Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Harlow, London, United Kingdom Hybrid / WFH Options
Raytheon
practises into our operation. You will be responsible for the daily maintenance and support of applications and related hardware associated with our solutions for intrusiondetection (IDS), Security Incident Event Monitoring (SIEM), and packet capture (PCAP). You will be expected to deliver upgrades and manage configuration of more »
protocols, including TCP/IP, DNS, DHCP, VLANs, and routing protocols (e.g., OSPF, BGP). with network security technologies such as firewalls, VPNs, and intrusiondetection/prevention systems. in network monitoring and management tools (e.g., Wireshark, Nagios, Cisco Prime). If you’re interested, please apply now more »
Stone, Staffordshire, United Kingdom Hybrid / WFH Options
yolk recruitment
resolving hardware, software, and network-related problems to minimise downtime and ensure reliability. Implementing security best practices, such as access controls, encryption, firewalls, and intrusiondetection/prevention systems, to protect against cyber threats. The experience you will bring to the team: Experience in the design, build & maintenance more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Delaney & Bourton
a network, phishing, port scanning, web application attacks, DDoS, lateral movement. Experience with security monitoring, incident response, and vulnerability management. Understanding of malware analysis, intrusiondetection/prevention systems, and endpoint security solutions. Ability to analyze and interpret security logs and data. Role can work hybrid, for a more »
Manchester, England, United Kingdom Hybrid / WFH Options
Pontoon
cloud security architectures and best practises (AWS and Azure). Experience with mainframe systems and migration projects. Proficiency in security technologies such as firewalls, intrusiondetection/prevention systems, and encryption.- Communication Skills: Ability to explain complex technical concepts to non-technical audiences. Strong presentation and report-writing more »
implement network infrastructure solutions based on business requirements and industry best practices. Solid knowledge of network security concepts, including firewall configuration, VPN setup, and intrusiondetection systems. Install, configure, and maintain network equipment including routers, switches, firewalls, and wireless controllers. Hands-on experience with network equipment such as more »
examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity analysts to detect, mitigate, and analyze threats. … management meetings and provides expert input to ensure security is maintained.Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusiondetection and prevention, eDiscovery, and content filtering.Ability to manage and continuously improve upon vulnerability management program.Ability to propose solutions for closing identified vulnerabilities more »
Doncaster, England, United Kingdom Hybrid / WFH Options
Cloud Decisions
as part of an engaging SOC team that provides around-the-clock protective monitoring solutions to clients across various industry verticals. Leveraging cutting-edge detection technology, offering assurance detection and incident response capabilities to organizations of all sizes. Role Overview As a SOC Engineer you'll work handling … both reactive and proactive security engagements. Your responsibilities will include: ✨Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and IntrusionDetection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. ✨Incident Reporting: Ensure timely, accurate … directly with customers regarding threats and alerts. Prepare and present findings to clients. ✨Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and Vulnerability Management tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible more »
ECSA, LPT, OSCP, AWS certified security, or equivalent are highly desirable.You have an in-depth knowledge of security principles, technologies, and best practices, threat detection and mitigation strategies.Mature understanding/experience with cloud security architecture (AWS, Azure) with a proven track record and work ethic that covers many platforms … to make sure the organization is compliant with PCI DSS, ISO/IEC 27001, SOC & HIPAA & IRAP controls.Strong understanding of network protocols & practices, firewalls, intrusiondetection/prevention systems and WAFs.Knowledge of security compliance standards relevant to the SaaS industry, such as PCI, GDPR, ISO 27001, SOC2, NIST.Experience more »
Oxfordshire, England, United Kingdom Hybrid / WFH Options
University of Oxford
collaboration with the Head of Information Security Operations and the rest of the team. OxCERT runs an on-premises Elasticsearch-based SIEM solution, an IntrusionDetection System (IDS), and a vulnerability scanning service as well as other open source and commercial tools. We are one of the first more »
City Of London, England, United Kingdom Hybrid / WFH Options
Computappoint
SD-WAN. Proficiency in utilizing network management and analysis tools, including LogicMonitor, Datadog, Solarwinds, Network Config Manager, and similar industry-standard products. Knowledgeable in intrusiondetection and prevention systems (IDS/IPS/AV) and other crucial network security measures. Services offered by Computappoint Limited are those of more »
Proven experience in cyber security incident response, with a strong understanding of incident handling methodologies and best practices. Familiarity with network security monitoring tools, intrusiondetection/prevention systems, and forensic analysis tools. Knowledge of common cyber threats and attack vectors, including malware, phishing, and ransomware. Relevant certifications more »
to have : Basic knowledge of ISO/SAE 21434 automotive cybersecurity standard. Expertise in IP based networks/communication protocols and net applications like IntrusionDetection System(IDS)* Personal Skills Strong problem-solving and debugging skills Good communication and teamwork skills Ability to work independently and remotely Ideally more »