network security. Understanding of 3GPP mobile network CORE and RAN architectures and security requirements. Strong knowledge of network security protocols, VPN, firewall management, and intrusiondetection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks (e.g., GDPR More ❯
About the Role This position involves deploying, maintaining, supporting, and enhancing our Information Security tools and processes. Key responsibilities include: Implementing and maintaining network, intrusiondetection, and prevention systems in hybrid environments (on-premises and cloud). Staying updated on cybersecurity threats to advise on system protections. Monitoring … threat intelligence feeds and translating them into detection and response actions. Analyzing security logs to identify attacker tactics, techniques, and procedures (TTPs), investigating suspicious activities, and performing remediation. Developing and validating security capabilities to identify vulnerabilities and improve detection and response measures. Supporting active response efforts as a … related fields. Security certifications such as GCIA, GCFA, GCFE, CISSP (Associate), CEH, or equivalents. Experience in areas like IAM, security operations, threat hunting, EDR, detection signatures, and analytics. Knowledge of open standards such as SAML, OAuth, or OpenID. Experience with encryption, logging, log analysis, and analytics. Practical experience with More ❯
Analyst, Cybersecurity Operations (Detection & Response) L3 Full-time McDonald's Office Location: International Office McDonald’s growth strategy, Accelerating the Arches, encompasses all aspects of our business as the leading global omni-channel restaurant brand. As the consumer landscape shifts, we are using our competitive advantages to further strengthen … incident response will be key in this role. The ideal candidate for this role should possess a solid understanding of cybersecurity practices, cloud technologies, detection and response frameworks, and incident handling procedures (containment, eradication, recovery, and lessons learned). They should excel in adhering to and enforcing the use … Strong expertise in analysing and mitigating cyber threats and vulnerabilities. Advanced competence in authentication, authorization, and access control methods. Proficiency in utilizing and developing intrusiondetection methodologies and techniques for detecting host and network-based intrusions. In-depth knowledge of system and application security threats and vulnerabilities, with More ❯
London, England, United Kingdom Hybrid / WFH Options
Onyx-Conseil
examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity analysts to detect, mitigate, and analyze threats. … meetings and provides expert input to ensure security is maintained. • Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusiondetection and prevention, eDiscovery, and content filtering. • Ability to manage and continuously improve upon vulnerability management program. • Ability to propose solutions for closing More ❯
Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
In Technology Group Limited
threats. Key Responsibilities: Monitor, detect, and respond to security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and More ❯
Bletchley, Buckinghamshire, United Kingdom Hybrid / WFH Options
In Technology Group
threats. Key Responsibilities: Monitor, detect, and respond to security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and More ❯
London, England, United Kingdom Hybrid / WFH Options
In Technology Group
threats. Key Responsibilities: Monitor, detect, and respond to security incidents and threats in real–time. Design and implement security solutions and controls, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
In Technology Group Limited
threats. Key Responsibilities: Monitor, detect, and respond to security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and More ❯
network security. Understanding of 3GPP mobile network CORE and RAN architectures and security requirements. Strong knowledge of network security protocols, VPN, firewall management, and intrusiondetection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks (e.g., GDPR More ❯
Azure, Google Cloud, and M365 Familiarity with security frameworks and standards (e.g., ISO 27001, NIST, CIS) Experience with security tools and technologies, including firewalls, intrusiondetection/prevention systems, and encryption Excellent problem-solving skills and the ability to think critically and strategically Strong communication and interpersonal skills More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Liberty Global
cutting-edge threat mitigation methodologies. Knowledge Sharing: Assist in developing training sessions and workshops to continuously enhance the team's technical skills and capabilities. Detection Engineering & Security Enhancements Proactive Defence: Develop and fine-tune detection rules, playbooks, and automation scripts that improve SOC efficiency and help pre-empt … managing, investigating, and responding to cyber incidents, with hands-on experience in a dynamic SOC or Incident Response role. Technical Expertise: Strong understanding of intrusiondetection, forensic investigations, vulnerability management, and advanced security technologies (SIEM, IDS/IPS, EDR, and firewalls). Analytical Skills: Proficiency in analysing log More ❯
London, England, United Kingdom Hybrid / WFH Options
BP p.l.c
distributed team globally to provide security across the enterprise that enables business activity and promotes safe and secure operations. Key Accountabilities Undertake Incident monitoring, detection and response activities in the SOC Analyze and investigate security alerts and incidents with appropriate blocking issue in support of the business Develop the … distributed team globally to provide security across the enterprise that enables business activity and promotes safe and secure operations. Key Accountabilities Undertake Incident monitoring, detection and response activities in the SOC Analyze and investigate security alerts and incidents with appropriate blocking issue in support of the business Develop the … Automation system digital security, Client Counseling, Conformance review, Digital Forensics, Incident management, incident investigation and response, Information Assurance, Information Security, Information security behaviour change, Intrusiondetection and analysis, Legal and regulatory environment and compliance, Risk Management, Secure development, Security administration, Security architecture, Security evaluation and functionality testing, Solution More ❯
Google Cloud, and M365. Familiarity with security frameworks and standards (e.g., ISO 27001, NIST, CIS). Experience with security tools and technologies, including firewalls, intrusiondetection/prevention systems, and encryption. Excellent problem-solving skills and the ability to think critically and strategically. Strong communication and interpersonal skills More ❯
classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who More ❯
London, England, United Kingdom Hybrid / WFH Options
Jas Gujral
classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who More ❯
modeling, and risk assessments; strong understanding of information security principles, including confidentiality, integrity, and availability. Experience with security tools and technologies, including vulnerability scanners, intrusiondetection systems, and security information and event management (SIEM) systems. Excellent communication and interpersonal skills, with the ability to collaborate effectively with cross … Generous PTO, plus company holidays Comprehensive medical and dental insurance Paid parental leave for all parents (12 weeks) Fertility and family planning support Early-detection cancer testing through Galleri Competitive pension scheme and company contribution Annual work-life stipends for: Home office setup, cell phone, internet Wellness stipend for More ❯
CASP+, CySA+, Security+, CC) Essential Skills Demonstrable experience with industry frameworks and standards. Strong understanding of network security principles and practices, including firewall configurations, intrusiondetection/prevention systems (IDS/IPS), and secure network design. Proficiency in cloud security principles and practices. Experience with risk assessment, vulnerability More ❯
to date with the latest cybersecurity threats, trends, and technologies. Skills and Qualifications: Proficiency with security information and event management (SIEM) systems. Experience with intrusiondetection/prevention systems (IDS/IPS), firewalls, and antivirus software. Familiarity with network protocols, operating systems, and security architectures. Strong analytical and More ❯
MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional; CCNA/CCNP Experience with security tools and technologies such as intrusiondetection systems, SIEM, and vulnerability management tools. Familiarity with regulatory requirements and industry standards related to IT security. If you're interested in More ❯
eg ISO 27001) as part of critical vendor performance assessment ensuring operational resilience is maintained. In collaboration with GT, manage security systems, including firewalls, intrusiondetection/prevention systems, and antivirus software. In collaboration with GT, Develop and test incident response plans and coordinate responses to security incidents More ❯
to identify vulnerabilities and ensure compliance. Collaborating with IT teams to integrate security protocols into network operations. Deploying and maintaining security devices like firewalls, intrusiondetection systems, and VPNs. Responding to security incidents, including post-event analysis to prevent recurrence. Staying updated on cybersecurity threats and security technology More ❯
design, databases, processing systems, web applications, mobile technology, cloud, big data, virtualization, protocols and technologies supporting encryption, authentication, access control, information systems attack patterns, intrusiondetection, and network security IQVIA is a leading global provider of advanced analytics, technology solutions and clinical research services to the life sciences More ❯
knowledge of the threat landscape relevant to SaaS products, preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusiondetection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools. You own relevant certifications (Security+, IAT II/III level or similar More ❯