Bletchley, Buckinghamshire, United Kingdom Hybrid / WFH Options
In Technology Group
data, and infrastructure against emerging threats. Key Responsibilities: Monitor, detect, and respond to security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and development teams to ensure secure More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
In Technology Group Limited
data, and infrastructure against emerging threats. Key Responsibilities: Monitor, detect, and respond to security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and development teams to ensure secure More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Liberty Global
threat hunting, adversary emulation, and cutting-edge threat mitigation methodologies. Knowledge Sharing: Assist in developing training sessions and workshops to continuously enhance the team's technical skills and capabilities. Detection Engineering & Security Enhancements Proactive Defence: Develop and fine-tune detection rules, playbooks, and automation scripts that improve SOC efficiency and help pre-empt potential attacks. Security Architecture: Collaborate … people with: Extensive experience in managing, investigating, and responding to cyber incidents, with hands-on experience in a dynamic SOC or Incident Response role. Technical Expertise: Strong understanding of intrusiondetection, forensic investigations, vulnerability management, and advanced security technologies (SIEM, IDS/IPS, EDR, and firewalls). Analytical Skills: Proficiency in analysing log sources and data normalization using More ❯
and regulations. Collaborate with IT teams to integrate security protocols into network architecture and operations. Be involved in the deployment and maintenance of network security devices such as firewalls, intrusiondetection systems, and VPNs. Act on and recover from security incidents, including conducting post-event analyses to prevent future incidents. Stay abreast of the latest cybersecurity threats and More ❯
to attack vectors and security incidents, and coordinate incident response across teams Security software testing:Test company software, firmware, and firewalls Security software design:Design software security systems like intrusiondetection systems and firewalls Security system maintenance: Maintain and proof network security systems Security system analysis:Analyse security systems and seek improvements on a continuous basis #J More ❯
of SIEM tools and advanced hunting queries. Experience Needed: Managing serious Cyber Incidents as a Digital Forensic Incident Responder. Working successfully in large, complex enterprise environments. Understanding security monitoring, intrusiondetection, firewalls, anti-virus, and web proxies. Technical expertise in networks, malware analysis, digital forensics. Effective communication with senior stakeholders. Company Overview: Element is a rapidly growing testing More ❯
implement security policies, standards, and guidelines aligned with industry standards (e.g., ISO 27001, NIST). Assist in the deployment, configuration, and management of security infrastructure and technologies, including firewalls, intrusiondetection/prevention systems, and secure network architectures. Provide guidance and support on Azure security practices, leveraging expertise in Microsoft Azure security frameworks and best practices. Stay updated More ❯
with global business risk/objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative, and cost-effective information security … +, CEH, SSCP, Security +, etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program review Experience in various technologies … including Unix, Windows, Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless More ❯
analysts with a view to develop these skills amongst the team whilst also acting as a technical escalation point. As such, the role requires a deep technical understanding of intrusiondetection and analysis, incident response, vulnerability management, and infrastructure Driving forward the technical skill set of the team by developing threat hunting, adversary emulation, leading edge threat mitigation … root cause analysis, with a view to identifying and influencing future prevention by maintaining the Incident knowledge base. Experience of other security technologies & defences such as Firewalls, Snort, Bro, IntrusionDetection System (IDS) monitoring and custom rule creation (YARA), TCP/IP Networking, WireShark , TCPDump , Netflow analysis. In depth understanding of IT systems and technologies ( e.g. Linux and … role within a business. Technical & Management reporting to demonstrate effectiveness and value of the teams work . †̄Global Information Assurance Certifications (GIAC) e.g. Certified Incident Handler (GCIH), Certified Intrusion Analyst (GCIA), Reverse Engineering Malware (GREM) would be an advantage. What’s in it for you? Competitive salary + Bonus 25 days annual leave with the option to purchase More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Allica Bank
in the creation of security awareness programs. Be a key player in the organisation's incident response efforts. Personal Attributes & Experience Deep experience with endpoint monitoring, CSPM, network security, intrusiondetection and management. Proven track record in managing continuous threat exposure management programs and responding to security incidents. Strong understanding of identity and access management (IAM) systems, tools More ❯
experience of managing serious Cyber Incidents, as an Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware analysis, digital forensics etc. Attention More ❯
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria Limited
Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of log data and intrusiondetection systems. Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be … great if you had: ? Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and experience are exactly what were looking for, please do apply, wed love to hear from More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
South East London, England, United Kingdom Hybrid / WFH Options
Iceberg
trenches and know what it takes to stay ahead of threat actors. Ideally, you bring: Hands-on experience with SIEM platforms , especially Splunk. Strong familiarity with MITRE ATT&CK , intrusiondetection/prevention systems, and malware behaviour. Confidence in network traffic analysis (PCAP, NetFlow) and endpoint forensics. The ability to explain technical risk in plain English — whether you More ❯
provide a * significant * opportunity to progress your career. As well as involvement in the design and implementation of Cyber Security Strategy, you’ll gain considerable experience in Vulnerability Monitoring, IntrusionDetection, Incident Response (including assurance and Business Continuity), and Cyber Investigations. You’ll be learning from some of the best in the business and working with many household More ❯
cyber analysts and engineers to maintain and optimise other cyber security platforms and tools to improve performance and end-user experience. These include, but are not limited to endpoint detection and response, network intrusiondetection, patch management, web filtering and email security gateways. Develop processes and procedures to manage, monitor and improve performance, reliability, recovery, capacity and More ❯
Romsey, England, United Kingdom Hybrid / WFH Options
副步
Microsoft’s enterprise Single Sign-On technologies. Mobile device management: Covering 300+ deployed mobile devices, applying best practice and industry standards. Cyber security and information assurance: Managing and maintaining intrusiondetection apparatus, supporting queries/investigations and hardened configuration of IT equipment. DevSecOps and Site Reliability Engineering: Supporting enterprise software teams and their Ci/CD requirements using More ❯
Eastbourne, England, United Kingdom Hybrid / WFH Options
Exalto Consulting
Architecture You will be required to design and implement end to end network infrastructure automation capabilities Proficiency in configuring, managing, and troubleshooting firewalls. Cisco, Palo Alto etc, Experience with intrusiondetection/prevention systems, as well as with SIEM tools and security incident response. Design and implement secure network architectures, including firewalls, intrusiondetection/prevention More ❯
variety of SIEM tools and exposure to many different networks, this is ideal for anyone looking to grow their hands-on experience with various tools and networks. Key Tasks: Detection, monitoring, and analysis of security incidents. Production of the monthly service reports. Assist Senior Analysts in performing network/system/application/log intrusiondetection analysis. More ❯
AWS Security Hub, Microsoft Defender for Cloud, and third-party tools like Palo Alto Networks, Tenable, etc. Experience and knowledge of CNAPP solutions. Knowledge of automated security scanning tools, intrusiondetection systems, and firewalls. Experience of DevSecOps tools and processes, AKS and EKS and container security. Familiarity with CI/CD pipelines and related tools (e.g., GitHub, Azure More ❯
Network Security rule design and administration across multiple platforms Minimum Qualifications 5+ years of experience working in a security team. Extensive experience with network security design, firewall management, and intrusion detection. Deep experience in deploying application-based firewalls (Palo Alto, Fortinet or similar) on premise or in cloud base services (Prisma, Zscaler or similar), and SSL inspection techniques. Proficiency … segmentation, network security architecture. Solid knowledge and working experience with Layer 2-7 protocols and technologies Strong knowledge and troubleshooting experience with routing, security protocols, ACLs, Firewalls, WAF, and Intrusion Prevention Systems Experience with open-source network scanning tools Excellent communication and interpersonal skills including the ability to build consensus and to present complex presentations Basic knowledge with one More ❯
managers, engineers, and security professionals across multiple countries Oversee end-to-end delivery of Data Centre Infrastructure (fitouts, upgrades, cabling, power, cooling) and Physical Security projects (access control, CCTV, intrusiondetection) Ensure projects are delivered on time, within budget, and to the highest quality and compliance standards Build and maintain strong relationships with key clients, acting as their … track record leading multi-site projects across the UK and Europe. Strong technical knowledge of both: Data Centre Infrastructure (power, cooling, cabling, fitouts)Physical Security Systems (access control, CCTV, intrusiondetection) Demonstrated success in building and leading high-performing teams. Experience with P&L ownership, budgeting, and financial reporting. Strong client management skills, with the ability to engage More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
Active SC Clearance and eligible for DV Clearance. Proven expertise in Red Hat Enterprise Linux (RHEL) administration and design. Strong understanding of security controls, including host firewalls, SELinux, and intrusion detection. Knowledge of networking fundamentals, especially from a security perspective. Experience working in highly governed environments with tight SLAs. Skilled in patch management and system update procedures. It would More ❯
of Security Engineering, where you will install, commission, and maintain electronic systems that protect individuals, homes, and properties. Master the art of installing and maintaining cutting-edge systems, including intrusiondetection, CCTV systems, and access control. Our team primarily focuses on large installation projects, which typically take 3-6 months to complete. Gain invaluable experience across both the More ❯
Security is a key aspect of the role, covering both hands-on implementation and compliance. The focus will primarily be on AppSec, encompassing principles and practices such as firewalls, intrusiondetection and prevention systems, encryption, and endpoint protection. On the compliance access you’ll need an understanding of security standards and frameworks such as ISO27001, NIST and GDPR. More ❯