Stroud, England, United Kingdom Hybrid / WFH Options
TieTalent
investigate high-priority alerts, analyse logs, or network traffic and endpoint activity using tools like Splunk. Whether you're monitoring security alarms, creating new detection content, using threat intelligence to strengthen our defences, or responding to breaches, each day will begin with a team meeting to review ongoing investigations … impact. About You You’ll bring a background in cyber security analysis and a passion for IT. Ideally, you’ll have experience with host intrusiondetection analysis, but don’t worry if that’s an area you’re still developing in - plenty of training will be provided. You … working as a Cyber Security/Security Operations Centre Analyst Evidence of experience working in at least one of the following fields: malware analysis, intrusiondetection and incident response Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria will be More ❯
Cinderford, England, United Kingdom Hybrid / WFH Options
TieTalent
investigate high-priority alerts, analyse logs, or network traffic and endpoint activity using tools like Splunk. Whether you're monitoring security alarms, creating new detection content, using threat intelligence to strengthen our defences, or responding to breaches, each day will begin with a team meeting to review ongoing investigations … impact. About You You’ll bring a background in cyber security analysis and a passion for IT. Ideally, you’ll have experience with host intrusiondetection analysis, but don’t worry if that’s an area you’re still developing in - plenty of training will be provided. You … working as a Cyber Security/Security Operations Centre Analyst Evidence of experience working in at least one of the following fields: malware analysis, intrusiondetection and incident response Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria will be More ❯
Cheltenham, England, United Kingdom Hybrid / WFH Options
GCHQ
tasks may involve investigating high-priority alerts, analysing logs, network traffic, and endpoint activity using tools like Splunk. You will monitor security alarms, create detection content, leverage threat intelligence, and respond to breaches. Each day begins with a team meeting to review investigations and plan. You will lead efforts … based on severity and impact. About You You should have a background in cyber security analysis and a passion for IT. Experience with host intrusiondetection analysis is preferred but training will be provided. A solid understanding of Windows and Linux Operating Systems is essential. You need at … To secure an interview, candidates must meet minimum criteria, including 6 months' experience as a Cyber Security/SOC Analyst, experience in malware analysis, intrusiondetection, incident response, or line management. What to Expect The recruitment process is fair and merit-based, involving application review, virtual interviews, and More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
install, commission, and maintain electronic systems designed to protect people, properties, and assets. Gain in-depth knowledge about our cutting-edge systems, including fire detection, intrusiondetection, CCTV, and access control solutions. Hit the road in your own company van, visiting a variety of sites, from residential More ❯
Plymouth, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
an information security or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusiondetection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge More ❯
Bath, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
an information security or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusiondetection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge More ❯
Swindon, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
an information security or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusiondetection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
Peppermillimports
role with one of our trusted client partners as a 'Spartan' consultant. In This Role You Will Undertake Network Security - Understanding of firewall configuration, intrusiondetection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
role with one of our trusted client partners as a 'Spartan' consultant. In this role you will undertake: Network Security - Understanding of firewall configuration, intrusiondetection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through More ❯
and advanced hunting queries. Experience Needed: Managing serious cyber incidents as a digital forensic incident responder. Operating within complex enterprise environments. Understanding security monitoring, intrusiondetection, firewalls, antivirus, and web proxies. Technical expertise in networks, malware analysis, and digital forensics. Effective communication with senior stakeholders. Company Overview: Element More ❯
Incidents, as an Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware More ❯
Incidents, as an Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware More ❯
Incidents, as an Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware More ❯
Incidents, as an Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware More ❯
Incidents, as an Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware More ❯
robust security protocols for network and cloud environments, adhering to regulatory requirements and industry best practices. Manage and monitor security controls, such as firewalls, intrusiondetection/prevention systems, and identity access management. Conduct regular security and vulnerability assessments, ensuring that both network and cloud environments are protected … with a proven track record in a leadership position or role of authority. Strong knowledge of networking principles, including routing, switching, VPNs, firewall management, intrusion prevention systems and network monitoring tools. Proficiency with cloud infrastructure services (Azure) and hybrid cloud architectures. Solid understanding of security practices and frameworks, with More ❯
Tewkesbury, England, United Kingdom Hybrid / WFH Options
Lockheed Martin
Team (LM-CIRT) and will work in the Global Defense and Intelligence Mission Area. This role is responsible for defending the enterprise against network intrusion activity originating from criminal and nation state adversaries. It is focused on supporting effective execution of operational workflows, analytical completeness, enhancing tradecraft, and implementing … of large-scale computer network environments Demonstrated background using computer network defense tools, processes, and tradecraft. Experience in a broad spectrum of technologies including intrusiondetection systems, security information and event management (SIEM), and forensic tools. Demonstrated excellence in technical writing and communication Demonstrated experience progressing cyber initiatives … Skills: Proficiency in Unix/Linux command line BASH knowledge including BASH Shell Scripting would be very useful Demonstrated experience developing and maintaining custom detection capabilities using programming and development expertise, including Python, Shell scripting, and regular expressions Demonstrated experience with in-depth security log analysis Reverse engineering of More ❯