objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
programs to meet industry standards Knowledge of cybersecurity functions such as risk management, vulnerability assessments, and security strategy Understanding of security systems including firewalls, intrusiondetection, antivirus software, authentication, log management, and content filtering Ability to work with senior leaders and guide OT cybersecurity capability development Ability to … or other industrial control regulations Experience analyzing vulnerability and security risk assessment tools, including OT Passive Monitoring Tools Knowledge of cybersecurity tools, network topologies, intrusiondetection, PKI, and secured networks Knowledge of automation or control systems programming software Excellent project management skills including finance, resource management, planning, and More ❯
industry standards and best practices Knowledge of cybersecurity functions, including risk management, vulnerability assessments, and security strategies Understanding of security systems such as firewalls, intrusiondetection, anti-virus software, authentication systems, log management, and content filtering Ability to work with and advise senior leaders, including CISO, CIO, and … NERC CIP, or similar regulations Experience analyzing vulnerability and security risk assessment tools, including OT Passive Monitoring Tools Knowledge of cybersecurity tools, network topologies, intrusiondetection, PKI, and secured networks Knowledge of automation or control systems programming software Possession of professional certifications such as GICSP, CSSA, or CISSP More ❯
cambridge, east anglia, United Kingdom Hybrid / WFH Options
Intec Select
an information security or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusiondetection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge More ❯
peterborough, east anglia, United Kingdom Hybrid / WFH Options
Intec Select
an information security or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusiondetection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge More ❯
AWS GuardDuty, Azure Security Center, and Google Cloud Security Command Center. Understanding of networking concepts, virtualization, and cloud infrastructure. Experience handling security incidents, including detection, analysis, and response. Proficiency in scripting languages (e.g., Python, PowerShell, Bash). Ability to analyse and utilize threat intelligence to enhance security measures. Experience … with security tools such as firewalls, WAFs, intrusiondetection/prevention systems, and vulnerability scanners. Conducting security audits and vulnerability assessments. Implementation and management of IAM policies. Risk assessment and mitigation in cloud environments. Experience with monitoring tools (e.g., AWS CloudWatch, Azure Monitor, log analysis). Strong attention More ❯
AWS GuardDuty, Azure Security Center, and Google Cloud Security Command Center. Understanding of networking concepts, virtualization, and cloud infrastructure. Experience handling security incidents, including detection, analysis, and response. Proficiency in scripting languages (e.g., Python, PowerShell, Bash). Ability to analyse and utilize threat intelligence to enhance security measures. Experience … with security tools such as firewalls, WAFs, intrusiondetection/prevention systems, and vulnerability scanners. Conducting security audits and vulnerability assessments. Implementation and management of IAM policies. Risk assessment and mitigation in cloud environments. Experience with monitoring tools (e.g., AWS CloudWatch, Azure Monitor, log analysis). Strong attention More ❯
approximately 2-8 global personnel. What we are looking for Broad-based industry and market knowledge of enterprise-level access control, video management, and intrusiondetection systems of 10+ years. Experience in managing global accounts on an enterprise level requiring support across multiple time zones. Ability to create More ❯
approximately 2-8 global personnel. What we are looking for Broad-based industry and market knowledge of enterprise-level access control, video management, and intrusiondetection systems of 10+ years. Experience in managing global accounts on an enterprise level requiring support across multiple time zones. Ability to create More ❯
and application performance, identifying bottlenecks, and taking corrective actions to maintain high availability, Implementing and maintaining server security, including patch management, vulnerability scanning, and intrusiondetection, Collaborating with network administrators, hardware engineers, and researchers to troubleshoot and resolve server and software-related issues, Working closely with the project More ❯
and application performance, identifying bottlenecks, and taking corrective actions to maintain high availability, Implementing and maintaining server security, including patch management, vulnerability scanning, and intrusiondetection, Collaborating with network administrators, hardware engineers, and researchers to troubleshoot and resolve server and software-related issues, Working closely with the project More ❯
Cambridge, Cambridgeshire, UK Hybrid / WFH Options
The ONE Group Ltd
teams to embed secure development practices (SSDLC). Conduct security assessments and perform static/dynamic analysis of firmware. Integrate system-level logging and intrusiondetection capabilities. About You: Strong background in Embedded Linux and system-level C programming. Experience with Linux hardening tools and techniques. Proficient in More ❯
Cambridge, Cambridgeshire, UK Hybrid / WFH Options
The ONE Group Ltd
teams to embed secure development practices (SSDLC). Conduct security assessments and perform static/dynamic analysis of firmware. Integrate system-level logging and intrusiondetection capabilities. About You: Strong background in Embedded Linux and system-level C programming. Experience with Linux hardening tools and techniques. Proficient in More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
The ONE Group Ltd
teams to embed secure development practices (SSDLC). Conduct security assessments and perform static/dynamic analysis of firmware. Integrate system-level logging and intrusiondetection capabilities. About You: Strong background in Embedded Linux and system-level C programming. Experience with Linux hardening tools and techniques. Proficient in More ❯
cambridge, east anglia, United Kingdom Hybrid / WFH Options
The ONE Group Ltd
teams to embed secure development practices (SSDLC). Conduct security assessments and perform static/dynamic analysis of firmware. Integrate system-level logging and intrusiondetection capabilities. About You: Strong background in Embedded Linux and system-level C programming. Experience with Linux hardening tools and techniques. Proficient in More ❯
Cambridge, south west england, United Kingdom Hybrid / WFH Options
The ONE Group Ltd
teams to embed secure development practices (SSDLC). Conduct security assessments and perform static/dynamic analysis of firmware. Integrate system-level logging and intrusiondetection capabilities. About You: Strong background in Embedded Linux and system-level C programming. Experience with Linux hardening tools and techniques. Proficient in More ❯