eg ISO 27001) as part of critical vendor performance assessment ensuring operational resilience is maintained. In collaboration with GT, manage security systems, including firewalls, intrusiondetection/prevention systems, and antivirus software. In collaboration with GT, Develop and test incident response plans and coordinate responses to security incidents More ❯
to identify vulnerabilities and ensure compliance. Collaborating with IT teams to integrate security protocols into network operations. Deploying and maintaining security devices like firewalls, intrusiondetection systems, and VPNs. Responding to security incidents, including post-event analysis to prevent recurrence. Staying updated on cybersecurity threats and security technology More ❯
knowledge of the threat landscape relevant to SaaS products, preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusiondetection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools. You own relevant certifications (Security+, IAT II/III level or similar More ❯
Service Provider organization Experience with security frameworks such as NIST CSF, ISO 27001, or CIS Controls Deep understanding of security technologies, such as firewalls, intrusiondetection and prevention systems, vulnerability scanners, and endpoint protection Strong knowledge of cloud security concepts and technologies, such as Amazon Web Services (AWS More ❯
Service Provider organization Experience with security frameworks such as NIST CSF, ISO 27001, or CIS Controls Deep understanding of security technologies, such as firewalls, intrusiondetection and prevention systems, vulnerability scanners, and endpoint protection Strong knowledge of cloud security concepts and technologies, such as Amazon Web Services (AWS More ❯
cyber security submitting them to the Information Security Officer for review and authorisation. Implementation & Execution within mandate Monitor and analyse Cybersecurity operational services, including intrusiondetection and prevention, situational awareness of: network intrusions. security events. data spillage; and. Incident response actions. Identify and resolve vulnerabilities in networks, servers More ❯
The DigitalXRAID Security Operations Centre provides around the clock protective monitoring solutions to a client base that spans multiple industry verticals. Utilising industry-leading detection technology, our team of experienced SOC team members work to provide assurance detection and incident response capabilities to organisations of all sizes. DigitalXRAID … successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), IntrusionDetection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities You will work alongside the SOC team to ensure More ❯
and addressing potential threats before they impact operations. • Oversee the selection, deployment, and management of security technologies, including but not limited to firewalls, endpoint detection and response (EDR), multi-factor authentication (MFA), encryption, SIEM, and intrusiondetection/prevention systems (IDS/IPS). Data Management & Analytics More ❯
to maintain and optimise other cyber security platforms and tools to improve performance and end-user experience. These include, but not limited to endpoint detection and response, network intrusiondetection, patch management, web filtering and email security gateways. Develop processes and procedures to manage, monitor and improve More ❯
maintain and optimise other cyber security platforms and tools to improve performance and end-user experience. These include, but are not limited to endpoint detection and response, network intrusiondetection, patch management, web filtering and email security gateways. Develop processes and procedures to manage, monitor and improve More ❯
maintain and optimise other cyber security platforms and tools to improve performance and end-user experience. These include, but are not limited to endpoint detection and response, network intrusiondetection, patch management, web filtering and email security gateways. Develop processes and procedures to manage, monitor and improve More ❯
maintain and optimise other cyber security platforms and tools to improve performance and end-user experience. These include, but are not limited to endpoint detection and response, network intrusiondetection, patch management, web filtering and email security gateways. Develop processes and procedures to manage, monitor and improve More ❯
Bredon, England, United Kingdom Hybrid / WFH Options
TieTalent
to protecting our organisation against a range of cyber threats. Your responsibilities include investigating alerts, analysing logs and network traffic, monitoring security alarms, creating detection content, using threat intelligence, responding to breaches, and leading process improvements. You will mentor junior analysts and explore Digital Forensics and security incidents. About … You You should have a background in cyber security analysis and a passion for IT. Experience with host intrusiondetection, and a solid understanding of Windows and Linux OS are preferred. At least 6 months experience as a Cyber Security or SOC Analyst is required. You should be More ❯
Conduct regular risk assessments and vulnerability scans to identify potential security gaps and mitigate risks effectively. Contribute to a robust security architecture, including firewalls, intrusiondetection systems, and encryption mechanisms, to safeguard network infrastructure and data. Monitor security infrastructure for suspicious activities, investigate incidents, and implement incident response … hours ago Huddersfield, England, United Kingdom 4 months ago Information Security Analyst - Vulnerability Management Manchester, England, United Kingdom 4 days ago Senior Threat Detection Engineer (Cyber Security) Stockport, England, United Kingdom 1 week ago Manchester, England, United Kingdom 1 week ago We’re unlocking community knowledge in a new More ❯
reverse engineering, exploit development, and vulnerability research. Familiarity with operating systems (Windows, Linux, macOS) and their security mechanisms. Understanding of network protocols, firewalls, and intrusiondetection/prevention systems. Knowledge of cloud security (AWS, Azure, GCP) and containerization (Docker, Kubernetes). Experience : 5+ years of experience in penetration More ❯
co-ordinator (SAC). An understanding of MOD Secure by Design policy and process. Deep technical expertise in security technologies and solutions, including firewalls, intrusiondetection/prevention systems (IDS/IPS), endpoint protection, encryption, identity and access management (IAM), and security information and event management (SIEM) systems. More ❯
implement comprehensive security strategies, policies, and procedures to protect the organization's information assets. Design, deploy, and manage security solutions, including PAM/IAM, intrusiondetection/prevention systems, endpoint protection, data loss prevention, encryption, and vulnerability management tools. Design and manage security in the cloud, including AWS More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
role with one of our trusted client partners as a 'Spartan' consultant. In this role you will undertake: Network Security - Understanding of firewall configuration, intrusiondetection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
Pepper Mill
role with one of our trusted client partners as a 'Spartan' consultant. In this role you will undertake: Network Security - Understanding of firewall configuration, intrusiondetection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through More ❯
teams to integrate security protocols into network architecture and operations. Be involved in the deployment and maintenance of network security devices such as firewalls, intrusiondetection systems, and VPNs. Act on and recover from security incidents, including conducting post-event analyses to prevent future incidents. Stay abreast of More ❯
or in a similar role, with deep understanding of the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusiondetection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g. More ❯
teams to integrate security protocols into network architecture and operations. Be involved in the deployment and maintenance of network security devices such as firewalls, intrusiondetection systems, and VPNs. Act on to and recover from security incidents, including conducting post-event analyses to prevent future incidents. Stay abreast More ❯
and addressing potential threats before they impact operations. • Oversee the selection, deployment, and management of security technologies, including but not limited to firewalls, endpoint detection and response (EDR), multi-factor authentication (MFA), encryption, SIEM, and intrusiondetection/prevention systems (IDS/IPS). Data Management & Analytics More ❯
London, England, United Kingdom Hybrid / WFH Options
Starling Bank
created across our technology teams Requirements What skills are essential: You have an in-depth knowledge of security principles, technologies, best practices and threat detection and mitigation strategies Knowledge of common attack vectors and methodologies (OWASP Top 10, Mitre ATT&CK Framework and social engineering tactics The ability to … security knowledge including container image provenance (e.g. Sigstore, Notary) with an in-depth knowledge of container runtimes Strong understanding of network protocols & practices, firewalls, intrusiondetection/prevention systems and WAFs Understanding of integrating security into the software development lifecycle Experience performing secure code reviews and security approvals … and dynamic application security testing (SAST/DAST) tools. Experience in Cryptography management & enhancements Experience configuring and utilising cloud-native security logging, monitoring, and detection services Relevant security certifications such as ISC2 CC, CISSP, CCSP, CISM, AWS Security Specialist or GCP Professional Cloud Security Engineer Our Interview process Interviewing More ❯
Meta’s Network Threat Detection team is seeking an experienced engineer to help secure the infrastructure that connects over a billion users. You will be responsible for building, implementing and operationally supporting network detection efforts throughout our entire infrastructure. We are looking for a candidate with a passion … as well as a desire to make life hard for the bad guys. With focuses that range from signal development, data pipelines, data enrichment, detection engineering & security tool development. We defend against internal and external attacks and our scope delivers great opportunities to push your skills further while having … a significant impact. Network Threat Detection Engineer Responsibilities Iterate network security posture to better protect against attacks and detect new vectors. Develop automation and utilize frameworks to scale both protection and mitigation tools. Mentor and evangelize security practices through cross functional work with engineering teams throughout Meta. Keep Meta More ❯