Job Title: Cybersecurity Architect Location: London, UK Type: Perm Role (Hybrid 2 days a week) RESPONSIBILITIES Design and implement secure network architectures including firewalls intrusiondetection prevention systems and encryption technologies Adhere to enterprise governance review processes to deliver project goals deliverables Follow enterprise ITSM CMDB processes Monitor and analyze security s using Security Information and Event Management … Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto etc Experience with intrusiondetection/prevention systems as well as with SIEM tools and security incident response Excellent problem solving skills analytical thinking and the ability to communicate effectively with diverse More ❯
Job Title: Cybersecurity Architect Location: London, UK Type: Perm Role (Hybrid 2 days a week) RESPONSIBILITIES Design and implement secure network architectures including firewalls intrusiondetection prevention systems and encryption technologies Adhere to enterprise governance review processes to deliver project goals deliverables Follow enterprise ITSM CMDB processes Monitor and analyze security s using Security Information and Event Management … Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto etc Experience with intrusiondetection/prevention systems as well as with SIEM tools and security incident response Excellent problem solving skills analytical thinking and the ability to communicate effectively with diverse More ❯
Job Title: Cybersecurity Architect Location: London, UK Type: Perm Role (Hybrid 2 days a week) RESPONSIBILITIES Design and implement secure network architectures including firewalls intrusiondetection prevention systems and encryption technologies Adhere to enterprise governance review processes to deliver project goals deliverables Follow enterprise ITSM CMDB processes Monitor and analyze security s using Security Information and Event Management … Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto etc Experience with intrusiondetection/prevention systems as well as with SIEM tools and security incident response Excellent problem solving skills analytical thinking and the ability to communicate effectively with diverse More ❯
Paddington, Greater London, England Hybrid / WFH Options
Nexus Jobs Limited
data loss protection and data classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who support and operate the Company More ❯
security. You have experience in the design/implementation in multiple areas of cyber security, such as identity and access management, infrastructure security, data security, application security, or incident detection and response. You've been hands-on as a software developer, system administrator, network engineer, or systems architect and have experience leading larger delivery teams or other IT and … implementation in one or more of the following areas (application security, identity and access management/data protection/infrastructure security such as networks/logging and monitoring, incident detection and response). Business level Korean reading, document writing, and conversation skills with customers, partners, and colleagues including other departments. Conversational English skills to communicate with internal team (This … and change management, automation) Holds industry certifications such as CISSP, CISA, CISM, or CCSP Implementation experience in one or more of the following: Next Generation Firewalls, Web Application Firewalls, IntrusionDetection/Prevention, Incident Response, and Security Information and Event Management (SIEM), Identify and Access Management (IAM) controls. Implementation experience with compliance frameworks such as NIST, PCI-DSS More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
Microsoft Sentinel Microsoft Defender (Cloud, Endpoint, Office 365) Microsoft Entra ID (Azure AD) Microsoft Purview Microsoft Intune Azure Security Center Information Security (On-Premise): Firewalls (e.g. Palo Alto, Fortinet) IntrusionDetection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & Access Management (IAM) Patch management and vulnerability scanning Data Loss More ❯
industry-recognized certifications (e.g., Cisco CCNA/CCNP, Juniper JNCIS-ENT). Experience with routing protocols, virtual routing instances, VPNs, and security zones. Experience with network security products including IntrusionDetection Systems (IDS) and Intrusion Prevention Systems (IPS). Proficiency in F5, Cisco Secure Firewall, and Gigamon technology. Demonstrable design experience with global network vendors (e.g., Cisco More ❯
Employment Type: Permanent
Salary: £50000 - £55000/annum £6k car + 20% bonuses
you'll be doing: Assess and evaluate the effectiveness of existing security controls. Design and implement security solutions to mitigate identified risks. Implement, and manage security systems, including firewalls, intrusiondetection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerability management etc. Respond to security events and incidents. Perform regular security audits and risk assessments. Maintain security More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
Microsoft Sentinel Microsoft Defender (Cloud, Endpoint, Office 365) Microsoft Entra ID (Azure AD) Microsoft Purview Microsoft Intune Azure Security Center Information Security (On-Premise): Firewalls (e.g. Palo Alto, Fortinet) IntrusionDetection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & Access Management (IAM) Patch management and vulnerability scanning tools Data More ❯
programs, including: CCTV/Alarm Monitoring and Response - provide comprehensive physical security monitoring for threats to the firm's assets, employees, and customers. GSICs monitor the access control system, intrusiondetection and panic alarm systems for threats and use the systems and CCTV systems to initiate and coordinate a security response to security and safety incidents or crisis More ❯
programs, including: CCTV/Alarm Monitoring and Response - provide comprehensive physical security monitoring for threats to the firm's assets, employees, and customers. GSICs monitor the access control system, intrusiondetection and panic alarm systems for threats and use the systems and CCTV systems to initiate and coordinate a security response to security and safety incidents or crisis More ❯
threats, implementing security measures, and monitoring network activity. Key responsibilities include: Monitor Networks and Systems: Continuously monitor the organisation’s networks and systems for security breaches or intrusions. Threat Detection and Response: Detect and respond to threats or security incidents by analysing data from various incident reports and alerts. Security Audits: Perform regular audits to ensure that systems and … Computer Science, Information Technology, or a related field. Experience in IT Infrastructure including security. Proficiency in supporting Active Directory, server, network and security technologies such as firewalls, antivirus, and intrusiondetection systems. Excellent analytical and problem-solving skills. Ability to work under pressure and handle multiple tasks simultaneously. Strong communication and interpersonal skills. What you’ll get in More ❯
including creating security standards, and procedures. A deep understanding of network security, OT and IT security, application security, identity management, cloud security, and endpoint security including knowledge of firewalls, intrusiondetection systems, encryption, and other security technologies and industry standards and frameworks such as NIST, ISO 27001, and IEC 62443. Effective communication skills so that you can explain More ❯
including creating security standards, and procedures. * A deep understanding of network security, OT and IT security, application security, identity management, cloud security, and endpoint security including knowledge of firewalls, intrusiondetection systems, encryption, and other security technologies and industry standards and frameworks such as NIST, ISO 27001, and IEC 62443. * Effective communication skills so that you can explain More ❯
code, e.g. Terraform. Proficiency with programming/scripting languages (e.g. Python, Bash, PowerShell). Experience building and deploying micro services-based applications. Experience with security technologies, for example Firewalls, IntrusionDetection/Prevention Systems, Vulnerability Scanning, WAFs, CASBs, SIEMs, and CSPMs. Experience inputting into and/or creating security architectures and designs. Understanding of security principles and the More ❯
experience of commissioning large facilities and managing commissioning teams to deliver successful outcomes within Electronic Security systems. In depth knowledge of enterprise security systems including card access control, intruder detection systems, CCTV systems and perimeter intrusiondetection systems. Experience in delivering and understanding design aspects of electronic security systems. Proven track record in complex project delivery, in More ❯
tools such as Splunk, Flexera, and other industry-standard SIEM platforms. You'll investigate security incidents, coordinate with other IT and security teams, and support continuous improvement of threat detection and response processes. Key Requirements: Previous experience in a SOC Analyst or similar cybersecurity role Strong expertise in Splunk or similar SIEM tools Familiarity with Flexera for vulnerability management … Understanding of firewalls, network protocols, intrusiondetection/prevention systems Relevant certifications (e.g., CISSP, CEH, Splunk) advantageous Must be eligible for Developed Vetting (DV) clearance , requiring 10 years continuous UK residency Please Note: All offers will be subject to standard pre-employment checks including ID, employment history (last 3 years), immigration status, and an unspent criminal record check.This More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Sopra Steria
Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of log data and intrusiondetection systems. Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be … great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and experience are exactly what we’re looking for, please do apply, we’d love to More ❯
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria
Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of log data and intrusiondetection systems. Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be … great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and experience are exactly what were looking for, please do apply, wed love to hear from More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Essex, South East, United Kingdom Hybrid / WFH Options
LJ Recruitment Limited
Designing, building, and maintaining secure systems that keep the bad guys out. Running regular security audits, spotting weak spots, and fixing them before anyone else notices. Working with firewalls, intrusiondetection systems, and endpoint protection tools, making sure everything is watertight. Collaborating with developers, IT teams, and business users to keep security practical (not just theoretical). Staying More ❯
Crofton Park, Greater London, UK Hybrid / WFH Options
LJ Recruitment Limited
Designing, building, and maintaining secure systems that keep the bad guys out. Running regular security audits, spotting weak spots, and fixing them before anyone else notices. Working with firewalls, intrusiondetection systems, and endpoint protection tools, making sure everything is watertight. Collaborating with developers, IT teams, and business users to keep security practical (not just theoretical). Staying More ❯
a complex large environment. · Strong knowledge of TCP/IP networking including routing, switching, firewall configuration and network security. · Hands-on experience with security best practices and tools (firewalls, intrusiondetection/prevention systems, etc.). · Strong communication and problem-solving skills. · The ability to prioritise work effectively while working under pressure. · Ability to work independently and as More ❯
and independent mindset. Effective communication and teamwork skills. Desirable: C programming skills for low-level or performance-critical development. Experience with containerisation (Docker, Kubernetes). Familiarity with endpoint security, intrusiondetection, or system hardening. Contributions to Linux or open-source projects. Experience with debugging, profiling, or performance optimisation tools. Why Join Us Shape the future of secure endpoint More ❯