Warwick, England, United Kingdom Hybrid / WFH Options
Vallum Associates
Job Title: Security SME- IntrusionDetection Specialist (IDS, HIDS) Location: Warwick or Wokingham (Hybrid – 2 Days/Week Onsite) Duration: 6+ Months Contract Inside IR35 Active SC Clearance (mandatory) Job Overview: We are seeking an experienced Security Subject Matter Expert (SME) with deep expertise in IntrusionDetection … across the estate and managing HIDS systems to detect and prevent intrusions effectively. Key Responsibilities: Lead the design, deployment, and management of Host-based IntrusionDetection Systems (HIDS) Monitor, analyze, and respond to security alerts from IDS platforms Continuously assess and improve the overall security posture of the … and IDS Ability to commute to Warwick or Wokingham 2 days per week Excellent communication skills and stakeholder management Strong hands-on experience with IntrusionDetection Systems (especially HIDS) Proven background in cybersecurity monitoring and incident response Familiarity with broader estate security management Strong analytical and problem-solving More ❯
Warwick, north west england, united kingdom Hybrid / WFH Options
Vallum Associates
Job Title: Security SME- IntrusionDetection Specialist (IDS, HIDS) Location: Warwick or Wokingham (Hybrid – 2 Days/Week Onsite) Duration: 6+ Months Contract Inside IR35 Active SC Clearance (mandatory) Job Overview: We are seeking an experienced Security Subject Matter Expert (SME) with deep expertise in IntrusionDetection … across the estate and managing HIDS systems to detect and prevent intrusions effectively. Key Responsibilities: Lead the design, deployment, and management of Host-based IntrusionDetection Systems (HIDS) Monitor, analyze, and respond to security alerts from IDS platforms Continuously assess and improve the overall security posture of the … and IDS Ability to commute to Warwick or Wokingham 2 days per week Excellent communication skills and stakeholder management Strong hands-on experience with IntrusionDetection Systems (especially HIDS) Proven background in cybersecurity monitoring and incident response Familiarity with broader estate security management Strong analytical and problem-solving More ❯
Royal Leamington Spa, England, United Kingdom Hybrid / WFH Options
Vallum Associates
Job Description Job Title: Security SME- IntrusionDetection Specialist (IDS, HIDS) Location: Warwick or Wokingham (Hybrid – 2 Days/Week Onsite) Duration: 6+ Months Contract Inside IR35 Active SC Clearance (mandatory) Job Overview: We are seeking an experienced Security Subject Matter Expert (SME) with deep expertise in IntrusionDetection Systems (IDS), particularly Host-based IDS (HIDS). The ideal candidate will be responsible for overseeing the security posture across the estate and managing HIDS systems to detect and prevent intrusions effectively. Key Responsibilities: Lead the design, deployment, and management of Host-based IntrusionDetectionMore ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
Skye Business Solutions
Rule fine-tuning, and integration of applicable changes from upstream rule repositories into our repo. Collaborate with Analysts and client cybersecurity professionals to refine detection strategies, improve detection accuracy and reduce false positives. Analyse security logs from various sources including cloud platforms services, firewalls, intrusiondetection … administration. Solid experience working with security logs across multiple domains - identity and access, network, system, data, application, cloud - and multiple product types, e.g. firewalls, intrusiondetection systems, VPN, web application firewalls, web and email filtering, identity directories and SSO, endpoint protection and EDR, and other security tools. Strong More ❯
london (city of london), south east england, united kingdom
Hays
network infrastructure and data. - Manage risk assessments and vulnerability assessments to identify potential security threats. - Oversee the implementation of security measures such as firewalls, intrusiondetection systems, and data encryption technologies. - Provide training and guidance to staff on information security best practices. - Stay updated on the latest cybersecurity … MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional;CCNA/CCNP Experience with security tools and technologies such as intrusiondetection systems, SIEM, and vulnerability management tools. Familiarity with regulatory requirements and industry standards related to IT security. Hays Specialist Recruitment Limited acts More ❯
and enterprise technologies, advising on secure architecture patterns, cloud automation, and evolving security threats. Own the evaluation of security tools and recommend technologies for intrusiondetection and prevention, security monitoring, web application firewalls (WAF), and data encryption, among others. Lead the evaluation of security tools and recommend technologies … for intrusiondetection and prevention, security monitoring, web application firewalls (WAF), and data encryption, among others. Who we are The UK's fastest broadband network. The nation's best-loved mobile brand. And, one of the UK's biggest companies too. Diverse, high performing teams - jam packed with More ❯
Stevenage, Hertfordshire, United Kingdom Hybrid / WFH Options
GlaxoSmithKline
to have in-depth understanding of network architecture to design, implement, and manage secure and efficient networks and proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. The OT Network Security Engineer will have ownership … are in place for all critical areas. People Management: Collaborate with internal owners of security technologies such as antivirus, IDS/IPS, SIEM, endpoint detection & response, configuration management, privileged identity management, etc. Why you? Basic Qualifications: We are looking for professionals with these required skills to achieve our goals … Engineering, Information Technology In-depth understanding of network architecture to design, implement, and manage secure and efficient networks. Proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. Strong ability to collaborate with cross-functional teams More ❯
to have in-depth understanding of network architecture to design, implement, and manage secure and efficient segmentation and proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and respond to security incidents. The OT Security Engineer will have ownership and responsibility to lead and drive security … Engineering, Information Technology. In-depth understanding of network architecture to design, implement, and manage secure and efficient networks. Proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. Strong ability to collaborate with cross-functional teams More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Tunstall Healthcare (UK) Ltd
Senior Network Engineer you will deliver network and security enhancements and 3rd line support of Tunstall's IT network infrastructure and security prevention and detection systems, working with Tunstall's internal IT teams and external service providers. Main responsibilities of the role: Design, implement, and optimize scalable and resilient … Conduct regular audits of network configurations to maintain consistency and compliance. Collaborate with security teams to implement and maintain robust protections, including firewalls, VPNs, intrusiondetection/prevention systems, and access control protocols. Conduct periodic vulnerability assessments, applying patches and updates to mitigate risks while maintaining compliance with … technologies and with system, security, and network monitoring tools. Understanding of the latest security principles, techniques, protocols and experience in security systems, including firewalls, intrusiondetection/prevention systems, anti-virus software, authentication systems, log management, content filtering. Working knowledge of security devices, tools and service providers Experience More ❯
ensure that, in close collaboration with the Head of Cyber Security & IT Project Manager, that all Infrastructure assets have appropriate threat mitigation controls/IntrusionDetection controls, Infrastructure Risks and Project Deliverables. Conduct regular one-to-one meetings to provide coaching, reinforce leadership values, and support personal and … ensure that, in close collaboration with the Head of Cyber Security & IT Project Manager, that all Infrastructure assets have appropriate threat mitigation controls/IntrusionDetection controls, Infrastructure Risks and Project Deliverables. Conduct regular one-to-one meetings to provide coaching, reinforce leadership values, and support personal and More ❯
install, commission, and maintain electronic systems designed to protect people, properties, and assets. Gain in-depth knowledge about our cutting-edge systems, including fire detection, intrusiondetection, CCTV, and access control solutions. Hit the road in your own company van, visiting a variety of sites, from residential More ❯
examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity analysts to detect, mitigate, and analyze threats. … meetings and provides expert input to ensure security is maintained. Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusiondetection and prevention, eDiscovery, and content filtering. Ability to manage and continuously improve upon vulnerability management program. Ability to propose solutions for closing More ❯
security, cloud security, and threat intelligence. Security Technologies: Proficient in using different security technologies, such as firewalls, end point protection, web protection, email protection, intrusiondetection and prevention systems, vulnerability scanners, encryption software, VPNs, and SIEMs. Be able to configure, test, deploy, and troubleshoot these tools and technologies More ❯
network security. Understanding of 3GPP mobile network CORE and RAN architectures and security requirements. Strong knowledge of network security protocols, VPN, firewall management, and intrusiondetection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks (e.g., GDPR More ❯
classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who More ❯
are mandatory. You will have a strong understanding of as many of the following areas as possible, and be able to demonstrate it: Security Detection and Monitoring Incident Response Detection Engineering Malware Analysis (Static and Dynamic) Threat Hunting and Threat Intelligence (MITRE ATT&CK) Cloud Security Penetration Testing … SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (Carbon Black, Microsoft Defender ATP, FireEye, CrowdStrike) IntrusionDetection/Prevention Systems (IDS/IPS) (Suricata, Snort, Bro, Cisco, Palo Alto) Web Proxies (Bluecoat, Zscaler, Squid, Cisco/OpenDNS Umbrella) Networking More ❯
manage robust security measures across networks, endpoints, cloud platforms, and IT infrastructure to safeguard systems and data. Oversee the deployment and management of firewalls, intrusiondetection systems (IDS), endpoint security solutions, and zero-trust architectures. Collaborate with IT and DevOps teams to embed security into cloud environments (AWS … improve security defences. Develop a comprehensive risk register, prioritising risks based on business impact and likelihood of exploitation. Implement continuous monitoring and advanced threat detection tools to proactively identify security threats and vulnerabilities. Develop and deliver security training programs for employees, promoting a company-wide culture of cyber awareness. More ❯
modeling, and risk assessments; strong understanding of information security principles, including confidentiality, integrity, and availability. Experience with security tools and technologies, including vulnerability scanners, intrusiondetection systems, and security information and event management (SIEM) systems. Excellent communication and interpersonal skills, with the ability to collaborate effectively with cross … Generous PTO, plus company holidays Comprehensive medical and dental insurance Paid parental leave for all parents (12 weeks) Fertility and family planning support Early-detection cancer testing through Galleri Competitive pension scheme and company contribution Annual work-life stipends for: Home office setup, cell phone, internet Wellness stipend for More ❯
understanding of security frameworks and regulations (e.g., NIST CSF, ISO 27001, GDPR, CIS controls). Familiarity with security technologies such as SIEM, endpoint security, intrusiondetection, and secure coding practices. Excellent problem-solving skills and the ability to translate security concepts into technical solutions. Strong communication skills, with More ❯
eg ISO 27001) as part of critical vendor performance assessment ensuring operational resilience is maintained. In collaboration with GT, manage security systems, including firewalls, intrusiondetection/prevention systems, and antivirus software. In collaboration with GT, Develop and test incident response plans and coordinate responses to security incidents More ❯
knowledge of the threat landscape relevant to SaaS products, preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusiondetection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools. You own relevant certifications (Security+, IAT II/III level or similar More ❯
implement comprehensive security strategies, policies, and procedures to protect the organization's information assets. Design, deploy, and manage security solutions, including PAM/IAM, intrusiondetection/prevention systems, endpoint protection, data loss prevention, encryption, and vulnerability management tools. Design and manage security in the cloud, including AWS More ❯
Experience of threat and risk modeling. Strong understanding of network security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusiondetection/prevention systems, security information and event management (SIEM) systems, and vulnerability assessment tools, and their configuration options. Familiarity with cloud security More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Experience of threat and risk modeling. Strong understanding of network security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusiondetection/prevention systems, security information and event management (SIEM) systems, and vulnerability assessment tools, and their configuration options. Familiarity with cloud security More ❯