Redscan (a trading name of Redscan Cyber Security Limited)
Requirements A passion for Cyber Security and enjoys solving problems. Knowledge of the security threat landscape. Knowledge of various security methodologies and processes, and technical security solutions (firewall and intrusiondetection systems). Knowledge of TCP/IP Protocols, network analysis, and network/security applications. Knowledge of common Internet protocols and applications. Ability to multi-task, prioritize More ❯
closely with senior analysts and other IT teams to ensure the integrity, confidentiality, and availability of information assets. Key Responsibilities: Monitor security alerts and events from various sources, including intrusiondetection systems (IDS), firewalls, and SIEM (Security Information and Event Management) systems. Conduct initial analysis and triage of security incidents to determine the severity and impact. Assist in More ❯
Ruislip, England, United Kingdom Hybrid / WFH Options
Alchemy Recruitment Solutions UK
compliance with security policies and standards Contribute to network optimisation and continuous improvement initiatives Ideal Candidate: Proven experience in network engineering and IT security roles Strong knowledge of firewalls, intrusiondetection systems (IDS/IPS), and endpoint security Hands-on experience with Cisco, Fortinet, Palo Alto, or similar technologies Familiarity with cloud network security (e.g., AWS, Azure) is More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Iceberg
trenches and know what it takes to stay ahead of threat actors. Ideally, you bring: Hands-on experience with SIEM platforms , especially Splunk. Strong familiarity with MITRE ATT&CK , intrusiondetection/prevention systems, and malware behaviour. Confidence in network traffic analysis (PCAP, NetFlow) and endpoint forensics. The ability to explain technical risk in plain English — whether you More ❯
trenches and know what it takes to stay ahead of threat actors. Ideally, you bring: Hands-on experience with SIEM platforms , especially Splunk. Strong familiarity with MITRE ATT&CK , intrusiondetection/prevention systems, and malware behaviour. Confidence in network traffic analysis (PCAP, NetFlow) and endpoint forensics. The ability to explain technical risk in plain English — whether you More ❯
london, south east england, united kingdom Hybrid / WFH Options
Iceberg
trenches and know what it takes to stay ahead of threat actors. Ideally, you bring: Hands-on experience with SIEM platforms , especially Splunk. Strong familiarity with MITRE ATT&CK , intrusiondetection/prevention systems, and malware behaviour. Confidence in network traffic analysis (PCAP, NetFlow) and endpoint forensics. The ability to explain technical risk in plain English — whether you More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Iceberg
trenches and know what it takes to stay ahead of threat actors. Ideally, you bring: Hands-on experience with SIEM platforms , especially Splunk. Strong familiarity with MITRE ATT&CK , intrusiondetection/prevention systems, and malware behaviour. Confidence in network traffic analysis (PCAP, NetFlow) and endpoint forensics. The ability to explain technical risk in plain English — whether you More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Iceberg
trenches and know what it takes to stay ahead of threat actors. Ideally, you bring: Hands-on experience with SIEM platforms , especially Splunk. Strong familiarity with MITRE ATT&CK , intrusiondetection/prevention systems, and malware behaviour. Confidence in network traffic analysis (PCAP, NetFlow) and endpoint forensics. The ability to explain technical risk in plain English — whether you More ❯
of all customers and prospects in our CRM (Salesforce). Apply if you Have a high aptitude for security technology, specifically encryption, authentication, with further knowledge of network security, intrusiondetection, anti-virus, routing, switching, LAN and WAN being desirable. The CISSP accreditation would also be beneficial. Are currently or have previously worked in a pre-sales engineer More ❯
also exceed expectations. As a Cybersecurity Engineer you'll oversee incident response, vulnerability management, and cyber threat hunting. You'll execute security solutions applying cutting-edge technologies like firewalls, intrusiondetection and prevention systems, antivirus software, and vulnerability scanners. You will be instrumental in not only addressing threats but also proactively recommending system tuning, identifying new use cases More ❯
code, e.g. Terraform. Proficiency with programming/scripting languages (e.g. Python, Bash, PowerShell). Experience building and deploying micro services-based applications. Experience with security technologies, for example Firewalls, IntrusionDetection/Prevention Systems, Vulnerability Scanning, WAFs, CASBs, SIEMs, and CSPMs. Experience inputting into and/or creating security architectures and designs. Understanding of security principles and the More ❯
London, England, United Kingdom Hybrid / WFH Options
Hunter Bond
Project work is also part of the opportunity. Ideally, you will have skills in: Cyber Security Operations/Monitoring Security Information and Event Management (SIEM) concepts Vulnerability and Threat detectionIntrusiondetection and prevention, such as Darktrace Ethical Hacker, Cyber Security SANS, CISSP certification Defender, Cortex XDR EPP, EDR/XDR Networking and firewalls, IDS/IPS More ❯
that require technical proficiency as well as tenacity, professionalism, and strong communication skills. Responsibilities Security Analytics - Efficiently distill actionable information from large data sets for reporting, hunting, and anomaly detection Incident Management - Detect, document, investigate, and resolve security incidents in an efficient manner Endpoint Forensics - Construct meaningful incident timelines from forensic artifact analysis Counter Measures - Ability to design and … and execute focused plans to discover advanced threats that evade traditional security controls Behavioral Analysis - Develop and implement criteria to identify anomalous user behavior leading indicating insider threat activity IntrusionDetection - Develop and tune network anomaly control capability to produce reliable actionable data Threat Hunting - Proactively search for unknown threats within the environment. Preferred Knowledge and Experience 3+ More ❯
A solid background in security architecture frameworks and methodologies Hands-on experience designing and implementing security solutions in large environments Must have expert understanding of security tools like firewalls, intrusiondetection/prevention systems, and encryption technologies, including knowledge of cloud integration Experience with Agile, DevSecOps and ITIL Experience with security frameworks (ISO27001, NIST, COBIT) In-depth understanding More ❯
London, England, United Kingdom Hybrid / WFH Options
Free-Work UK
and security infrastructure to meet organizational needs. Monitor and respond to security incidents using tools like SIEM, Sophos MTR, and Splunk. Maintain system security through configuring firewalls, VPNs, and intrusiondetection systems, and ensure timely patching. Manage vulnerability remediation based on penetration tests and risk assessments. Conduct penetration testing and forensic analysis of security incidents. Stay updated on More ❯
Hayes, England, United Kingdom Hybrid / WFH Options
Alchemy Recruitment Solutions UK
compliance with security policies and standards Contribute to network optimisation and continuous improvement initiatives Ideal Candidate: Proven experience in network engineering and IT security roles Strong knowledge of firewalls, intrusiondetection systems (IDS/IPS), and endpoint security Hands-on experience with Cisco, Fortinet, Palo Alto, or similar technologies Familiarity with cloud network security (e.g., AWS, Azure) is More ❯
Hayes, Hillingdon, Greater London, UK Hybrid / WFH Options
Alchemy Recruitment Solutions UK
compliance with security policies and standards Contribute to network optimisation and continuous improvement initiatives Ideal Candidate: Proven experience in network engineering and IT security roles Strong knowledge of firewalls, intrusiondetection systems (IDS/IPS), and endpoint security Hands-on experience with Cisco, Fortinet, Palo Alto, or similar technologies Familiarity with cloud network security (e.g., AWS, Azure) is More ❯
Hayes, south east england, united kingdom Hybrid / WFH Options
Alchemy Recruitment Solutions UK
compliance with security policies and standards Contribute to network optimisation and continuous improvement initiatives Ideal Candidate: Proven experience in network engineering and IT security roles Strong knowledge of firewalls, intrusiondetection systems (IDS/IPS), and endpoint security Hands-on experience with Cisco, Fortinet, Palo Alto, or similar technologies Familiarity with cloud network security (e.g., AWS, Azure) is More ❯
working collaboratively with IT teams. THE ROLE: Design and implement strategic plans to ensure IT network security. Monitor logs generated from SIEM & Sophos MTR tools. Configure, maintain, and implement intrusiondetection systems, firewalls, VPNs, web protocols, and email security. Create and update Jira tickets regularly for ongoing work. THE PERSON: Background in Network Security. Knowledge of Firewalls, Routers More ❯
cloud systems, virtualisation, and storage solutions to deliver scalable, secure, and cost-effective services. Network Management: Manage corporate and venue networks, including security protocols such as firewalls, VPNs, and intrusiondetection systems. Strategic Collaboration: Align IT initiatives with organisational goals, budget planning, and resource optimisation. Vendor Relationships: Negotiate and monitor contracts, ensuring vendor compliance and performance. Security and More ❯
infrastructure, including routers, switches, firewalls, and load balancers. Hands-on experience with cloud networking (AWS, Azure, Google Cloud) and SDN (Software-Defined Networking). Knowledge of network security principles, intrusiondetection systems, and firewall configurations. Familiarity with automation tools (e.g., Ansible, Terraform) for network deployment and management. Experience working with monitoring and performance tools such as Wireshark, Nagios More ❯
London, England, United Kingdom Hybrid / WFH Options
Viribus
TCP/IP networking Knowledge of virtual desktop infrastructure RDS, Citrix, VMware Horizon, Parallels, etc Aruba/HP/Brocade Switch configuration and management Remote access and VPN technologies Intrusiondetection & prevention solutions Knowledge of Database technology such as MariaDB/Postgres Experience of working with Cisco, Sophos, Fortinet, Palo Alto firewalls Hands on experience with log aggregation More ❯
including provisioning, configuring, and troubleshooting virtual machines to ensure optimal performance and reliability. Implementing virtualization security: Implementing security best practices for virtualized environments, such as access controls, encryption, and intrusiondetection, to protect against cyber threats and ensure data confidentiality. Performing system upgrades and patches: Applying software updates, patches, and upgrades to virtualization software, operating systems, and applications More ❯
Analyst, Cybersecurity Operations (Detection & Response) L1 Full-time McDonald's Office Location: International Office As a L1 Response Analyst within the Security Operations Center (SOC), your role primarily involves using defensive measures and information gathered from various sources to identify, analyse, and report cybersecurity events, protecting McDonald's information assets. You will support the Incident Response process by assisting … the opportunity to engage in essential work that safeguards our organization's cybersecurity. The ideal candidate for this role should possess a foundational understanding of cybersecurity practices, cloud technologies, detection and response frameworks, and incident handling procedures (containment, eradication, recovery, and lessons learned). They should be familiar with adhering to established incident response playbooks and practices, have an … computer networking concepts, protocols, and network security methodologies. Entry-level ability to analyse cyber threats and vulnerabilities. Awareness of authentication, authorization, and access control methods. Basic skills in utilizing intrusiondetection methodologies and techniques for detecting host and network-based intrusions. Recognition of common system and application security threats and vulnerabilities. Understanding of network attacks and their relationship More ❯
The ideal candidate will be responsible for implementing and maintaining security measures to safeguard our clients’ WordPress websites and server infrastructure. This role demands expertise in cybersecurity protocols, threat detection, and proactive security measures, ensuring the safety and integrity of our clients’ digital assets. Key Responsibilities: Conduct vulnerability assessments and security audits, identifying and addressing potential vulnerabilities in clients … WordPress websites and server setups. Implement robust security protocols, including firewall configurations, intrusiondetection systems, and encryption tools, to safeguard clients’ digital assets. Monitor network traffic for suspicious activities and potential security threats, implementing real-time threat detection measures. Collaborate with clients to understand their security requirements, providing tailored cybersecurity solutions and recommendations. Respond promptly to security … approach to security. Qualifications: Proven experience as a Cybersecurity Analyst or similar role, with a focus on web security and WordPress platforms. In-depth knowledge of cybersecurity protocols, threat detection, intrusiondetection systems, and encryption technologies. Experience with security assessment tools and methodologies. Strong understanding of web vulnerabilities, including SQL injection, cross-site scripting (XSS), and cross More ❯