data loss protection and data classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who support and operate the Company More ❯
experience as a Security Engineer or in a similar role, with deep understanding of the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusiondetection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). More ❯
or CISM accreditation. You will develop and maintain the information security architecture and will have proven experience with compliance, vulnerability management, network security, cloud security (AWS & Azure), firewalls and intrusiondetection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threat analysis and act as a subject matter expert More ❯
with the latest cybersecurity threats and trends and escalate risks promptly. Ensure compliance with relevant industry regulations and standards (e.g., GDPR, ISO 27001). Manage security systems, including firewalls, intrusiondetection/prevention systems, and antivirus software, in collaboration with GT. Develop and test incident response plans and coordinate responses to security incidents and breaches. Raise cybersecurity awareness More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Reed Technology
and hands-on experience with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusiondetection systems, and SIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience More ❯
perform detailed investigations and root cause analysis. Implement and maintain continuous monitoring strategies to ensure compliance with federal regulations and standards. Provide technical expertise in areas such as firewalls, intrusiondetection systems, and encryption technologies. Keep abreast of the latest security trends, technologies, and regulatory changes to advise on and implement relevant best practices. Prepare and deliver technical More ❯
to your application. You will develop and maintain the cyber security architecture and will have proven experience with compliance, vulnerability management, network security, cloud security (AWS & Azure), firewalls and intrusiondetection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threat analysis and act as a subject matter expert More ❯
Central London, London, United Kingdom Hybrid / WFH Options
STK Recruitment
to explain technical concepts to non-technical stakeholders. Project management skills, with the ability to handle multiple projects simultaneously. Familiarity with other security technologies and solutions, such as firewalls, intrusiondetection systems, and VPNs. More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Robert Walters
new solutions as required. Contribute to the deployment of advanced security tools and technologies that enhance the organisation's overall cyber resilience. Oversee the incident management process by supporting detection, response, reporting, and resolution of security incidents. Prepare clear security metrics reports for stakeholders at all levels to inform decision-making and demonstrate progress against objectives. Promote a culture … highly valued. Recognised information security frameworks such as ISO 27001 or NIST ensures you can contribute meaningfully to policy development. A solid understanding of core security technologies-including firewalls, intrusiondetection systems, endpoint protection platforms-and their practical application is important. Experience supporting vulnerability management processes from identification through remediation demonstrates your ability to manage risk proactively. Proficiency More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Robert Walters
new solutions as required. Contribute to the deployment of advanced security tools and technologies that enhance the organisation's overall cyber resilience. Oversee the incident management process by supporting detection, response, reporting, and resolution of security incidents. Prepare clear security metrics reports for stakeholders at all levels to inform decision-making and demonstrate progress against objectives. Promote a culture … highly valued. Recognised information security frameworks such as ISO 27001 or NIST ensures you can contribute meaningfully to policy development. A solid understanding of core security technologies-including firewalls, intrusiondetection systems, endpoint protection platforms-and their practical application is important. Experience supporting vulnerability management processes from identification through remediation demonstrates your ability to manage risk proactively. Proficiency More ❯
TCP/IP networking Knowledge of virtual desktop infrastructure RDS, Citrix, VMware Horizon, Parallels, etc Aruba/HP/Brocade Switch configuration and management Remote access and VPN technologies Intrusiondetection & prevention solutions Knowledge of Database technology such as MariaDB/Postgres Experience of working with Cisco, Sophos, Fortinet, Palo Alto firewalls Hands on experience with log aggregation More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Langley James Limited
predictions). Overhaul legacy CRM UI/UX into a high-performance, modern user experience. Resolve application sluggishness, optimise load performance, and boost uptime. Own cybersecurity strategy: implement audits, intrusiondetection, and disaster recovery plans. Integrate disconnected platforms (e.g., SpeechIQ, People Management) into a centralised data ecosystem. Manage infrastructure improvements, server performance, and monitoring tools. Build and lead More ❯