Job Title: Cybersecurity Architect Location: London, UK Type: Perm Role (Hybrid 2 days a week) RESPONSIBILITIES Design and implement secure network architectures including firewalls intrusiondetection prevention systems and encryption technologies Adhere to enterprise governance review processes to deliver project goals deliverables Follow enterprise ITSM CMDB processes Monitor and analyze security s using Security Information and Event Management … Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto etc Experience with intrusiondetection/prevention systems as well as with SIEM tools and security incident response Excellent problem solving skills analytical thinking and the ability to communicate effectively with diverse More ❯
Job Title: Cybersecurity Architect Location: London, UK Type: Perm Role (Hybrid 2 days a week) RESPONSIBILITIES Design and implement secure network architectures including firewalls intrusiondetection prevention systems and encryption technologies Adhere to enterprise governance review processes to deliver project goals deliverables Follow enterprise ITSM CMDB processes Monitor and analyze security s using Security Information and Event Management … Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto etc Experience with intrusiondetection/prevention systems as well as with SIEM tools and security incident response Excellent problem solving skills analytical thinking and the ability to communicate effectively with diverse More ❯
Job Title: Cybersecurity Architect Location: London, UK Type: Perm Role (Hybrid 2 days a week) RESPONSIBILITIES Design and implement secure network architectures including firewalls intrusiondetection prevention systems and encryption technologies Adhere to enterprise governance review processes to deliver project goals deliverables Follow enterprise ITSM CMDB processes Monitor and analyze security s using Security Information and Event Management … Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto etc Experience with intrusiondetection/prevention systems as well as with SIEM tools and security incident response Excellent problem solving skills analytical thinking and the ability to communicate effectively with diverse More ❯
of unusual or malicious activity. * Conduct regular security assessments and audits to identify vulnerabilities, risks, and potential areas for improvement. * Implement and maintain security tools and protocols, including firewalls, intrusiondetection systems, and endpoint protection. * Investigate security incidents, respond to potential breaches, and document all relevant findings and actions. * Develop security policies, standards and best practices for the … solutions through projects. * Managing relationships with security vendors & service providers. Key Skills: * Significant experience in a Security focused role. * Experience building, operating, and maintaining security systems. * Experience with firewalls, intrusiondetection systems, antivirus software, authentication systems, content filtering, and log management. * Experience with network security and networking technologies. * Knowledge of security frameworks and certifications - NIST, ISO27001, Cyber Essentials More ❯
many other services to customers all over the world. The role is responsible for overseeing physical security design and the installation of security features and systems including Access Control, IntrusionDetection, Camera Surveillance, Passive and Active Barriers, and other security features and capabilities consistent with AWS security standards and public sector contract requirements. This role will perform security … t achieve in the cloud. BASIC QUALIFICATIONS • 3+ years of experience working with physical security design and/or implementation of electronic security systems such as Access Control System, IntrusionDetection System, and CCTV Surveillance systems. Familiarity with security in depth strategies. • 2+ years of experience in program or project management, working with both technical and non-technical More ❯
Paddington, Greater London, England Hybrid / WFH Options
Nexus Jobs Limited
data loss protection and data classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who support and operate the Company More ❯
to ensure the security of network infrastructure and data.- Manage risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusiondetection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
Microsoft Sentinel Microsoft Defender (Cloud, Endpoint, Office 365) Microsoft Entra ID (Azure AD) Microsoft Purview Microsoft Intune Azure Security Center Information Security (On-Premise): Firewalls (e.g. Palo Alto, Fortinet) IntrusionDetection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & Access Management (IAM) Patch management and vulnerability scanning Data Loss More ❯
to ensure the security of network infrastructure and data.- Manage risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusiondetection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor More ❯
in building and scaling a more transparent and efficient financial markets infrastructure. As a SecOps Lead at Flowdesk, you will be the principal point of contact for our Managed Detection and Response partner , ensuring rapid, coordinated responses to security incidents and continually enhancing Flowdesk's security posture. Your mission will be to Serve as the primary interface for our … as incident commander during security events, coordinating with IT, engineering, and business teams to ensure swift containment and recovery. Review and tune security alerts with the MDR provider, refining detection rules to minimize false positives and improve threat identification accuracy. Develop, track, and report on key MDR performance indicators (KPIs) to leadership, highlighting trends and the effectiveness of security … threat detection. Strong knowledge of EDR tools (e.g., CrowdStrike, SentinelOne, Carbon Black) and their role in detecting and responding to threats on endpoints. Solid understanding of network protocols, firewalls, intrusiondetection/prevention systems (IDS/IPS), and network traffic analysis. Familiarity with security principles and services in major cloud environments (AWS, Azure, GCP). Ability to consume More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
Microsoft Sentinel Microsoft Defender (Cloud, Endpoint, Office 365) Microsoft Entra ID (Azure AD) Microsoft Purview Microsoft Intune Azure Security Center Information Security (On-Premise): Firewalls (e.g. Palo Alto, Fortinet) IntrusionDetection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & Access Management (IAM) Patch management and vulnerability scanning tools Data More ❯
programs, including: CCTV/Alarm Monitoring and Response - provide comprehensive physical security monitoring for threats to the firm's assets, employees, and customers. GSICs monitor the access control system, intrusiondetection and panic alarm systems for threats and use the systems and CCTV systems to initiate and coordinate a security response to security and safety incidents or crisis More ❯
programs, including: CCTV/Alarm Monitoring and Response - provide comprehensive physical security monitoring for threats to the firm's assets, employees, and customers. GSICs monitor the access control system, intrusiondetection and panic alarm systems for threats and use the systems and CCTV systems to initiate and coordinate a security response to security and safety incidents or crisis More ❯
and independent mindset. Effective communication and teamwork skills. Desirable: C programming skills for low-level or performance-critical development. Experience with containerisation (Docker, Kubernetes). Familiarity with endpoint security, intrusiondetection, or system hardening. Contributions to Linux or open-source projects. Experience with debugging, profiling, or performance optimisation tools. Why Join Us Shape the future of secure endpoint More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Career poster
and independent mindset. Effective communication and teamwork skills. Desirable: C programming skills for low-level or performance-critical development. Experience with containerisation (Docker, Kubernetes). Familiarity with endpoint security, intrusiondetection, or system hardening. Contributions to Linux or open-source projects. Experience with debugging, profiling, or performance optimisation tools. Why Join Us Shape the future of secure endpoint More ❯
maintaining robust security solutions. Key Responsibilities Security Assessments & Vulnerability Management: Identifying weaknesses in systems and networks through vulnerability assessments and penetration testing. Implementing Security Solutions: Putting in place firewalls, intrusiondetection systems (IDS), and other tools to actively block and monitor for threats. Patch Management: Ensuring all systems are up-to-date with the latest security patches to More ❯
TCP/IP networking Knowledge of virtual desktop infrastructure RDS, Citrix, VMware Horizon, Parallels, etc Aruba/HP/Brocade Switch configuration and management Remote access and VPN technologies Intrusiondetection & prevention solutions Knowledge of Database technology such as MariaDB/Postgres Experience of working with Cisco, Sophos, Fortinet, Palo Alto firewalls Hands on experience with log aggregation More ❯
research and development, and innovation within one or more of the Cybersecurity sciences (e.g. network, endpoint and cloud security, cryptography, malware analysis, vulnerability assessment, privileged access management, anomaly/intrusiondetection, incident response, or offensive security). The Principal Cybersecurity Analytics Engineer role is a key leadership, hands on technical role, contributing to, coordinating, and leading delivery of More ❯
escalation point for noteworthy investigations, deeper investigations, and those that require critical attention. Continue to build out new capabilities within the program aligned with our attack surface. Opportunities include detection enhancements, improved or new standard operating procedures, and working with internal teams to tune and operationalize new technologies. Focus on continuing to develop dashboards, direct alerting, risk-based alerting … threat intelligence, breach attack simulation, or similar programs. Strong understanding of the fundamentals such as packet, file, and log analysis. Knowledgeable with various security infrastructure tools such as firewalls, intrusion prevention/detection systems, proxy servers, email controls, anonymizing technology, data loss prevention, Endpoint Detection and Response (EDR), and SIEM (Splunk) Strong understanding of common communication protocols More ❯