoS protections, proxies, host-based protections and malware analysis engines Good understanding of Cyber Detection and Response Concepts such as the MITRE ATT&CK framework for mapping adversary behaviours More ❯
environments. Deep knowledge of routing, switching, firewalls (FortiGate, Check Point), load balancers (F5), and SD-WAN technologies. Experience in managing ISP peering, public IP allocations, redundancy, and DDoS protection strategies. Strong understanding of automation, observability, and network monitoring tools to drive proactive operations. Skilled in incident, change, and problem management processes within ITIL or similar frameworks. More ❯
Enterprise Application and App registration certificate. Closely working With Security Architect and Team to adhere zero-trust architecture by securing server policy, group policy, defender etc. Tenant security – DDOS, Azure Firewall policy creation and maintain of Application, Network rule along with IDPS to ensure all the inbound/outbound traffic managed via AZFW. Password management, disk encryption More ❯
Enterprise Application and App registration certificate. Closely working With Security Architect and Team to adhere zero-trust architecture by securing server policy, group policy, defender etc. Tenant security – DDOS, Azure Firewall policy creation and maintain of Application, Network rule along with IDPS to ensure all the inbound/outbound traffic managed via AZFW. Password management, disk encryption More ❯
Enterprise Application and App registration certificate. Closely working With Security Architect and Team to adhere zero-trust architecture by securing server policy, group policy, defender etc. Tenant security – DDOS, Azure Firewall policy creation and maintain of Application, Network rule along with IDPS to ensure all the inbound/outbound traffic managed via AZFW. Password management, disk encryption More ❯
london (city of london), south east england, united kingdom
Tata Consultancy Services
Enterprise Application and App registration certificate. Closely working With Security Architect and Team to adhere zero-trust architecture by securing server policy, group policy, defender etc. Tenant security – DDOS, Azure Firewall policy creation and maintain of Application, Network rule along with IDPS to ensure all the inbound/outbound traffic managed via AZFW. Password management, disk encryption More ❯
Enterprise Application and App registration certificate. Closely working With Security Architect and Team to adhere zero-trust architecture by securing server policy, group policy, defender etc. Tenant security – DDOS, Azure Firewall policy creation and maintain of Application, Network rule along with IDPS to ensure all the inbound/outbound traffic managed via AZFW. Password management, disk encryption More ❯
teams on segmentation, NAC, and firewall controls . Leading on incident response , root cause analysis, and runbook development. Managing and optimising a wide suite of tools: WAF, DDoS, VPN, perimeter firewalls, email/web security, MFA, SSO, PAM, MDM/MAM, and conditional access. Partnering with InfoSec to align platforms with overall security strategy. Supporting vulnerability scanning, remediation More ❯
teams on segmentation, NAC, and firewall controls . Leading on incident response , root cause analysis, and runbook development. Managing and optimising a wide suite of tools: WAF, DDoS, VPN, perimeter firewalls, email/web security, MFA, SSO, PAM, MDM/MAM, and conditional access. Partnering with InfoSec to align platforms with overall security strategy. Supporting vulnerability scanning, remediation More ❯
teams on segmentation, NAC, and firewall controls . Leading on incident response , root cause analysis, and runbook development. Managing and optimising a wide suite of tools: WAF, DDoS, VPN, perimeter firewalls, email/web security, MFA, SSO, PAM, MDM/MAM, and conditional access. Partnering with InfoSec to align platforms with overall security strategy. Supporting vulnerability scanning, remediation More ❯
sciences, energy, media & entertainment, or manufacturing. Hands-on technical expertise in building security capabilities in code, deploying infrastructure as code, and implementing enterprise security solutions (e.g. WAF, IPS, Anti-DDOS, SIEM) Amazon is an equal opportunity employer and does not discriminate on the basis of protected veteran status, disability, or other legally protected status. Our inclusive culture empowers More ❯
non-technical audiences Hands-on technical expertise in building and deploying security solutions, capabilities and infrastructure. Implementation experience with enterprise security solutions such as SSO, Federation, WAF, IPS, Anti-DDOS, and SIEM and understanding architectural implications of meeting industry standards such as PCI DSS, ISO 27001, GDPR, and NIST frameworks and relevant regulatory frameworks such as Thailand's More ❯
understand and learn the latest in cyber defences. We would like to hear how we could use this knowledge to protect our customers & colleagues. Good knowledge ofDDoS, Bot and DNS protection. Solid understanding of how cyber defence is applied through the networking layers (routing/switching, IP, network protocols, firewalls, WAF) The ability to take More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Client Server Ltd
flexibility to work from home one day a week. About you: You have experience in a similar position with knowledge of common cyber attack types such as DDoS, SQLi, XSS, etc. You have experience with vulnerability assessment software and prioritisation of results using a combination of various frameworks tied to internal objects (CVE, CVSS More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Langley James Limited
IT Security Officer, to implement and maintain robust security across their infrastructure. Key responsibilities include managing MaiServers, Firewalls and Micorsoft Gateways. You will be involved in Managing WAF/DDoS, web/email security gateways, SIEM/SOAR/EDR (alert response), firewalls, MFA/SSO, MDM/MAM, vulnerability scans/remediation, security certificates, IDS/IPS, PAM, and … CrowdStrike EDR, Mimecast, Duo, Okta, Rapid7 IVM/IDR, Palo Alto Firewalls, InTune, and Entra ID/Azure AD/Group Policy. And become Familiar with Imperva WAF/DDoS, Menlo, Cisco security, KnowBe4, Digicert, patching tools, web application scanners, and Kali Linux, AI, Machine Learning You could gain: Security certifications (CISM, MS Security, OSCP preferred). Financial services/ More ❯
Analyzer and Endpoint Detection & Response tools. Understanding of web application security vulnerabilities, such as cross-site scripting, cross-site request forgery, SQL injection, denial-of-service attacks, and API attacks. Good understanding of Web Application Security risks. Excellent understanding ofDDoS techniques and mitigation mechanisms. Display great problem More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Marlin Selection
ensure compliance with security standards and best practices; you will essentially be a key technical leader in safeguarding sensitive data and systems. Key Responsibilities/Duties Manage WAF and DDoS systems Manage the Web Security Gateway Manage the Email Security Gateway Manage the SIEM, SOAR, Identity Protection and EDR, and respond to alerts and threats. Carry out vulnerability scans, identify … and Panorama InTune and Conditional Access Entra ID, Active Directory, DNS, GPO Experience using the following technology stack would be advantageous; understanding the principles is required. Imperva WAF and DDoS Menlo Web Security Gateway Menlo CASB Cisco Secure Access Cisco Umbrella Cisco ASA KnowBe4 Digicert Certificates and Microsoft Certificate Services Ivanti or Automox patching AppCheck or Tenable WAS Kali Linux More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Holland & Barrett International Limited
ingress and egress points, including creating and maintaining an edge network with a Web Application Firewall (WAF), DistributedDenialofService (DDoS) protection, and a Content Delivery Network (CDN). Access Control: Establish an access control baseline focusing on the principle of least privilege and segregation of duties. More ❯