to ensure the security of network infrastructure and data.- Manage risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusiondetection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor … CCSP MCSA-Microsoft Windows Server MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional;CCNA/CCNP Experience with security tools and technologies such as intrusiondetection systems, SIEM, and vulnerability management tools. Familiarity with regulatory requirements and industry standards related to IT security. Hays Specialist Recruitment Limited acts as an employment agency for More ❯
continuity and disaster recovery plans from an information security perspective, including considerations for application security. Security Monitoring and Incident Response : Establish and maintain processes for continuous security monitoring and detection of security events, including application-specific security events. Lead the investigation and resolution of security incidents, including those related to application vulnerabilities, root cause analysis, and implementation of corrective … risks. Conduct regular risk assessments and vulnerability analyses of systems, applications, and infrastructure. Security Operations : Oversee the management of security technologies and controls, including but not limited to, firewalls, intrusiondetection/prevention systems, security information and event management (SIEM), data loss prevention (DLP), vulnerability management tools, and application security testing tools. Secure Software Development Lifecycle (SSDLC) : Integrate More ❯
compliance with relevant regulatory standards (eg ISO 27001) as part of critical vendor performance assessment ensuring operational resilience is maintained. In collaboration with GT, manage security systems, including firewalls, intrusiondetection/prevention systems, and antivirus software. In collaboration with GT, Develop and test incident response plans and coordinate responses to security incidents and breaches Raise awareness of More ❯
London, England, United Kingdom Hybrid / WFH Options
Airbus
space , sustainability is at the heart of our purpose . So what's your next change? Airbus Defense and Space is looking for a passionate and talented Cyber Security Detection & Automation Engineer to join our international Incident Response Team (CSIRT), in Newport, Portsmouth or Stevenage. A mission critical part for us in order to secure our world-class business. … security tools and technologies protecting our whole enterprise. You will be responsible for managing our Cyber Threat Intelligence (CTI) research and Threat Hunting activities, the entire lifecycle of our detection rules repository and SOC automation stack. You will be responsible for the technical evolution of our SOC blueprint and managing enhancement projects to integrate new features and solutions into … TTPs (e.g., MITRE ATT&CK) and emerging threats, enabling consistent, repeatable hunts. Develop code-based playbooks (e.g., Jupyter Notebooks or Python scripts) that integrate threat intelligence, log sources, and detection logic-making them reusable by SOC, IR, and detection engineering teams. Collaborate with detection engineers to convert hunt findings into long-term detections and SIEM use cases More ❯
experience as a Security Engineer or in a similar role, with deep understanding of the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusiondetection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). More ❯
Identification, Containment, Eradication, Recovery, and Lessons Learned - collaborating with a global team of incident responders. You will apply your comprehensive skills in cyber defense, digital forensics, log analysis, and intrusion analysis to address security incidents across our endpoints, network, and cloud infrastructure. In this role, you will be responsible for prevention, detection, response, and remediation activities, ensuring that … information assets and technologies are adequately protected by leveraging various technologies such as Next-Generation Firewalls (NGFW), Endpoint Detection and Response (EDR), IntrusionDetection/Prevention Systems (IDS/IPS), Data Loss Prevention (DLP), and more. You will also leverage your collaboration and communication skills to work effectively with all relevant stakeholders in multicultural and global environments. … response process is working smoothly Develop incident response runbooks, playbooks and SOPs with reference to different regulatory requirements - Evaluate the incident response readiness of different layers - people, process, technology Detection & Analysis: - Respond to the cyber security incidents escalated from various channels including the 24/7 SOC team. - Respond to cyber security incidents in compliance with the local authority More ❯
or CISM accreditation. You will develop and maintain the information security architecture and will have proven experience with compliance, vulnerability management, network security, cloud security (AWS & Azure), firewalls and intrusiondetection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threat analysis and act as a subject matter expert More ❯
a similar role. Industry certifications such as CISSP, CEH, etc or equivalent are highly desirable. You have an in-depth knowledge of security principles, technologies, and best practices, threat detection and mitigation strategies. Mature understanding/experience with cloud security architecture (AWS, Azure) with a proven track record and work ethic that covers many platforms (Windows/Linux), to … working with internal stakeholders to make sure the organization is compliant with PCI DSS, ISO/IEC 27001, SOC & HIPAA & IRAP controls. Strong understanding of network protocols & practices, firewalls, intrusiondetection/prevention systems and WAFs. Knowledge of security compliance standards relevant to the SaaS industry, such as PCI, GDPR, ISO 27001, SOC2, NIST. Experience of external penetration More ❯
Central London, London, England, United Kingdom Hybrid / WFH Options
hireful
a similar role. Industry certifications such as CISSP, CEH, etc or equivalent are highly desirable. You have an in-depth knowledge of security principles, technologies, and best practices, threat detection and mitigation strategies. Mature understanding/experience with cloud security architecture (AWS, Azure) with a proven track record and work ethic that covers many platforms (Windows/Linux), to … working with internal stakeholders to make sure the organization is compliant with PCI DSS, ISO/IEC 27001, SOC & HIPAA & IRAP controls. Strong understanding of network protocols & practices, firewalls, intrusiondetection/prevention systems and WAFs. Knowledge of security compliance standards relevant to the SaaS industry, such as PCI, GDPR, ISO 27001, SOC2, NIST. Experience of external penetration More ❯
with the latest cybersecurity threats and trends and escalate risks promptly. Ensure compliance with relevant industry regulations and standards (e.g., GDPR, ISO 27001). Manage security systems, including firewalls, intrusiondetection/prevention systems, and antivirus software, in collaboration with GT. Develop and test incident response plans and coordinate responses to security incidents and breaches. Raise cybersecurity awareness More ❯
standard operating procedures (SOPs), playbooks, process flows, and risk reports, using diverse tools and data sources. Develop, refine, and maintain insider threat indicators and use case scenarios to enhance detection capabilities. Design and deliver insider risk awareness initiatives, highlighting emerging trends and fostering a culture of security, accountability, and vigilance. Identify and implement improvements to detection and response … processes based on lessons learned and evolving threat landscapes. Collaborate with internal partners on threat detection and response initiatives to strengthen organizational resilience. Qualifications Bachelor's degree in Information Security, Cybersecurity, Computer Science, or a related field; advanced degree preferred. Experience in insider risk, counterintelligence, cybersecurity, or a related discipline. Hands-on experience with insider threat detection tools … UAM, DLP, and other monitoring technologies. Strong understanding of insider risk frameworks, regulatory and privacy requirements, and relevant laws. Familiarity with SOC or Fusion Centre operations, including threat monitoring, intrusiondetection, incident response, and analysis. In-depth knowledge of the cyber threat landscape, including adversary tactics, campaigns, and the intersection of insider and external threats. Demonstrated ability to More ❯
City of London, London, United Kingdom Hybrid / WFH Options
DGH Recruitment
of unusual or malicious activity. - Conduct regular security assessments and audits to identify vulnerabilities, risks, and potential areas for improvement. - Implement and maintain security tools and protocols, including firewalls, intrusiondetection systems, and endpoint protection. - Investigate security incidents, respond to potential breaches, and document all relevant findings and actions. - Act as a technical SME and escalation point for … engineering requirements - including new solutions through projects. Required Skills/Experience: - Strong background in IT Security/Cyber Security - Experience building, operating, and maintaining security systems. - Experience with firewalls, intrusiondetection systems, antivirus software, authentication systems, content filtering, and log management. - Experience with network security and networking technologies. - Knowledge of database and operating system security. - Experience managing outsourced More ❯
to your application. You will develop and maintain the cyber security architecture and will have proven experience with compliance, vulnerability management, network security, cloud security (AWS & Azure), firewalls and intrusiondetection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threat analysis and act as a subject matter expert More ❯
that require technical proficiency as well as tenacity, professionalism, and strong communication skills. Responsibilities Security Analytics - Efficiently distill actionable information from large data sets for reporting, hunting, and anomaly detection Incident Management - Detect, document, investigate, and resolve security incidents in an efficient manner Endpoint Forensics - Construct meaningful incident timelines from forensic artifact analysis Counter Measures - Ability to design and … and execute focused plans to discover advanced threats that evade traditional security controls Behavioral Analysis - Develop and implement criteria to identify anomalous user behavior leading indicating insider threat activity IntrusionDetection - Develop and tune network anomaly control capability to produce reliable actionable data Threat Hunting - Proactively search for unknown threats within the environment. Preferred Knowledge and Experience 3+ More ❯
infrastructure, including routers, switches, firewalls, and load balancers. Hands-on experience with cloud networking (AWS, Azure, Google Cloud) and SDN (Software-Defined Networking). Knowledge of network security principles, intrusiondetection systems, and firewall configurations. Familiarity with automation tools (e.g., Ansible, Terraform) for network deployment and management. Experience working with monitoring and performance tools such as Wireshark, Nagios More ❯
with industry best practices. Collaborate with network administrators to design and implement network enhancements. Data Security and Backup: Implement and maintain data security measures, including firewalls, antivirus software, and intrusiondetection systems. Conduct regular data backups and ensure disaster recovery plans are in place. Stay updated with data security trends and proactively address vulnerabilities. Documentation and Knowledge Sharing More ❯
with industry best practices. Collaborate with network administrators to design and implement network enhancements. Data Security and Backup: Implement and maintain data security measures, including firewalls, antivirus software, and intrusiondetection systems. Conduct regular data backups and ensure disaster recovery plans are in place. Stay updated with data security trends and proactively address vulnerabilities. Documentation and Knowledge Sharing More ❯
that require technical proficiency as well as tenacity, professionalism, and strong communication skills. Responsibilities Security Analytics - Efficiently distill actionable information from large data sets for reporting, hunting, and anomaly detection Incident Management - Detect, document, investigate, and resolve security incidents in an efficient manner Endpoint Forensics - Construct meaningful incident timelines from forensic artifact analysis Counter Measures - Ability to design and … and execute focused plans to discover advanced threats that evade traditional security controls Behavioral Analysis -Develop and implement criteria to identify anomalous user behavior leading indicating insider threat activity IntrusionDetection - Develop and tune network anomaly control capability to produce reliable actionable data Threat Hunting - Proactively search for unknown threats within the environment. Knowledge and Experience University degree More ❯
depth knowledge of regulations like GDPR, Data Protection Act (DPA), and other regional or industry-specific standards. Understanding of cybersecurity principles, such as encryption, firewalls, secure coding practices, and intrusiondetection systems. Ability to conduct Data Protection Impact Assessments (DPIAs) and evaluate risks in data processing activities. Knowledge of database management systems, data flows, and data processing operations. More ❯
monitoring and investigations, supporting GCS's cybersecurity operations and incident response programs. The ideal candidate should demonstrate leadership in supervising small teams, with expertise in cybersecurity practices, cloud technologies, detection and response frameworks, and incident handling (containment, eradication, recovery, lessons learned). They should adhere to established incident response procedures, possess strong attention to detail, and collaborate effectively across … events Proven ability to lead resolution during security crises Proficiency in networking concepts, protocols, and security methodologies Deep understanding of system and application security threats Knowledge of network attacks, intrusiondetection, and security principles Leadership skills in supervising analysts and guiding team performance Responsibilities: Lead and develop SOC staff and security teams Align security priorities with organizational strategies More ❯
servicing and maintaining IP CCTV systems (e.g., Genetec, Milestone, Avigilon, Axis) Strong networking knowledge: IP addressing, routing, and switch configuration (advantageous) Understanding of integration between CCTV, Access Control, and IntrusionDetection Systems Excellent fault-finding and problem-solving skills Professional, self-motivated, and reliable with strong communication skills Full UK driving licence Relevant industry certifications (e.g., FIA, HIK More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Eligo Recruitment
You: Proven experience in electronic security systems design , ideally within the built environment Background in consultancy or security integration welcomed Familiarity with systems such as CCTV, access control, and intrusiondetection etc. Good working knowledge of AutoCAD, Revit, and other Autodesk tools Able to communicate complex technical ideas clearly and effectively Eligible for, or currently holding, UK security More ❯
projects across the UK and EMEA. In this role, you will work alongside senior engineers to assist with the configuration, testing, commissioning, and documentation of access control, CCTV, and intrusiondetection systems. This is an ideal opportunity for someone with a technical background who is looking to grow their career in the physical security industry. Training and development … the team. Qualifications For development purposes the following knowledge, skills and experience are required. Key Responsibilities: Assist with the delivery of physical security projects, including access control, CCTV, and intrusiondetection systems. Support the configuration, testing, and commissioning of security systems under the guidance of senior engineers. Prepare project documentation such as commissioning reports, asset lists, and handover … security systems and technologies. Qualifications & Experience: 1-3 years' experience in a technical engineering role (physical security, electrical, or IT fields preferred). Familiarity with access control, CCTV, or intrusiondetection systems is desirable but not essential. Basic understanding of IP networks and structured cabling. Strong technical aptitude and willingness to learn new systems. Good organizational skills and More ❯
In this hands-on role, you will be responsible for the full delivery cycle - from infrastructure cabling through to the installation, configuration, and commissioning of access control, CCTV, and intrusiondetection systems. You'll work across data centres, campuses, and critical infrastructure sites, helping ensure that projects are delivered on time, to specification, and to the highest quality … structured cabling, containment, and system installation. Install and terminate structured cabling (Cat6A, fibre optic) to TIA/EIA standards. Install, configure, and commission security systems: Access Control , CCTV , and IntrusionDetection . Test, troubleshoot, and rectify technical issues on-site during delivery. Complete project documentation: test results, commissioning reports, as-builts, and handover packs. Ensure installations comply with More ❯