at least one year in a hands-on capacity *Strong understanding of cybersecurity principles and technologies. *Hands-on experience with security tools such as antivirus, content filtering, firewalls, and intrusiondetection systems. *Proficiency in Microsoft Azure and associated cloud security services. *Familiarity with Windows and Linux operating systems. *Experience with log management and security monitoring platforms. *Critical thinking … related subject. *Professional certifications such as CISSP, CompTIA Security+, or equivalent. *Experience with governance frameworks and risk management tools. Key Responsibilities *Operate and maintain security systems including firewalls, antivirus, intrusiondetection/prevention, and authentication platforms. *Monitor system logs and network traffic to identify suspicious activity and potential threats. *Respond to security incidents and support forensic investigations. *Develop … Adecco is acting as an Employment Agency. We are proud to be an equal opportunities employer. Keywords IT Security Specialist, Cybersecurity Analyst, SOC Analyst, Azure Security, Information Security, Firewalls, IntrusionDetection, Antivirus, ITIL, CISSP, Security Compliance, Vulnerability Management, Risk Register, Public Sector IT, Hybrid Role, Manchester Jobs, Security Awareness Training More ❯
guidance on information security matters to various stakeholders across the organization. 2. Security Operations & Incident Response: Oversee the day-to-day operation of security systems and tools, including firewalls, intrusiondetection/prevention systems (IDS/IPS), antivirus, anti-malware, SIEM (Security Information and Event Management), vulnerability scanners, and data encryption solutions. Manage vulnerability management programs, including regular … scanning, penetration testing, and remediation of identified weaknesses. Lead and manage security incident response, including detection, analysis, containment, eradication, recovery, and post-incident review. Develop and maintain robust disaster recovery and business continuity plans related to information security. Monitor security alerts, logs, and reports for suspicious activity and potential threats. 3. Compliance & Audit: Ensure the organization's adherence to … information security principles, frameworks (e.g., ISO 27001, NIST, Cyber Essentials), and best practices. Hands-on experience with security technologies such as firewalls, SIEM, IDS/IPS, vulnerability scanners, endpoint detection and response (EDR), and identity management solutions. Experience with cloud security (e.g., Azure Security). Proven experience in managing security incidents and conducting incident response. Familiarity with data privacy More ❯
to ensure the security of network infrastructure and data. - Manage risk assessments and vulnerability assessments to identify potential security threats. - Oversee the implementation of security measures such as firewalls, intrusiondetection systems, and data encryption technologies. - Provide training and guidance to staff on information security best practices. - Stay updated on the latest cybersecurity trends and technologies. **Qualifications:** - Bachelor More ❯
to ensure the security of network infrastructure and data.- Manage risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusiondetection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor More ❯
is key to detecting, preventing, and responding to cybersecurity threats in a proactive and efficient manner. Key Responsibilities: Security Architecture & Implementation Design, deploy, and manage security solutions including firewalls, intrusiondetection/prevention systems, endpoint protection, SIEM, and identity management platforms. Implement secure network architecture and enforce segmentation and least-privilege access controls. Support secure cloud environments across … Azure, AWS, or GCP (e.g., IAM, security groups, encryption, KMS). Threat Detection & Incident Response Monitor and analyze security alerts and network traffic for threats or suspicious activity. Lead or support incident response activities: investigation, containment, eradication, recovery, and reporting. Conduct root cause analysis and implement security hardening improvements. Vulnerability & Risk Management Run regular vulnerability scans and penetration testing More ❯
is key to detecting, preventing, and responding to cybersecurity threats in a proactive and efficient manner. Key Responsibilities: Security Architecture & Implementation Design, deploy, and manage security solutions including firewalls, intrusiondetection/prevention systems, endpoint protection, SIEM, and identity management platforms. Implement secure network architecture and enforce segmentation and least-privilege access controls. Support secure cloud environments across … Azure, AWS, or GCP (e.g., IAM, security groups, encryption, KMS). Threat Detection & Incident Response Monitor and analyze security alerts and network traffic for threats or suspicious activity. Lead or support incident response activities: investigation, containment, eradication, recovery, and reporting. Conduct root cause analysis and implement security hardening improvements. Vulnerability & Risk Management Run regular vulnerability scans and penetration testing More ❯
is key to detecting, preventing, and responding to cybersecurity threats in a proactive and efficient manner. Key Responsibilities: Security Architecture & Implementation Design, deploy, and manage security solutions including firewalls, intrusiondetection/prevention systems, endpoint protection, SIEM, and identity management platforms. Implement secure network architecture and enforce segmentation and least-privilege access controls. Support secure cloud environments across … Azure, AWS, or GCP (e.g., IAM, security groups, encryption, KMS). Threat Detection & Incident Response Monitor and analyze security alerts and network traffic for threats or suspicious activity. Lead or support incident response activities: investigation, containment, eradication, recovery, and reporting. Conduct root cause analysis and implement security hardening improvements. Vulnerability & Risk Management Run regular vulnerability scans and penetration testing More ❯
Banbury, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
IT infrastructure, cloud services, and cyber security. Proven continuous development in both technical and soft domains. Proficiency with security tools and technologies such as SIEM, DLP, network protection, threat detection, and endpoint protection. An understanding of network infrastructure such as VPNs, firewalls, switches, routers, LANs, IntrusionDetection, and vulnerability scanning. Understanding of IT and cyber security frameworks More ❯
Hook Norton, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
IT infrastructure, cloud services, and cyber security. Proven continuous development in both technical and soft domains. Proficiency with security tools and technologies such as SIEM, DLP, network protection, threat detection, and endpoint protection. An understanding of network infrastructure such as VPNs, firewalls, switches, routers, LANs, IntrusionDetection, and vulnerability scanning. Understanding of IT and cyber security frameworks More ❯
out cyber analysis . Working within the SOC, you will play a key role in helping to protect customer’s IT networks from cyber attack. Responsibilities : Monitor and analyse IntrusionDetection Systems (IDS), Anomaly Detection Systems (ADS), Firewall event logs, and Security Incident and Event Management (SIEM) toolset event logs to identify security attacks and threats for More ❯
platforms such as AWS, Azure, Google Cloud, and M365. Familiarity with security frameworks and standards (e.g., ISO 27001, NIST, CIS). Experience with security tools and technologies, including firewalls, intrusiondetection/prevention systems, and encryption. Excellent problem-solving skills and the ability to think critically and strategically. Strong communication and interpersonal skills, with the ability to engage More ❯
Champion ISO 20000 and ISO 27001 standards, ensuring compliance and audit readiness. Collaborate with the Information Security team to implement and maintain robust cybersecurity measures including firewalls, antivirus, and intrusiondetection systems. Ensure compliance with UK and EU data protection regulations (e.g., GDPR), and IT risk management frameworks. Design and lead the offshoring strategy for IT infrastructure services More ❯
Hatfield, Hertfordshire, South East, United Kingdom
Affinity Water Limited
simultaneously. Strong understanding of industrial control systems (ICS) and SCADA systems. Strong problem-solving skills and attention to detail. Proven experience with OT and IT security technologies, including firewalls, intrusiondetection systems (IDS), vulnerability detection, network discovery, log collection systems, and security information and event management (SIEM) solutions. UK Driving Licence. About Us Affinity Water is the More ❯
Lead risk assessments, threat modeling, and vulnerability management. Ensure compliance with ISO 27001, SOC 2, GDPR, HIPAA, and other relevant standards. Oversee incident response and monitoring to ensure rapid detection and remediation. Champion a security-first culture across engineering, research, and business teams. DevOps & Infrastructure Own and evolve CI/CD pipelines and deployment automation. Architect and manage scalable … experience in IT security leadership and DevOps/SRE management. Strong expertise in Cloud security & architecture (AWS/Azure/GCP). Knowledge of IAM, Zero Trust, SIEM, and intrusiondetection/prevention systems. Experience supporting AI/ML platforms and GPU clusters is a plus. Familiarity with compliance frameworks (SOC 2, ISO 27001, FedRAMP). Excellent leadership More ❯
london, south east england, united kingdom Hybrid/Remote Options
Growtoday AB
and attack artefacts. Proficiency with antivirus, vulnerability scanning and information security software. Detailed technical knowledge of database and operating system security. Hands on experience in security systems, including firewalls, intrusiondetection systems, anti-virus software, authentication systems, log management, content filtering, etc. Ability to discover and patch SQLi, XSS, CSRF, SSRF, authentication and authorization flaws, and other web More ❯
City of London, London, United Kingdom Hybrid/Remote Options
CSC
Nutanix Flow environment. Policy Development : Create and enforce security policies and procedures to protect network resources and data. Security Management : Manage and maintain security tools and technologies, including firewalls, intrusiondetection/prevention systems, and VPNs. Incident Response : Lead and coordinate responses to security incidents, including investigation, mitigation, and reporting. Compliance : Ensure compliance with relevant security standards and … Python, PowerShell, or Terraform. Security Certifications – Industry-recognized certifications such as CISSP, CISM, CCNP Security, AWS Certified Advanced Networking, or Nutanix Certified Professional – Multicloud Infrastructure (NCP-MCI). Threat Detection & Incident Response – Experience in real-time threat monitoring, and coordinated incident response efforts. Compliance & Governance – Familiarity with security frameworks and regulations such as GDPR, HIPAA, PCI-DSS, NIST, CIS More ❯
Nutanix Flow environment. Policy Development : Create and enforce security policies and procedures to protect network resources and data. Security Management : Manage and maintain security tools and technologies, including firewalls, intrusiondetection/prevention systems, and VPNs. Incident Response : Lead and coordinate responses to security incidents, including investigation, mitigation, and reporting. Compliance : Ensure compliance with relevant security standards and … Python, PowerShell, or Terraform. Security Certifications – Industry-recognized certifications such as CISSP, CISM, CCNP Security, AWS Certified Advanced Networking, or Nutanix Certified Professional – Multicloud Infrastructure (NCP-MCI). Threat Detection & Incident Response – Experience in real-time threat monitoring, and coordinated incident response efforts. Compliance & Governance – Familiarity with security frameworks and regulations such as GDPR, HIPAA, PCI-DSS, NIST, CIS More ❯
Conduct regular system audits to identify vulnerabilities and ensure compliance with security policies and regulations. Be involved in the deployment and maintenance of network security devices such as firewalls, intrusiondetection systems, and VPNs. Support the resolution of network security incidents, including conducting post-event analyses to prevent future incidents. Stay abreast of the latest cybersecurity threats and More ❯
you will focus on maintaining and enhancing the security of systems and infrastructure, ensuring protection against internal and external threats. Responsibilities: Monitor, maintain, and improve security systems, including firewalls, intrusiondetection/prevention systems, and endpoint protection. Conduct regular vulnerability assessments and manage system patches. Investigate and respond to security incidents and breaches. Oversee identity and access controls More ❯
diagnostic tools such as Wireshark, SolarWinds, or similar. Manage IP addressing schemes, VLANs, and routing protocols (e.g., OSPF, EIGRP). Ensure network security through access controls, firewall policies, and intrusiondetection systems. Collaborate with infrastructure and security teams on network upgrades, migrations, and architecture planning. Support server environments including Windows Server, Active Directory, and Microsoft Exchange. Maintain accurate More ❯
Employment Type: Full-Time
Salary: £40,000 - £450,000 per annum, Inc benefits
can already do Minimum of 3–5 years’ experience in a security engineering or closely related IT security role Strong hands-on knowledge of security technologies (such as firewalls, intrusiondetection/prevention systems, endpoint protection, SIEM, vulnerability management tools, etc.) Experience administering and supporting security solutions within cloud and on-premises environments Proven capability in responding to More ❯
tools such as Splunk, Flexera, and other industry-standard SIEM platforms. You'll investigate security incidents, coordinate with other IT and security teams, and support continuous improvement of threat detection and response processes. Key Requirements: Previous experience in a SOC Analyst or similar cybersecurity role Strong expertise in Splunk or similar SIEM tools Familiarity with Flexera for vulnerability management … Understanding of firewalls, network protocols, intrusiondetection/prevention systems Relevant certifications (e.g., CISSP, CEH, Splunk) advantageous Must be eligible for Developed Vetting (DV) clearance , requiring 10 years continuous UK residency Please Note: All offers will be subject to standard pre-employment checks including ID, employment history (last 3 years), immigration status, and an unspent criminal record check.This More ❯
across the following areas: Threat prevention: anti-malware, content filtering, and advanced threat protection (Palo Alto, Check Point, Cisco) Cloud network security: particularly within Microsoft Azure Perimeter security: firewalls, intrusiondetection and prevention (IDS/IPS) Web Application Firewalls (WAF): SaaS, on-prem, or Azure-based deployments Secure connectivity: SSL VPNs, remote access, and segmentation best practices Modern More ❯
DMZ environments, NAC solutions, routers, and gateways. Configure and manage firewalls, perform rule assessments, and apply segmentation and zoning strategies aligned with Zero Trust principles. Utilise network monitoring and intrusiondetection/prevention systems (IDS/IPS) to identify and respond to potential security threats. Conduct OS-level hardening across server environments to minimising vulnerabilities Strengthen virtualisation and More ❯
Cisco Nexus switches, Cisco ASA firewalls, F5 LTM and DNS load balancers. Strong network design and management skills and experience, including setting up firewall rules, dynamic routing, load balancing, intrusiondetection and prevention, setting up remote access and site-to-site VPNs. Strong practical experience of following ITIL processes in a 24x7 operations environment with tight SLA and More ❯