software-defined data center to hybrid cloud computing and the mobile workspace. We have an exciting opportunity for a Principal Engineer on our Network Detection and Research Team part of the ANS Business Unit. Our team is responsible for the development of the network intrusiondetection capabilities … for VMware vDefend Advanced Threat Prevention (ATP), a cutting-edge networking and security analytics solution for the detection and prevention of advanced threats. The team has been operating since 2014 and has built the award-winning network detection capabilities in the Lastline Defender product, now part of the … NSX family. We are passionate about network detection and threat research, and combine in a single team C/C++ developers responsible for engine development with developers maintaining the data collection infrastructure (on top of GCP/k8s) and the development of new detection capabilities in the product. More ❯
network infrastructure and data. - Manage risk assessments and vulnerability assessments to identify potential security threats. - Oversee the implementation of security measures such as firewalls, intrusiondetection systems, and data encryption technologies. - Provide training and guidance to staff on information security best practices. - Stay updated on the latest cybersecurity … MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional;CCNA/CCNP Experience with security tools and technologies such as intrusiondetection systems, SIEM, and vulnerability management tools. Familiarity with regulatory requirements and industry standards related to IT security. Hays Specialist Recruitment Limited acts More ❯
london (city of london), south east england, united kingdom
Hays
network infrastructure and data. - Manage risk assessments and vulnerability assessments to identify potential security threats. - Oversee the implementation of security measures such as firewalls, intrusiondetection systems, and data encryption technologies. - Provide training and guidance to staff on information security best practices. - Stay updated on the latest cybersecurity … MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional;CCNA/CCNP Experience with security tools and technologies such as intrusiondetection systems, SIEM, and vulnerability management tools. Familiarity with regulatory requirements and industry standards related to IT security. Hays Specialist Recruitment Limited acts More ❯
and enterprise technologies, advising on secure architecture patterns, cloud automation, and evolving security threats. Own the evaluation of security tools and recommend technologies for intrusiondetection and prevention, security monitoring, web application firewalls (WAF), and data encryption, among others. Lead the evaluation of security tools and recommend technologies … for intrusiondetection and prevention, security monitoring, web application firewalls (WAF), and data encryption, among others. Who we are The UK's fastest broadband network. The nation's best-loved mobile brand. And, one of the UK's biggest companies too. Diverse, high performing teams - jam packed with More ❯
and enterprise technologies, advising on secure architecture patterns, cloud automation, and evolving security threats. Own the evaluation of security tools and recommend technologies for intrusiondetection and prevention, security monitoring, web application firewalls (WAF), and data encryption, among others. Lead the evaluation of security tools and recommend technologies … for intrusiondetection and prevention, security monitoring, web application firewalls (WAF), and data encryption, among others. Who we are The UK's fastest broadband network. The nation's best-loved mobile brand. And, one of the UK's biggest companies too. Diverse, high performing teams - jam packed with More ❯
to have in-depth understanding of network architecture to design, implement, and manage secure and efficient segmentation and proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and respond to security incidents. The OT Security Engineer will have ownership and responsibility to lead and drive security … Engineering, Information Technology. In-depth understanding of network architecture to design, implement, and manage secure and efficient networks. Proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. Strong ability to collaborate with cross-functional teams More ❯
to have in-depth understanding of network architecture to design, implement, and manage secure and efficient segmentation and proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and respond to security incidents. The OT Security Engineer will have ownership and responsibility to lead and drive security … Engineering, Information Technology. In-depth understanding of network architecture to design, implement, and manage secure and efficient networks. Proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. Strong ability to collaborate with cross-functional teams More ❯
to have in-depth understanding of network architecture to design, implement, and manage secure and efficient segmentation and proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and respond to security incidents. The OT Security Engineer will have ownership and responsibility to lead and drive security … Engineering, Information Technology In-depth understanding of network architecture to design, implement, and manage secure and efficient networks. Proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. Strong ability to collaborate with cross-functional teams More ❯
to have in-depth understanding of network architecture to design, implement, and manage secure and efficient segmentation and proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and respond to security incidents. The OT Security Engineer will have ownership and responsibility to lead and drive security … Engineering, Information Technology In-depth understanding of network architecture to design, implement, and manage secure and efficient networks. Proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. Strong ability to collaborate with cross-functional teams More ❯
Engineer to join our team. If you have a passion for cybersecurity, thrive on solving complex security challenges, and are experienced in advanced threat detection and response, we’d love to hear from you! As a Senior Security Engineer, you will be responsible for protecting our systems, networks, and … Monitor systems and networks for suspicious activity and engage in response procedures as necessary. Manage and document all stages of security incident response, including detection, containment, and recovery. Work closely with the Crisis Management Team and be prepared to respond, liaise with customers and take action, as and when … and network security architecture Experience conducting vulnerability assessments, incident response, and forensics using tools such as Nessus Proficiency in threat hunting, malware analysis, and intrusiondetection techniques Familiarity with compliance frameworks (e.g., NIST, ISO, PCI-DSS) and regulatory requirements Strong analytical skills with the ability to think like More ❯
examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity analysts to detect, mitigate, and analyze threats. … meetings and provides expert input to ensure security is maintained. Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusiondetection and prevention, eDiscovery, and content filtering. Ability to manage and continuously improve upon vulnerability management program. Ability to propose solutions for closing More ❯
network security. Understanding of 3GPP mobile network CORE and RAN architectures and security requirements. Strong knowledge of network security protocols, VPN, firewall management, and intrusiondetection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks (e.g., GDPR More ❯
record of delivering complex projects successfully. Strong experience with control frameworks such as ISO27001, NIST, CPS234, and COBIT. Extensive experience with security technologies, including IntrusionDetection, Anti-virus/anti-malware, Database Activity Monitoring, Data Loss Prevention, Penetration Testing, Firewalls, and Security Log management tools. Ability to identify More ❯
Route 53, AWS GuardDuty, AWS Security Hub, and AWS Inspector. Proficiency in network security protocols such as IPSec and SSL/TLS, and managing intrusiondetection/prevention systems (IDS/IPS). Experience with SD-WAN technologies and SIEM solutions. Strong understanding of Terraform for infrastructure management More ❯
classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who More ❯
are mandatory. You will have a strong understanding of as many of the following areas as possible, and be able to demonstrate it: Security Detection and Monitoring Incident Response Detection Engineering Malware Analysis (Static and Dynamic) Threat Hunting and Threat Intelligence (MITRE ATT&CK) Cloud Security Penetration Testing … SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (Carbon Black, Microsoft Defender ATP, FireEye, CrowdStrike) IntrusionDetection/Prevention Systems (IDS/IPS) (Suricata, Snort, Bro, Cisco, Palo Alto) Web Proxies (Bluecoat, Zscaler, Squid, Cisco/OpenDNS Umbrella) Networking More ❯
modeling, and risk assessments; strong understanding of information security principles, including confidentiality, integrity, and availability. Experience with security tools and technologies, including vulnerability scanners, intrusiondetection systems, and security information and event management (SIEM) systems. Excellent communication and interpersonal skills, with the ability to collaborate effectively with cross … Generous PTO, plus company holidays Comprehensive medical and dental insurance Paid parental leave for all parents (12 weeks) Fertility and family planning support Early-detection cancer testing through Galleri Competitive pension scheme and company contribution Annual work-life stipends for: Home office setup, cell phone, internet Wellness stipend for More ❯
modeling, and risk assessments; strong understanding of information security principles, including confidentiality, integrity, and availability. Experience with security tools and technologies, including vulnerability scanners, intrusiondetection systems, and security information and event management (SIEM) systems. Excellent communication and interpersonal skills, with the ability to collaborate effectively with cross … Generous PTO, plus company holidays Comprehensive medical and dental insurance Paid parental leave for all parents (12 weeks) Fertility and family planning support Early-detection cancer testing through Galleri Competitive pension scheme and company contribution Annual work-life stipends for: Home office setup, cell phone, internet Wellness stipend for More ❯
understanding of security frameworks and regulations (e.g., NIST CSF, ISO 27001, GDPR, CIS controls). Familiarity with security technologies such as SIEM, endpoint security, intrusiondetection, and secure coding practices. Excellent problem-solving skills and the ability to translate security concepts into technical solutions. Strong communication skills, with More ❯
MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional; CCNA/CCNP Experience with security tools and technologies such as intrusiondetection systems, SIEM, and vulnerability management tools. Familiarity with regulatory requirements and industry standards related to IT security. If you're interested in More ❯
eg ISO 27001) as part of critical vendor performance assessment ensuring operational resilience is maintained. In collaboration with GT, manage security systems, including firewalls, intrusiondetection/prevention systems, and antivirus software. In collaboration with GT, Develop and test incident response plans and coordinate responses to security incidents More ❯
knowledge of the threat landscape relevant to SaaS products, preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusiondetection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools. You own relevant certifications (Security+, IAT II/III level or similar More ❯
knowledge of the threat landscape relevant to SaaS products, preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusiondetection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools. You own relevant certifications (Security+, IAT II/III level or similar More ❯
identify vulnerabilities, threats, and potential breaches. Conduct regular security assessments, audits, and penetration testing. Collaborate with IT and security teams to implement firewalls, VPNs, intrusiondetection/prevention systems (IDS/IPS), and other security technologies. Develop and enforce security policies, procedures, and best practices to maintain compliance More ❯
implement comprehensive security strategies, policies, and procedures to protect the organization's information assets. Design, deploy, and manage security solutions, including PAM/IAM, intrusiondetection/prevention systems, endpoint protection, data loss prevention, encryption, and vulnerability management tools. Design and manage security in the cloud, including AWS More ❯