objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
oxford district, south east england, United Kingdom
Americold Logistics, LLC
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
In Technology Group
threats. Key Responsibilities: Monitor, detect, and respond to security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and More ❯
Bletchley, Buckinghamshire, United Kingdom Hybrid / WFH Options
In Technology Group
threats. Key Responsibilities: Monitor, detect, and respond to security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
Intec Select
an information security or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusiondetection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge More ❯
reading, south east england, United Kingdom Hybrid / WFH Options
Intec Select
an information security or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusiondetection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge More ❯
high wycombe, south east england, United Kingdom Hybrid / WFH Options
Intec Select
an information security or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusiondetection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge More ❯
oxford district, south east england, United Kingdom Hybrid / WFH Options
Intec Select
an information security or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusiondetection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge More ❯
milton keynes, south east england, United Kingdom Hybrid / WFH Options
Intec Select
an information security or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusiondetection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge More ❯
on-premises networks (hybrid setups). Operations, Monitoring, and Incident Management Monitor the performance of both on-premises and cloud-based systems. Ensure timely detection, escalation, and resolution of incidents and outages. Develop and track key performance indicators (KPIs) such as MTTD and MTTR. Automate repetitive tasks using scripts … and cloud-native tools. Security and Compliance Implement and manage infrastructure security measures, including firewalls, VPNs, and intrusiondetection systems. Ensure compliance with industry standards such as GDPR, ISO 27001 and SOC 2. Perform regular audits and address vulnerabilities in both cloud and traditional systems. Strategic Planning and More ❯
needs. Monitor and respond to security incidents using tools like SIEM and Sophos MTR and Splunk. Maintain system security by configuring firewalls, VPNs, and intrusiondetection systems, and ensuring timely patching. Manage vulnerability remediation based on penetration test results and risk assessments. Conduct penetration tests. Investigate security incidents More ❯
approximately 2-8 global personnel. What we are looking for Broad-based industry and market knowledge of enterprise-level access control, video management, and intrusiondetection systems of 10+ years. Experience in managing global accounts on an enterprise level requiring support across multiple time zones. Ability to create More ❯
approximately 2-8 global personnel. What we are looking for Broad-based industry and market knowledge of enterprise-level access control, video management, and intrusiondetection systems of 10+ years. Experience in managing global accounts on an enterprise level requiring support across multiple time zones. Ability to create More ❯
approximately 2-8 global personnel. What we are looking for Broad-based industry and market knowledge of enterprise-level access control, video management, and intrusiondetection systems of 10+ years. Experience in managing global accounts on an enterprise level requiring support across multiple time zones. Ability to create More ❯
approximately 2-8 global personnel. What we are looking for Broad-based industry and market knowledge of enterprise-level access control, video management, and intrusiondetection systems of 10+ years. Experience in managing global accounts on an enterprise level requiring support across multiple time zones. Ability to create More ❯
oxford district, south east england, United Kingdom
QCIC
approximately 2-8 global personnel. What we are looking for Broad-based industry and market knowledge of enterprise-level access control, video management, and intrusiondetection systems of 10+ years. Experience in managing global accounts on an enterprise level requiring support across multiple time zones. Ability to create More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Bright Purple Resourcing
including cloud resources, tuning and potential growth. Ensure security is integrated into all architecture including network security, encryption, multi-factor authentication, authorisation, identity management, intrusiondetection/prevention. About You: Proven experience in the secure design of cloud platform environments including: Selection of appropriate cloud services and cloud More ❯
of the role, covering both hands-on implementation and compliance. The focus will primarily be on AppSec, encompassing principles and practices such as firewalls, intrusiondetection and prevention systems, encryption, and endpoint protection. On the compliance access you’ll need an understanding of security standards and frameworks such More ❯