Bedford, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
highly desirable. Experience with security frameworks and standards, such as NIST, ISO 27001, CyberEssentials Plus, and CIS. Strong understanding of networking protocols, operating systems, and security technologies like firewalls, intrusiondetection/prevention systems, and SIEM. Excellent analytical, problem-solving, and communication skills. Ability to work independently and collaboratively. Strong work ethic and commitment to security best practices. More ❯
Stevenage, Hertfordshire, United Kingdom Hybrid / WFH Options
GlaxoSmithKline
the OT Network Security Engineer to have in-depth understanding of network architecture to design, implement, and manage secure and efficient networks and proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. The OT Network Security Engineer will have ownership and responsibility to deliver secure … and that Tech continuity plans are in place for all critical areas. People Management: Collaborate with internal owners of security technologies such as antivirus, IDS/IPS, SIEM, endpoint detection & response, configuration management, privileged identity management, etc. Why you? Basic Qualifications: We are looking for professionals with these required skills to achieve our goals: Bachelor's Degree - Technical Degree … e.g. Engineering, Information Technology In-depth understanding of network architecture to design, implement, and manage secure and efficient networks. Proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. Strong ability to collaborate with cross-functional teams and communicate technical insights effectively to support secure file More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
testing Statement of Works, and manage the remediation of identified vulnerabilities. Security Tools & Technologies Advice: Provide guidance on the selection, implementation, and optimization of security tools such as firewalls, intrusiondetection systems (IDS), intrusion prevention systems (IPS), and security information and event management (SIEM) systems. Support Security Architecture & Design: Assess the design, implementation, and maintenance of developed More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
Murnen Design
with the ability to influence and motivate others. Deep understanding of cyber security threats, vulnerabilities, and mitigation techniques. Experience with a wide range of security technologies and practices, including: Intrusiondetection and prevention systems (IDPS) Security information and event management (SIEM) system Vulnerability scanning and penetration testing Cloud security Identity and access management (IAM) Data loss prevention (DLP More ❯
Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of log data and intrusiondetection systems. Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be … great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and experience are exactly what we’re looking for, please do apply, we’d love to More ❯
and Splunk implementations. Knowledge of the Mitre Att&ck Framework. Understanding of client-server applications, web applications, databases, firewalls, VPNs, and AntiVirus products. Expertise in log data analysis and intrusiondetection systems. Knowledge of networking principles (TCP/IP, WANs, LANs, protocols like SMTP, HTTP, FTP, POP, LDAP). If interested, even if your skills don’t match More ❯
administration or networking administration. * Knowledge of LDAP, Active Directory, WSUS, VMware, Veeam (or equivalent), Nessus, or Splunk. * Knowledge of security technologies and architecture, including encryption, network security, firewall configuration, intrusion detection. * Proficiency working with Windows operating systems, including Windows 10,Windows Server 2016 Server, Windows Server 2019 . * Excellent time management skills. * Ability to prioritize and multi task. * Ability More ❯
Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of log data and intrusiondetection systems. Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, and LDAP. If you More ❯
control, encryption at rest/in transit, and regular patching Perform routine system housekeeping: Monitor logs and alerts for irregularities or performance degradation Update security certificates, firewall rules, and intrusion-detection configurations as needed Test and validate new environment configurations before production rollout Collaborate with Cross-Functional Teams Partner with Business Intelligence (BI), clinical, and non-clinical stakeholders More ❯
Cheshire East, England, United Kingdom Hybrid / WFH Options
Exalto Consulting
Architecture You will be required to design and implement end to end network infrastructure automation capabilities Proficiency in configuring, managing, and troubleshooting firewalls. Cisco, Palo Alto etc, Experience with intrusiondetection/prevention systems, as well as with SIEM tools and security incident response. Design and implement secure network architectures, including firewalls, intrusiondetection/prevention More ❯
Minimum Qualifications 5+ years of experience working in a security team. Extensive experience with network security design, firewall management, and intrusion detection. Deep experience in deploying application-based firewalls (Palo Alto, Fortinet or similar) on premise or in cloud base services (Prisma, Zscaler or similar), and SSL inspection techniques. Proficiency in multiple security technologies, including network security, NGFW, NAC … segmentation, network security architecture. Solid knowledge and working experience with Layer 2-7 protocols and technologies Strong knowledge and troubleshooting experience with routing, security protocols, ACLs, Firewalls, WAF, and Intrusion Prevention Systems Experience with open-source network scanning tools Excellent communication and interpersonal skills including the ability to build consensus and to present complex presentations Basic knowledge with one More ❯
Active SC Clearance and eligible for DV Clearance. Proven expertise in Red Hat Enterprise Linux (RHEL) administration and design. Strong understanding of security controls, including host firewalls, SELinux, and intrusion detection. Knowledge of networking fundamentals, especially from a security perspective. Experience working in highly governed environments with tight SLAs. Skilled in patch management and system update procedures. It would More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
Active SC Clearance and eligible for DV Clearance. Proven expertise in Red Hat Enterprise Linux (RHEL) administration and design. Strong understanding of security controls, including host firewalls, SELinux, and intrusion detection. Knowledge of networking fundamentals, especially from a security perspective. Experience working in highly governed environments with tight SLAs. Skilled in patch management and system update procedures. It would More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
system services. Collaborate with software teams to embed secure development practices (SSDLC). Conduct security assessments and perform static/dynamic analysis of firmware. Integrate system-level logging and intrusiondetection capabilities. About You: Strong background in Embedded Linux and system-level C programming. Experience with Linux hardening tools and techniques. Proficient in Python and Bash scripting. Solid More ❯