and enterprise technologies, advising on secure architecture patterns, cloud automation, and evolving security threats. Own the evaluation of security tools and recommend technologies for intrusiondetection and prevention, security monitoring, web application firewalls (WAF), and data encryption, among others. Lead the evaluation of security tools and recommend technologies … for intrusiondetection and prevention, security monitoring, web application firewalls (WAF), and data encryption, among others. Who we are The UK's fastest broadband network. The nation's best-loved mobile brand. And, one of the UK's biggest companies too. Diverse, high performing teams - jam packed with More ❯
examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity analysts to detect, mitigate, and analyze threats. … meetings and provides expert input to ensure security is maintained. Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusiondetection and prevention, eDiscovery, and content filtering. Ability to manage and continuously improve upon vulnerability management program. Ability to propose solutions for closing More ❯
network security. Understanding of 3GPP mobile network CORE and RAN architectures and security requirements. Strong knowledge of network security protocols, VPN, firewall management, and intrusiondetection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks (e.g., GDPR More ❯
classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who More ❯
are mandatory. You will have a strong understanding of as many of the following areas as possible, and be able to demonstrate it: Security Detection and Monitoring Incident Response Detection Engineering Malware Analysis (Static and Dynamic) Threat Hunting and Threat Intelligence (MITRE ATT&CK) Cloud Security Penetration Testing … SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (Carbon Black, Microsoft Defender ATP, FireEye, CrowdStrike) IntrusionDetection/Prevention Systems (IDS/IPS) (Suricata, Snort, Bro, Cisco, Palo Alto) Web Proxies (Bluecoat, Zscaler, Squid, Cisco/OpenDNS Umbrella) Networking More ❯
modeling, and risk assessments; strong understanding of information security principles, including confidentiality, integrity, and availability. Experience with security tools and technologies, including vulnerability scanners, intrusiondetection systems, and security information and event management (SIEM) systems. Excellent communication and interpersonal skills, with the ability to collaborate effectively with cross … Generous PTO, plus company holidays Comprehensive medical and dental insurance Paid parental leave for all parents (12 weeks) Fertility and family planning support Early-detection cancer testing through Galleri Competitive pension scheme and company contribution Annual work-life stipends for: Home office setup, cell phone, internet Wellness stipend for More ❯
eg ISO 27001) as part of critical vendor performance assessment ensuring operational resilience is maintained. In collaboration with GT, manage security systems, including firewalls, intrusiondetection/prevention systems, and antivirus software. In collaboration with GT, Develop and test incident response plans and coordinate responses to security incidents More ❯
knowledge of the threat landscape relevant to SaaS products, preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusiondetection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools. You own relevant certifications (Security+, IAT II/III level or similar More ❯
implement comprehensive security strategies, policies, and procedures to protect the organization's information assets. Design, deploy, and manage security solutions, including PAM/IAM, intrusiondetection/prevention systems, endpoint protection, data loss prevention, encryption, and vulnerability management tools. Design and manage security in the cloud, including AWS More ❯
Experience of threat and risk modeling. Strong understanding of network security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusiondetection/prevention systems, security information and event management (SIEM) systems, and vulnerability assessment tools, and their configuration options. Familiarity with cloud security More ❯
the design/implementation in multiple areas of cyber security, such as identity and access management, infrastructure security, data security, application security, or incident detection and response. You've been hands-on as a software developer, system administrator, network engineer, or systems architect and have experience leading larger delivery … of the following areas (application security, identity and access management/data protection/infrastructure security such as networks/logging and monitoring, incident detection and response). - Business level Korean reading, document writing, and conversation skills with customers, partners, and colleagues including other departments. - Conversational English skills to … industry certifications such as CISSP, CISA, CISM, or CCSP Implementation experience in one or more of the following: Next Generation Firewalls, Web Application Firewalls, IntrusionDetection/Prevention, Incident Response, and Security Information and Event Management (SIEM), Identify and Access Management (IAM) controls. - Implementation experience with compliance frameworks More ❯
Service Provider organization. Experience with security frameworks such as NIST CSF, ISO 27001, or CIS Controls. Deep understanding of security technologies , such as firewalls, intrusiondetection and prevention systems, vulnerability scanners, and endpoint protection. Strong knowledge of cloud security concepts and technologies , such as Amazon Web Services (AWS More ❯
analytical (RCA) skills. Good working knowledge of Cisco Meraki and associated technologies. Practical knowledge of Continual Service Improvement (CSI) methodologies. Vulnerability management and assessment. Intrusiondetection and prevention analysis/frameworks. Solid exposure to cloud-based applications security and provisioning. Experience in writing policy, process, and standard playbooks. More ❯
Redscan (a trading name of Redscan Cyber Security Limited)
Security and enjoys solving problems. Knowledge of the security threat landscape. Knowledge of various security methodologies and processes, and technical security solutions (firewall and intrusiondetection systems). Knowledge of TCP/IP Protocols, network analysis, and network/security applications. Knowledge of common Internet protocols and applications. More ❯
practices Familiarity with Azure services, including Azure Defender, Azure Monitor, and Azure Policy. Experience with security and compliance scanning tools such as vulnerability scanners, intrusiondetection systems, & security information & event management (SIEM) solutions. Knowledge of container management with Azure Container Registry. Experience in SAST, DAST & other techniques to More ❯
industry standards but also exceed expectations. Oversee incident response, vulnerability management, and cyber threat hunting. Execute security solutions applying cutting-edge technologies like firewalls, intrusiondetection and prevention systems, antivirus software, and vulnerability scanners. Proactively recommending system tuning, identifying new use cases, and providing additional insight from customer More ❯
and future needs. Monitor and respond to security incidents using tools like SIEM and Sophos MTR. Maintain system security by configuring firewalls, VPNs, and intrusiondetection systems, and ensuring timely patching. Manage vulnerability remediation based on penetration test results and risk assessments. Investigate security incidents, conduct forensic analysis More ❯
and future needs. Monitor and respond to security incidents using tools like SIEM and Sophos MTR. Maintain system security by configuring firewalls, VPNs, and intrusiondetection systems, and ensuring timely patching. Manage vulnerability remediation based on penetration test results and risk assessments. Investigate security incidents, conduct forensic analysis More ❯
pipelines. Utilize big data technologies (Databricks, Spark). Develop custom security applications, APIs, AI/ML models, and advanced analytic technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusiondetection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and analytics in Databricks, Synapse Analytics, and large-scale data warehouses (Snowflake, Redshift, Presto). Proficiency in data visualization tools (Databricks, PowerBI) and the Python data science ecosystem (Jupyter, Pandas More ❯
pipelines. Utilize big data technologies (Databricks, Spark). Develop custom security applications, APIs, AI/ML models, and advanced analytic technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusiondetection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and analytics in Databricks, Synapse Analytics, and large-scale data warehouses (Snowflake, Redshift, Presto). Proficiency in data visualization tools (Databricks, PowerBI) and the Python data science ecosystem (Jupyter, Pandas More ❯
City of London, London, United Kingdom Hybrid / WFH Options
JobHeron
of the Senior Security Engineer: Develop and implement comprehensive security strategies, policies, and procedures. Design, deploy, and manage security solutions, including PAM/IAM, intrusiondetection/prevention systems, endpoint protection, data loss prevention and encryption. Design and manage security in the cloud, including AWS Control Tower, Azure More ❯
risk management framework to minimize the department's exposure to fraud risks. Oversee the implementation, management, and proper utilization of security tools such as intrusiondetection systems, vulnerability management, anti-virus software, and data encryption. Assess and manage the identification and mitigation plans of existing and emerging security More ❯
in individual machines, such as drivers and settings of personal computers as well as printers. Maintain network servers such as file servers, VPN gateways, intrusiondetection systems. Administer servers, desktop computers, printers, routers, switches, firewalls, phones, personal digital assistants, smartphones, software deployment, security updates and patches. Department: Network More ❯
iperf, dig/nslookup, cURL, tcpdump/wireshark and related) • Knowledge/experience of network security (SSL/TLS, Network- and Web Application Firewalls, IntrusionDetection and Prevention Services) • Knowledge managing domain transfers, records and DNS security (DNSSEC and DNS Filtering) • Operating Systems knowledge oriented to maintenance and More ❯
to effectively convey security policies and procedures to staff and stakeholders. Technical Knowledge : Proficiency in security technologies and systems, including surveillance, access control, and intrusion detection. Crisis Management : Skills in crisis management and emergency response planning. Compliance Knowledge : Understanding of relevant security regulations and standards. Problem-Solving : Strong problem More ❯