In this hands-on role, you will be responsible for the full delivery cycle — from infrastructure cabling through to the installation, configuration, and commissioning of access control, CCTV, and intrusiondetection systems. You’ll work across data centres, campuses, and critical infrastructure sites, helping ensure that projects are delivered on time, to specification, and to the highest quality … structured cabling, containment, and system installation. Install and terminate structured cabling (Cat6A, fibre optic) to TIA/EIA standards. Install, configure, and commission security systems: Access Control , CCTV , and IntrusionDetection . Test, troubleshoot, and rectify technical issues on-site during delivery. Complete project documentation: test results, commissioning reports, as-builts, and handover packs. Ensure installations comply with More ❯
Newcastle upon Tyne, United Kingdom Hybrid / WFH Options
NHS Business Services Authority
BSA IT systems is maintained.2. Actively monitor and undertake activities that mitigate threats to the integrity of the NHS BSAs Information Assets. Assesses the effectiveness of firewalls, Gateways, IDS (IntrusionDetection Systems) and IPS (Intrusion Prevention Systems) to improve network/system resilience3. Ensure that all controls are in place to ensure continued certification to the Information More ❯
continuity and disaster recovery plans from an information security perspective, including considerations for application security. Security Monitoring and Incident Response : Establish and maintain processes for continuous security monitoring and detection of security events, including application-specific security events. Lead the investigation and resolution of security incidents, including those related to application vulnerabilities, root cause analysis, and implementation of corrective … risks. Conduct regular risk assessments and vulnerability analyses of systems, applications, and infrastructure. Security Operations : Oversee the management of security technologies and controls, including but not limited to, firewalls, intrusiondetection/prevention systems, security information and event management (SIEM), data loss prevention (DLP), vulnerability management tools, and application security testing tools. Secure Software Development Lifecycle (SSDLC) : Integrate More ❯
data loss protection and data classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who support and operate the Company More ❯
experience as a Security Engineer or in a similar role, with deep understanding of the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusiondetection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). More ❯
and regulations. Collaborate with IT teams to integrate security protocols into network architecture and operations. Be involved in the deployment and maintenance of network security devices such as firewalls, intrusiondetection systems, and VPNs. Act on to and recover from security incidents, including conducting post-event analyses to prevent future incidents. Stay abreast of the latest cybersecurity threats More ❯
remediation of vulnerabilities Configure, customize, tune, manage, troubleshoot, and maintain effective and efficient operation of security technologies, such as SIEM, endpoint security, secure web gateway, CASB, DLP, email security, intrusiondetection/prevention systems, etc. This may also include scripting, automation, and orchestration across various platforms Define, document, and follow approved processes for all the responsibilities included in More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
vulnerabilities are addressed first. Work with the Customer Business Owners to ensure they fully understand the risks, and can effectively coordinate the recommended remediation Oversee the upkeeping of the intrusiondetection system (IDS) and intrusion prevention system (IPS) signatures for customer's security gateways and Firewalls. What's important? It starts with amazing people, challenging projects and More ❯
obtain UK Developed Vetting (DV) security clearance; British Citizenship is required for this role. Preferred qualifications: Certifications in Security (e.g., GSEC, CISSP, CISM, OSCP). Experience with Kubernetes threat detection and anomaly detection. Experience with service mesh security concepts (e.g., Istio, Linkerd) and workload identity. Experience in detection engineering, logging pipeline development, or SIEM tuning in containerised environments. … security platforms with a strong emphasis on Kubernetes-based environments. You'll be at the intersection of security and engineering-developing scalable tooling, automating security controls, and enabling robust detection and response capabilities across our cloud infrastructure. This is an engineering-centric role that requires deep technical expertise in cloud environments, Kubernetes security, and platform automation. You'll work … over the weekend to ensure security incidents can be swiftly resolved. Responsibilities Deploy, configure, and manage cloud security platform tools and technologies, including Security Information and Event Management (SIEM), IntrusionDetection/Prevention Systems (IDS/IPS), and Cloud Workload Protection Platforms (CWPP). Develop and implement security monitoring and logging strategies. Investigate and analyse security incidents, including More ❯
shall coordinate efforts in Data Engineering and Security Automation to provide regional capability in the support of operational teams such as Cyber Incident Response, the Security Operations Center, and Detection Engineering. In addition, they shall act as a conduit for regional requirements, working alongside local teams and stakeholders to help integrate with the wider capability. Responsibilities Support the delivery … platforms for data normalization and routing (eg Cribl, Apache Kafka) desirable Bachelor's degree or equivalent practical experience is preferred. Experience with security monitoring, event and anomaly analysis and intrusiondetection/prevention techniques. CISSP desirable Strong analytical and problem-solving skills with the ability to troubleshoot complex technical issues Excellent communication skills and the ability to collaborate More ❯
or CISM accreditation. You will develop and maintain the information security architecture and will have proven experience with compliance, vulnerability management, network security, cloud security (AWS & Azure), firewalls and intrusiondetection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threat analysis and act as a subject matter expert More ❯
and risk assessments to identify and address potential vulnerabilities. - Develop and maintain security policies and procedures in accordance with industry standards. - Configure and manage security tools, such as firewalls, intrusiondetection systems, and encryption technologies. - Monitor network traffic and system logs for suspicious activity and respond to security incidents in a timely manner. - Stay updated on the latest More ❯
and hands-on experience with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusiondetection systems, and SIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience More ❯
and hands-on experience with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusiondetection systems, and SIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience More ❯
and hands-on experience with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusiondetection systems, and SIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Reed Technology
and hands-on experience with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusiondetection systems, and SIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience More ❯
including creating security standards, and procedures. A deep understanding of network security, OT and IT security, application security, identity management, cloud security, and endpoint security including knowledge of firewalls, intrusiondetection systems, encryption, and other security technologies and industry standards and frameworks such as NIST, ISO 27001, and IEC 62443. Effective communication skills so that you can explain More ❯
including creating security standards, and procedures. A deep understanding of network security, OT and IT security, application security, identity management, cloud security, and endpoint security including knowledge of firewalls, intrusiondetection systems, encryption, and other security technologies and industry standards and frameworks such as NIST, ISO 27001, and IEC 62443. Effective communication skills so that you can explain More ❯
IT concepts, both infrastructure and software related. A working knowledge of at least 3 of the following areas; Information and Data Management, System Design and Development, Security (firewalls, VPN, intrusiondetection and prevention systems), Application Management, ERP systems, CRM systems, Networking and Microsoft Solutions, Infrastructure. Strong knowledge of network, server, storage, and virtualisation technologies. Understanding of the relevant More ❯
tools (e.g., Terraform, Helm, ArgoCD). United Kingdom Security Vetting Developed Vetting (DV) clearance. Preferred qualifications: Certifications in Security (e.g., GSEC, CISSP, CISM, OSCP). Experience with Kubernetes threat detection and anomaly detection. Experience with service mesh security concepts (e.g., Istio, Linkerd) and workload identity. Experience in detection engineering, logging pipeline development, or SIEM tuning in containerised environments. … security platforms with a strong emphasis on Kubernetes-based environments. You'll be at the intersection of security and engineering-developing scalable tooling, automating security controls, and enabling robust detection and response capabilities across our cloud infrastructure. This is an engineering-centric role that requires deep technical expertise in cloud environments, Kubernetes security, and platform automation. You'll work … complex needs of local, state and federal government and educational institutions. Responsibilities Deploy, configure, and manage cloud security platform tools and technologies, including Security Information and Event Management (SIEM), IntrusionDetection/Prevention Systems (IDS/IPS), and Cloud Workload Protection Platforms (CWPP). Develop and implement security monitoring and logging strategies. Investigate and analyse security incidents, including More ❯
incidents, and evolving defences to meet shifting risks. Key responsibilities include: Monitor Networks and Systems: Continuously monitor the organisation's networks and systems for security breaches or intrusions. Threat Detection and Response: Detect and respond to threats or security incidents by analysing data from various incident reports and alerts. Security Audits: Perform regular audits to ensure that systems and … of 2-3 years of experience in IT Infrastructure including security. Strong understanding of network protocols and security technologies. Proficiency in using security tools such as firewalls, antivirus, and intrusiondetection systems. Excellent analytical and problem-solving skills. Ability to work under pressure and handle multiple tasks simultaneously. Strong communication and interpersonal skills. What you'll get in More ❯
perform detailed investigations and root cause analysis. Implement and maintain continuous monitoring strategies to ensure compliance with federal regulations and standards. Provide technical expertise in areas such as firewalls, intrusiondetection systems, and encryption technologies. Keep abreast of the latest security trends, technologies, and regulatory changes to advise on and implement relevant best practices. Prepare and deliver technical More ❯
support of business requirements. Knowledge, Skills, Experience & Qualifications Education and Qualifications Networks -Network Security Technology experience in this area includes but is not limited to: • Perimeter Security, including firewalls, intrusiondetection/prevention (IDS/IPS), anti-malware and threat prevention (Check Point, Palo Alto Networks and Cisco). • Cloud network security (Check Point and Microsoft Azure). More ❯
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria Limited
Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of log data and intrusiondetection systems. Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be … great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and experience are exactly what were looking for, please do apply, wed love to hear from More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
technical expertise will be pivotal. You'll also play a critical role in shaping and safeguarding the organisation's cybersecurity posture - designing and implementing robust security protocols, managing threat detection and response, and ensuring compliance with key standards such as GDPR, Cyber Essentials, and ISO 27001. Collaboration is key, as you'll work closely with IT support, application teams … and support. Familiar with VMware for virtualisation and cloud-based UC telephony systems. Solid understanding of DNS, DHCP, VPN access, and administration. Hands-on experience with firewalls (e.g., Fortinet), intrusiondetection/prevention systems, and Cisco networking/routing. Knowledge of security best practices, including EDR/XDR platforms and antivirus solutions (e.g., EPO). Familiar with identity More ❯