objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and evaluating new, alternative … etc. Must have a solid understanding of information technology and information security practices, including the areas of host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modelling, physical security, systems integrity, and continuity planning. Familiar with security policy and standards development, implementation, and program … Linux, TCP/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusiondetection, incident response, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management More ❯
install, commission, and maintain electronic systems designed to protect people, properties, and assets. Gain in-depth knowledge about our cutting-edge systems, including fire detection, intrusiondetection, CCTV, and access control solutions. Hit the road in your own company van, visiting a variety of sites, from residential More ❯
Bletchley, Buckinghamshire, United Kingdom Hybrid / WFH Options
In Technology Group
threats. Key Responsibilities: Monitor, detect, and respond to security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
In Technology Group Limited
threats. Key Responsibilities: Monitor, detect, and respond to security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Liberty Global
cutting-edge threat mitigation methodologies. Knowledge Sharing: Assist in developing training sessions and workshops to continuously enhance the team's technical skills and capabilities. Detection Engineering & Security Enhancements Proactive Defence: Develop and fine-tune detection rules, playbooks, and automation scripts that improve SOC efficiency and help pre-empt … managing, investigating, and responding to cyber incidents, with hands-on experience in a dynamic SOC or Incident Response role. Technical Expertise: Strong understanding of intrusiondetection, forensic investigations, vulnerability management, and advanced security technologies (SIEM, IDS/IPS, EDR, and firewalls). Analytical Skills: Proficiency in analysing log More ❯
maintain and optimise other cyber security platforms and tools to improve performance and end-user experience. These include, but are not limited to endpoint detection and response, network intrusiondetection, patch management, web filtering and email security gateways. Develop processes and procedures to manage, monitor and improve More ❯
teams to integrate security protocols into network architecture and operations. Be involved in the deployment and maintenance of network security devices such as firewalls, intrusiondetection systems, and VPNs. Act on and recover from security incidents, including conducting post-event analyses to prevent future incidents. Stay abreast of More ❯
incidents, and coordinate incident response across teams. Security software testing: Test company software, firmware, and firewalls. Security software design: Design software security systems like intrusiondetection systems and firewalls. Security system maintenance: Maintain and proof network security systems. Security system analysis: Analyse security systems and seek improvements on More ❯
/objectives. This role focuses on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. The position will support the Director of IT Security in reviewing and evaluating new, cost-effective information … Industry certifications preferred: CISSP, CompTIA+, CEH, SSCP, Security+, etc. Solid understanding of IT and security practices, including host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modeling, physical security, systems integrity, and continuity planning. Experience with security policies, standards development, implementation, and review. Experience More ❯
advanced hunting queries. Experience Needed: Managing serious cyber incidents as a digital forensic responder. Operating within large, complex enterprise environments. Understanding of security monitoring, intrusiondetection/prevention, and control systems. Technical expertise in networks, malware analysis, and digital forensics. Effective communication with senior stakeholders. Company Overview: Element More ❯
hunting queries. Experience Needed: Managing serious Cyber Incidents as a Digital Forensic Incident Responder. Working successfully in large, complex enterprise environments. Understanding security monitoring, intrusiondetection, firewalls, anti-virus, and web proxies. Technical expertise in networks, malware analysis, digital forensics. Effective communication with senior stakeholders. Company Overview: Element More ❯
guidelines aligned with industry standards (e.g., ISO 27001, NIST). Assist in the deployment, configuration, and management of security infrastructure and technologies, including firewalls, intrusiondetection/prevention systems, and secure network architectures. Provide guidance and support on Azure security practices, leveraging expertise in Microsoft Azure security frameworks More ❯
on-premises networks (hybrid setups). Operations, Monitoring, and Incident Management Monitor the performance of both on-premises and cloud-based systems. Ensure timely detection, escalation, and resolution of incidents and outages. Develop and track key performance indicators (KPIs) such as MTTD and MTTR. Automate repetitive tasks using scripts … and cloud-native tools. Security and Compliance Implement and manage infrastructure security measures, including firewalls, VPNs, and intrusiondetection systems. Ensure compliance with industry standards such as GDPR, ISO 27001 and SOC 2. Perform regular audits and address vulnerabilities in both cloud and traditional systems. Strategic Planning and More ❯
development Experience Needed: Extensive experience managing serious cyber incidents as a digital forensic responder Experience in large, complex enterprise environments Knowledge of security monitoring, intrusiondetection, firewalls, antivirus, web proxies Technical expertise in networks, malware analysis, digital forensics Effective communication with senior stakeholders Company Overview: Element is a More ❯
advanced hunting queries. Experience Needed: Managing serious cyber incidents as a digital forensic incident responder. Working successfully in large, complex environments. Understanding security monitoring, intrusiondetection, and prevention systems. Technical expertise in networks, malware analysis, and digital forensics. Effective communication with senior stakeholders. Company Overview: Element is a More ❯
advanced hunting queries. Experience Needed: Managing serious cyber incidents as a digital forensic responder. Working successfully in large, complex enterprise environments. Understanding security monitoring, intrusiondetection, prevention, and control systems. Technical expertise in networks, malware analysis, and digital forensics. Effective communication with senior stakeholders. Company Overview: Element is More ❯
Extensive experience managing serious cyber incidents as a digital forensic responder. Proven success working within large, complex enterprise environments. Understanding of security monitoring tools, intrusiondetection, and prevention systems. Technical expertise in networks, malware analysis, and digital forensics. Effective communication with senior stakeholders. Company Overview Element is a More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Allica Bank
awareness programs. Be a key player in the organisation's incident response efforts. Personal Attributes & Experience Deep experience with endpoint monitoring, CSPM, network security, intrusiondetection and management. Proven track record in managing continuous threat exposure management programs and responding to security incidents. Strong understanding of identity and More ❯
Incidents, as an Digital forensic incident responder. Experience in operating successfully within a large complex/federated enterprise environment. Demonstrable understanding of security monitoring, intrusiondetection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malware More ❯