Strong interpersonal and presentation skills. Strong analytical skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of VulnerabilityScanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of More ❯
in basic shell scripting, creating Snort rules, or other log-searching query languages and methods. Must be confident to handle common security incidents independently. Must have good understanding of VulnerabilityScanning and management as well as Ethical Hacking (Penetration Testing) Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of More ❯
systems (Windows, OS X, Linux). Proficiency in shell scripting, creating Snort rules, or other log-searching query languages. Confidence in handling common security incidents independently. Good understanding of VulnerabilityScanning, Management, and Ethical Hacking (Penetration Testing). Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work with minimal supervision. Willingness to work More ❯
SIEM tools. Strong verbal and written English communication skills. Excellent interpersonal and presentation skills. Strong analytical skills. Good understanding of network traffic flows, normal vs. suspicious activities. Knowledge of VulnerabilityScanning, Management, and Ethical Hacking (Penetration Testing). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines such as Incident, Problem, and Change More ❯
bottlenecks - e.g. Grafana, Datadog Networking Concepts - Knowledge in TCP/IP, DNS, VPN, load balancing, and firewalls Security Best Practices - Implementing security in DevOps (e.g., IAM policies, network security, vulnerabilityscanning, encryption) Security Protocols - Experience with modern security protocols and practices - e.g. Zero Trust, OAuth, OpenID, TLS/SSL Agile Methodologies - Experience with Agile, Scrum, and Kanban DevOps More ❯
Burton-on-Trent, Staffordshire, UK Hybrid / WFH Options
PHD Communications
hardware, and software. Technologies · Windows Server – 2019,2022 · Hyper V Manager · Failover Cluster Manager · Microsoft Azure/Office 365/Intune/MS Teams · Backup & Replication (Veeam) · SQL Server · Vulnerabilityscanning (Nessus) Essential Skills · Firewall management (Sophos advantageous) · Microsoft Multifactor Authentication · Demonstrable skills in both on-perm and cloud infrastructure · Network Configuration, Routers, Internet, VPN's, WiFi, Ethernet … range includes Healthcare, Waste Management, Pharmaceuticals, Electrical Wholesalers, Telecoms, Breweries, Retail...... PHD Communications team collectively can offer experience of consultancy services for document & print and mail management, electronic billing & scanning bureau services, and operational process improvement. Our mission is to provide the most cost effective, high quality services to all our clients, in a safe and rewarding environment for More ❯
Arnold, Nottinghamshire, United Kingdom Hybrid / WFH Options
Lockheed Martin
GCP) • Experience with infrastructure as code (IaC) tools (e.g., Terraform, Ansible) • Understanding of Risk Management Framework (RMF) NIST SP 800-53 • Understanding of security best practices and tools (e.g., vulnerabilityscanning, penetration testing) • Strong problem-solving and troubleshooting skills • Excellent communication and collaboration skills • Technical curiosity to learn new skills and are ready to help across the team More ❯
infrastructure Familiarity with industry security standards and compliance frameworks Strong documentation, communication, and leadership skills Desirable qualifications and experience: Industry certifications or working toward one Experience with Microsoft Defender, vulnerabilityscanning, and disaster recovery planning Understanding of ITIL and service management methodologies Why consider this role? Join a forward-thinking, values-led organisation with a strong public service More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Adria Solutions
infrastructure Familiarity with industry security standards and compliance frameworks Strong documentation, communication, and leadership skills Desirable qualifications and experience: Industry certifications or working toward one Experience with Microsoft Defender, vulnerabilityscanning, and disaster recovery planning Understanding of ITIL and service management methodologies Why consider this role? Join a forward-thinking, values-led organisation with a strong public service More ❯
recruit for a Security Operations Analyst on a permanent basis. Role Responsibilities: Develop security policies and frameworks. Drive patch management across infrastructure and application teams. Conduct risk assessments and vulnerability scans. Respond to security incidents and alerts. Ensure compliance with regulations (e.g., PCI-DSS, GDPR). Skills & Experience Required: Knowledge of PCI-DSS and GDPR An understanding of Security … best practices SIEM, Vulnerabilityscanning and common security frameworks Security management systems and organisational security controls, including standards, best practices, and approaches to risk assessment and mitigation. If you would like to hear more about this fantastic opportunity, please click apply or send your CV directly to nick.oakley@infinitetalent.co.uk More ❯
brand/reputation of working with large police forces across the UK and assisting with Technical Cyber Security consulting side and offering services such as outsourced SOC, penetration testing, vulnerabilityscanning to name a few. All candidates should make sure to read the following job description and information carefully before applying. This role is to join the commercial More ❯
brand/reputation of working with large police forces across the UK and assisting with Technical Cyber Security consulting side and offering services such as outsourced SOC, penetration testing, vulnerabilityscanning to name a few. This role is to join the commercial team to leverage current client base and offer technical Cyber Security solutions but mainly to create More ❯