Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
leonardo company
manage the remediation of identified vulnerabilities. Security Tools & Technologies Advice: Provide guidance on the selection, implementation, and optimization of security tools such as firewalls, intrusiondetection systems (IDS), intrusion prevention systems (IPS), and security information and event management (SIEM) systems. Support Security Architecture & Design: Assess the design … manage the remediation of identified vulnerabilities. Security Tools & Technologies Advice: Provide guidance on the selection, implementation, and optimization of security tools such as firewalls, intrusiondetection systems (IDS), intrusion prevention systems (IPS), and security information and event management (SIEM) systems. Support Security Architecture & Design: Assess the design More ❯
Stevenage, Hertfordshire, United Kingdom Hybrid / WFH Options
GlaxoSmithKline
to have in-depth understanding of network architecture to design, implement, and manage secure and efficient networks and proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. The OT Network Security Engineer will have ownership … are in place for all critical areas. People Management: Collaborate with internal owners of security technologies such as antivirus, IDS/IPS, SIEM, endpoint detection & response, configuration management, privileged identity management, etc. Why you? Basic Qualifications: We are looking for professionals with these required skills to achieve our goals … Engineering, Information Technology In-depth understanding of network architecture to design, implement, and manage secure and efficient networks. Proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. Strong ability to collaborate with cross-functional teams More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
Cheshire East, England, United Kingdom Hybrid / WFH Options
Exalto Consulting
design principles. Zscaler Private Access & Internet Access knowledge of zerotrust Proficiency in configuring, managing, and troubleshooting firewalls. Cisco, Palo Alto etc,. Experience with intrusiondetection/prevention systems, as well as with SIEM tools and security incident response. Conduct regular security assessments, including penetration testing and vulnerability … assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusiondetection/prevention systems, and encryption technologies. Adhere to enterprise governance & review processes to deliver project goals & deliverables. Follow enterprise ITSM & CMDB processes If you have the above experience and are More ❯
unauthorized access, vulnerabilities, and emerging threats. This role involves identifying and managing security risks, implementing and maintaining tools for spam filtering, software patching, and intrusiondetection and prevention. The analyst enforces information security policies and supports their integration across systems, applications, and user practices. The analyst will conduct … of anomalous events. Ensure that logs, metrics, and alerting align with organizational security and operational requirements. •Manage, monitor, analyze, and report on network firewalls, intrusion prevention systems, web security, email security, virtual private network (VPN), security information and event management (SIEM) platforms (e.g., FortiAnalyzer), log monitoring, and Multi-Factor More ❯
Bedford, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
frameworks and standards, such as NIST, ISO 27001, CyberEssentials Plus, and CIS. Strong understanding of networking protocols, operating systems, and security technologies like firewalls, intrusiondetection/prevention systems, and SIEM. Excellent analytical, problem-solving, and communication skills. Ability to work independently and collaboratively. Strong work ethic and More ❯
hunting queries Experience Needed: Managing serious cyber incidents as a digital forensic incident responder Working within large, complex enterprise environments Understanding of security monitoring, intrusiondetection, firewalls, antivirus, web proxies Technical expertise in networks, malware analysis, digital forensics Effective communication with senior stakeholders Company Overview: Element is a More ❯
Experience Needed: Extensive experience managing serious cyber incidents as a digital forensic responder. Proven success in large, complex enterprise environments. Understanding of security monitoring, intrusiondetection, firewalls, antivirus, web proxies. Technical expertise in networks, malware analysis, digital forensics. Effective communication with senior stakeholders. Company Overview: Element is a More ❯
advanced hunting queries. Experience Needed: Managing serious cyber incidents as a digital forensic incident responder. Operating within large, complex enterprise environments. Understanding security monitoring, intrusiondetection, firewalls, anti-virus, and web proxies. Technical expertise in networks, malware analysis, digital forensics. Strong communication skills with senior stakeholders. Company Overview More ❯
experience managing serious Cyber Incidents as a Digital Forensic Incident Responder. Proven success operating within large, complex, federated enterprise environments. Understanding of security monitoring, intrusiondetection, prevention, and control systems, including firewalls, anti-virus, and web proxies. Technical expertise in networks, malware analysis, digital forensics, etc. Attention to More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
Murnen Design
and motivate others. Deep understanding of cyber security threats, vulnerabilities, and mitigation techniques. Experience with a wide range of security technologies and practices, including: Intrusiondetection and prevention systems (IDPS) Security information and event management (SIEM) system Vulnerability scanning and penetration testing Cloud security Identity and access management More ❯
Incidents, as an Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware More ❯
Incidents, as an Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware More ❯
Incidents, as an Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware More ❯
Incidents, as an Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware More ❯
Incidents, as an Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware More ❯
Incidents, as an Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of log data and intrusiondetection systems. Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP … POP, LDAP. It would be great if you had: ? Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of log data and intrusiondetection systems. Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP … POP, LDAP. It would be great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and More ❯
and writing hunting queries Experience needed: Managing serious cyber incidents as a digital forensic responder Working in large enterprise environments Understanding security monitoring and intrusiondetection systems Technical expertise in networks, malware analysis, and digital forensics Company Overview: Element is a global testing, inspection, and certification company with More ❯
and query development Experience Needed: Managing serious cyber incidents as a digital forensic responder Working in complex enterprise environments Understanding of security monitoring and intrusiondetection systems Technical expertise in networks, malware analysis, digital forensics Effective communication with senior stakeholders Company Overview: Element is a leading testing, inspection More ❯
the Mitre Att&ck Framework. Understanding of client-server applications, web applications, databases, firewalls, VPNs, and AntiVirus products. Expertise in log data analysis and intrusiondetection systems. Knowledge of networking principles (TCP/IP, WANs, LANs, protocols like SMTP, HTTP, FTP, POP, LDAP). If interested, even if More ❯
of LDAP, Active Directory, WSUS, VMware, Veeam (or equivalent), Nessus, or Splunk. * Knowledge of security technologies and architecture, including encryption, network security, firewall configuration, intrusion detection. * Proficiency working with Windows operating systems, including Windows 10,Windows Server 2016 Server, Windows Server 2019 . * Excellent time management skills. * Ability to More ❯
server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of log data and intrusiondetection systems. Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP More ❯