Job Title: Cybersecurity Architect Location: London, UK Type: Perm Role (Hybrid 2 days a week) RESPONSIBILITIES Design and implement secure network architectures including firewalls intrusiondetection prevention systems and encryption technologies Adhere to enterprise governance review processes to deliver project goals deliverables Follow enterprise ITSM CMDB processes Monitor and analyze security s using Security Information and Event Management … Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto etc Experience with intrusiondetection/prevention systems as well as with SIEM tools and security incident response Excellent problem solving skills analytical thinking and the ability to communicate effectively with diverse More ❯
Paddington, Greater London, England Hybrid / WFH Options
Nexus Jobs Limited
data loss protection and data classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who support and operate the Company More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
Microsoft Sentinel Microsoft Defender (Cloud, Endpoint, Office 365) Microsoft Entra ID (Azure AD) Microsoft Purview Microsoft Intune Azure Security Center Information Security (On-Premise): Firewalls (e.g. Palo Alto, Fortinet) IntrusionDetection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & Access Management (IAM) Patch management and vulnerability scanning Data Loss More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
Microsoft Sentinel Microsoft Defender (Cloud, Endpoint, Office 365) Microsoft Entra ID (Azure AD) Microsoft Purview Microsoft Intune Azure Security Center Information Security (On-Premise): Firewalls (e.g. Palo Alto, Fortinet) IntrusionDetection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & Access Management (IAM) Patch management and vulnerability scanning tools Data More ❯
and independent mindset. Effective communication and teamwork skills. Desirable: C programming skills for low-level or performance-critical development. Experience with containerisation (Docker, Kubernetes). Familiarity with endpoint security, intrusiondetection, or system hardening. Contributions to Linux or open-source projects. Experience with debugging, profiling, or performance optimisation tools. Why Join Us Shape the future of secure endpoint More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Career poster
and independent mindset. Effective communication and teamwork skills. Desirable: C programming skills for low-level or performance-critical development. Experience with containerisation (Docker, Kubernetes). Familiarity with endpoint security, intrusiondetection, or system hardening. Contributions to Linux or open-source projects. Experience with debugging, profiling, or performance optimisation tools. Why Join Us Shape the future of secure endpoint More ❯
TCP/IP networking Knowledge of virtual desktop infrastructure RDS, Citrix, VMware Horizon, Parallels, etc Aruba/HP/Brocade Switch configuration and management Remote access and VPN technologies Intrusiondetection & prevention solutions Knowledge of Database technology such as MariaDB/Postgres Experience of working with Cisco, Sophos, Fortinet, Palo Alto firewalls Hands on experience with log aggregation More ❯
escalation point for noteworthy investigations, deeper investigations, and those that require critical attention. Continue to build out new capabilities within the program aligned with our attack surface. Opportunities include detection enhancements, improved or new standard operating procedures, and working with internal teams to tune and operationalize new technologies. Focus on continuing to develop dashboards, direct alerting, risk-based alerting … threat intelligence, breach attack simulation, or similar programs. Strong understanding of the fundamentals such as packet, file, and log analysis. Knowledgeable with various security infrastructure tools such as firewalls, intrusion prevention/detection systems, proxy servers, email controls, anonymizing technology, data loss prevention, Endpoint Detection and Response (EDR), and SIEM (Splunk) Strong understanding of common communication protocols More ❯