proactively enhance our security posture. Datacenter Security: Oversee the security of datacenter environments, including physical security, network segmentation, and access controls. Implement and manage security technologies such as firewalls, intrusiondetection/prevention systems (IDS/IPS), and data encryption. Collaborate with datacenter operations teams to ensure the secure deployment and maintenance of infrastructure. Collaboration and Leadership: Work More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
In Technology Group Limited
data, and infrastructure against emerging threats. Key Responsibilities: Monitor, detect, and respond to security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and development teams to ensure secure More ❯
a similar role, demonstrating strong knowledge of the threat landscape relevant to SaaS products, preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusiondetection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools. You own relevant certifications (Security+, IAT II/III level or similar). You excel in risk More ❯
Newport, Wales, United Kingdom Hybrid / WFH Options
AIRBUS Defence and Space Limited
space , sustainability is at the heart of our purpose . So what's your next change? Airbus Defense and Space is looking for a passionate and talented Cyber Security Detection & Automation Engineer to join our international Incident Response Team (CSIRT), in Newport, Portsmouth or Stevenage. A mission critical part for us in order to secure our world-class business. … security tools and technologies protecting our whole enterprise. You will be responsible for managing our Cyber Threat Intelligence (CTI) research and Threat Hunting activities, the entire lifecycle of our detection rules repository and SOC automation stack. You will be responsible for the technical evolution of our SOC blueprint and managing enhancement projects to integrate new features and solutions into … TTPs (e.g., MITRE ATT&CK) and emerging threats, enabling consistent, repeatable hunts. Develop code-based playbooks (e.g., Jupyter Notebooks or Python scripts) that integrate threat intelligence, log sources, and detection logic-making them reusable by SOC, IR, and detection engineering teams. Collaborate with detection engineers to convert hunt findings into long-term detections and SIEM use cases More ❯
Boston, Massachusetts, United States Hybrid / WFH Options
Digital Prospectors
Computer Science, Information Systems, or a related technical field. • Strong knowledge of cyber threats, including malware, APTs, DDoS, insider threats, hacktivism, and emerging threats. • Hands-on experience with enterprise intrusiondetection systems (IDS/IPS), host/network security tools, firewalls, HIPS, WAFs, and event correlation. • Proven experience in cybersecurity operations, including threat analysis, incident response, and vulnerability More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
assigned to work in a role with one of our trusted client partners as a 'Spartan' consultant. In this role you will undertake: Network Security - Understanding of firewall configuration, intrusiondetection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and More ❯
experience as a Security Engineer or in a similar role, with deep understanding of the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusiondetection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). More ❯
Falls Church, Virginia, United States Hybrid / WFH Options
Epsilon Inc
regulations. Work with DevOps teams to implement secure coding practices and foster secure CI/CD development pipelines. Support the evaluation and deployment of security tools, including endpoint protection, intrusiondetection/prevention systems, and threat intelligence platforms. Maintain awareness of the latest security trends, vulnerabilities, and threat intelligence to proactively protect the organization. Assist in developing and More ❯
controls and consider lessons learnt in order to protect the bank from potential cyber-attacks and respond to threats. Accountabilities: * Management of security monitoring systems, including intrusive prevention and detection systems, to alert, detect and block potential cyber security incidents, and provide a prompt response to restore normal operations with minimised system damage. * Identification of emerging cyber security threats … analysis, and threat intelligence. * Incident response skills, including proficiency in PCAP capture, network analysis, and traffic pattern recognition. * Knowledge of attack techniques (MITRE ATT&CK framework, malware analysis, and intrusiondetection). * Proficiency in analyzing network traffic (PCAP), endpoint logs, IDS/IPS alerts, and security telemetry. * Stakeholder management skills, with the ability to communicate and articulate security More ❯
traffic, systems, and logs for unusual or malicious activity. Conducting regular security assessments and audits to identify vulnerabilities and risks. Implementing and maintaining security tools and protocols, including firewalls, intrusiondetection systems, and endpoint protection solutions. Investigating security incidents, responding to potential breaches, and documenting findings. Leading security-focused projects across the network, Windows Desktop/Server environments More ❯
San Antonio, Texas, United States Hybrid / WFH Options
BridgePhase, LLC
implementation to ongoing monitoring and incident response. Ideal candidates bring deep expertise in cybersecurity principles, hands-on experience with cloud and container security, and the ability to lead threat detection and mitigation strategies in real-time. If you're driven by mission impact and thrive in fast-paced, agile environments, we want to hear from you. We are hiring … cybersecurity standards. Perform vulnerability assessments, risk analysis, and compliance audits across mission systems. Integrate and maintain security tools such as container scanners, static and dynamic analysis, SIEM, EDR, and intrusiondetection systems. Analyze system logs, alerts, and telemetry to detect and respond to threats in near-real-time, and lead gap assessments to identify missing security data sources More ❯
Stevenage, Hertfordshire, United Kingdom Hybrid / WFH Options
GlaxoSmithKline
the OT Network Security Engineer to have in-depth understanding of network architecture to design, implement, and manage secure and efficient networks and proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. The OT Network Security Engineer will have ownership and responsibility to deliver secure … and that Tech continuity plans are in place for all critical areas. People Management: Collaborate with internal owners of security technologies such as antivirus, IDS/IPS, SIEM, endpoint detection & response, configuration management, privileged identity management, etc. Why you? Basic Qualifications: We are looking for professionals with these required skills to achieve our goals: Bachelor's Degree - Technical Degree … e.g. Engineering, Information Technology In-depth understanding of network architecture to design, implement, and manage secure and efficient networks. Proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. Strong ability to collaborate with cross-functional teams and communicate technical insights effectively to support secure file More ❯
or CISM accreditation. You will develop and maintain the information security architecture and will have proven experience with compliance, vulnerability management, network security, cloud security (AWS & Azure), firewalls and intrusiondetection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threat analysis and act as a subject matter expert More ❯
of the role include: Advocating for infrastructure/application Security and providing support for security projects. Competence in reviewing new technologies, methodologies and integration opportunities. Support in enhancing security detection and incident response efforts/playbooks. Monitoring, remediating, and reporting on security events. Supporting team and activities required for maintaining Smart Communications standards and certification requirements. What we're … have skills and experience : At least 3 years of hands-on, proven industry experience in a similar role. Good understanding of security principles, technologies, and best practices, including threat detection and mitigation strategies. Good level of knowledge of cloud security: AWS and Azure. Experience ensuring data confidentiality, integrity, and availability throughout its lifecycle, including during transmission, storage, and processing. … An understanding of application security principals, best practices, OWASP/related standards. Knowledge of security frameworks & controls, hardening standards & security best practices. An understanding of network protocols & practices, firewalls, intrusiondetection/prevention systems and WAFs. We look for the following SMART values in everyone we hire at Smart Communications: S peak Openly - We are positive, creative, helpful More ❯
design and implementation within a Service Provider organization. Experience with security frameworks such as NIST CSF, ISO 27001, or CIS Controls. Deep understanding of security technologies , such as firewalls, intrusiondetection and prevention systems, vulnerability scanners, and endpoint protection. Strong knowledge of cloud security concepts and technologies , such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
testing Statement of Works, and manage the remediation of identified vulnerabilities. Security Tools & Technologies Advice: Provide guidance on the selection, implementation, and optimization of security tools such as firewalls, intrusiondetection systems (IDS), intrusion prevention systems (IPS), and security information and event management (SIEM) systems. Support Security Architecture & Design: Assess the design, implementation, and maintenance of developed More ❯
flows. Use Git for source control and collaboration. Write and optimize queries in SQL (PostgreSQL, MySQL, Oracle). Support the implementation and maintenance of cybersecurity tools (e.g., firewalls, antivirus, intrusiondetection systems). Participate in vulnerability assessments and help remediate identified risks. Assist with incident detection, response, and reporting. Help document security policies, procedures, and technical guidelines. More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Southern Communications Ltd
to attack vectors and security incidents, and coordinate incident response across teams Security software testing:?Test company software, firmware, and firewalls Security software design:?Design software security systems like intrusiondetection systems and firewalls Security system maintenance:?Maintainand proof network security systems Security system analysis:?Analyse security systems and seek improvements on a continuous basis? Help develop platforms More ❯
with the latest cybersecurity threats and trends and escalate risks promptly. Ensure compliance with relevant industry regulations and standards (e.g., GDPR, ISO 27001). Manage security systems, including firewalls, intrusiondetection/prevention systems, and antivirus software, in collaboration with GT. Develop and test incident response plans and coordinate responses to security incidents and breaches. Raise cybersecurity awareness More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Battelle Memorial Institute
configuration management/modification of network devices (routers, switches). Experience with DoD Risk Management Framework. Understanding of networking and security concepts (e.g., TCP/IP stack, routing, firewalls, intrusiondetection systems, intrusion prevention systems). Familiarity with IP networking concepts, e.g., virtual private networks, tunneling, layering, defense in depth. Understanding of commodity networking applications, e.g., DNS More ❯
proposals - balancing compliance, risk, and performance. Implementing and testing security components like Windows Server, Active Directory, WSUS, antivirus , backup systems , I ndustrial Network Elements , Network Management Solutions (NMS) and IntrusionDetection Solutions (IDS) . Configuring and troubleshooting routers, switches, and firewalls . Configuring and maintaining virtualized environments . Creating and maintaining as-built documentation that ensures clarity and More ❯
systems and processes, including security incident management. Strong troubleshooting skills for hardware, software, and network issues with a focus on security implications. Experience with security tools such as SIEM, intrusiondetection systems, or vulnerability scanners. Excellent customer service and communication skills, with the ability to explain technical concepts to non-technical users. Experience with Microsoft OneDrive, SharePoint, and More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
KBC Technologies Group
and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusiondetection/prevention systems, and encryption technologies. Adhere to enterprise governance & review processes to deliver project goals & deliverables. Follow enterprise ITSM & CMDB processes Monitor and analyze security alerts … network security fundamentals, encryption technologies, and secure network design principles. Zscaler Private Access & Internet Access Proficiency in configuring, managing, and troubleshooting firewalls. Cisco, Palo Alto etc,. Experience with intrusiondetection/prevention systems, as well as with SIEM tools and security incident response. Excellent problem-solving skills, analytical thinking, and the ability to communicate effectively with diverse More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
N Brown Group
responsible for implementing, managing and enhancing the technology underpinning N Browns cyber security services. Youll have a good understanding of a range of security tools like web application firewalls, intrusiondetection technologies, vulnerability scanners and SIEMs; and the technical knowledge to integrate them to enhance our protection and build automated responses. Youll need a good understanding of the … creating correlation searches and dashboards is a plus. Experience of working within PCI DSS, or other compliance frameworks. Software and Technology SIEM (ideally Splunk) & IaaS (AWS, Azure, GCP) Endpoint Detection and Response (EDR) tools such as MS Defender APT. Network and Host IntrusionDetection/Prevention tools Web Application Firewalls (ideally Akamai) Vulnerability scanning tools (ideally Rapid7 More ❯
Reston, Virginia, United States Hybrid / WFH Options
RedKey Solutions
and upgrade security measures and tools for protecting information systems and networks. • Automate repeatable tasks and provide consultative support. • Design, configure, implement, troubleshoot, and maintain security platforms (e.g., firewalls, intrusiondetection/prevention, anti-virus/malware, cryptography systems, SIEM, MDM). • Formulate systems and methodologies, respond to security events, and assist in remediation efforts. • Participate in the … years of relevant experience (or equivalent experience/certifications). Preferred Qualifications: • Experience with additional security tools and processes (IDS/IPS, VPN, Webinspect, Appdetective). • Experience in incident detection, response, and forensics. • Proficiency in scripting languages (Python, PowerShell). • Experience with Cloud Computing Technologies/AWS. • Agile Software Development experience. • AWS Certification. • Knowledge of maintaining VPNs, firewalls, and More ❯