Job summary The NHS Counter Fraud Authority (NHSCFA) is the national body responsible for all matters relating to the prevention, detection and investigation of economic crime across the NHS. Further information about our work and annual plan for delivering this is available on our website. An exciting opportunity has arisen to join the NHSCFA Technology team as an Information … both in person and remote. Demonstrate detailed knowledge of: IT system monitoring (SIEM). Security Incident Management. Demonstrate detailed knowledge of Information Security in several of the following areas: Intrusiondetection and prevention systems. Vulnerability Management. Network technology and operations. Windows 10 and Windows Server. SUSE Linux. Microsoft365. oInformation Security Management Systems ISO27001. Risk Management Process. IT system … in person and remote. Demonstrate detailed knowledge of: IT system monitoring (SIEM). Security Incident Management. Demonstrate detailed knowledge of Information Security in several of the following areas: oIntrusion detection and prevention systems. Vulnerability Management. oNetwork technology and operations. Windows 10 and Windows Server. SUSE Linux. Microsoft365. Information Security Management Systems ISO27001. oRisk Management Process. oIT system auditing Experience More ❯
Paddington, Greater London, England Hybrid / WFH Options
Nexus Jobs Limited
data loss protection and data classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who support and operate the Company More ❯
Ashby-De-La-Zouch, Leicestershire, UK Hybrid / WFH Options
Capgemini
continuous years, and unspent criminal record check (known as Disclosure and Barring Service) Your role Security Monitoring: Continuously monitor security alerts from various security tools including SIEMs, firewall, intrusiondetection systems, anti-virus, EDRs and other security tools. This will involve analysing logs and alerts to identify potential security incidents. Incident Response: Investigate security incidents to assess their More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Pontoon
or similar role in the engineering sector. Strong knowledge of security frameworks, standards, and best practises (e.g., NIST, ISO 27001). Proficiency in security tools and technologies (e.g., firewalls, intrusiondetection systems). Excellent analytical and problem-solving skills. Ability to communicate complex security concepts to non-technical stakeholders. Relevant certifications (e.g., CISSP, CISM, or equivalent) are a More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Pontoon
or similar role in the engineering sector. Strong knowledge of security frameworks, standards, and best practises (e.g., NIST, ISO 27001). Proficiency in security tools and technologies (e.g., firewalls, intrusiondetection systems). Excellent analytical and problem-solving skills. Ability to communicate complex security concepts to non-technical stakeholders. Relevant certifications (e.g., CISSP, CISM, or equivalent) are a More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Reed Technology
and hands-on experience with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusiondetection systems, and SIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience More ❯
Reston, Virginia, United States Hybrid / WFH Options
RedKey Solutions
and upgrade security measures and tools for protecting information systems and networks. • Automate repeatable tasks and provide consultative support. • Design, configure, implement, troubleshoot, and maintain security platforms (e.g., firewalls, intrusiondetection/prevention, anti-virus/malware, cryptography systems, SIEM, MDM). • Formulate systems and methodologies, respond to security events, and assist in remediation efforts. • Participate in the … years of relevant experience (or equivalent experience/certifications). Preferred Qualifications: • Experience with additional security tools and processes (IDS/IPS, VPN, Webinspect, Appdetective). • Experience in incident detection, response, and forensics. • Proficiency in scripting languages (Python, PowerShell). • Experience with Cloud Computing Technologies/AWS. • Agile Software Development experience. • AWS Certification. • Knowledge of maintaining VPNs, firewalls, and More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Mission Services LLC (MSI)
Enterprise Mission Assurance Support Service) • RMF (Risk Management Framework) • SIEM (Splunk or LogRythm) • Strong understanding of security principles, including confidentiality, integrity, and availability • Experience with security technologies, including firewalls, intrusiondetection systems, and encryption • Excellent problem-solving and analytical skills • Strong communication and collaboration skills Education and Experience: At least 5-8 years of experience in cyber security More ❯
Mc Lean, Virginia, United States Hybrid / WFH Options
ANISTAR Technologies
applications. Monitor security logs and alerts to detect and respond to security incidents in a timely manner. Assist in the design, implementation, and configuration of security controls, including firewalls, intrusiondetection/prevention systems, antivirus software, encryption tools, and access controls. Ensure that security measures are effectively integrated into the architecture and operation of IT systems. Collaborate with More ❯
Bradford, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Yorkshire Water
crew of professionals who blend technical wizardry with real-world vigilance to keep our systems safe. We have a varied range of skillsets in our team including Security Operations, intrusiondetection, vulnerability scanning, advanced threat protection, Operational Technology, Physical Security and Governance Risk and Compliance specialists to name but a few. We cover every angle of digital defence. More ❯
Pontypridd, Mid Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Ignite Digital Search Ltd
technologies in a senior or lead role Deep understanding of network design configuration and troubleshooting Proficiency in managing LAN WAN and VPN environments Experience with network security including firewalls, intrusiondetection and prevention, and mobile device management Excellent stakeholder communication and project delivery skills Relevant certifications such as CCNA CCNP CWNA or ITIL are desirable Desirable Technical Knowledge More ❯
Derby, Derbyshire, United Kingdom Hybrid / WFH Options
Adecco
procedures to safeguard data integrity. Collaborate closely with the Head of Cyber Security and IT Project Manager to ensure all infrastructure assets are protected by appropriate threat mitigation measures, intrusiondetection systems, and risk management protocols. Lead and support the Infrastructure Support Team , including mentoring other IT managers and fostering a collaborative, high-performance culture. Conduct regular one More ❯
Bradford, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Yorkshire Water
crew of professionals who blend technical wizardry with real-world vigilance to keep our systems safe. We have a varied range of skillsets in our team including Security Operations, intrusiondetection, vulnerability scanning, advanced threat protection, Operational Technology, Physical Security and Governance Risk and Compliance specialists to name but a few. We cover every angle of digital defence. More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Breakpoint Labs, LLC
and willingness to complete client technical aptitude test to validate minimum technical proficiency level. - Experience in host-based computer forensics, network-based forensics, cyber incident response, cyber-criminal investigation, intrusiondetection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetration testing, security operations center analysis, defensive cyber More ❯