Security Manager. Responsible for ensuring that all servers and other IT related equipment is hardened against industry security best practices and standards. Performs audits of firewall(s), log management, intrusiondetection systems, and content filtering controls (email, DLP and other technical controls). Conducts internal security audits and reviews as needed, together with appropriate recommendations and conclusions. Identifies … such as firewalls, IDS/IPS, SIEM, DLP, and Endpoint protection solutions. Good understanding and knowledge of security concepts, protocols, processes, architectures, and platforms (authentication and access control technologies, intrusiondetection, network traffic analysis, Web Application Firewalls, Encryption and Key Management, SIEM technology, incident handling, media/malware analysis, etc.) Good knowledge of cloud technologies, architecture, and security More ❯
Security Manager. Responsible for ensuring that all servers and other IT related equipment is hardened against industry security best practices and standards. Performs audits of firewall(s), log management, intrusiondetection systems, and content filtering controls (email, DLP and other technical controls). Conducts internal security audits and reviews as needed, together with appropriate recommendations and conclusions. Identifies … such as firewalls, IDS/IPS, SIEM, DLP, and Endpoint protection solutions. Good understanding and knowledge of security concepts, protocols, processes, architectures, and platforms (authentication and access control technologies, intrusiondetection, network traffic analysis, Web Application Firewalls, Encryption and Key Management, SIEM technology, incident handling, media/malware analysis, etc.) Good knowledge of cloud technologies, architecture, and security More ❯
Security Manager. Responsible for ensuring that all servers and other IT related equipment is hardened against industry security best practices and standards. Performs audits of firewall(s), log management, intrusiondetection systems, and content filtering controls (email, DLP and other technical controls). Conducts internal security audits and reviews as needed, together with appropriate recommendations and conclusions. Identifies … such as firewalls, IDS/IPS, SIEM, DLP, and Endpoint protection solutions. Good understanding and knowledge of security concepts, protocols, processes, architectures, and platforms (authentication and access control technologies, intrusiondetection, network traffic analysis, Web Application Firewalls, Encryption and Key Management, SIEM technology, incident handling, media/malware analysis, etc.) Good knowledge of cloud technologies, architecture, and security More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
Witherslack Group
experience in an IT Security Analyst role Proven experience developing, operating and maintaining security systems Knowledge of security systems including anti-virus applications, content filtering, firewalls, authentication systems and intrusiondetection and notification systems Extensive skills and knowledge of Azure and associated applications Critical thinking skills and ability to solve complex problems Hands on experience in security systems … including firewalls, intrusiondetection systems, anti-virus software, authentication systems, log management, content filtering, etc Experience of multiple operating systems e.g., Windows, Linux Experience in building and maintaining security systems It is also desirable but not essential that you have: Knowledge of security protocols and principles Experience of Data Security Protection Toolkit Experience of developing Standard Operating Procedures More ❯
East London, London, United Kingdom Hybrid / WFH Options
Witherslack Group
experience in an IT Security Analyst role Proven experience developing, operating and maintaining security systems Knowledge of security systems including anti-virus applications, content filtering, firewalls, authentication systems and intrusiondetection and notification systems Extensive skills and knowledge of Azure and associated applications Critical thinking skills and ability to solve complex problems Hands on experience in security systems … including firewalls, intrusiondetection systems, anti-virus software, authentication systems, log management, content filtering, etc Experience of multiple operating systems e.g., Windows, Linux Experience in building and maintaining security systems It is also desirable but not essential that you have: Knowledge of security protocols and principles Experience of Data Security Protection Toolkit Experience of developing Standard Operating Procedures More ❯
across the lifecycle of integrated security systems. This includes oversight of Genetec, Lenel, and other VMS platforms, as well as POS integration, video analytics, facial recognition software, access control, intrusiondetection, and CCTV surveillance technologies. The SDM will work closely with internal functions (Service Desk, NOC, PMO, Engineering and Field Teams) to deliver consistent, high-quality outcomes. They … and Safety Systems Strong technical awareness of Genetec, Lenel, and other VMS platforms , as well as POS integrations, video analytics, and facial recognition software Knowledge of access control, CCTV, intrusiondetection, and integrated security platforms Experience developing t raining programmes and technical documentation , and delivering training to customer teams Strong service management and planning skills , with the ability More ❯
is key to detecting, preventing, and responding to cybersecurity threats in a proactive and efficient manner. Key Responsibilities: Security Architecture & Implementation Design, deploy, and manage security solutions including firewalls, intrusiondetection/prevention systems, endpoint protection, SIEM, and identity management platforms. Implement secure network architecture and enforce segmentation and least-privilege access controls. Support secure cloud environments across … Azure, AWS, or GCP (e.g., IAM, security groups, encryption, KMS). Threat Detection & Incident Response Monitor and analyze security alerts and network traffic for threats or suspicious activity. Lead or support incident response activities: investigation, containment, eradication, recovery, and reporting. Conduct root cause analysis and implement security hardening improvements. Vulnerability & Risk Management Run regular vulnerability scans and penetration testing More ❯
Sunbury-On-Thames, London, United Kingdom Hybrid / WFH Options
BP Energy
office/remote working Skills: Automation system digital security, Client Counseling, Conformance review, Digital Forensics, Incident management, incident investigation and response, Information Assurance, Information Security, Information security behaviour change, Intrusiondetection and analysis, Legal and regulatory environment and compliance, Risk Management, Secure development, Security administration, Security architecture, Security evaluation and functionality testing, Solution Architecture, Stakeholder Management, Supplier security More ❯
Paddington, Greater London, England Hybrid / WFH Options
Nexus Jobs Limited
data loss protection and data classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who support and operate the Company More ❯
requirements gathering through to procurement, budgeting, vendor management , and security assessments . Security, Compliance & Governance Partner with Information Security teams to enhance network security posture , addressing vulnerabilities and implementing intrusiondetection/prevention systems. Ensure ongoing compliance with ISO 27001, PCI-DSS , and other relevant regulatory standards. Drive a proactive approach to incident response, monitoring, and continuous threat … detection . Oversee audit readiness and maintain comprehensive network documentation and asset inventories. People & Stakeholder Leadership Build, develop, and mentor a high-performing network engineering team , fostering a culture of excellence, accountability, and continuous learning. Set clear objectives, manage performance, and align team skills with evolving business and technology needs. Act as the trusted technical adviser to senior stakeholders More ❯
requirements gathering through to procurement, budgeting, vendor management , and security assessments . Security, Compliance & Governance Partner with Information Security teams to enhance network security posture , addressing vulnerabilities and implementing intrusiondetection/prevention systems. Ensure ongoing compliance with ISO 27001, PCI-DSS , and other relevant regulatory standards. Drive a proactive approach to incident response, monitoring, and continuous threat … detection . Oversee audit readiness and maintain comprehensive network documentation and asset inventories. People & Stakeholder Leadership Build, develop, and mentor a high-performing network engineering team , fostering a culture of excellence, accountability, and continuous learning. Set clear objectives, manage performance, and align team skills with evolving business and technology needs. Act as the trusted technical adviser to senior stakeholders More ❯
requirements gathering through to procurement, budgeting, vendor management , and security assessments . Security, Compliance & Governance Partner with Information Security teams to enhance network security posture , addressing vulnerabilities and implementing intrusiondetection/prevention systems. Ensure ongoing compliance with ISO 27001, PCI-DSS , and other relevant regulatory standards. Drive a proactive approach to incident response, monitoring, and continuous threat … detection . Oversee audit readiness and maintain comprehensive network documentation and asset inventories. People & Stakeholder Leadership Build, develop, and mentor a high-performing network engineering team , fostering a culture of excellence, accountability, and continuous learning. Set clear objectives, manage performance, and align team skills with evolving business and technology needs. Act as the trusted technical adviser to senior stakeholders More ❯
london (city of london), south east england, united kingdom
AirSearch
requirements gathering through to procurement, budgeting, vendor management , and security assessments . Security, Compliance & Governance Partner with Information Security teams to enhance network security posture , addressing vulnerabilities and implementing intrusiondetection/prevention systems. Ensure ongoing compliance with ISO 27001, PCI-DSS , and other relevant regulatory standards. Drive a proactive approach to incident response, monitoring, and continuous threat … detection . Oversee audit readiness and maintain comprehensive network documentation and asset inventories. People & Stakeholder Leadership Build, develop, and mentor a high-performing network engineering team , fostering a culture of excellence, accountability, and continuous learning. Set clear objectives, manage performance, and align team skills with evolving business and technology needs. Act as the trusted technical adviser to senior stakeholders More ❯
and risk assessments to identify and address potential vulnerabilities. - Develop and maintain security policies and procedures in accordance with industry standards. - Configure and manage security tools, such as firewalls, intrusiondetection systems, and encryption technologies. - Monitor network traffic and system logs for suspicious activity and respond to security incidents in a timely manner. - Stay updated on the latest More ❯
the Cyber Fusion Centre. You will report directly to the Head of Insider Risk Management and manage a team of investigators, overseeing complex security investigations, and enhancing insider risk detection and response capabilities. You will play an important leadership role in developing programmes, driving continuous improvement, and encouraging collaboration. Summary of Primary Responsibilities Collaborate with the Head of Insider … documented case summaries. Analyze data from technical and behavioral sources to detect and respond to insider risk incidents. Develop & maintain insider threat indicators and use case scenarios to improve detection accuracy. Manage and mentor a geographically dispersed team of investigators. Support professional development and foster expertise in insider risk and investigative practices. Work closely with partner teams (e.g., HR … Legal, Threat Detection Engineering, etc.) on threat detection and response initiatives to ensure coordinated and effective risk mitigation. Create and deliver insider risk awareness content, highlighting emerging trends and fostering a culture of vigilance and shared responsibility. Produce executive-level documentation, including SOPs, playbooks, process Qualifications Experience at management level working in insider risk, counterintelligence, or law enforcement More ❯
support of business requirements. Knowledge, Skills, Experience & Qualifications Education and Qualifications Networks -Network Security Technology experience in this area includes but is not limited to: • Perimeter Security, including firewalls, intrusiondetection/prevention (IDS/IPS), anti-malware and threat prevention (Check Point, Palo Alto Networks and Cisco). • Cloud network security (Check Point and Microsoft Azure). More ❯