experience as a Security Engineer or in a similar role, with deep understanding of the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusiondetection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). More ❯
and regulations. Collaborate with IT teams to integrate security protocols into network architecture and operations. Be involved in the deployment and maintenance of network security devices such as firewalls, intrusiondetection systems, and VPNs. Act on to and recover from security incidents, including conducting post-event analyses to prevent future incidents. Stay abreast of the latest cybersecurity threats More ❯
Analyst, Cybersecurity Operations (Detection & Response) L3 Full-time McDonald's Office Location: International Office McDonald’s growth strategy, Accelerating the Arches, encompasses all aspects of our business as the leading global omni-channel restaurant brand. As the consumer landscape shifts, we are using our competitive advantages to further strengthen our brand. One of our core growth strategies is to … event monitoring, eDiscovery, forensics, and incident response will be key in this role. The ideal candidate for this role should possess a solid understanding of cybersecurity practices, cloud technologies, detection and response frameworks, and incident handling procedures (containment, eradication, recovery, and lessons learned). They should excel in adhering to and enforcing the use of established incident response playbooks … protocols, and network security methodologies. Strong expertise in analysing and mitigating cyber threats and vulnerabilities. Advanced competence in authentication, authorization, and access control methods. Proficiency in utilizing and developing intrusiondetection methodologies and techniques for detecting host and network-based intrusions. In-depth knowledge of system and application security threats and vulnerabilities, with the ability to develop and More ❯
is a technically focused role working within the IT Department. The role has responsibility for maintaining our core suite of security tools (including vulnerability scanning, patch management, anti-virus, intrusiondetection/prevention) as well as advising on security aspects of all existing and incoming IT systems. The IT Department's mission is to meet and exceed customer … to demonstrate ownership. Desirable: Experience in one or more of the following would also be advantageous: Formal security-related qualification, such as Comptia Sec+ Firewall management (ideally CheckPoint) including intrusiondetection/prevention protocols. Microsoft Azure AZ-900 qualification. Special aspects Our standard working hours are 09.30 to 17.30 but it is essential that the applicant is committed More ❯
London, England, United Kingdom Hybrid / WFH Options
Leonardo
testing Statement of Works, and manage the remediation of identified vulnerabilities. Security Tools & Technologies Advice: Provide guidance on the selection, implementation, and optimization of security tools such as firewalls, intrusiondetection systems (IDS), intrusion prevention systems (IPS), and security information and event management (SIEM) systems. Support Security Architecture & Design: Assess the design, implementation, and maintenance of developed … United Kingdom 2 weeks ago London, England, United Kingdom 4 weeks ago London, England, United Kingdom 2 weeks ago London, England, United Kingdom 2 weeks ago Senior Security Engineer, Detection and Response London, England, United Kingdom 2 days ago London, England, United Kingdom 1 week ago London, England, United Kingdom 2 weeks ago London, England, United Kingdom 1 day More ❯
improve the security and robustness of QA’s organisational infrastructure and associated IT systems. As a Head of Cyber Security Operations you will be responsible for safeguarding QA from intrusion, security threats, security weaknesses, software bugs and exploits. You will be responsible for direct and virtual teams involved in keeping QA secure. Role Responsibilities: Management of the Security Operations … and operating systems including firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server, networks and cloud services Comprehensive knowledge or experience of information security principles, including risk assessment, intrusiondetection, Security Incident and Event Management (SIEM) tools, threat and vulnerability management Detailed knowledge or experience of application or network based penetration testing tools and methodologies Experience of More ❯
controls and consider lessons learnt in order to protect the bank from potential cyber-attacks and respond to threats. Accountabilities: * Management of security monitoring systems, including intrusive prevention and detection systems, to alert, detect and block potential cyber security incidents, and provide a prompt response to restore normal operations with minimised system damage. * Identification of emerging cyber security threats … analysis, and threat intelligence. * Incident response skills, including proficiency in PCAP capture, network analysis, and traffic pattern recognition. * Knowledge of attack techniques (MITRE ATT&CK framework, malware analysis, and intrusiondetection). * Proficiency in analyzing network traffic (PCAP), endpoint logs, IDS/IPS alerts, and security telemetry. * Stakeholder management skills, with the ability to communicate and articulate security More ❯
London, England, United Kingdom Hybrid / WFH Options
Starling Bank
DevSecOps mindset that we have created across our technology teams Requirements What skills are essential: You have an in-depth knowledge of security principles, technologies, best practices and threat detection and mitigation strategies Knowledge of common attack vectors and methodologies (OWASP Top 10, Mitre ATT&CK Framework and social engineering tactics The ability to identify potential threats, attack vectors … qualifications are a plus) Container security knowledge including container image provenance (e.g. Sigstore, Notary) with an in-depth knowledge of container runtimes Strong understanding of network protocols & practices, firewalls, intrusiondetection/prevention systems and WAFs Understanding of integrating security into the software development lifecycle Experience performing secure code reviews and security approvals including the use of static … and dynamic application security testing (SAST/DAST) tools. Experience in Cryptography management & enhancements Experience configuring and utilising cloud-native security logging, monitoring, and detection services Relevant security certifications such as ISC2 CC, CISSP, CCSP, CISM, AWS Security Specialist or GCP Professional Cloud Security Engineer Our Interview process Interviewing is a two way process and we want you to More ❯
London, England, United Kingdom Hybrid / WFH Options
Fruition Group
traffic, systems, and logs for unusual or malicious activity. Conducting regular security assessments and audits to identify vulnerabilities and risks. Implementing and maintaining security tools and protocols, including firewalls, intrusiondetection systems, and endpoint protection solutions. Investigating security incidents, responding to potential breaches, and documenting findings. Leading security-focused projects across the network, Windows Desktop/Server environments More ❯
London, England, United Kingdom Hybrid / WFH Options
EVORA Global Limited
understanding of network and system architecture, including cloud environments. Familiarity with security frameworks and standards (e.g., ISO 27001). Experience with security tools and technologies (firewalls, SIEM, vulnerability scanners, intrusiondetection/prevention systems). Experience Required: Extensive experience in IT operations, cyber security, and business systems management. Proven experience in business systems analysis, implementation, and administration. Strong More ❯
London, England, United Kingdom Hybrid / WFH Options
Iceberg
trenches and know what it takes to stay ahead of threat actors. Ideally, you bring: Hands-on experience with SIEM platforms , especially Splunk. Strong familiarity with MITRE ATT&CK , intrusiondetection/prevention systems, and malware behaviour. Confidence in network traffic analysis (PCAP, NetFlow) and endpoint forensics. The ability to explain technical risk in plain English — whether you More ❯
design and implementation within a Service Provider organization •Experience with security frameworks such as NIST CSF, ISO 27001, or CIS Controls •Deep understanding of security technologies, such as firewalls, intrusiondetection and prevention systems, vulnerability scanners, and endpoint protection •Strong knowledge of cloud security concepts and technologies, such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud More ❯
or CISM accreditation. You will develop and maintain the information security architecture and will have proven experience with compliance, vulnerability management, network security, cloud security (AWS & Azure), firewalls and intrusiondetection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threat analysis and act as a subject matter expert More ❯
Information Security, or a related field (or equivalent work experience). 2+ years of experience in a cybersecurity or IT security role. Technical Skills: Knowledge of networking protocols, firewalls, intrusiondetection/prevention systems, and endpoint protection. Experience with SIEM tools such as Splunk, QRadar, or Sentinel. Familiarity with security frameworks and standards (e.g., NIST, ISO 27001, CIS More ❯
experience). Experience: 13 years of experience in a security operations, cybersecurity, or IT role. Experience with SIEM platforms (e.g., Splunk, QRadar, ArcSight). Familiarity with log analysis and intrusiondetection systems. Certifications (Preferred but not required): CompTIA Security+ Certified SOC Analyst (CSA) GIAC Security Essentials (GSEC) Certified Ethical Hacker (CEH) Skills: Strong analytical and problem-solving skills. More ❯
London, England, United Kingdom Hybrid / WFH Options
Smart Communications group
existing infrastructure/application architecture. Advocating for infrastructure/application Security Design. Reviewing new technologies and methodologies and introducing integration opportunities (where feasible). Support Management in enhancing security detection and incident response efforts/playbooks. Monitoring, remediating, and reporting on security events. Network management fundamentals are required to be able to enhance security posture across network tools. Supporting … in a similar role. Bachelor/master’s degree in computer science, Information Security, or a related field. Good understanding of security principles, technologies, and best practices, including threat detection and mitigation strategies. Good level of knowledge on cloud security architecture, specifically with Azure (preferable) and AWS. Demonstrated proven ability to ensure data confidentiality, integrity, and availability throughout its …/undertaking internal pen testing and creation of external penetration testing scopes. Knowledge of security frameworks & controls, hardening standards & security best practices. An understanding of network protocols & practices, firewalls, intrusiondetection/prevention systems, and WAFs. Our values S peak Openly - We are positive, creative, helpful, kind and we have fun. We listen and provide constructive feedback. Through More ❯
London, England, United Kingdom Hybrid / WFH Options
Smart Communications, Inc
of the role include: Advocating for infrastructure/application Security and providing support for security projects. Competence in reviewing new technologies, methodologies and integration opportunities. Support in enhancing security detection and incident response efforts/playbooks. Monitoring, remediating, and reporting on security events. Supporting team and activities required for maintaining Smart Communications standards and certification requirements. What we're … have skills and experience: At least 3 years of hands-on, proven industry experience in a similar role. Good understanding of security principles, technologies, and best practices, including threat detection and mitigation strategies. Good level of knowledge of cloud security: AWS and Azure. Experience ensuring data confidentiality, integrity, and availability throughout its lifecycle, including during transmission, storage, and processing. … An understanding of application security principals, best practices, OWASP/related standards. Knowledge of security frameworks & controls, hardening standards & security best practices. An understanding of network protocols & practices, firewalls, intrusiondetection/prevention systems and WAFs. We look for the following SMART values in everyone we hire at Smart Communications: S peak Openly - We are positive, creative, helpful More ❯
design and implementation within a Service Provider organization. Experience with security frameworks such as NIST CSF, ISO 27001, or CIS Controls. Deep understanding of security technologies , such as firewalls, intrusiondetection and prevention systems, vulnerability scanners, and endpoint protection. Strong knowledge of cloud security concepts and technologies , such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud More ❯
and third-party providers, identifying and addressing potential threats before they impact operations. • Oversee the selection, deployment, and management of security technologies, including but not limited to firewalls, endpoint detection and response (EDR), multi-factor authentication (MFA), encryption, SIEM, and intrusiondetection/prevention systems (IDS/IPS). Data Management & Analytics • Lead the development and enforcement More ❯
effective security policies and protocols, ensuring that the network environment remains secure and compliant with industry standards. Key Responsibilities: Design and implement secure network architectures, including firewalls, VPNs, and intrusiondetection systems. Monitor network traffic and respond to security incidents and breaches in a timely manner. Conduct regular vulnerability assessments and penetration tests to identify and mitigate risks. More ❯
with the latest cybersecurity threats and trends and escalate risks promptly. Ensure compliance with relevant industry regulations and standards (e.g., GDPR, ISO 27001). Manage security systems, including firewalls, intrusiondetection/prevention systems, and antivirus software, in collaboration with GT. Develop and test incident response plans and coordinate responses to security incidents and breaches. Raise cybersecurity awareness More ❯
London, England, United Kingdom Hybrid / WFH Options
Sodexo
Management : Leading change initiatives to improve security posture. Performance Metrics : Establishing and monitoring KPIs to measure security program effectiveness. Technical Expertise : Deep understanding of cybersecurity technologies such as firewalls, intrusiondetection, encryption, and network security protocols. Regulatory Compliance : Knowledge of laws, regulations, and standards like GDPR, Cyber Essentials, ISO/IEC 27001, and ensuring compliance. Incident Response : Developing More ❯
experience of managing serious Cyber Incidents, as an Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware analysis, digital forensics etc. Attention More ❯
infection vectors Experience in securing cloud environments, including knowledge of cloud security architecture and best practices Experience working with on-premises and cloud (hybrid) security systems, such as firewalls, intrusiondetection/prevention systems, and SIEM tools Experience working with networking and security controls across all OSI layers Ability to effectively detect, investigate, and respond to security incidents More ❯
infection vectors Experience in securing cloud environments, including knowledge of cloud security architecture and best practices Experience working with on-premises and cloud (hybrid) security systems, such as firewalls, intrusiondetection/prevention systems, and SIEM tools Experience working with networking and security controls across all OSI layers Ability to effectively detect, investigate, and respond to security incidents More ❯