a Oodle Car Finance). This role will be responsible for managing day-to-day 1st line cyber security operations, working closely with third parties to support cyber threat detection and response. You will also lead the execution of remediation activities following the identification of vulnerabilities and security incidents, ensuring Oodle remains protected against evolving threats. What you’ll … day operations of the 1st line cyber security function, including security operations, security engineering, and security technology deployments. Ensure the implementation and maintenance of security controls, such as firewalls, intrusiondetection/prevention systems, endpoint security solutions, and data loss prevention systems. Collaborate with third-party service providers, such as managed security service providers (MSSPs), to manage policies More ❯
and purposeful in their work. About the Role This position involves deploying, maintaining, supporting, and enhancing our Information Security tools and processes. Key responsibilities include: Implementing and maintaining network, intrusiondetection, and prevention systems in hybrid environments (on-premises and cloud). Staying updated on cybersecurity threats to advise on system protections. Monitoring threat intelligence feeds and translating … them into detection and response actions. Analyzing security logs to identify attacker tactics, techniques, and procedures (TTPs), investigating suspicious activities, and performing remediation. Developing and validating security capabilities to identify vulnerabilities and improve detection and response measures. Supporting active response efforts as a technical resource for the security team. Tracking and resolving security issues from identification to resolution. … science, information systems, cybersecurity, or related fields. Security certifications such as GCIA, GCFA, GCFE, CISSP (Associate), CEH, or equivalents. Experience in areas like IAM, security operations, threat hunting, EDR, detection signatures, and analytics. Knowledge of open standards such as SAML, OAuth, or OpenID. Experience with encryption, logging, log analysis, and analytics. Practical experience with network security architecture and cloud More ❯
Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
In Technology Group Limited
data, and infrastructure against emerging threats. Key Responsibilities: Monitor, detect, and respond to security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and development teams to ensure secure More ❯
or policies with regards to cyber security submitting them to the Information Security Officer for review and authorisation. Implementation & Execution within mandate Monitor and analyse Cybersecurity operational services, including intrusiondetection and prevention, situational awareness of: network intrusions. security events. data spillage; and. Incident response actions. Identify and resolve vulnerabilities in networks, servers, systems, and applications by performing More ❯
organizational assets against cyber threats. Conduct regular risk assessments and vulnerability scans to identify potential security gaps and mitigate risks effectively. Contribute to a robust security architecture, including firewalls, intrusiondetection systems, and encryption mechanisms, to safeguard network infrastructure and data. Monitor security infrastructure for suspicious activities, investigate incidents, and implement incident response procedures to minimize impact and … ago Manchester Area, United Kingdom 15 hours ago Huddersfield, England, United Kingdom 4 months ago Information Security Analyst - Vulnerability Management Manchester, England, United Kingdom 4 days ago Senior Threat Detection Engineer (Cyber Security) Stockport, England, United Kingdom 1 week ago Manchester, England, United Kingdom 1 week ago We’re unlocking community knowledge in a new way. Experts add insights More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
PURVIEW
and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusiondetection/prevention systems, and encryption technologies. Adhere to enterprise governance & review processes to deliver project goals & deliverables. Follow enterprise ITSM & CMDB processes Monitor and analyse security alerts … network security fundamentals, encryption technologies, and secure network design principles. Zscaler Private Access & Internet Access Proficiency in configuring, managing, and troubleshooting firewalls. Cisco, Palo Alto etc,. Experience with intrusiondetection/prevention systems, as well as with SIEM tools and security incident response. Excellent problem-solving skills, analytical thinking, and the ability to communicate effectively with diverse More ❯
improve the security and robustness of QA’s organisational infrastructure and associated IT systems. As a Head of Cyber Security Operations you will be responsible for safeguarding QA from intrusion, security threats, security weaknesses, software bugs and exploits. You will be responsible for direct and virtual teams involved in keeping QA secure. Role Responsibilities Management of the Security Operations … and operating systems including firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server, networks and cloud services Comprehensive knowledge or experience of information security principles, including risk assessment, intrusiondetection, Security Incident and Event Management (SIEM) tools, threat and vulnerability management Detailed knowledge or experience of application or network based penetration testing tools and methodologies Experience of More ❯
and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusiondetection/prevention systems, and encryption technologies. Adhere to enterprise governance & review processes to deliver project goals & deliverables. Follow enterprise ITSM & CMDB processes Monitor and analyze security alerts … network security fundamentals, encryption technologies, and secure network design principles. Zscaler Private Access & Internet Access Proficiency in configuring, managing, and troubleshooting firewalls. Cisco, Palo Alto etc,. Experience with intrusiondetection/prevention systems, as well as with SIEM tools and security incident response. Excellent problem-solving skills, analytical thinking, and the ability to communicate effectively with diverse More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
PURVIEW
and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusiondetection/prevention systems, and encryption technologies. Adhere to enterprise governance & review processes to deliver project goals & deliverables. Follow enterprise ITSM & CMDB processes Monitor and analyse security alerts … network security fundamentals, encryption technologies, and secure network design principles. Zscaler Private Access & Internet Access Proficiency in configuring, managing, and troubleshooting firewalls. Cisco, Palo Alto etc,. Experience with intrusiondetection/prevention systems, as well as with SIEM tools and security incident response. Excellent problem-solving skills, analytical thinking, and the ability to communicate effectively with diverse More ❯
London Group incident management process. The team aims to minimize and control damage from cybersecurity incidents, ensuring incident management and response controls are effective to enable the identification, protection, detection, response, and recovery of RLG information assets. The role contributes to our purpose by: Helping build financial resilience Moving fairly to a sustainable world Strengthening mutual choice for customers … cause analysis, create metrics, and generate reports and analytics to improve future incident response Collect supporting information and artifacts for incident response activities Identify and execute projects to enhance intrusiondetection and incident response capabilities Conduct technical analysis on impacted systems to determine impact, scope, and recovery from active and potential cyber incidents Leverage cybersecurity tools to identify More ❯
minimise and control the damage resulting from cybersecurity incidents, ensuring that appropriate incident management and response controls are in place and operating as required to enable the identification, protection, detection, response, and recovery of RLG information assets. It outlines how the role contributes to our purpose: Helping build financial resilience Moving fairly to a sustainable world Strengthening the mutual … metrics, and generate reports and analytics to improve future incident response Collect supporting information and relevant artifacts in support of incident response activities Identify and execute projects to improve intrusiondetection and incident response capabilities Conduct technical analysis on impacted systems to determine impact, scope, and recovery from cyber incidents Leverage cybersecurity tools from RLG to identify and More ❯
of SIEM tools and advanced hunting queries Experience Needed: Managing serious cyber incidents as a digital forensic responder Working within large, complex enterprise environments Understanding of security monitoring and intrusiondetection systems Technical expertise in networks, malware analysis, and digital forensics Effective communication with senior stakeholders Company Overview: Element is a global testing, inspection, and certification company with More ❯
Experience with SIEM tools and writing advanced queries. Experience Needed: Managing serious cyber incidents as a digital forensic responder. Working in large, complex enterprise environments. Knowledge of security monitoring, intrusiondetection, firewalls, antivirus, web proxies. Technical expertise in networks, malware, and forensics. Effective communication with senior stakeholders. Company Overview: Element is a global testing, inspection, and certification company More ❯
platform. In-depth working knowledge of Microsoft platforms with a focus on Intune, Microsoft Exchange Online, Office 365 support technologies, and Azure Active Directory. Strong experience configuring anti-malware, intrusiondetection, firewalls and vulnerability scanning systems and network security. Extensive experience and working knowledge with Microsoft Azure Infrastructure as a Service platform and hybrid infrastructure; including planning, configuration More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Sodexo
Management : Leading change initiatives to improve security posture. Performance Metrics : Establishing and monitoring KPIs to measure security program effectiveness. Technical Expertise : Deep understanding of cybersecurity technologies such as firewalls, intrusiondetection, encryption, and network security protocols. Regulatory Compliance : Knowledge of laws, regulations, and standards like GDPR, Cyber Essentials, ISO/IEC 27001, and ensuring compliance. Incident Response : Developing More ❯
you'll be doing: Assess and evaluate the effectiveness of existing security controls. Design and implement security solutions to mitigate identified risks. Implement, and manage security systems, including firewalls, intrusiondetection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerability management etc. Respond to security events and incidents. Perform regular security audits and risk assessments. Maintain security More ❯
Macclesfield, Cheshire, North West, United Kingdom Hybrid / WFH Options
Purview Consultancy Services Ltd
and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusiondetection/prevention systems, and encryption technologies. Adhere to enterprise governance & review processes to deliver project goals & deliverables. Follow enterprise ITSM & CMDB processes Monitor and analyse security alerts … network security fundamentals, encryption technologies, and secure network design principles. Zscaler Private Access & Internet Access Proficiency in configuring, managing, and troubleshooting firewalls. Cisco, Palo Alto etc,. Experience with intrusiondetection/prevention systems, as well as with SIEM tools and security incident response. Excellent problem-solving skills, analytical thinking, and the ability to communicate effectively with diverse More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
N Brown Group
responsible for implementing, managing and enhancing the technology underpinning N Browns cyber security services. Youll have a good understanding of a range of security tools like web application firewalls, intrusiondetection technologies, vulnerability scanners and SIEMs; and the technical knowledge to integrate them to enhance our protection and build automated responses. Youll need a good understanding of the … creating correlation searches and dashboards is a plus. Experience of working within PCI DSS, or other compliance frameworks. Software and Technology SIEM (ideally Splunk) & IaaS (AWS, Azure, GCP) Endpoint Detection and Response (EDR) tools such as MS Defender APT. Network and Host IntrusionDetection/Prevention tools Web Application Firewalls (ideally Akamai) Vulnerability scanning tools (ideally Rapid7 More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
Ubique Systems
network security fundamentals, encryption technologies, and secure network design principles. Zscaler Private Access & Internet Access Proficiency in configuring, managing, and troubleshooting firewalls. Cisco, Palo Alto etc,. Experience with intrusiondetection/prevention systems, as well as with SIEM tools and security incident response. Excellent problem-solving skills, analytical thinking, and the ability to communicate effectively with diverse More ❯
on corporate technology development to fully secure information, computer, network, and processing systems. Manage the administration of all computer security systems and their corresponding or associated software, including firewalls, intrusiondetection systems, cryptography systems, and anti-virus software. Manage the administration of the facility's security systems and their corresponding equipment or software, including fire alarms, locks, intruder … detection systems, sprinkler systems, and anti-theft measures. Develop, track, and control the security services annual operating and capital budgets for purchasing, staffing, and operations. Ensure that facilities, premises, and equipment adhere to all applicable laws and regulations. Recommend and implement changes in security policies and practices in accordance with changes in local or federal law. Creatively and independently More ❯
of SIEM tools and writing advanced hunting queries. Experience Needed: Managing serious cyber incidents as a digital forensic responder. Working in large, complex enterprise environments. Understanding of security monitoring, intrusiondetection, prevention, and control systems. Technical expertise in networks, malware analysis, and digital forensics. Effective communication with senior stakeholders. Company Overview: Element is a global testing, inspection, and More ❯
Knowledge of SIEM tools and query development. Experience Needed: Managing serious cyber incidents as a digital forensic responder. Working within large, complex enterprise environments. Understanding of security monitoring and intrusiondetection systems. Technical expertise in networks, malware analysis, and digital forensics. Effective communication with senior stakeholders. Company Overview: Element is a rapidly growing testing, inspection, and certification company More ❯
IT asset management and lifecycle tracking Monitor network performance and assist with routine maintenance to ensure connectivity and stability Assist in monitoring and maintaining firewalls, antivirus, endpoint protection, and intrusiondetection/prevention systems Manage day-to-day interactions with IT service providers and hardware/software suppliers To setup, onboard and provide training to key systems for More ❯
O365), and managing data center technologies (SANs, Switches, VLANs, Routers, Servers, and Firewalls). Able to demonstrate an understanding of ISO27001:2013 and information security best practices (identity management, intrusiondetection/prevention) and a solid understanding of ITIL principles. Experience preparing project documentation and managing projects through to completion. Desirable experience: CompTIA+ security, Certified networking credential, Endpoint More ❯
experience of managing serious Cyber Incidents, as an Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware analysis, digital forensics etc. Attention More ❯