Great Malvern, England, United Kingdom Hybrid / WFH Options
TieTalent
investigate high-priority alerts, analyse logs, or network traffic and endpoint activity using tools like Splunk. Whether you're monitoring security alarms, creating new detection content, using threat intelligence to strengthen our defences, or responding to breaches, each day will begin with a team meeting to review ongoing investigations … impact. About You You’ll bring a background in cyber security analysis and a passion for IT. Ideally, you’ll have experience with host intrusiondetection analysis, but don’t worry if that’s an area you’re still developing in - plenty of training will be provided. You … working as a Cyber Security/Security Operations Centre Analyst Evidence of experience working in at least one of the following fields: malware analysis, intrusiondetection and incident response Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria will be More ❯
Evesham, England, United Kingdom Hybrid / WFH Options
TieTalent
investigate high-priority alerts, analyse logs, or network traffic and endpoint activity using tools like Splunk. Whether you're monitoring security alarms, creating new detection content, using threat intelligence to strengthen our defences, or responding to breaches, each day will begin with a team meeting to review ongoing investigations … impact. About You You’ll bring a background in cyber security analysis and a passion for IT. Ideally, you’ll have experience with host intrusiondetection analysis, but don’t worry if that’s an area you’re still developing in - plenty of training will be provided. You … working as a Cyber Security/Security Operations Centre Analyst Evidence of experience working in at least one of the following fields: malware analysis, intrusiondetection and incident response Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria will be More ❯
co-ordinator (SAC). An understanding of MOD Secure by Design policy and process. Deep technical expertise in security technologies and solutions, including firewalls, intrusiondetection/prevention systems (IDS/IPS), endpoint protection, encryption, identity and access management (IAM), and security information and event management (SIEM) systems. More ❯
procedures to ensure the protection of network infrastructure and communication systems. Oversee the design and implementation and maintenance of network security solutions, including firewalls, intrusiondetection/prevention systems and secure communication channels. Monitor network reports for security incidents and respond promptly to mitigate risks and breaches. Work More ❯
and query development Experience Needed: Managing serious cyber incidents as a digital forensic responder Working in large, complex enterprise environments Understanding of security monitoring, intrusiondetection, and control systems Technical expertise in networks, malware analysis, and forensics Effective communication with senior stakeholders Company Overview: Element is a global More ❯
procedures to ensure the protection of network infrastructure and communication systems. Oversee the design and implementation and maintenance of network security solutions, including firewalls, intrusiondetection/prevention systems and secure communication channels. Monitor network reports for security incidents and respond promptly to mitigate risks and breaches. Work More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Crimson
procedures to ensure the protection of network infrastructure and communication systems. Oversee the design and implementation and maintenance of network security solutions, including firewalls, intrusiondetection/prevention systems and secure communication channels. Monitor network reports for security incidents and respond promptly to mitigate risks and breaches. Work More ❯
query development Experience Needed: Managing serious cyber incidents as a digital forensic incident responder Working within large, complex enterprise environments Understanding of security monitoring, intrusiondetection, and prevention systems Technical expertise in networks, malware analysis, and digital forensics Effective communication with senior stakeholders Company Overview: Element is a More ❯
procedures to ensure the protection of network infrastructure and communication systems. Oversee the design and implementation and maintenance of network security solutions, including firewalls, intrusiondetection/prevention systems and secure communication channels. Monitor network reports for security incidents and respond promptly to mitigate risks and breaches. Work More ❯
Experience Needed: Extensive experience managing serious cyber incidents as a digital forensic responder. Proven success in large, complex enterprise environments. Understanding of security monitoring, intrusiondetection, prevention, and control systems. Technical expertise in networks, malware analysis, and digital forensics. Effective communication with senior stakeholders. Company Overview Element is More ❯
hunting queries. Experience Needed: Managing serious cyber incidents as a Digital Forensics Incident Responder. Working effectively within large, complex enterprise environments. Understanding security monitoring, intrusiondetection, prevention, and control systems. Technical expertise in networks, malware analysis, digital forensics, etc. Strong attention to detail and communication skills with senior More ❯
Incidents, as a Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware More ❯
Incidents, as an Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware More ❯
Incidents, as an Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware More ❯
experience as a System Administrator, Network Administrator, or similar role. Experience with databases, networks (LAN, WAN) and patch management. Knowledge of system security (e.g. intrusiondetection systems) and data backup/recovery. Technologies like Fortinet, OnlyKey etc. Familiarity with various operating systems and platforms (Linux, OSX & Windows.) Resourcefulness More ❯
Stafford, England, United Kingdom Hybrid / WFH Options
risual Limited
you bring? Extensive knowledge of network protocols and technologies, including TCP/IP, DNS, DHCP, VLANs, and VPNs. Experience with network security, including firewalls, intrusiondetection/prevention systems, and access control. Knowledge of routing and switching technologies, including OSPF, BGP, and VLANs. Experience with network monitoring tools More ❯
with big data technologies (Databricks, Spark). Development of custom security applications, APIs, AI/ML models, and advanced analytics technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusiondetection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and analytics in Databricks, Synapse Analytics, and large-scale data warehouses (Snowflake, Redshift, Presto). Proficiency in data visualization tools (Databricks, PowerBI) and the Python data science ecosystem (Jupyter, Pandas More ❯
protocols and standards such as Modbus, DNP3, IEC 61850, and OPC. Proven experience in designing and implementing security controls for OT systems, including firewalls, intrusiondetection systems, and access controls. Familiarity with network segmentation techniques and security architectures for OT systems. Experience with Industrial communication network and system More ❯
Stafford, Staffordshire, West Midlands, United Kingdom Hybrid / WFH Options
Quest Global Engineering Limited
protocols and standards such as Modbus, DNP3, IEC 61850, and OPC. Proven experience in designing and implementing security controls for OT systems, including firewalls, intrusiondetection systems, and access controls. Familiarity with network segmentation techniques and security architectures for OT systems. Experience with Industrial communication network and system More ❯
fault-tolerant storage. Monitor and manage user identities and access permissions within cloud platforms using Cloud technologies such as Cloud IAM System and Cloud IntrusionDetection System. Set up and enforce networking policies: firewalls, NAT, VPN tunnels, and routing. Familiarity with virtualisation platform e.g. PVE, VMware Carry out More ❯
experience) in low voltage systems including: Experience in the following systems: Structured cabling, both inside and outside plant Electronic Physical Access Control Video Surveillance IntrusionDetection Overhead Paging Audio/Visual Experience in the following systems a plus: Nurse Call Real Time Locating Systems Infant (and memory care More ❯
maintaining, troubleshooting, supporting, and optimizing network security capabilities. Understanding of networking protocols and infrastructure designs, including cloud infrastructures, routing, firewall functionality, host and network intrusiondetection systems, encryption, load balancing, and other network devices. The following certifications would be a plus: - Cisco CCIE Security, Checkpoint CCSE/CCSM More ❯