Dartford, Kent, United Kingdom Hybrid / WFH Options
Confidential
license. In this role, you will: Deploy, administer, and maintain Network & Security platforms and any other related software, such as routers, switches, wireless, firewalls, intrusiondetection/prevention, network access control, cryptography systems, monitoring, and cloud technologies/applications. Perform diagnostics, appraisal, and analysis on predominantly Cisco based … Network & Security technologies, such as, firewalls, VPN s, intrusiondetection/intrusion prevention, network access control, and other network policies to ensure maximum system reliability & security. Monitor network traffic to optimise performance and efficiency. Implement and administer remote access, and VPN Solutions. Manage PKI distribution and issue more »
the companies network infrastructure. Main Responsibilities: Deploy, administer, and maintain Network & Security platforms and any other related software, such as routers, switches, wireless, firewalls, intrusiondetection/prevention, network access control, cryptography systems, monitoring, and cloud technologies/applications. Perform diagnostics, appraisal, and analysis on predominantly Cisco based … Network & Security technologies, such as, firewalls, VPNs, intrusiondetection/intrusion prevention, network access control, and other network policies to ensure maximum system reliability & security. Give direction and recommendation on Network & Security Enhancements/Features. Provide BAU support for Network & Security related tickets/incidents. Contribute to more »
necessary to support business continuity for a 24/7 emergency policing service and its external partners. Responsibilities: Implement network security including firewall configurations, intrusiondetection/prevention systems, and access control lists To maintain the network architecture including Cisco routers and switches and Cisco ASA/Firepower … network infrastructure including layer 2 and 3 switching and routing. Must have experience of managing network security hardware and software, including firewalls and network intrusiondetection systems. Experience of network hardware and software including Cisco and Meraki solutions Must demonstrate in-depth understanding of datacentre network architectures, ICT more »
server Firewalling technologies and capabilities. Knowledge of security event management (SIEM), event correlation and analysis technologies. Knowledge of data encryption technologies. Strong knowledge of IntrusionDetection and Intrusion Prevention technical capabilities. Knowledge of web filtering and email SPAM prevention techniques. Knowledge of vulnerability assessment and forensic investigations more »
server Firewalling technologies and capabilities. Knowledge of security event management (SIEM), event correlation and analysis technologies. Knowledge of data encryption technologies. Strong knowledge of IntrusionDetection and Intrusion Prevention technical capabilities. Knowledge of web filtering and email SPAM prevention techniques. Knowledge of vulnerability assessment and forensic investigations more »
server Firewalling technologies and capabilities. Knowledge of security event management (SIEM), event correlation and analysis technologies. Knowledge of data encryption technologies. Strong knowledge of IntrusionDetection and Intrusion Prevention technical capabilities. Knowledge of web filtering and email SPAM prevention techniques. Knowledge of vulnerability assessment and forensic investigations more »
server Firewalling technologies and capabilities. Knowledge of security event management (SIEM), event correlation and analysis technologies. Knowledge of data encryption technologies. Strong knowledge of IntrusionDetection and Intrusion Prevention technical capabilities. Knowledge of web filtering and email SPAM prevention techniques. Knowledge of vulnerability assessment and forensic investigations more »
server Firewalling technologies and capabilities. Knowledge of security event management (SIEM), event correlation and analysis technologies. Knowledge of data encryption technologies. Strong knowledge of IntrusionDetection and Intrusion Prevention technical capabilities. Knowledge of web filtering and email SPAM prevention techniques. Knowledge of vulnerability assessment and forensic investigations more »
server Firewalling technologies and capabilities. Knowledge of security event management (SIEM), event correlation and analysis technologies. Knowledge of data encryption technologies. Strong knowledge of IntrusionDetection and Intrusion Prevention technical capabilities. Knowledge of web filtering and email SPAM prevention techniques. Knowledge of vulnerability assessment and forensic investigations more »
knowledge on Security frameworks and technologies such as ISO 27001, NIST, SOC Technical writing experience 4+ years of Information Security experience Strong knowledge of IntrusionDetection and Intrusion Prevention technical capabilities. Strong knowledge of risk management principles and practices. Strong knowledge of security administration and role-based more »
Oversee the implementation and operation of controls to meet identified security control objectives. Advise operations teams supporting computer security incident response activities related to intrusiondetection monitoring, scanning, cyber threat reporting, and development/implementation of vulnerability mitigation strategies. Develop trusted advisor relationships for information risk management and more »
security tools. Collaborate with the security governance teams to create and maintain security policies and procedures. Design and implement network security architectures, including firewalls, intrusiondetection/prevention systems, and secure access controls. Work closely with IT, compliance, and business teams to integrate security into all aspects of more »
road map Provide routine reporting on virtualization metrics to senior management Security Integration: Ensure network security by designing and implementing robust security protocols, firewalls, intrusiondetection systems, and encryption mechanisms Must have expertise in managing Cisco firewalls, Palo Alto host-based firewalls, Palo Alto WAF, SD-WAN technologies more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
LPT, OSCP, AWS certified security, or equivalent are highly desirable. You have an in-depth knowledge of security principles, technologies, and best practices, threat detection and mitigation strategies. Mature understanding/experience with cloud security architecture (AWS, Azure) with a proven track record and work ethic that covers many … make sure the organization is compliant with PCI DSS, ISO/IEC 27001, SOC & HIPAA & IRAP controls. Strong understanding of network protocols & practices, firewalls, intrusiondetection/prevention systems and WAFs. Knowledge of security compliance standards relevant to the SaaS industry, such as PCI, GDPR, ISO 27001, SOC2 more »
for the Confidentiality, Integrity, and Availability of PROD systems. Lead and supervise our external (MSP) Security Operations Center (SOC) functions that consist of: Monitoring, detection and analysis activities, Threat Hunting, Threat intelligence activities, Incident response (IR) activities Being the focal point for PROD security incidents - Manage the investigation, provide … post-incident reviews, and implementing improvements based on lessons learned Enrich and expand the SOC coverage based on existing/& new attack vectors. Suggest detection and response improvements for GIS as well as the MSP to speed up and/or enhance detection capabilities. Ensures security operations playbooks … teams Experience in a leadership position within a Security Operations Center preferred. Significant demonstrated experience working with Security Information Event Management (SIEM), Continuous Monitoring, IntrusionDetection/Prevention Systems (ID/PS), Network Traffic Analysis, Incident Response, Endpoint Security Systems, Digital Forensics, WLAN Monitoring, and/or Threat more »
We are looking for a Vice President, Solution Engineering, Cyber Risk to advise our clients and prospective clients on Managed Detection and Response (MDR) services. In this role you will partner with our Sales and Incident Response teams to introduce, position and architect technical solutions to address our clients … detection and response needs. You will act as a trusted advisor and technical subject matter expert on Managed Detection and Response, which will include sound working knowledge of Endpoint Detection and Response (EDR), Security Incident and Event Management (SIEM), and Network Detection and Response (NDR) tools. … including C-suite and senior security engineering Deep understanding of security technologies such as EDR, SIEM, Cloud provider security solutions, Anti-virus, Firewall, Network Intrusiondetection Familiarity with security frameworks: CIS Critical Security Controls, NIST500:83, ISO27001 Familiarity with Enterprise Architecture frameworks: TOGAF, SABSA, etc. Relevant education and more »
practices, and risk management methodologies. * Technologies: Advanced proficiency with AuditBoard is preferred. Experience with other key cybersecurity technologies such as SIEM, firewall management, and intrusiondetection systems is highly regarded. * Education: Bachelor's degree in computer science, information security, or a related field; a graduate degree is a more »
such as: Risk Assessment and Risk Management Change Management Logical, Physical, and Administrative Access Controls Physical Security Encryption (in relation to compliance) Malicious Code: Detection and Response Systems and Software Development Life Cycle Personnel Security Media Controls Audit, Logging, and Monitoring Controls Vendor Management IntrusionDetection and more »
and information security roles. Strong knowledge of IT infrastructure, network security, and cybersecurity best practices. Proficiency in security tools and technologies such as firewalls, intrusiondetection systems, and antivirus software. Experience with compliance frameworks such as ISO 27001, NIST, GDPR, and HIPAA. Strong leadership and team management skills. more »
ITIL (Information Technology Infrastructure Library) and COBIT (Control Objectives for Information and Related Technologies) frameworks. Hands-on experience with security technologies such as firewalls, intrusiondetection/prevention systems, encryption, and identity/access management solutions. Excellent communication and interpersonal skills, with the ability to effectively communicate complex more »
East London, London, United Kingdom Hybrid / WFH Options
MECS Communications Ltd
of the following as possible: * Security operations management * DevOps or software development roles, with a focus on security. * Security tools such as vulnerability scanners, intrusiondetection systems, & security information & event management (SIEM) solutions. * Multi cloud environments AWS & Azure etc. * Using & managing Splunk including defining data streams, indices & ingests more »
have been compromised with Ransomware/Data breaches. Tech, Experience & Qualifications: Experience working in Managed service provider (MSP) environments. Network security principles, including firewalls, intrusiondetection/prevention systems, and VPN technologies. Fortinet Firewall, FortiSIEM, FortiEDR beneficial or equivalent firewalls Certifications in relevant technologies such as Microsoft Azure more »
to identify weaknesses in systems and networks and propose mitigation plans where required 4.Recommend, design and implement security tools and technologies such as firewalls, intrusiondetection systems, endpoint protection and distributed denial of service (DDoS) mitigation solutions. 5.Build strong relationships with customers, providing ongoing cybersecurity consultation and support. more »
to identify weaknesses in systems and networks and propose mitigation plans where required 4.Recommend, design and implement security tools and technologies such as firewalls, intrusiondetection systems, endpoint protection and distributed denial of service (DDoS) mitigation solutions. 5.Build strong relationships with customers, providing ongoing cybersecurity consultation and support. more »
to identify weaknesses in systems and networks and propose mitigation plans where required 4.Recommend, design and implement security tools and technologies such as firewalls, intrusiondetection systems, endpoint protection and distributed denial of service (DDoS) mitigation solutions. 5.Build strong relationships with customers, providing ongoing cybersecurity consultation and support. more »