to identify weaknesses in systems and networks and propose mitigation plans where required 4.Recommend, design and implement security tools and technologies such as firewalls, intrusiondetection systems, endpoint protection and distributed denial of service (DDoS) mitigation solutions. 5.Build strong relationships with customers, providing ongoing cybersecurity consultation and support. more »
to identify weaknesses in systems and networks and propose mitigation plans where required 4.Recommend, design and implement security tools and technologies such as firewalls, intrusiondetection systems, endpoint protection and distributed denial of service (DDoS) mitigation solutions. 5.Build strong relationships with customers, providing ongoing cybersecurity consultation and support. more »
to identify weaknesses in systems and networks and propose mitigation plans where required 4.Recommend, design and implement security tools and technologies such as firewalls, intrusiondetection systems, endpoint protection and distributed denial of service (DDoS) mitigation solutions. 5.Build strong relationships with customers, providing ongoing cybersecurity consultation and support. more »
to identify weaknesses in systems and networks and propose mitigation plans where required 4.Recommend, design and implement security tools and technologies such as firewalls, intrusiondetection systems, endpoint protection and distributed denial of service (DDoS) mitigation solutions. 5.Build strong relationships with customers, providing ongoing cybersecurity consultation and support. more »
SD-WAN. Proficiency in utilizing network management and analysis tools, including LogicMonitor, Datadog, Solarwinds, Network Config Manager, and similar industry-standard products. Knowledgeable in intrusiondetection and prevention systems (IDS/IPS/AV) and other crucial network security measures. Services offered by Computappoint Limited are those of more »
Stone, Staffordshire, United Kingdom Hybrid / WFH Options
yolk recruitment
resolving hardware, software, and network-related problems to minimise downtime and ensure reliability. Implementing security best practices, such as access controls, encryption, firewalls, and intrusiondetection/prevention systems, to protect against cyber threats. The experience you will bring to the team: Experience in the design, build & maintenance more »
Experience working with third-party vendors, including MSP & SOC. 5+ years of experience in cybersecurity or incident response. Strong technical background in cybersecurity, including intrusiondetection, malware analysis, and vulnerability assessment. Experience in developing and implementing incident response plans. Excellent communication, project management, and leadership skills. Relevant certifications more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Delaney & Bourton
a network, phishing, port scanning, web application attacks, DDoS, lateral movement. Experience with security monitoring, incident response, and vulnerability management. Understanding of malware analysis, intrusiondetection/prevention systems, and endpoint security solutions. Ability to analyze and interpret security logs and data. Role can work hybrid, for a more »
knowledge of TCP/IP networking including routing, switching, firewall configuration and network security. · Hands-on experience with security best practices and tools (firewalls, intrusiondetection/prevention systems, etc.). · Strong communication and problem-solving skills. · The ability to prioritise work effectively while working under pressure. · Ability more »
roles such as System Administrator, Network Administrator, or similar positions Proficiency in databases, networks (LAN, WAN), and patch management Knowledge of system security, including intrusiondetection systems, and expertise in data backup and recovery Deploy and configure software and hardware systems Manage network servers and technology tools Handle more »
technology and processes with global reach. Minimum Qualifications Extensive experience in Information Security with a focus on Incident Response, Security Engineering, and/or IntrusionDetection Proficient understanding of incident response automation strategies, with demonstrated ability to implement them Proficient understanding of threat modeling, operational threat intelligence, and more »
On technologies. * Mobile device management: Covering 300+ deployed mobile devices, applying best practice and industry standards. * Cyber security and information assurance: Managing and maintaining intrusiondetection apparatus, supporting queries/investigations and hardened configuration of IT equipment. * DevSecOps and Site Reliability Engineering: Supporting enterprise software teams and their more »
carriers RADIUS Private systems to authenticate network elements LVAC Understanding of AV/DC power autonomy Voice Systems Security systems Various vendors firewalls and intrusiondetection systems DCN Management infrastructure Desiredtechnical/professional qualifications: HNC/HND in Electronics or Engineering Full clean driving license IOSH CSCS EUSR more »
of relevant experience in IT/Network Engineering will be considered. Experience in configuration and troubleshooting of Cisco routers, switches, firewalls, and/or intrusiondetection systems, including software upgrades. Active, In-Scope and transferable U.S. government issued security clearance is required prior to start date. U.S. citizenship more »
Linux, Microsoft, or other network related fields are a plus Experience with scripting and automation tools are a plus Knowledge of system security (e.g. intrusiondetection systems) and data backup/recovery Crypto Quantique is committed to creating a diverse environment and is proud to be an equal more »
as : ASIS PSP , CSPM , Prince2, PMP Recognised qualifications in Security or Business Managemen t at degree level or equivalent Experience with physical access control, intrusiondetection, video management, PSIM and architecture. Detailed Knowledge of various leading security systems including but not limited to HID, Genetec, Mercury, Axis, Ibex more »
Royston, Hertfordshire, South East, United Kingdom
Johnson Matthey Plc
as : ASIS PSP , CSPM , Prince2, PMP Recognised qualifications in Security or Business Managemen t at degree level or equivalent Experience with physical access control, intrusiondetection, video management, PSIM and architecture. Detailed Knowledge of various leading security systems including but not limited to HID, Genetec, Mercury, Axis, Ibex more »
Billingham, County Durham, North East, United Kingdom
Johnson Matthey Plc
as : ASIS PSP , CSPM , Prince2, PMP Recognised qualifications in Security or Business Managemen t at degree level or equivalent Experience with physical access control, intrusiondetection, video management, PSIM and architecture. Detailed Knowledge of various leading security systems including but not limited to HID, Genetec, Mercury, Axis, Ibex more »
South East London, London, United Kingdom Hybrid / WFH Options
Greater London Authority
users, as necessary. 10. Continuously look for improvements to the wider GLAs Digital estate, particularly in areas such as cyber security improvements, threat and intrusiondetection, system recovery, tracking and reducing technical debt and ensuring the estate is secure, reliable and stable. 11. Continuously improve your own knowledge more »
Employment Type: Contract, Part Time, Work From Home
Your responsibilities will include: Leading planned maintenance tasks and breakdowns on site security system equipment. Specifically building intruder alarms, card access control systems, perimeter intrusiondetection systems, CCTV and the Security management networked systems controlling these Provide support for On-Call Rota to maintain system 24/ more »