Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
vulnerabilities are addressed first. Work with the Customer Business Owners to ensure they fully understand the risks, and can effectively coordinate the recommended remediation Oversee the upkeeping of the intrusiondetection system (IDS) and intrusion prevention system (IPS) signatures for customer's security gateways and Firewalls. What's important? It starts with amazing people, challenging projects and More ❯
incidents, and evolving defences to meet shifting risks. Key responsibilities include: Monitor Networks and Systems: Continuously monitor the organisation’s networks and systems for security breaches or intrusions. Threat Detection and Response: Detect and respond to threats or security incidents by analysing data from various incident reports and alerts. Security Audits: Perform regular audits to ensure that systems and … of 2-3 years of experience in IT Infrastructure including security. Strong understanding of network protocols and security technologies. Proficiency in using security tools such as firewalls, antivirus, and intrusiondetection systems. Excellent analytical and problem-solving skills. Ability to work under pressure and handle multiple tasks simultaneously. Strong communication and interpersonal skills. What you’ll get in More ❯
Redscan (a trading name of Redscan Cyber Security Limited)
Requirements A passion for Cyber Security and enjoys solving problems Knowledge of the security threat landscape Knowledge of various security methodologies and processes, and technical security solutions (firewall and intrusiondetection systems) Knowledge of TCP/IP Protocols, network analysis, and network/security applications Knowledge of common Internet protocols and applications Ability to multi-task, prioritize, and More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Robert Walters
new solutions as required. Contribute to the deployment of advanced security tools and technologies that enhance the organisation's overall cyber resilience. Oversee the incident management process by supporting detection, response, reporting, and resolution of security incidents. Prepare clear security metrics reports for stakeholders at all levels to inform decision-making and demonstrate progress against objectives. Promote a culture … highly valued. Recognised information security frameworks such as ISO 27001 or NIST ensures you can contribute meaningfully to policy development. A solid understanding of core security technologies-including firewalls, intrusiondetection systems, endpoint protection platforms-and their practical application is important. Experience supporting vulnerability management processes from identification through remediation demonstrates your ability to manage risk proactively. Proficiency More ❯
OPC UA, DNP3, Modbus TCP/IP) and methods to diagnose/debug using Wireshark. Configuring server operating systems, i.e. Windows Server. Configuring next generation firewalls such as Fortinet. IntrusionDetection Systems such as Nozomi, Radiflow. Anti-malware, patch management and disaster recovery tools. Network monitoring and management. Standard cyber topics such as VPN technologies, Secure Network Access More ❯
and the technical skills required to develop, implement, and secure such cyber-physical systems. Experience or interest in cybersecurity and cyber threats (ie - designing secure products, systems, and applications; intrusiondetection; digital forensics; system recovery; risk assessment tools and methods; security solutions, policies, standards, and procedures, etc.). Knowledge and/or experience in applying Product Security policies More ❯