Splunk or other industry-standard SIEM tools for security monitoring and analysis. Familiarity with security technologies and an understanding of network protocols, firewalls, and intrusiondetection/prevention systems. Knowledge of Threat Intelligence , Digital Forensics , and Data Loss Prevention . Relevant certifications such as CISSP , CEH , or Splunk More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Sparta Global Limited
role with one of our trusted client partners as a 'Spartan' consultant. In this role you will undertake: Network Security - Understanding of firewall configuration, intrusiondetection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
role with one of our trusted client partners as a 'Spartan' consultant. In this role you will undertake: Network Security - Understanding of firewall configuration, intrusiondetection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through More ❯
Service Provider organization. Experience with security frameworks such as NIST CSF, ISO 27001, or CIS Controls. Deep understanding of security technologies , such as firewalls, intrusiondetection and prevention systems, vulnerability scanners, and endpoint protection. Strong knowledge of cloud security concepts and technologies , such as Amazon Web Services (AWS More ❯
analytical (RCA) skills. Good working knowledge of Cisco Meraki and associated technologies. Practical knowledge of Continual Service Improvement (CSI) methodologies. Vulnerability management and assessment. Intrusiondetection and prevention analysis/frameworks. Solid exposure to cloud-based applications security and provisioning. Experience in writing policy, process, and standard playbooks. More ❯
desirable. Strong expertise in network security concepts, protocols, security standards and best practices is essential. Additionally, experience with security tools and technologies, including firewalls, intrusiondetection/prevention systems, and security information and event management (SIEM) tools, is particularly valued. More ❯
to identify weaknesses in systems and networks and propose mitigation plans where required. Recommend, design and implement security tools and technologies such as firewalls, intrusiondetection systems, endpoint protection and distributed denial of service (DDoS) mitigation solutions. Build strong relationships with customers, providing ongoing cybersecurity consultation and support. More ❯
to identify weaknesses in systems and networks and propose mitigation plans where required. Recommend, design and implement security tools and technologies such as firewalls, intrusiondetection systems, endpoint protection and distributed denial of service (DDoS) mitigation solutions. Build strong relationships with customers, providing ongoing cybersecurity consultation and support. More ❯
to identify weaknesses in systems and networks and propose mitigation plans where required. Recommend, design and implement security tools and technologies such as firewalls, intrusiondetection systems, endpoint protection and distributed denial of service (DDoS) mitigation solutions. Build strong relationships with customers, providing ongoing cybersecurity consultation and support. More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of log data and intrusiondetection systems. Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP … POP, LDAP. It would be great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Understanding of network security, firewalls, IAM, cloud platforms (AWS, Azure), and endpoint protection. Familiarity with standards including NIST CSF & ISO 27001. Knowledge of SIEM, intrusiondetection, endpoint security, and secure coding. This role is onsite 2 days per week No sponsorship is available This role is looking to More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Context
progress your career. As well as involvement in the design and implementation of Cyber Security Strategy, you'll gain considerable experience in Vulnerability Monitoring, IntrusionDetection, Incident Response (including assurance of Business Continuity), and Cyber Investigations. You'll be learning from some of the best in the business More ❯
concepts and protocols (TCP/IP, VLAN, VPN, BGP, OSPF, etc.). Solid knowledge of network security concepts, including firewall configuration, VPN setup, and intrusiondetection systems. Hands-on experience with network equipment such as Cisco routers and switches, firewalls, and wireless controllers. Experience with Remote Management and More ❯
london, south east england, united kingdom Hybrid / WFH Options
Syntax Integration Limited
concepts and protocols (TCP/IP, VLAN, VPN, BGP, OSPF, etc.). Solid knowledge of network security concepts, including firewall configuration, VPN setup, and intrusiondetection systems. Hands-on experience with network equipment such as Cisco routers and switches, firewalls, and wireless controllers. Experience with Remote Management and More ❯
Redscan (a trading name of Redscan Cyber Security Limited)
Security and enjoys solving problems. Knowledge of the security threat landscape. Knowledge of various security methodologies and processes, and technical security solutions (firewall and intrusiondetection systems). Knowledge of TCP/IP Protocols, network analysis, and network/security applications. Knowledge of common Internet protocols and applications. More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
OFWAT
maturity of an organisation Proven experience and expertise in one or more of the following: SIEM systems preferably Microsoft Sentinel, network and systems security, intrusiondetection/prevention, and malware analysis. Professional Qualifications: At least one professional qualification such as CISSP, CISM, SANS, or equivalent. Strong analytical skills More ❯
practices Familiarity with Azure services, including Azure Defender, Azure Monitor, and Azure Policy. Experience with security and compliance scanning tools such as vulnerability scanners, intrusiondetection systems, & security information & event management (SIEM) solutions. Knowledge of container management with Azure Container Registry. Experience in SAST, DAST & other techniques to More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Allica Bank Limited
awareness programs. Be a key player in the organisation's incident response efforts. Personal Attributes & Experience Deep experience with endpoint monitoring, CSPM, network security, intrusiondetection and management. Proven track record in managing continuous threat exposure management programs and responding to security incidents. Strong understanding of identity and More ❯
Skills and Qualifications Strong knowledge of system and network security, protocols, and best practices, including ISO27001, SOC2 and Cyber Essentials controls. Experience with firewalls, intrusiondetection systems, anti-virus software, and data encryption. Knowledge of risk assessment tools, technologies, and methods. Experience designing secure networks, systems, and application More ❯
industry standards but also exceed expectations. Oversee incident response, vulnerability management, and cyber threat hunting. Execute security solutions applying cutting-edge technologies like firewalls, intrusiondetection and prevention systems, antivirus software, and vulnerability scanners. Proactively recommending system tuning, identifying new use cases, and providing additional insight from customer More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Michael Page (UK)
Conduct root cause analysis and implement preventative measures for recurring issues. Security and Compliance Implement and maintain network security measures, including firewalls, VPNs, and intrusiondetection/prevention systems (IDS/IPS). Ensure compliance with industry regulations and best-practices (GDPR, HIPAA, PCI-DSS, CIS). Conduct More ❯
Conduct root cause analysis and implement preventative measures for recurring issues Security and Compliance Implement and maintain network security measures, including firewalls, VPNs, and intrusiondetection/prevention systems (IDS/IPS) Ensure compliance with industry regulations and best-practices (GDPR, HIPAA, PCI-DSS, CIS) Conduct regular vulnerability More ❯
IT software, networking and cybersecurity and are always looking for smarter ways to implement processes. Proficiency in security tools and technologies such as firewalls, intrusiondetection systems, and antivirus software. You have gone through the dance of implementing compliance frameworks such as ISO 27001, NIST, GDPR, and HIPAA. More ❯
and future needs. Monitor and respond to security incidents using tools like SIEM and Sophos MTR. Maintain system security by configuring firewalls, VPNs, and intrusiondetection systems, and ensuring timely patching. Manage vulnerability remediation based on penetration test results and risk assessments. Investigate security incidents, conduct forensic analysis More ❯
and future needs. Monitor and respond to security incidents using tools like SIEM and Sophos MTR. Maintain system security by configuring firewalls, VPNs, and intrusiondetection systems, and ensuring timely patching. Manage vulnerability remediation based on penetration test results and risk assessments. Investigate security incidents, conduct forensic analysis More ❯