Great Malvern, England, United Kingdom Hybrid / WFH Options
TieTalent
investigate high-priority alerts, analyse logs, or network traffic and endpoint activity using tools like Splunk. Whether you're monitoring security alarms, creating new detection content, using threat intelligence to strengthen our defences, or responding to breaches, each day will begin with a team meeting to review ongoing investigations … impact. About You You’ll bring a background in cyber security analysis and a passion for IT. Ideally, you’ll have experience with host intrusiondetection analysis, but don’t worry if that’s an area you’re still developing in - plenty of training will be provided. You … working as a Cyber Security/Security Operations Centre Analyst Evidence of experience working in at least one of the following fields: malware analysis, intrusiondetection and incident response Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria will be More ❯
Evesham, England, United Kingdom Hybrid / WFH Options
TieTalent
investigate high-priority alerts, analyse logs, or network traffic and endpoint activity using tools like Splunk. Whether you're monitoring security alarms, creating new detection content, using threat intelligence to strengthen our defences, or responding to breaches, each day will begin with a team meeting to review ongoing investigations … impact. About You You’ll bring a background in cyber security analysis and a passion for IT. Ideally, you’ll have experience with host intrusiondetection analysis, but don’t worry if that’s an area you’re still developing in - plenty of training will be provided. You … working as a Cyber Security/Security Operations Centre Analyst Evidence of experience working in at least one of the following fields: malware analysis, intrusiondetection and incident response Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria will be More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
a related field. Hands-on experience with Proofpoint implementations (e.g., Email Protection, Targeted Attack Protection, Information Protection). Proficiency in security technologies, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and SIEM. Experience with ProofPoint in a cloud-based environment, specifically Microsoft 365. Excellent problem-solving More ❯
co-ordinator (SAC). An understanding of MOD Secure by Design policy and process. Deep technical expertise in security technologies and solutions, including firewalls, intrusiondetection/prevention systems (IDS/IPS), endpoint protection, encryption, identity and access management (IAM), and security information and event management (SIEM) systems. More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
BT Security
a plus. Experience in security architecture, particularly in networks and hosting platforms, will be beneficial Strong understanding of network security protocols, firewalls, VPNs, and intrusiondetection systems. Excellent analytical and problem-solving skills. Ability to communicate complex security concepts to non-technical stakeholders. Benefits On target 10% on More ❯
procedures to ensure the protection of network infrastructure and communication systems. Oversee the design and implementation and maintenance of network security solutions, including firewalls, intrusiondetection/prevention systems and secure communication channels. Monitor network reports for security incidents and respond promptly to mitigate risks and breaches. Work More ❯
and query development Experience Needed: Managing serious cyber incidents as a digital forensic responder Working in large, complex enterprise environments Understanding of security monitoring, intrusiondetection, and control systems Technical expertise in networks, malware analysis, and forensics Effective communication with senior stakeholders Company Overview: Element is a global More ❯
procedures to ensure the protection of network infrastructure and communication systems. Oversee the design and implementation and maintenance of network security solutions, including firewalls, intrusiondetection/prevention systems and secure communication channels. Monitor network reports for security incidents and respond promptly to mitigate risks and breaches. Work More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Crimson
procedures to ensure the protection of network infrastructure and communication systems. Oversee the design and implementation and maintenance of network security solutions, including firewalls, intrusiondetection/prevention systems and secure communication channels. Monitor network reports for security incidents and respond promptly to mitigate risks and breaches. Work More ❯
query development Experience Needed: Managing serious cyber incidents as a digital forensic incident responder Working within large, complex enterprise environments Understanding of security monitoring, intrusiondetection, and prevention systems Technical expertise in networks, malware analysis, and digital forensics Effective communication with senior stakeholders Company Overview: Element is a More ❯
procedures to ensure the protection of network infrastructure and communication systems. Oversee the design and implementation and maintenance of network security solutions, including firewalls, intrusiondetection/prevention systems and secure communication channels. Monitor network reports for security incidents and respond promptly to mitigate risks and breaches. Work More ❯
Experience Needed: Extensive experience managing serious cyber incidents as a digital forensic responder. Proven success in large, complex enterprise environments. Understanding of security monitoring, intrusiondetection, prevention, and control systems. Technical expertise in networks, malware analysis, and digital forensics. Effective communication with senior stakeholders. Company Overview Element is More ❯
hunting queries. Experience Needed: Managing serious cyber incidents as a Digital Forensics Incident Responder. Working effectively within large, complex enterprise environments. Understanding security monitoring, intrusiondetection, prevention, and control systems. Technical expertise in networks, malware analysis, digital forensics, etc. Strong attention to detail and communication skills with senior More ❯
Incidents, as a Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware More ❯
Incidents, as an Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware More ❯
Incidents, as an Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware More ❯
experience as a System Administrator, Network Administrator, or similar role. Experience with databases, networks (LAN, WAN) and patch management. Knowledge of system security (e.g. intrusiondetection systems) and data backup/recovery. Technologies like Fortinet, OnlyKey etc. Familiarity with various operating systems and platforms (Linux, OSX & Windows.) Resourcefulness More ❯
Stafford, England, United Kingdom Hybrid / WFH Options
risual Limited
you bring? Extensive knowledge of network protocols and technologies, including TCP/IP, DNS, DHCP, VLANs, and VPNs. Experience with network security, including firewalls, intrusiondetection/prevention systems, and access control. Knowledge of routing and switching technologies, including OSPF, BGP, and VLANs. Experience with network monitoring tools More ❯