perform detailed investigations and root cause analysis. Implement and maintain continuous monitoring strategies to ensure compliance with federal regulations and standards. Provide technical expertise in areas such as firewalls, intrusiondetection systems, and encryption technologies. Keep abreast of the latest security trends, technologies, and regulatory changes to advise on and implement relevant best practices. Prepare and deliver technical More ❯
Redscan (a trading name of Redscan Cyber Security Limited)
Requirements A passion for Cyber Security and enjoys solving problems Knowledge of the security threat landscape Knowledge of various security methodologies and processes, and technical security solutions (firewall and intrusiondetection systems) Knowledge of TCP/IP Protocols, network analysis, and network/security applications Knowledge of common Internet protocols and applications Ability to multi-task, prioritize, and More ❯
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria Limited
Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of log data and intrusiondetection systems. Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be … great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and experience are exactly what were looking for, please do apply, wed love to hear from More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
technical expertise will be pivotal. You'll also play a critical role in shaping and safeguarding the organisation's cybersecurity posture - designing and implementing robust security protocols, managing threat detection and response, and ensuring compliance with key standards such as GDPR, Cyber Essentials, and ISO 27001. Collaboration is key, as you'll work closely with IT support, application teams … and support. Familiar with VMware for virtualisation and cloud-based UC telephony systems. Solid understanding of DNS, DHCP, VPN access, and administration. Hands-on experience with firewalls (e.g., Fortinet), intrusiondetection/prevention systems, and Cisco networking/routing. Knowledge of security best practices, including EDR/XDR platforms and antivirus solutions (e.g., EPO). Familiar with identity More ❯
to your application. You will develop and maintain the cyber security architecture and will have proven experience with compliance, vulnerability management, network security, cloud security (AWS & Azure), firewalls and intrusiondetection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threat analysis and act as a subject matter expert More ❯
Central London, London, United Kingdom Hybrid / WFH Options
STK Recruitment
to explain technical concepts to non-technical stakeholders. Project management skills, with the ability to handle multiple projects simultaneously. Familiarity with other security technologies and solutions, such as firewalls, intrusiondetection systems, and VPNs. More ❯
and Splunk implementations. Knowledge of the Mitre Att&ck Framework. Understanding of client-server applications, web applications, databases, firewalls, VPNs, and AntiVirus products. Expertise in log data analysis and intrusiondetection systems. Strong networking knowledge including TCP/IP, WANs, LANs, and protocols like SMTP, HTTP, FTP, POP, LDAP. If you're interested but unsure if your skills More ❯
that require technical proficiency as well as tenacity, professionalism, and strong communication skills. Responsibilities Security Analytics - Efficiently distill actionable information from large data sets for reporting, hunting, and anomaly detection Incident Management - Detect, document, investigate, and resolve security incidents in an efficient manner Endpoint Forensics - Construct meaningful incident timelines from forensic artifact analysis Counter Measures - Ability to design and … and execute focused plans to discover advanced threats that evade traditional security controls Behavioral Analysis - Develop and implement criteria to identify anomalous user behavior leading indicating insider threat activity IntrusionDetection - Develop and tune network anomaly control capability to produce reliable actionable data Threat Hunting - Proactively search for unknown threats within the environment. Preferred Knowledge and Experience 3+ More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Robert Walters
new solutions as required. Contribute to the deployment of advanced security tools and technologies that enhance the organisation's overall cyber resilience. Oversee the incident management process by supporting detection, response, reporting, and resolution of security incidents. Prepare clear security metrics reports for stakeholders at all levels to inform decision-making and demonstrate progress against objectives. Promote a culture … highly valued. Recognised information security frameworks such as ISO 27001 or NIST ensures you can contribute meaningfully to policy development. A solid understanding of core security technologies-including firewalls, intrusiondetection systems, endpoint protection platforms-and their practical application is important. Experience supporting vulnerability management processes from identification through remediation demonstrates your ability to manage risk proactively. Proficiency More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Robert Walters
new solutions as required. Contribute to the deployment of advanced security tools and technologies that enhance the organisation's overall cyber resilience. Oversee the incident management process by supporting detection, response, reporting, and resolution of security incidents. Prepare clear security metrics reports for stakeholders at all levels to inform decision-making and demonstrate progress against objectives. Promote a culture … highly valued. Recognised information security frameworks such as ISO 27001 or NIST ensures you can contribute meaningfully to policy development. A solid understanding of core security technologies-including firewalls, intrusiondetection systems, endpoint protection platforms-and their practical application is important. Experience supporting vulnerability management processes from identification through remediation demonstrates your ability to manage risk proactively. Proficiency More ❯
TCP/IP networking Knowledge of virtual desktop infrastructure RDS, Citrix, VMware Horizon, Parallels, etc Aruba/HP/Brocade Switch configuration and management Remote access and VPN technologies Intrusiondetection & prevention solutions Knowledge of Database technology such as MariaDB/Postgres Experience of working with Cisco, Sophos, Fortinet, Palo Alto firewalls Hands on experience with log aggregation More ❯
OPC UA, DNP3, Modbus TCP/IP) and methods to diagnose/debug using Wireshark. Configuring server operating systems, i.e. Windows Server. Configuring next generation firewalls such as Fortinet. IntrusionDetection Systems such as Nozomi, Radiflow. Anti-malware, patch management and disaster recovery tools. Network monitoring and management. Standard cyber topics such as VPN technologies, Secure Network Access More ❯
Honeybourne Place Jessop Avenue, Cheltenham, Gloucestershire, England
IRESS FS LIMITED
join our internal Security Operations Centre (SOC). You will work alongside experienced security professionals to monitor, investigate, & respond to cybersecurity threats. You will build foundational skills in threat detection, incident response, & security operations. Role Your duties will include: Learning to use an array of security tools such as endpoint protection, intrusiondetection/protection systems, and More ❯
proven experience designing and managing resilient secure and high availability network environments supporting internal and customer services strong grasp of network security best practices and technologies including firewalls, segmentation, intrusiondetection/prevention and encryption. More ❯
/IP, DNS, DHCP, and VPN. - Proficient in scripting languages (e.g., PowerShell) for automation and administration tasks. Experience with security best practices and tools, such as firewalls, antivirus, and intrusiondetection systems. We are part of the AB Dynamics Group, an innovative, dynamic listed business with a friendly and supportive working environment. In addition to competitive salaries, our More ❯
and the technical skills required to develop, implement, and secure such cyber-physical systems. Experience or interest in cybersecurity and cyber threats (ie - designing secure products, systems, and applications; intrusiondetection; digital forensics; system recovery; risk assessment tools and methods; security solutions, policies, standards, and procedures, etc.). Knowledge and/or experience in applying Product Security policies More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Rolls-Royce plc
and the technical skills required to develop, implement, and secure such cyber-physical systems. Experience or interest in cybersecurity and cyber threats (ie - designing secure products, systems, and applications; intrusiondetection; digital forensics; system recovery; risk assessment tools and methods; security solutions, policies, standards, and procedures, etc.). Knowledge and/or experience in applying Product Security policies More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
processes . What youll bring: Active DV Clearance. Proven expertise in Red Hat Enterprise Linux ( RHEL ) administration and design. Strong understanding of security controls , including host firewalls , SELinux , and intrusion detection. Knowledge of networking fundamentals , especially from a security perspective. Experience working in highly governed environments with tight SLAs. Skilled in patch management and system update procedures. It would More ❯
Department when in country or on a site already. Requirements Proven experience in a similar role within the security industry. Strong knowledge of security systems including access control, CCTV, intrusiondetection, and integrated security solutions. Strong problem-solving abilities and analytical skills to address technical challenges effectively. Exceptional communication and interpersonal skills for building relationships with clients and More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Langley James Limited
predictions). Overhaul legacy CRM UI/UX into a high-performance, modern user experience. Resolve application sluggishness, optimise load performance, and boost uptime. Own cybersecurity strategy: implement audits, intrusiondetection, and disaster recovery plans. Integrate disconnected platforms (e.g., SpeechIQ, People Management) into a centralised data ecosystem. Manage infrastructure improvements, server performance, and monitoring tools. Build and lead More ❯
for security installations Strong knowledge of CCTV & Access Control systems, including installation and configuration techniques Familiarity with hand tools and electrical work relevant to security system installations Experience with intrusiondetection systems (IDS) and their integration into existing infrastructures Solid understanding of computer networking principles as they relate to security systems Mechanical knowledge relevant to the installation of More ❯
for security installations Strong knowledge of CCTV & Access Control systems, including installation and configuration techniques Familiarity with hand tools and electrical work relevant to security system installations Experience with intrusiondetection systems (IDS) and their integration into existing infrastructures Solid understanding of computer networking principles as they relate to security systems Mechanical knowledge relevant to the installation of More ❯
servicing and maintaining IP CCTV systems (e.g., Genetec, Milestone, Avigilon, Axis) Strong networking knowledge: IP addressing, routing, and switch configuration (advantageous) Understanding of integration between CCTV, Access Control, and IntrusionDetection Systems Excellent fault-finding and problem-solving skills Professional, self-motivated, and reliable with strong communication skills Full UK driving licence Relevant industry certifications (e.g., FIA, HIK More ❯
ICT announces Stewart Meyer as Chief Marketing Officer Integrated Control Technology (ICT), a provider of intelligent access control, intrusiondetection, building automation and security solutions, is pleased to announce that Stewart Meyer, who has been serving on a fractional basis at ICT since July 2024, has transitioned to the full-time role of Chief Marketing Officer at ICT. More ❯