investigate high-priority alerts, analyse logs, or network traffic and endpoint activity using tools like Splunk. Whether you're monitoring security alarms, creating new detection content, using threat intelligence to strengthen our defences, or responding to breaches, each day will begin with a team meeting to review ongoing investigations … impact. About You You’ll bring a background in cyber security analysis and a passion for IT. Ideally, you’ll have experience with host intrusiondetection analysis, but don’t worry if that’s an area you’re still developing in - plenty of training will be provided. You … working as a Cyber Security/Security Operations Centre Analyst• Evidence of experience working in at least one of the following fields: malware analysis, intrusiondetection and incident response• Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria will be More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Lloyds Bank plc
Senior Infrastructure Specialist and play a pivotal role in protecting the UK's largest digital bank. This opportunity sits within our Network Security Prevention, Detection, Compliance and Assurance team - part of the wider Network Security & Traffic Management Lab - which manages critical controls like Intrusion Prevention/Detection Systems (IPS/IDS) and Network Detection & Response (NDR) across our on-prem and multi-cloud environment. In this role, you'll lead the technologies that enforce our network security policies and keep our systems compliant in a dynamic, evolving threat landscape. It's a chance to drive … What you'll need Demonstrable experience in network security or infrastructure roles, with deep technical knowledge of security boundary devices such as firewalls and intrusiondetection/prevention systems Firewall policy expertise:Good understanding of firewall rule sets and network security policy standard practices - you know how to More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Experience of threat and risk modeling. Strong understanding of network security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusiondetection/prevention systems, security information and event management (SIEM) systems, and vulnerability assessment tools, and their configuration options. Familiarity with cloud security More ❯