guidance on information security matters to various stakeholders across the organization. 2. Security Operations & Incident Response: Oversee the day-to-day operation of security systems and tools, including firewalls, intrusiondetection/prevention systems (IDS/IPS), antivirus, anti-malware, SIEM (Security Information and Event Management), vulnerability scanners, and data encryption solutions. Manage vulnerability management programs, including regular … scanning, penetration testing, and remediation of identified weaknesses. Lead and manage security incident response, including detection, analysis, containment, eradication, recovery, and post-incident review. Develop and maintain robust disaster recovery and business continuity plans related to information security. Monitor security alerts, logs, and reports for suspicious activity and potential threats. 3. Compliance & Audit: Ensure the organization's adherence to … information security principles, frameworks (e.g., ISO 27001, NIST, Cyber Essentials), and best practices. Hands-on experience with security technologies such as firewalls, SIEM, IDS/IPS, vulnerability scanners, endpoint detection and response (EDR), and identity management solutions. Experience with cloud security (e.g., Azure Security). Proven experience in managing security incidents and conducting incident response. Familiarity with data privacy More ❯
to ensure the security of network infrastructure and data. - Manage risk assessments and vulnerability assessments to identify potential security threats. - Oversee the implementation of security measures such as firewalls, intrusiondetection systems, and data encryption technologies. - Provide training and guidance to staff on information security best practices. - Stay updated on the latest cybersecurity trends and technologies. **Qualifications:** - Bachelor More ❯
to ensure the security of network infrastructure and data.- Manage risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusiondetection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid/Remote Options
Elevation Recruitment Group
of unusual or malicious activity. Conduct regular security assessments and audits to identify vulnerabilities, risks, and potential areas for improvement. Implement and maintain security tools and protocols, including firewalls, intrusiondetection systems, and endpoint protection. Investigate security incidents, respond to potential breaches, and document all relevant findings and actions. Undertake security focussed projects to improve security across Network More ❯
Banbury, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
IT infrastructure, cloud services, and cyber security. Proven continuous development in both technical and soft domains. Proficiency with security tools and technologies such as SIEM, DLP, network protection, threat detection, and endpoint protection. An understanding of network infrastructure such as VPNs, firewalls, switches, routers, LANs, IntrusionDetection, and vulnerability scanning. Understanding of IT and cyber security frameworks More ❯
Hook Norton, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
IT infrastructure, cloud services, and cyber security. Proven continuous development in both technical and soft domains. Proficiency with security tools and technologies such as SIEM, DLP, network protection, threat detection, and endpoint protection. An understanding of network infrastructure such as VPNs, firewalls, switches, routers, LANs, IntrusionDetection, and vulnerability scanning. Understanding of IT and cyber security frameworks More ❯
platforms such as AWS, Azure, Google Cloud, and M365. Familiarity with security frameworks and standards (e.g., ISO 27001, NIST, CIS). Experience with security tools and technologies, including firewalls, intrusiondetection/prevention systems, and encryption. Excellent problem-solving skills and the ability to think critically and strategically. Strong communication and interpersonal skills, with the ability to engage More ❯
Lead risk assessments, threat modeling, and vulnerability management. Ensure compliance with ISO 27001, SOC 2, GDPR, HIPAA, and other relevant standards. Oversee incident response and monitoring to ensure rapid detection and remediation. Champion a security-first culture across engineering, research, and business teams. DevOps & Infrastructure Own and evolve CI/CD pipelines and deployment automation. Architect and manage scalable … experience in IT security leadership and DevOps/SRE management. Strong expertise in Cloud security & architecture (AWS/Azure/GCP). Knowledge of IAM, Zero Trust, SIEM, and intrusiondetection/prevention systems. Experience supporting AI/ML platforms and GPU clusters is a plus. Familiarity with compliance frameworks (SOC 2, ISO 27001, FedRAMP). Excellent leadership More ❯
support for network and communications infrastructure, resolving complex issues and coordinating with external suppliers when required. Monitor and enhance network security protocols, including firewall rules, access control lists, and intrusion prevention measures to safeguard systems and data. Drive the implementation of emerging network technologies and communication solutions, such as advanced VPN services and unified communications platforms. Ensure proactive maintenance … Local Area Networks (LAN), Wide Area Networks (WAN), Wireless Networks, and associated protocols (TCP/IP, MPLS, DNS, DHCP). Strong understanding of network security principles, including firewall configuration, intrusiondetection/prevention systems (IDS/IPS), Virtual Private Networks (VPNs), and encryption technologies Experience managing large-scale enterprise telecoms environments, including PBX systems, VoIP technologies, unified communications More ❯
london, south east england, united kingdom Hybrid/Remote Options
Growtoday AB
and attack artefacts. Proficiency with antivirus, vulnerability scanning and information security software. Detailed technical knowledge of database and operating system security. Hands on experience in security systems, including firewalls, intrusiondetection systems, anti-virus software, authentication systems, log management, content filtering, etc. Ability to discover and patch SQLi, XSS, CSRF, SSRF, authentication and authorization flaws, and other web More ❯
Hatfield, Hertfordshire, England, United Kingdom Hybrid/Remote Options
Michael Page Technology
Practical experience and understanding of ISO27001 Familiar with NIST and GDPR is preferred Solid experience in threat, risk and vulnerabilities management process Experience with security tools such as SIEM, intrusiondetection systems, and endpoint protection. Strong analytical and problem-solving skills. Hold at least one security related professional certification is desirable Job Offer 24 days of holiday leave More ❯
diagnostic tools such as Wireshark, SolarWinds, or similar. Manage IP addressing schemes, VLANs, and routing protocols (e.g., OSPF, EIGRP). Ensure network security through access controls, firewall policies, and intrusiondetection systems. Collaborate with infrastructure and security teams on network upgrades, migrations, and architecture planning. Support server environments including Windows Server, Active Directory, and Microsoft Exchange. Maintain accurate More ❯
Employment Type: Full-Time
Salary: £40,000 - £450,000 per annum, Inc benefits
Conduct regular system audits to identify vulnerabilities and ensure compliance with security policies and regulations. Be involved in the deployment and maintenance of network security devices such as firewalls, intrusiondetection systems, and VPNs. Support the resolution of network security incidents, including conducting post-event analyses to prevent future incidents. Stay abreast of the latest cybersecurity threats and More ❯
Birmingham, West Midlands, United Kingdom Hybrid/Remote Options
ECS
Endpoint, Tenable, Sentinel, Zscaler, Tanium and Illiumo would be advantageous. Understanding of network protocols, configurations, deployment and management of routers, switches, and firewalls. Knowledge of cybersecurity principles, including firewalls, intrusiondetection/prevention systems, and encryption. Analytical and problem-solving skills to identify and assess issues, threats, patterns, and trends. Verbal communication skills, including presentation skills, with an More ❯
This is your chance to learn from industry experts and develop practical skills in a dynamic, supportive environment. Role Assisting in monitoring and maintaining IT security systems (firewalls, antivirus, intrusiondetection) Supporting the identification and assessment of security threats, vulnerabilities, and risks Helping respond to security incidents and participating in investigations under supervision Maintaining documentation on security policies More ❯
This is your chance to learn from industry experts and develop practical skills in a dynamic, supportive environment. Role Assisting in monitoring and maintaining IT security systems (firewalls, antivirus, intrusiondetection) Supporting the identification and assessment of security threats, vulnerabilities, and risks Helping respond to security incidents and participating in investigations under supervision Maintaining documentation on security policies More ❯
Engineer Apprentice at SNO, you’ll work alongside experienced professionals to safeguard systems and data. Your responsibilities will include: Assisting in monitoring and maintaining IT security systems (firewalls, antivirus, intrusiondetection). Supporting the identification and assessment of security threats, vulnerabilities, and risks. Helping respond to security incidents and participating in investigations under supervision. Maintaining documentation on security More ❯
Birchwood, Warrington, Cheshire, England, United Kingdom
QA
Engineer Apprentice at SNO, you’ll work alongside experienced professionals to safeguard systems and data. Your responsibilities will include: Assisting in monitoring and maintaining IT security systems (firewalls, antivirus, intrusiondetection). Supporting the identification and assessment of security threats, vulnerabilities, and risks. Helping respond to security incidents and participating in investigations under supervision. Maintaining documentation on security More ❯
tools such as Splunk, Flexera, and other industry-standard SIEM platforms. You'll investigate security incidents, coordinate with other IT and security teams, and support continuous improvement of threat detection and response processes. Key Requirements: Previous experience in a SOC Analyst or similar cybersecurity role Strong expertise in Splunk or similar SIEM tools Familiarity with Flexera for vulnerability management … Understanding of firewalls, network protocols, intrusiondetection/prevention systems Relevant certifications (e.g., CISSP, CEH, Splunk) advantageous Must be eligible for Developed Vetting (DV) clearance , requiring 10 years continuous UK residency Please Note: All offers will be subject to standard pre-employment checks including ID, employment history (last 3 years), immigration status, and an unspent criminal record check. More ❯
Bromsgrove, Worcestershire, United Kingdom Hybrid/Remote Options
First Choice Recruitment Services
IT and security teams to contain and resolve threats. Keep incident logs, reports, and tickets updated within incident tracking systems. Assist in threat intelligence gathering and analysis to enhance detection capabilities. Participate in vulnerability management activities. Update and oversee the software inventory. Support compliance reporting and audits. Assist in IT service desk activities. Stay updated with emerging cyber threats … management of the Company. Key skills: Candidates will need recent work history of working in a similar role. Degree Educated would be an advantage A strong understanding of firewalls, intrusiondetection systems and other security technologies is essential. Familiar with ethical hacking and penetration testing an advantage. The ability to analyse complex data and identify potential security threats More ❯
Kent, South East, United Kingdom Hybrid/Remote Options
Nextech Group Limited
testing of routers, switches, firewalls and wireless access points. * Monitor network performance, highlight inefficiencies and recommend improvements. * Contribute to implementing and maintaining network security measures including firewalls, VPNs and intrusiondetection systems. * Help with routine maintenance such as firmware updates, patching and backups. * Maintain accurate documentation of network setups, diagrams and processes. * Work collaboratively with cross-functional teams More ❯
across the following areas: Threat prevention: anti-malware, content filtering, and advanced threat protection (Palo Alto, Check Point, Cisco) Cloud network security: particularly within Microsoft Azure Perimeter security: firewalls, intrusiondetection and prevention (IDS/IPS) Web Application Firewalls (WAF): SaaS, on-prem, or Azure-based deployments Secure connectivity: SSL VPNs, remote access, and segmentation best practices Modern More ❯
Kent, South East, United Kingdom Hybrid/Remote Options
Nextech Group Limited
and configuration of enterprise-level network equipment - routers, switches, firewalls, wireless access points, etc. * Monitor network performance and recommend optimisations. * Help implement and maintain network security measures (firewalls, VPNs, intrusiondetection, etc.). * Perform regular maintenance: firmware updates, patching, backups to ensure network availability and reliability. * Maintain accurate documentation: network configurations, diagrams, process notes. * Collaborate with internal teams More ❯
Systems Fiber Optic Cable Systems CCTV Systems Access Control Systems Public Address General Alarm Systems (PAGA) PABX, Hotline Systems Wireless/Microwave/TMR Radio Systems Perimeter/Fence IntrusionDetection Systems Key Responsibilities: Focus on safety, reliability, and quality in all telecom systems. Create Block Diagrams, Schematic Diagrams, Cable Schedules, datasheets, Interconnection and Wiring Diagrams, Cabinet General More ❯