responsible for implementing and maintaining security measures to safeguard our clients’ WordPress websites and server infrastructure. This role demands expertise in cybersecurity protocols, threat detection, and proactive security measures, ensuring the safety and integrity of our clients’ digital assets. Key Responsibilities: Conduct vulnerability assessments and security audits, identifying and … addressing potential vulnerabilities in clients’ WordPress websites and server setups. Implement robust security protocols, including firewall configurations, intrusiondetection systems, and encryption tools, to safeguard clients’ digital assets. Monitor network traffic for suspicious activities and potential security threats, implementing real-time threat detection measures. Collaborate with clients … experience as a Cybersecurity Analyst or similar role, with a focus on web security and WordPress platforms. In-depth knowledge of cybersecurity protocols, threat detection, intrusiondetection systems, and encryption technologies. Experience with security assessment tools and methodologies. Strong understanding of web vulnerabilities, including SQL injection, cross More ❯
London, England, United Kingdom Hybrid / WFH Options
KPMG United Kingdom
This job is brought to you by Jobs/Redefined, the UK's leading over-50s age inclusive jobs board. Job description Senior Threat Detection Analyst Base Location: Hybrid/UK based (core office in London) plus network of 20 offices nationally: www.kpmg88careers.co.uk/experienced-professional/#LeBlender.OfficeLocations The … We've proudly stood beside the institutions and businesses which make the UK what it is. Why join KPMG EWT as a Senior Threat Detection Analyst ? The Team is an important function within Security Operations in KPMG. The team play a key role in ensuring that the business IT … as an escalation point for other security analysts in the SOC, including 3rd party MSSP Co-ordinate SOC team response and work with Threat Detection manager to improve triage processes Deputise Threat Detection Manager with full delegated responsibilities, when required Proactively monitor the network security sensors ensuring timely More ❯
EMEA. In this role, you will work alongside senior engineers to assist with the configuration, testing, commissioning, and documentation of access control, CCTV, and intrusiondetection systems. This is an ideal opportunity for someone with a technical background who is looking to grow their career in the physical … purposes the following knowledge, skills and experience are required. Key Responsibilities: Assist with the delivery of physical security projects, including access control, CCTV, and intrusiondetection systems. Support the configuration, testing, and commissioning of security systems under the guidance of senior engineers. Prepare project documentation such as commissioning … Experience: 1-3 years' experience in a technical engineering role (physical security, electrical, or IT fields preferred). Familiarity with access control, CCTV, or intrusiondetection systems is desirable but not essential. Basic understanding of IP networks and structured cabling. Strong technical aptitude and willingness to learn new More ❯
Great Malvern, England, United Kingdom Hybrid / WFH Options
TieTalent
investigate high-priority alerts, analyse logs, or network traffic and endpoint activity using tools like Splunk. Whether you're monitoring security alarms, creating new detection content, using threat intelligence to strengthen our defences, or responding to breaches, each day will begin with a team meeting to review ongoing investigations … impact. About You You’ll bring a background in cyber security analysis and a passion for IT. Ideally, you’ll have experience with host intrusiondetection analysis, but don’t worry if that’s an area you’re still developing in - plenty of training will be provided. You … working as a Cyber Security/Security Operations Centre Analyst Evidence of experience working in at least one of the following fields: malware analysis, intrusiondetection and incident response Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria will be More ❯
Evesham, England, United Kingdom Hybrid / WFH Options
TieTalent
investigate high-priority alerts, analyse logs, or network traffic and endpoint activity using tools like Splunk. Whether you're monitoring security alarms, creating new detection content, using threat intelligence to strengthen our defences, or responding to breaches, each day will begin with a team meeting to review ongoing investigations … impact. About You You’ll bring a background in cyber security analysis and a passion for IT. Ideally, you’ll have experience with host intrusiondetection analysis, but don’t worry if that’s an area you’re still developing in - plenty of training will be provided. You … working as a Cyber Security/Security Operations Centre Analyst Evidence of experience working in at least one of the following fields: malware analysis, intrusiondetection and incident response Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria will be More ❯
Stroud, England, United Kingdom Hybrid / WFH Options
TieTalent
investigate high-priority alerts, analyse logs, or network traffic and endpoint activity using tools like Splunk. Whether you're monitoring security alarms, creating new detection content, using threat intelligence to strengthen our defences, or responding to breaches, each day will begin with a team meeting to review ongoing investigations … impact. About You You’ll bring a background in cyber security analysis and a passion for IT. Ideally, you’ll have experience with host intrusiondetection analysis, but don’t worry if that’s an area you’re still developing in - plenty of training will be provided. You … working as a Cyber Security/Security Operations Centre Analyst Evidence of experience working in at least one of the following fields: malware analysis, intrusiondetection and incident response Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria will be More ❯
Cinderford, England, United Kingdom Hybrid / WFH Options
TieTalent
investigate high-priority alerts, analyse logs, or network traffic and endpoint activity using tools like Splunk. Whether you're monitoring security alarms, creating new detection content, using threat intelligence to strengthen our defences, or responding to breaches, each day will begin with a team meeting to review ongoing investigations … impact. About You You’ll bring a background in cyber security analysis and a passion for IT. Ideally, you’ll have experience with host intrusiondetection analysis, but don’t worry if that’s an area you’re still developing in - plenty of training will be provided. You … working as a Cyber Security/Security Operations Centre Analyst Evidence of experience working in at least one of the following fields: malware analysis, intrusiondetection and incident response Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria will be More ❯
Coleford, England, United Kingdom Hybrid / WFH Options
TieTalent
investigate high-priority alerts, analyse logs, or network traffic and endpoint activity using tools like Splunk. Whether you're monitoring security alarms, creating new detection content, using threat intelligence to strengthen our defences, or responding to breaches, each day will begin with a team meeting to review ongoing investigations … impact. About You You’ll bring a background in cyber security analysis and a passion for IT. Ideally, you’ll have experience with host intrusiondetection analysis, but don’t worry if that’s an area you’re still developing in - plenty of training will be provided. You … working as a Cyber Security/Security Operations Centre Analyst Evidence of experience working in at least one of the following fields: malware analysis, intrusiondetection and incident response Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria will be More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
N Brown Group
enhancing the technology underpinning N Browns cyber security services. Youll have a good understanding of a range of security tools like web application firewalls, intrusiondetection technologies, vulnerability scanners and SIEMs; and the technical knowledge to integrate them to enhance our protection and build automated responses. Youll need … is a plus. Experience of working within PCI DSS, or other compliance frameworks. Software and Technology SIEM (ideally Splunk) & IaaS (AWS, Azure, GCP) Endpoint Detection and Response (EDR) tools such as MS Defender APT. Network and Host IntrusionDetection/Prevention tools Web Application Firewalls (ideally Akamai More ❯
Killamarsh, England, United Kingdom Hybrid / WFH Options
TieTalent
tasks may involve investigating high-priority alerts, analyzing logs, network traffic, and endpoint activity using tools like Splunk. You will monitor security alarms, create detection content, utilize threat intelligence, and respond to breaches. Each day starts with a team meeting to review ongoing investigations and plan next steps. You … security analysis and a passion for IT, with at least 6 months of experience as a Cyber Security or SOC Analyst. Experience with host intrusiondetection, Windows and Linux OS, and effective communication skills are essential. Leadership experience or delegation responsibilities are advantageous. Training and Development We support … committed to fair recruitment and support. Additional Information Minimum criteria include 6 months of SOC or security analysis experience, and experience in malware analysis, intrusiondetection, or incident response. The role requires UK residency, British citizenship or dual nationality, and the highest security clearance (DV). Considerations for More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
PURVIEW
regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusiondetection/prevention systems, and encryption technologies. Adhere to enterprise governance & review processes to deliver project goals & deliverables. Follow enterprise ITSM & CMDB processes … and secure network design principles. Zscaler Private Access & Internet Access Proficiency in configuring, managing, and troubleshooting firewalls. Cisco, Palo Alto etc,. Experience with intrusiondetection/prevention systems, as well as with SIEM tools and security incident response. Excellent problem-solving skills, analytical thinking, and the ability More ❯
Stevenage, Hertfordshire, United Kingdom Hybrid / WFH Options
GlaxoSmithKline
to have in-depth understanding of network architecture to design, implement, and manage secure and efficient networks and proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. The OT Network Security Engineer will have ownership … are in place for all critical areas. People Management: Collaborate with internal owners of security technologies such as antivirus, IDS/IPS, SIEM, endpoint detection & response, configuration management, privileged identity management, etc. Why you? Basic Qualifications: We are looking for professionals with these required skills to achieve our goals … Engineering, Information Technology In-depth understanding of network architecture to design, implement, and manage secure and efficient networks. Proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. Strong ability to collaborate with cross-functional teams More ❯
regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusiondetection/prevention systems, and encryption technologies. Adhere to enterprise governance & review processes to deliver project goals & deliverables. Follow enterprise ITSM & CMDB processes … and secure network design principles. Zscaler Private Access & Internet Access Proficiency in configuring, managing, and troubleshooting firewalls. Cisco, Palo Alto etc,. Experience with intrusiondetection/prevention systems, as well as with SIEM tools and security incident response. Excellent problem-solving skills, analytical thinking, and the ability More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
PURVIEW
regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusiondetection/prevention systems, and encryption technologies. Adhere to enterprise governance & review processes to deliver project goals & deliverables. Follow enterprise ITSM & CMDB processes … and secure network design principles. Zscaler Private Access & Internet Access Proficiency in configuring, managing, and troubleshooting firewalls. Cisco, Palo Alto etc,. Experience with intrusiondetection/prevention systems, as well as with SIEM tools and security incident response. Excellent problem-solving skills, analytical thinking, and the ability More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯