Key Responsibilities: Help administer the Group's Security Operations Centre. Work across our growing toolset to monitor the entire infrastructure and react to real time threats as they occur. Intrusiondetection and illegal activity monitoring. Assist with penetration and vulnerability testing. Implement network, firewall, patching and other technical security matter. Ensure up to date patch management is undertaken. … and verbal communication skills. A thorough understanding of the network infrastructure fundamentals A good working knowledge of various security technologies such as: active directory, anti-malware protection, vulnerability scanners, intrusiondetection/prevention, system hardening along with some knowledge of MS-Windows server operating systems A willingness and ability to learn about new technologies and solutions and be More ❯
Redscan (a trading name of Redscan Cyber Security Limited)
Requirements A passion for Cyber Security and enjoys solving problems Knowledge of the security threat landscape Knowledge of various security methodologies and processes, and technical security solutions (firewall and intrusiondetection systems) Knowledge of TCP/IP Protocols, network analysis, and network/security applications Knowledge of common Internet protocols and applications Ability to multi-task, prioritize, and More ❯
and transformational initiatives with the ability to adapt to changing security landscapes and organisational needs. Led effective incident response efforts with experience using security technologies (including encryption protocols, firewalls, intrusiondetection systems, and vulnerability assessment tools) to minimise risk and ensure rapid recovery. Subject matter expert in information security standards and best practices (including PCI DSS and ISO More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Robert Walters
new solutions as required. Contribute to the deployment of advanced security tools and technologies that enhance the organisation's overall cyber resilience. Oversee the incident management process by supporting detection, response, reporting, and resolution of security incidents. Prepare clear security metrics reports for stakeholders at all levels to inform decision-making and demonstrate progress against objectives. Promote a culture … highly valued. Recognised information security frameworks such as ISO 27001 or NIST ensures you can contribute meaningfully to policy development. A solid understanding of core security technologies-including firewalls, intrusiondetection systems, endpoint protection platforms-and their practical application is important. Experience supporting vulnerability management processes from identification through remediation demonstrates your ability to manage risk proactively. Proficiency More ❯
OPC UA, DNP3, Modbus TCP/IP) and methods to diagnose/debug using Wireshark. Configuring server operating systems, i.e. Windows Server. Configuring next generation firewalls such as Fortinet. IntrusionDetection Systems such as Nozomi, Radiflow. Anti-malware, patch management and disaster recovery tools. Network monitoring and management. Standard cyber topics such as VPN technologies, Secure Network Access More ❯
systems and the technical skills required to develop, implement, and secure such cyber-physical systems.Experience or interest in cybersecurity and cyber threats (i.e. - designing secure products, systems, and applications; intrusiondetection; digital forensics; system recovery; risk assessment tools and methods; security solutions, policies, standards, and procedures, etc.).Knowledge and/or experience in applying systems security policies and More ❯