Macclesfield, England, United Kingdom Hybrid / WFH Options
LTIMindtree
expansion plans in Macclesfield, UK. About the Role Role: Cyber Security Architect Location: Macclesfield, United Kingdom (Hybrid) Duration – Full Time Responsibilities : Design and implement secure network architectures including firewalls intrusiondetection prevention systems and encryption technologies Adhere to enterprise governance review processes to deliver project goals deliverables Follow enterprise ITSM CMDB processes Monitor and analyze security s using … Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto etc Experience with intrusiondetection prevention systems as well as with SIEM tools and security incident response Excellent problem solving skills analytical thinking and the ability to communicate effectively with diverse stakeholders More ❯
warrington, cheshire, north west england, united kingdom Hybrid / WFH Options
LTIMindtree
expansion plans in Macclesfield, UK. About the Role Role: Cyber Security Architect Location: Macclesfield, United Kingdom (Hybrid) Duration – Full Time Responsibilities : Design and implement secure network architectures including firewalls intrusiondetection prevention systems and encryption technologies Adhere to enterprise governance review processes to deliver project goals deliverables Follow enterprise ITSM CMDB processes Monitor and analyze security s using … Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto etc Experience with intrusiondetection prevention systems as well as with SIEM tools and security incident response Excellent problem solving skills analytical thinking and the ability to communicate effectively with diverse stakeholders More ❯
Job Title: Cybersecurity Architect Location: London, UK Type: Perm Role (Hybrid 2 days a week) RESPONSIBILITIES Design and implement secure network architectures including firewalls intrusiondetection prevention systems and encryption technologies Adhere to enterprise governance review processes to deliver project goals deliverables Follow enterprise ITSM CMDB processes Monitor and analyze security s using Security Information and Event Management … Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto etc Experience with intrusiondetection/prevention systems as well as with SIEM tools and security incident response Excellent problem solving skills analytical thinking and the ability to communicate effectively with diverse More ❯
Job Title: Cybersecurity Architect Location: London, UK Type: Perm Role (Hybrid 2 days a week) RESPONSIBILITIES Design and implement secure network architectures including firewalls intrusiondetection prevention systems and encryption technologies Adhere to enterprise governance review processes to deliver project goals deliverables Follow enterprise ITSM CMDB processes Monitor and analyze security s using Security Information and Event Management … Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto etc Experience with intrusiondetection/prevention systems as well as with SIEM tools and security incident response Excellent problem solving skills analytical thinking and the ability to communicate effectively with diverse More ❯
Job Title: Cybersecurity Architect Location: London, UK Type: Perm Role (Hybrid 2 days a week) RESPONSIBILITIES Design and implement secure network architectures including firewalls intrusiondetection prevention systems and encryption technologies Adhere to enterprise governance review processes to deliver project goals deliverables Follow enterprise ITSM CMDB processes Monitor and analyze security s using Security Information and Event Management … Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto etc Experience with intrusiondetection/prevention systems as well as with SIEM tools and security incident response Excellent problem solving skills analytical thinking and the ability to communicate effectively with diverse More ❯
of unusual or malicious activity. * Conduct regular security assessments and audits to identify vulnerabilities, risks, and potential areas for improvement. * Implement and maintain security tools and protocols, including firewalls, intrusiondetection systems, and endpoint protection. * Investigate security incidents, respond to potential breaches, and document all relevant findings and actions. * Develop security policies, standards and best practices for the … solutions through projects. * Managing relationships with security vendors & service providers. Key Skills: * Significant experience in a Security focused role. * Experience building, operating, and maintaining security systems. * Experience with firewalls, intrusiondetection systems, antivirus software, authentication systems, content filtering, and log management. * Experience with network security and networking technologies. * Knowledge of security frameworks and certifications - NIST, ISO27001, Cyber Essentials More ❯
new access control and CCTV systems, including providing recommendations on hardware and software solutions Install, program and configure commercial electronic security systems for enterprise systems (door access control, CCTV, intrusiondetection, low voltage communication, electronic locks, point sensors, signaling devices, etc.) Design, implement, and manage virtual machines (VMs) on a server infrastructure, ensuring optimal performance, security, and availability … Access Control: Genetec Video Management: Genetec, Axis, Hanwha Install of Security Systems Software onto a server (Genetec , Salient, Omnicast, Synergis) Knowledge of configuring various Security Access Control, CCTV, and Intrusion systems. Genetec certifications Demonstrated ability to work both independently and within cross-functional project teams effectively Experienced in compliance best practices for technology platforms Able to adapt quickly to … changing requirements and priorities Preferred/Desired Qualifications: 8+ years of experience in installing and programming the following: IntrusionDetection: DMP, Bosch Experience with software development lifecycle (SDLC) and Agile Methodologies Carbon60, Lorien & SRG - The Impellam Group STEM Portfolio are acting as an Employment Business in relation to this vacancy. More ❯
Watford, Hertfordshire, England, United Kingdom Hybrid / WFH Options
Lorien
new access control and CCTV systems, including providing recommendations on hardware and software solutions Install, program and configure commercial electronic security systems for enterprise systems (door access control, CCTV, intrusiondetection, low voltage communication, electronic locks, point sensors, signaling devices, etc.) Design, implement, and manage virtual machines (VMs) on a server infrastructure, ensuring optimal performance, security, and availability … Access Control: Genetec Video Management: Genetec, Axis, Hanwha Install of Security Systems Software onto a server (Genetec , Salient, Omnicast, Synergis) Knowledge of configuring various Security Access Control, CCTV, and Intrusion systems. Genetec certifications Demonstrated ability to work both independently and within cross-functional project teams effectively Experienced in compliance best practices for technology platforms Able to adapt quickly to … changing requirements and priorities Preferred/Desired Qualifications: 8+ years of experience in installing and programming the following: IntrusionDetection: DMP, Bosch Experience with software development lifecycle (SDLC) and Agile Methodologies Carbon60, Lorien & SRG - The Impellam Group STEM Portfolio are acting as an Employment Business in relation to this vacancy. More ❯
Paddington, Greater London, England Hybrid / WFH Options
Nexus Jobs Limited
data loss protection and data classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who support and operate the Company More ❯
to ensure the security of network infrastructure and data.- Manage risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusiondetection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor More ❯
security. You have experience in the design/implementation in multiple areas of cyber security, such as identity and access management, infrastructure security, data security, application security, or incident detection and response. You've been hands-on as a software developer, system administrator, network engineer, or systems architect and have experience leading larger delivery teams or other IT and … implementation in one or more of the following areas (application security, identity and access management/data protection/infrastructure security such as networks/logging and monitoring, incident detection and response). Business level Korean reading, document writing, and conversation skills with customers, partners, and colleagues including other departments. Conversational English skills to communicate with internal team (This … and change management, automation) Holds industry certifications such as CISSP, CISA, CISM, or CCSP Implementation experience in one or more of the following: Next Generation Firewalls, Web Application Firewalls, IntrusionDetection/Prevention, Incident Response, and Security Information and Event Management (SIEM), Identify and Access Management (IAM) controls. Implementation experience with compliance frameworks such as NIST, PCI-DSS More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
Microsoft Sentinel Microsoft Defender (Cloud, Endpoint, Office 365) Microsoft Entra ID (Azure AD) Microsoft Purview Microsoft Intune Azure Security Center Information Security (On-Premise): Firewalls (e.g. Palo Alto, Fortinet) IntrusionDetection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & Access Management (IAM) Patch management and vulnerability scanning Data Loss More ❯
to ensure the security of network infrastructure and data.- Manage risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusiondetection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor More ❯
in building and scaling a more transparent and efficient financial markets infrastructure. As a SecOps Lead at Flowdesk, you will be the principal point of contact for our Managed Detection and Response partner , ensuring rapid, coordinated responses to security incidents and continually enhancing Flowdesk's security posture. Your mission will be to Serve as the primary interface for our … as incident commander during security events, coordinating with IT, engineering, and business teams to ensure swift containment and recovery. Review and tune security alerts with the MDR provider, refining detection rules to minimize false positives and improve threat identification accuracy. Develop, track, and report on key MDR performance indicators (KPIs) to leadership, highlighting trends and the effectiveness of security … threat detection. Strong knowledge of EDR tools (e.g., CrowdStrike, SentinelOne, Carbon Black) and their role in detecting and responding to threats on endpoints. Solid understanding of network protocols, firewalls, intrusiondetection/prevention systems (IDS/IPS), and network traffic analysis. Familiarity with security principles and services in major cloud environments (AWS, Azure, GCP). Ability to consume More ❯
industry-recognized certifications (e.g., Cisco CCNA/CCNP, Juniper JNCIS-ENT). Experience with routing protocols, virtual routing instances, VPNs, and security zones. Experience with network security products including IntrusionDetection Systems (IDS) and Intrusion Prevention Systems (IPS). Proficiency in F5, Cisco Secure Firewall, and Gigamon technology. Demonstrable design experience with global network vendors (e.g., Cisco More ❯
Employment Type: Permanent
Salary: £50000 - £55000/annum £6k car + 20% bonuses
traffic, systems, and logs for unusual or malicious activity. Conducting regular security assessments and audits to identify vulnerabilities and risks. Implementing and maintaining security tools and protocols, including Firewalls, intrusiondetection systems, and endpoint protection solutions. Investigating security incidents, responding to potential breaches, and documenting findings. Leading security-focused projects across the network, Windows Desktop/Server environments More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
Microsoft Sentinel Microsoft Defender (Cloud, Endpoint, Office 365) Microsoft Entra ID (Azure AD) Microsoft Purview Microsoft Intune Azure Security Center Information Security (On-Premise): Firewalls (e.g. Palo Alto, Fortinet) IntrusionDetection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & Access Management (IAM) Patch management and vulnerability scanning tools Data More ❯
programs, including: CCTV/Alarm Monitoring and Response - provide comprehensive physical security monitoring for threats to the firm's assets, employees, and customers. GSICs monitor the access control system, intrusiondetection and panic alarm systems for threats and use the systems and CCTV systems to initiate and coordinate a security response to security and safety incidents or crisis More ❯
programs, including: CCTV/Alarm Monitoring and Response - provide comprehensive physical security monitoring for threats to the firm's assets, employees, and customers. GSICs monitor the access control system, intrusiondetection and panic alarm systems for threats and use the systems and CCTV systems to initiate and coordinate a security response to security and safety incidents or crisis More ❯
They’re Looking for: Proven experience in information or cyber security, or a related IT role Strong understanding of Information Security standards and frameworks Proficiency in security software and intrusiondetection/prevention systems Experience managing incident response plans and investigating threats using forensic analysis tools Strong analytical, problem-solving, and multitasking skills Excellent communication skills to translate More ❯
including creating security standards, and procedures. A deep understanding of network security, OT and IT security, application security, identity management, cloud security, and endpoint security including knowledge of firewalls, intrusiondetection systems, encryption, and other security technologies and industry standards and frameworks such as NIST, ISO 27001, and IEC 62443. Effective communication skills so that you can explain More ❯
including creating security standards, and procedures. * A deep understanding of network security, OT and IT security, application security, identity management, cloud security, and endpoint security including knowledge of firewalls, intrusiondetection systems, encryption, and other security technologies and industry standards and frameworks such as NIST, ISO 27001, and IEC 62443. * Effective communication skills so that you can explain More ❯
Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Michael Page
Practical experience and understanding of ISO27001 Familiar with NIST and GDPR is preferred Solid experience in threat, risk and vulnerabilities management process Experience with security tools such as SIEM, intrusiondetection systems, and endpoint protection. Strong analytical and problem-solving skills. Hold at least one security related professional certification is desirable Job Offer 24 days of holiday leave More ❯
experience of commissioning large facilities and managing commissioning teams to deliver successful outcomes within Electronic Security systems. In depth knowledge of enterprise security systems including card access control, intruder detection systems, CCTV systems and perimeter intrusiondetection systems. Experience in delivering and understanding design aspects of electronic security systems. Proven track record in complex project delivery, in More ❯
tools such as Splunk, Flexera, and other industry-standard SIEM platforms. You'll investigate security incidents, coordinate with other IT and security teams, and support continuous improvement of threat detection and response processes. Key Requirements: Previous experience in a SOC Analyst or similar cybersecurity role Strong expertise in Splunk or similar SIEM tools Familiarity with Flexera for vulnerability management … Understanding of firewalls, network protocols, intrusiondetection/prevention systems Relevant certifications (e.g., CISSP, CEH, Splunk) advantageous Must be eligible for Developed Vetting (DV) clearance , requiring 10 years continuous UK residency Please Note: All offers will be subject to standard pre-employment checks including ID, employment history (last 3 years), immigration status, and an unspent criminal record check. More ❯