examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity analysts to detect, mitigate, and analyze threats. … meetings and provides expert input to ensure security is maintained. Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusiondetection and prevention, eDiscovery, and content filtering. Ability to manage and continuously improve upon vulnerability management program. Ability to propose solutions for closing More ❯
an information security or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusiondetection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Intec Select
an information security or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusiondetection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge More ❯
classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who More ❯
knowledge of the threat landscape relevant to SaaS products, preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusiondetection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools. You own relevant certifications (Security+, IAT II/III level or similar More ❯
Experience of threat and risk modeling. Strong understanding of network security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusiondetection/prevention systems, security information and event management (SIEM) systems, and vulnerability assessment tools, and their configuration options. Familiarity with cloud security More ❯
created across our technology teams Requirements What skills are essential: You have an in-depth knowledge of security principles, technologies, best practices and threat detection and mitigation strategies Knowledge of common attack vectors and methodologies (OWASP Top 10, Mitre ATT&CK Framework and social engineering tactics The ability to … security knowledge including container image provenance (e.g. Sigstore, Notary) with an in-depth knowledge of container runtimes Strong understanding of network protocols & practices, firewalls, intrusiondetection/prevention systems and WAFs Understanding of integrating security into the software development lifecycle Experience performing secure code reviews and security approvals … and dynamic application security testing (SAST/DAST) tools. Experience in Cryptography management & enhancements Experience configuring and utilising cloud-native security logging, monitoring, and detection services Relevant security certifications such as ISC2 CC, CISSP, CCSP, CISM, AWS Security Specialist or GCP Professional Cloud Security Engineer Our Interview process Interviewing More ❯
Service Provider organization. Experience with security frameworks such as NIST CSF, ISO 27001, or CIS Controls. Deep understanding of security technologies , such as firewalls, intrusiondetection and prevention systems, vulnerability scanners, and endpoint protection. Strong knowledge of cloud security concepts and technologies , such as Amazon Web Services (AWS More ❯
concepts and protocols (TCP/IP, VLAN, VPN, BGP, OSPF, etc.). Solid knowledge of network security concepts, including firewall configuration, VPN setup, and intrusiondetection systems. Hands-on experience with network equipment such as Cisco routers and switches, firewalls, and wireless controllers. Experience with Remote Management and More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Syntax Integration Limited
concepts and protocols (TCP/IP, VLAN, VPN, BGP, OSPF, etc.). Solid knowledge of network security concepts, including firewall configuration, VPN setup, and intrusiondetection systems. Hands-on experience with network equipment such as Cisco routers and switches, firewalls, and wireless controllers. Experience with Remote Management and More ❯
practices Familiarity with Azure services, including Azure Defender, Azure Monitor, and Azure Policy. Experience with security and compliance scanning tools such as vulnerability scanners, intrusiondetection systems, & security information & event management (SIEM) solutions. Knowledge of container management with Azure Container Registry. Experience in SAST, DAST & other techniques to More ❯
London, England, United Kingdom Hybrid / WFH Options
Deutsche Bank
wide ranging CSR programme + 2 days’ volunteering leave per year Your key responsibilities Working knowledge of security services such as encryption, authentication, and intrusiondetection and prevention architectures, Identity & Access Management, application security and network security Understanding of cybersecurity threats, vulnerabilities, protection measures, and technologies Knowledge of More ❯
industry standards but also exceed expectations. Oversee incident response, vulnerability management, and cyber threat hunting. Execute security solutions applying cutting-edge technologies like firewalls, intrusiondetection and prevention systems, antivirus software, and vulnerability scanners. Proactively recommending system tuning, identifying new use cases, and providing additional insight from customer More ❯
City of London, London, United Kingdom Hybrid / WFH Options
JobHeron
of the Senior Security Engineer: Develop and implement comprehensive security strategies, policies, and procedures. Design, deploy, and manage security solutions, including PAM/IAM, intrusiondetection/prevention systems, endpoint protection, data loss prevention and encryption. Design and manage security in the cloud, including AWS Control Tower, Azure More ❯
desktop/VDI, Certificates and PKI, RSA Tokens. Designing network infrastructure with Cisco Routing/Switches, TCP/IP, DNS/DHCP/NTP, intrusiondetection/prevention. Designing solutions hosted on AWS, understanding Well Architected Framework and Landing Zones. Designing and working with AzureAD and Office More ❯
risk management framework to minimize the department's exposure to fraud risks. Oversee the implementation, management, and proper utilization of security tools such as intrusiondetection systems, vulnerability management, anti-virus software, and data encryption. Assess and manage the identification and mitigation plans of existing and emerging security More ❯
Incident Handling Guide. Familiarity with NIST (National Institute of Standards and Technology) Special Publication 800-82 Comprehensive knowledge of internet protocols, firewalls, proxies, and intrusiondetection/prevention systems. Familiarity/Knowledge of the Perdue Enterprise Reference Architecture (PERA) Certifications for SANS (SysAdmin, Audit, Network and Security) GIAC More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Vantage Data Centers
Incident Handling Guide. Familiarity with NIST (National Institute of Standards and Technology) Special Publication 800-82 Comprehensive knowledge of internet protocols, firewalls, proxies, and intrusiondetection/prevention systems. Familiarity/Knowledge of the Perdue Enterprise Reference Architecture (PERA) Certifications for SANS (SysAdmin, Audit, Network and Security) GIAC More ❯
GPO, High Availability, VDI, Certificates, PKI, RSA Tokens. Expertise in designing network infrastructure with Cisco Routing/Switches, TCP/IP, DNS, DHCP, NTP, Intrusion protection/detection. Experience designing solutions hosted on AWS, including Well Architected Framework and Landing Zones (PALZ experience is a bonus). Expertise with More ❯
with SEO best practices and tools for keyword research, on-page optimization, and link building. Understanding of cybersecurity principles and practices, including risk assessment, intrusiondetection, and incident response. Proficient in social media platforms and tools for content creation, scheduling, and analytics. Benefits: Hybrid work model offering flexibility More ❯
a Cyber Defence Analyst you will take a proactive approach to threat hunting and security incident response. You'll play a key role in detection enhancements, improvements to standard operating procedures and will collaborate with internal teams to tune and put new technologies into operation. There's a broad … You have a strong knowledge of SIEM and deep Splunk experience You have a good understanding of various security infrastructure tools such as firewalls, intrusion prevention/detection systems, proxy servers, email controls, anonymising technology, data loss prevention, Endpoint Detection and Response (EDR) You have experience of More ❯