Warwick, England, United Kingdom Hybrid / WFH Options
Vallum Associates
Job Title: Security SME- IntrusionDetection Specialist (IDS, HIDS) Location: Warwick or Wokingham (Hybrid – 2 Days/Week Onsite) Duration: 6+ Months Contract Inside IR35 Active SC Clearance (mandatory) Job Overview: We are seeking an experienced Security Subject Matter Expert (SME) with deep expertise in IntrusionDetection … across the estate and managing HIDS systems to detect and prevent intrusions effectively. Key Responsibilities: Lead the design, deployment, and management of Host-based IntrusionDetection Systems (HIDS) Monitor, analyze, and respond to security alerts from IDS platforms Continuously assess and improve the overall security posture of the … and IDS Ability to commute to Warwick or Wokingham 2 days per week Excellent communication skills and stakeholder management Strong hands-on experience with IntrusionDetection Systems (especially HIDS) Proven background in cybersecurity monitoring and incident response Familiarity with broader estate security management Strong analytical and problem-solving More ❯
Warwick, north west england, united kingdom Hybrid / WFH Options
Vallum Associates
Job Title: Security SME- IntrusionDetection Specialist (IDS, HIDS) Location: Warwick or Wokingham (Hybrid – 2 Days/Week Onsite) Duration: 6+ Months Contract Inside IR35 Active SC Clearance (mandatory) Job Overview: We are seeking an experienced Security Subject Matter Expert (SME) with deep expertise in IntrusionDetection … across the estate and managing HIDS systems to detect and prevent intrusions effectively. Key Responsibilities: Lead the design, deployment, and management of Host-based IntrusionDetection Systems (HIDS) Monitor, analyze, and respond to security alerts from IDS platforms Continuously assess and improve the overall security posture of the … and IDS Ability to commute to Warwick or Wokingham 2 days per week Excellent communication skills and stakeholder management Strong hands-on experience with IntrusionDetection Systems (especially HIDS) Proven background in cybersecurity monitoring and incident response Familiarity with broader estate security management Strong analytical and problem-solving More ❯
Albuquerque, New Mexico, United States Hybrid / WFH Options
MELE Associates, Inc
S&S Support the PHYSEC Program management activities to update PHYSEC policies and procedures by performing the following tasks: Inspections, Inspection Reporting, Space Accreditations, IntrusionDetection Systems, Badging, and Access Control Assist with preparation of Construction Security Plans (CSP), Pre-Construction Plans, Fixed Facility Checklist & TEMPEST requirements. Conduct … for the duration of projects to ensure compliance, construction design, and security standards Apply knowledge of operations of Electronic Security Systems (ESS) to include IntrusionDetection Systems (IDS) and Automated Entry Control Systems (AECS) Performs physical security work to inspect, analyze and evaluate physical security systems and measures … governing a variety of safeguards and security disciplines and security policies and procedures. Proficiency in managing security systems such as CCTV, access control, and intrusiondetection systems. Experience in developing and implementing security policies and procedures. Knowledge of the latest security technologies and trends. LOCATION: This is a More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
Skye Business Solutions
Rule fine-tuning, and integration of applicable changes from upstream rule repositories into our repo. Collaborate with Analysts and client cybersecurity professionals to refine detection strategies, improve detection accuracy and reduce false positives. Analyse security logs from various sources including cloud platforms services, firewalls, intrusiondetection … administration. Solid experience working with security logs across multiple domains - identity and access, network, system, data, application, cloud - and multiple product types, e.g. firewalls, intrusiondetection systems, VPN, web application firewalls, web and email filtering, identity directories and SSO, endpoint protection and EDR, and other security tools. Strong More ❯
Alexandria, Virginia, United States Hybrid / WFH Options
Agile Defense, Inc
Government with information requests, perform specialized cyber threat analyses, and produce reports for the Government and external organizations. • Assist the USPTO SOC with advanced intrusiondetection capability by providing the adversarial tactics, techniques, and procedures along with IOC's and recommended detection rules. • Recommend countermeasures to malware … USPTO information systems to detect and work with the USPTO SOC to isolate advanced threats that may evade existing security solutions. • Develop Cloud IOC detection and response. • Ensure threat intelligence is machine readable allowing it to be easily stored, analyzed, and transmitted in a structured format and allowing REST … possess a strong cyber security background with experience in host-based and network-based forensics related to the identification of advanced cyber threat activities, intrusiondetection, incident response, malware analysis, security content development (e.g., signatures, rules etc.), and cyber threat intelligence. • Must have experience in developing scripts to More ❯
algorithms Assist customers in implementing sound and secure logging practices, deployment of agents and sensors Leverage advanced knowledge of security operations, cyber security tools, intrusiondetection, and secured networks to integrate with the SIEM platform Triage emerging threats to protect assets and information in client environments. Partner with … level of analytical and problem-solving abilities Positive attitude with strong oral and written communication skills Knowledge of IP networking and network security including IntrusionDetection Familiarity with common network vulnerability/penetration testing tools Familiarity with service management software such as ServiceNow Familiarity with data visualization platforms … provider (MSSP) experience is a plus Certifications or work toward any of the following is strongly desired: GIAC Certified Incident Handler (GCIH) GIAC Certified Intrusion Analyst (GCIA) GIAC Certified Forensic Analyst (GCFA) GIAC Certified Forensic Examiner (GCFE) GIAC Network Forensic Analyst (GNFA) Cisco Certified Network Associate (CCNA) Microsoft Certified More ❯
Dundee, Angus, United Kingdom Hybrid / WFH Options
DC Thomson
and risks Develop and implement threat models to identify potential security threats and design mitigation strategies Oversee the implementation of security solutions, including firewalls, intrusiondetection/prevention systems, security information and event management (SIEM) tools, and data loss prevention (DLP) solutions Adhere to relevant security standards and … or more years Strong understanding of security principles, methodologies, and best practices Hands-on experience with a wide range of security technologies, including firewalls, intrusiondetection/prevention systems, SIEM, and vulnerability scanners Experience with cloud security in AWS and Azure environments Knowledge of security standards and compliance More ❯
Stevenage, Hertfordshire, United Kingdom Hybrid / WFH Options
GlaxoSmithKline
to have in-depth understanding of network architecture to design, implement, and manage secure and efficient networks and proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. The OT Network Security Engineer will have ownership … are in place for all critical areas. People Management: Collaborate with internal owners of security technologies such as antivirus, IDS/IPS, SIEM, endpoint detection & response, configuration management, privileged identity management, etc. Why you? Basic Qualifications: We are looking for professionals with these required skills to achieve our goals … Engineering, Information Technology In-depth understanding of network architecture to design, implement, and manage secure and efficient networks. Proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. Strong ability to collaborate with cross-functional teams More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Tunstall Healthcare (UK) Ltd
Senior Network Engineer you will deliver network and security enhancements and 3rd line support of Tunstall's IT network infrastructure and security prevention and detection systems, working with Tunstall's internal IT teams and external service providers. Main responsibilities of the role: Design, implement, and optimize scalable and resilient … Conduct regular audits of network configurations to maintain consistency and compliance. Collaborate with security teams to implement and maintain robust protections, including firewalls, VPNs, intrusiondetection/prevention systems, and access control protocols. Conduct periodic vulnerability assessments, applying patches and updates to mitigate risks while maintaining compliance with … technologies and with system, security, and network monitoring tools. Understanding of the latest security principles, techniques, protocols and experience in security systems, including firewalls, intrusiondetection/prevention systems, anti-virus software, authentication systems, log management, content filtering. Working knowledge of security devices, tools and service providers Experience More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Leidos
Splunk and creating Splunk dashboards and notables. Additionally, the ideal candidate would be familiar with tools commonly deployed in a SOC environment such as intrusiondetection systems, intrusion analysis systems, security information event management platforms (SIEM), endpoint threat detection tools, and security operations ticket management. REQUIRED … in network defense environments. • Splunk Admin Certification • Strong analytical and technical skills in computer network defense operations, ability to lead efforts in Incident Handling (Detection, Analysis, Triage), Hunting (anomalous pattern detection and content management) and Malware Analysis. • Prior experience and ability with analyzing information technology security events to … report generation, and general content creation. • Ability to develop rules, filters, views, signatures, countermeasures and operationally relevant applications and scripts to support analysis and detection efforts. • Strong logical/critical thinking abilities, especially analyzing security events from host and network event sources e.g., windows event logs, AV, EDR, network More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Battelle Memorial Institute
network devices (routers, switches). Experience with DoD Risk Management Framework. Understanding of networking and security concepts (e.g., TCP/IP stack, routing, firewalls, intrusiondetection systems, intrusion prevention systems). Familiarity with IP networking concepts, e.g., virtual private networks, tunneling, layering, defense in depth. Understanding of More ❯
examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity analysts to detect, mitigate, and analyze threats. … meetings and provides expert input to ensure security is maintained. Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusiondetection and prevention, eDiscovery, and content filtering. Ability to manage and continuously improve upon vulnerability management program. Ability to propose solutions for closing More ❯
Amherst, Massachusetts, United States Hybrid / WFH Options
University of Massachusetts Amherst
analytical and critical thinking skills to assess security risks and develop mitigation strategies. Demonstrated technical understanding of system, network and cloud security, incident management, intrusiondetection, vulnerability and patch management, and other related concepts and technologies. Experience with security tools such as SIEM, EDR/XDR, forensics tools More ❯
Bethesda, Maryland, United States Hybrid / WFH Options
Lockheed Martin
planning. • Strong knowledge of cyber threat landscape, vulnerability assessments, incident response, and threat hunting methodologies. • Extensive knowledge in security tools and technologies, including SIEM, intrusiondetection/prevention systems, and threat intelligence platforms. • Active TOP SECRET security clearance or recently active TOP SECRET clearance within 24 months with More ❯
classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who More ❯
knowledge of the threat landscape relevant to SaaS products, preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusiondetection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools. You own relevant certifications (Security+, IAT II/III level or similar More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Odyssey Systems Consulting Group
an agile development environment is preferred Hand-on experience in software security testing, methodologies, and frameworks Hands-on experience in security systems, including firewalls, intrusiondetection systems, anti-virus software, authentication systems, log management, content filtering, etc. (e.g. HBSS/Trellix, Windows Defense, etc.). Familiarity with web More ❯
Experience of threat and risk modeling. Strong understanding of network security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusiondetection/prevention systems, security information and event management (SIEM) systems, and vulnerability assessment tools, and their configuration options. Familiarity with cloud security More ❯
Experience of threat and risk modeling. Strong understanding of network security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusiondetection/prevention systems, security information and event management (SIEM) systems, and vulnerability assessment tools, and their configuration options. Familiarity with cloud security More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Experience of threat and risk modeling. Strong understanding of network security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusiondetection/prevention systems, security information and event management (SIEM) systems, and vulnerability assessment tools, and their configuration options. Familiarity with cloud security More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Experience of threat and risk modeling. Strong understanding of network security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusiondetection/prevention systems, security information and event management (SIEM) systems, and vulnerability assessment tools, and their configuration options. Familiarity with cloud security More ❯
City, Edinburgh, United Kingdom Hybrid / WFH Options
Deloitte LLP
Experience of threat and risk modeling. Strong understanding of network security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusiondetection/prevention systems, security information and event management (SIEM) systems, and vulnerability assessment tools, and their configuration options. Familiarity with cloud security More ❯
Falls Church, Virginia, United States Hybrid / WFH Options
Epsilon Inc
to implement secure coding practices and foster secure CI/CD development pipelines. Support the evaluation and deployment of security tools, including endpoint protection, intrusiondetection/prevention systems, and threat intelligence platforms. Maintain awareness of the latest security trends, vulnerabilities, and threat intelligence to proactively protect the More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Aerospace Corporation
wide range of advanced cybersecurity defense solutions with a strong emphasis on practical, hands-on experience and documented proficiency in securing complex environments (e.g., intrusiondetection systems (IDS), Extensive experience with security information and event management (SEIM) systems, Endpoint Detection and Response (EDR) solutions and configuring host … systems to generate and forward comprehensive audit logs for effective threat detection and incident response. Willing to travel occasionally to work location or customer site/domestically/internationally approx. 15-20% if required. This position requires an Active Top Secret Security Clearance, which is issued by the U.S. More ❯
Herndon, Virginia, United States Hybrid / WFH Options
VTG
team with enforcing DoD, NIST, and Intelligence Community (IC) security guidelines, including RMF and STIG compliance. Implement and maintain security measures such as firewalls, intrusiondetection/prevention systems, and access controls. Conduct vulnerability assessments and patch management to mitigate security risks. Maintain physical and logical security protocols … requiring prolonged sitting, standing, and walking in a secure environment. Top Secret/SCI with Poly Desired: Experience with Splunk, SIEM tools, or endpoint detection and response (EDR) platforms. Prior experience in classified or SCIF environments. Prior experience leading a team. More ❯