a technical expert to local stakeholders in London. Conducts real-time and historical analysis using the full security suite owned by the business including Endpoint Protection, SIEM, Firewall, Endpoint Detection & Response, IntrusionDetection Systems, Email Gateway, Web Content Filtering & Identity Management technology. Conducts incident response triage analysis on suspected hosts to determine potential ongoing attacks and its More ❯
large/enterprise environment. Experience working in heavily regulated industries. Strong understanding of security principles. Hands-on experience with a variety of security tools, including: Secure Web Gateway. Endpoint detection and response (EDR). Data Leakage Prevention (DLP). Email Security (Gateway and DMARC). Proficiency in scripting and automation languages (e.g. PowerShell, Terraform). Secondary requirements Knowledge of … Security Frameworks (NIST, MITRE etc). Security information and event management (SIEM). Intrusiondetection and prevention systems (IDPS). Relevant security certifications (e.g., SSCP, Vendor Certifications). Experience of working with tools like Jira, Planner and Confluence. #J-18808-Ljbffr More ❯
/IP, DNS, DHCP, and VPN. Proficient in scripting languages (e.g., PowerShell) for automation and administration tasks. Experience with security best practices and tools, such as firewalls, antivirus, and intrusiondetection systems. #J-18808-Ljbffr More ❯
data loss protection and data classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who support and operate the Company More ❯
London, England, United Kingdom Hybrid / WFH Options
Jas Gujral
data loss protection and data classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who support and operate the Company More ❯
a SOC environment. Exposure to vulnerability management. Experience using Splunk and/or other SIEM tools for security monitoring and analysis. Familiarity with security technologies, network protocols, firewalls, and intrusiondetection/prevention systems. Knowledge of Threat Intelligence, Digital Forensics, and Data Loss Prevention. Benefits: ✔ Salary between £40,000-£45,000 ✔ 10% DV Bonus (if held/once More ❯
swindon, wiltshire, south west england, united kingdom
F5 Consultants
a SOC environment. Exposure to vulnerability management. Experience using Splunk and/or other SIEM tools for security monitoring and analysis. Familiarity with security technologies, network protocols, firewalls, and intrusiondetection/prevention systems. Knowledge of Threat Intelligence, Digital Forensics, and Data Loss Prevention. Benefits: ✔ Salary between £40,000-£45,000 ✔ 10% DV Bonus (if held/once More ❯
variety of SIEM tools and exposure to many different networks, this is ideal for anyone looking to grow their hands-on experience with various tools and networks. Key Tasks: Detection, monitoring, and analysis of security incidents. Production of the monthly service reports. Assist Senior Analysts in performing network/system/application/log intrusiondetection analysis. More ❯
Newcastle upon Tyne, Tyne and Wear, Tyne & Wear, United Kingdom
Michael Page
and recommend proactive measures. Assist in disaster recovery and business continuity planning. Profile Essential Proven experience in IT infrastructure security Strong knowledge of network security principles, firewalls, VPNs, and intrusiondetection systems Desirable Experience in a manufacturing or industrial environment, Operational Technologies Knowledge with security frameworks and compliance requirements (e.g., NIST, ISO 27001, GDPR) Experience with SIEM solutions More ❯
maintaining a positive customer experience. Keeping accurate records of customer interactions in CRM (Salesforce). Qualifications: High aptitude for security technology, including encryption and authentication; knowledge of network security, intrusiondetection, anti-virus, routing, switching, LAN, and WAN is desirable. CISSP certification is a plus. Experience in a pre-sales engineer role managing end-to-end technical deal More ❯
London, England, United Kingdom Hybrid / WFH Options
McNally Recruitment Ltd
security policies that will fortify their defenses. Designing and implementing security controls, policies, and procedures. Work alongside cross-functional teams to deploy state-of-the-art technologies, including firewalls, intrusiondetection/prevention systems, access controls, and encryption technologies, ensuring the security framework. Conduct thorough security assessments, identifying potential security breaches. Lend your expertise to the design and More ❯
of activities, contacts, and account information in CRM (Salesforce). Apply if you Have a high aptitude for security technology, especially encryption and authentication, with knowledge of network security, intrusiondetection, anti-virus, routing, switching, LAN, and WAN; CISSP certification is a plus. Have experience as a pre-sales engineer managing end-to-end technical deal processes. Can More ❯
all customers and prospects in our CRM (Salesforce). Apply if you Have a high aptitude for security technology, specifically encryption and authentication, with further knowledge of network security, intrusiondetection, anti-virus, routing, switching, LAN, and WAN being desirable. The CISSP accreditation would also be beneficial. Have previously worked in a pre-sales engineer role, managing end More ❯
and non-technical stakeholders. Proficient in configuring and managing network devices such as routers, switches, and firewalls. Strong understanding of network security principles and practices, including firewalls, VPNs, and intrusiondetection systems. Proven experience in enterprise network implementation and support. Please note- an element of travel is required with this role to attend various sites across the UK More ❯
AWS Security Hub, Microsoft Defender for Cloud, and third-party tools like Palo Alto Networks, Tenable, etc. Experience and knowledge of CNAPP solutions. Knowledge of automated security scanning tools, intrusiondetection systems, and firewalls. Experience of DevSecOps tools and processes, AKS and EKS and container security. Familiarity with CI/CD pipelines and related tools (e.g., GitHub, Azure More ❯
of all customers and prospects in our CRM (Salesforce). Apply if you Have a high aptitude for security technology, specifically encryption, authentication, with further knowledge of network security, intrusiondetection, anti-virus, routing, switching, LAN, and WAN being desirable. The CISSP accreditation would also be beneficial. Are currently or have previously worked in a pre-sales engineer More ❯
manage, and enhance the fraud risk management framework to minimize the department's exposure to fraud risks. Oversee the implementation, management, and proper utilization of security tools such as intrusiondetection systems, vulnerability management, anti-virus software, and data encryption. Assess and manage the identification and mitigation plans of existing and emerging security threats, vulnerabilities, and risks. Maintain More ❯
assets, network traffic, and system vulnerabilities. Generate regular reports on system performance, security posture, and compliance status. Cybersecurity & Compliance: Cyber Protection Techniques: Implement advanced cyber protection measures, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans More ❯
London, England, United Kingdom Hybrid / WFH Options
Vantage Data Centers
Revision 2, Computer Security Incident Handling Guide. Familiarity with NIST (National Institute of Standards and Technology) Special Publication 800-82 Comprehensive knowledge of internet protocols, firewalls, proxies, and intrusiondetection/prevention systems. Familiarity/Knowledge of the Perdue Enterprise Reference Architecture (PERA) Certifications for SANS (SysAdmin, Audit, Network and Security) GIAC (Global Information Assurance Certification) Global Industrial More ❯
purpose. Secure the communication and provide confidentiality and integrity of messages. METHODS TO IMPLEMENT: centralized group key management protocols, decentralized architectures, distributed key management protocols, cryptography-based access controls, intrusiondetection and defense like BBB block, brain, barrier for the human brain. All team members obtain key generation; all team members can perform access control, and generation of More ❯
Minimum Qualifications 5+ years of experience working in a security team. Extensive experience with network security design, firewall management, and intrusion detection. Deep experience in deploying application-based firewalls (Palo Alto, Fortinet or similar) on premise or in cloud base services (Prisma, Zscaler or similar), and SSL inspection techniques. Proficiency in multiple security technologies, including network security, NGFW, NAC … segmentation, network security architecture. Solid knowledge and working experience with Layer 2-7 protocols and technologies Strong knowledge and troubleshooting experience with routing, security protocols, ACLs, Firewalls, WAF, and Intrusion Prevention Systems Experience with open-source network scanning tools Excellent communication and interpersonal skills including the ability to build consensus and to present complex presentations Basic knowledge with one More ❯
Minimum Qualifications 5+ years of experience working in a security team. Extensive experience with network security design, firewall management, and intrusion detection. Deep experience in deploying application-based firewalls (Palo Alto, Fortinet or similar) on premise or in cloud base services (Prisma, Zscaler or similar), and SSL inspection techniques. Proficiency in multiple security technologies, including network security, NGFW, NAC … segmentation, network security architecture. Solid knowledge and working experience with Layer 2-7 protocols and technologies Strong knowledge and troubleshooting experience with routing, security protocols, ACLs, Firewalls, WAF, and Intrusion Prevention Systems Experience with open-source network scanning tools Excellent communication and interpersonal skills including the ability to build consensus and to present complex presentations Basic knowledge with one More ❯
Network Security rule design and administration across multiple platforms Minimum Qualifications 5+ years of experience working in a security team. Extensive experience with network security design, firewall management, and intrusion detection. Deep experience in deploying application-based firewalls (Palo Alto, Fortinet or similar) on premise or in cloud base services (Prisma, Zscaler or similar), and SSL inspection techniques. Proficiency … segmentation, network security architecture. Solid knowledge and working experience with Layer 2-7 protocols and technologies Strong knowledge and troubleshooting experience with routing, security protocols, ACLs, Firewalls, WAF, and Intrusion Prevention Systems Experience with open-source network scanning tools Excellent communication and interpersonal skills including the ability to build consensus and to present complex presentations Basic knowledge with one More ❯
Network Security rule design and administration across multiple platforms Minimum Qualifications 5+ years of experience working in a security team. Extensive experience with network security design, firewall management, and intrusion detection. Deep experience in deploying application-based firewalls (Palo Alto, Fortinet or similar) on premise or in cloud base services (Prisma, Zscaler or similar), and SSL inspection techniques. Proficiency … segmentation, network security architecture. Solid knowledge and working experience with Layer 2-7 protocols and technologies Strong knowledge and troubleshooting experience with routing, security protocols, ACLs, Firewalls, WAF, and Intrusion Prevention Systems Experience with open-source network scanning tools Excellent communication and interpersonal skills including the ability to build consensus and to present complex presentations Basic knowledge with one More ❯
monitoring and investigations, supporting GCS's cybersecurity operations and incident response programs. The ideal candidate should demonstrate leadership in supervising small teams, with expertise in cybersecurity practices, cloud technologies, detection and response frameworks, and incident handling (containment, eradication, recovery, lessons learned). They should adhere to established incident response procedures, possess strong attention to detail, and collaborate effectively across … events Proven ability to lead resolution during security crises Proficiency in networking concepts, protocols, and security methodologies Deep understanding of system and application security threats Knowledge of network attacks, intrusiondetection, and security principles Leadership skills in supervising analysts and guiding team performance Responsibilities: Lead and develop SOC staff and security teams Align security priorities with organizational strategies More ❯