guidance on information security matters to various stakeholders across the organization. 2. Security Operations & Incident Response: Oversee the day-to-day operation of security systems and tools, including firewalls, intrusiondetection/prevention systems (IDS/IPS), antivirus, anti-malware, SIEM (Security Information and Event Management), vulnerability scanners, and data encryption solutions. Manage vulnerability management programs, including regular … scanning, penetration testing, and remediation of identified weaknesses. Lead and manage security incident response, including detection, analysis, containment, eradication, recovery, and post-incident review. Develop and maintain robust disaster recovery and business continuity plans related to information security. Monitor security alerts, logs, and reports for suspicious activity and potential threats. 3. Compliance & Audit: Ensure the organization's adherence to … information security principles, frameworks (e.g., ISO 27001, NIST, Cyber Essentials), and best practices. Hands-on experience with security technologies such as firewalls, SIEM, IDS/IPS, vulnerability scanners, endpoint detection and response (EDR), and identity management solutions. Experience with cloud security (e.g., Azure Security). Proven experience in managing security incidents and conducting incident response. Familiarity with data privacy More ❯
to ensure the security of network infrastructure and data.- Manage risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusiondetection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid/Remote Options
Leidos Innovations UK Limited
a wide variety of stakeholders to ensure, the Leidos CSOC, a Defensive Cyber Security capability, can support a customers Cyber Resilience, protecting them with a 24 x 7 Threat Detection and Response service, mitigating their risk of Cyber Attack. The successful candidate will be able to demonstrate experience from a CSOC background or be able to demonstrate sufficient transferable … within the environments. Respond to and correlate alerts from various detective and preventative Cyber Security tools such as Security Information Event Monitoring (SIEM), End Point Protection (EPP), End Point Detection and Response (EDR), XDR (Extended DR), Web Application Firewall (WAF), and Firewalls. Proactively detect suspicious activity, vulnerabilities, and security misconfigurations before they can be exploited by adversaries impacting Confidentiality … On-Premises solutions including but not limited to Firewalls, Network Access Control Lists, Network Security Groups, DDoS Protection, VPNs, Mail Gateways, Web Proxies, Load Balancers including Web Application Firewalls, Intrusion Prevention System, and IntrusionDetection Systems. Communication and Soft Skills Good verbal and written communication skills required for hand overs, reports, and documenting events during a Cyber More ❯
is key to detecting, preventing, and responding to cybersecurity threats in a proactive and efficient manner. Key Responsibilities: Security Architecture & Implementation Design, deploy, and manage security solutions including firewalls, intrusiondetection/prevention systems, endpoint protection, SIEM, and identity management platforms. Implement secure network architecture and enforce segmentation and least-privilege access controls. Support secure cloud environments across … Azure, AWS, or GCP (e.g., IAM, security groups, encryption, KMS). Threat Detection & Incident Response Monitor and analyze security alerts and network traffic for threats or suspicious activity. Lead or support incident response activities: investigation, containment, eradication, recovery, and reporting. Conduct root cause analysis and implement security hardening improvements. Vulnerability & Risk Management Run regular vulnerability scans and penetration testing More ❯
Banbury, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
IT infrastructure, cloud services, and cyber security. Proven continuous development in both technical and soft domains. Proficiency with security tools and technologies such as SIEM, DLP, network protection, threat detection, and endpoint protection. An understanding of network infrastructure such as VPNs, firewalls, switches, routers, LANs, IntrusionDetection, and vulnerability scanning. Understanding of IT and cyber security frameworks More ❯
Hook Norton, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
IT infrastructure, cloud services, and cyber security. Proven continuous development in both technical and soft domains. Proficiency with security tools and technologies such as SIEM, DLP, network protection, threat detection, and endpoint protection. An understanding of network infrastructure such as VPNs, firewalls, switches, routers, LANs, IntrusionDetection, and vulnerability scanning. Understanding of IT and cyber security frameworks More ❯
Champion ISO 20000 and ISO 27001 standards, ensuring compliance and audit readiness. Collaborate with the Information Security team to implement and maintain robust cybersecurity measures including firewalls, antivirus, and intrusiondetection systems. Ensure compliance with UK and EU data protection regulations (e.g., GDPR), and IT risk management frameworks. Design and lead the offshoring strategy for IT infrastructure services More ❯
Hatfield, Hertfordshire, South East, United Kingdom
Affinity Water Limited
simultaneously. Strong understanding of industrial control systems (ICS) and SCADA systems. Strong problem-solving skills and attention to detail. Proven experience with OT and IT security technologies, including firewalls, intrusiondetection systems (IDS), vulnerability detection, network discovery, log collection systems, and security information and event management (SIEM) solutions. UK Driving Licence. About Us Affinity Water is the More ❯
Buckinghamshire, England, United Kingdom Hybrid/Remote Options
Addition+
such as SIEM, DLP, endpoint protection, and network monitoring. Knowledge of frameworks including ISO27001, GDPR, NIS2, and MITRE ATT&CK. Skilled in networking fundamentals — firewalls, VPNs, routers, LANs, and intrusion detection. Relevant certifications such as SC-200 or AZ-500 (CISSP/CISM/CRISC advantageous). Confident communicator with the ability to influence and collaborate across teams. What More ❯
Conduct regular system audits to identify vulnerabilities and ensure compliance with security policies and regulations. Be involved in the deployment and maintenance of network security devices such as firewalls, intrusiondetection systems, and VPNs. Support the resolution of network security incidents, including conducting post-event analyses to prevent future incidents. Stay abreast of the latest cybersecurity threats and More ❯
such as PowerShell, Python, or Bash. Monitoring Tools: Experience with monitoring tools like Nagios, Zabbix, or SolarWinds. Security Best Practices: Understanding of security best practices and tools, including firewalls, intrusiondetection/prevention systems, and vulnerability management. Disaster Recovery: Experience in designing and implementing disaster recovery plans and procedures. Automation: Familiarity with automation tools and frameworks. Diagnostics: Strong More ❯
Cisco Nexus switches, Cisco ASA firewalls, F5 LTM and DNS load balancers. Strong network design and management skills and experience, including setting up firewall rules, dynamic routing, load balancing, intrusiondetection and prevention, setting up remote access and site-to-site VPNs. Strong practical experience of following ITIL processes in a 24x7 operations environment with tight SLA and More ❯
london, south east england, united kingdom Hybrid/Remote Options
BCD Meetings and Events
and AnyConnect (NAM/Posture), Experience with NAC/ISE integration with wired, wireless, VPN as well as posture Strong background and ability to monitor network security by analyzing Intrusion Detections reports, firewall logs and other application sources Strong understanding of network security architectures, solutions, processes, frameworks, and components Extensive experience with Cloud solutions such as AWS, Azure Thorough More ❯
Systems Fiber Optic Cable Systems CCTV Systems Access Control Systems Public Address General Alarm Systems (PAGA) PABX, Hotline Systems Wireless/Microwave/TMR Radio Systems Perimeter/Fence IntrusionDetection Systems Key Responsibilities: Focus on safety, reliability, and quality in all telecom systems. Create Block Diagrams, Schematic Diagrams, Cable Schedules, datasheets, Interconnection and Wiring Diagrams, Cabinet General More ❯