Desirables: Strong technical skills in designing and implementing secure networking solutions. Experience with network security products such as Firewalls, IDS/IPS, WAF, and DDoS mitigation solutions (Akamai experience is desirable). Knowledge of software-defined networking and cloud networking (desirable). Please apply and submit your CV more »
Greater London, England, United Kingdom Hybrid / WFH Options
Cititec Talent
Protocols and Security (HTTP, API, TLS, DNS, CDN etc) WAF deployment, tuning and troubleshooting experience. Experience of implemented Bot and DOS/DDos protection Good knowledge of scripting languages (Bash, Python, JavaScript ect.) and automation experience more »
landscape and attacks that may be relevant to them. Have an understanding of incident response investigations such as but not limited to DDoS, Email Compromise, Phishing, Malware, and Ransomware. Liaise with clients on delivery, implementation, and project issues. 1-2 years of previous experience working in more »
Manchester Area, United Kingdom Hybrid / WFH Options
GS Solutions
/Security setting recently. Experience solutioning Cisco, Fortinet, Juniper, Palo Alto, Netskope, Zscaler, CrowdStrike (At-least two or more) Vulnerability Management/EDR/DDoS/WAF/PAM – Beneficial MUST have an excellent understanding of current cyber security trends. more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Delaney & Bourton
log analysis and PCAP analysis. A solid understanding in the approach threat actors take to attacking a network, phishing, port scanning, web application attacks, DDoS, lateral movement. Experience with security monitoring, incident response, and vulnerability management. Understanding of malware analysis, intrusion detection/prevention systems, and endpoint security more »
South East London, London, United Kingdom Hybrid / WFH Options
The Fortune Group (Recruitment) Limited
and Monitoring/Alerting service AntiVirus/AntiMalware for End User devices Antivirus/Malware/Ransomware etc for Product/Platform DDos Protection Access Management/Review (IAM) Threat modelling Setup Bug Bounty program Application Security/Testing Brand monitoring (domans etc) Whitelist client access Encryption in more »