Dartford, Kent, United Kingdom Hybrid / WFH Options
Confidential
license. In this role, you will: Deploy, administer, and maintain Network & Security platforms and any other related software, such as routers, switches, wireless, firewalls, intrusiondetection/prevention, network access control, cryptography systems, monitoring, and cloud technologies/applications. Perform diagnostics, appraisal, and analysis on predominantly Cisco based … Network & Security technologies, such as, firewalls, VPN s, intrusiondetection/intrusion prevention, network access control, and other network policies to ensure maximum system reliability & security. Monitor network traffic to optimise performance and efficiency. Implement and administer remote access, and VPN Solutions. Manage PKI distribution and issue more »
the companies network infrastructure. Main Responsibilities: Deploy, administer, and maintain Network & Security platforms and any other related software, such as routers, switches, wireless, firewalls, intrusiondetection/prevention, network access control, cryptography systems, monitoring, and cloud technologies/applications. Perform diagnostics, appraisal, and analysis on predominantly Cisco based … Network & Security technologies, such as, firewalls, VPNs, intrusiondetection/intrusion prevention, network access control, and other network policies to ensure maximum system reliability & security. Give direction and recommendation on Network & Security Enhancements/Features. Provide BAU support for Network & Security related tickets/incidents. Contribute to more »
necessary to support business continuity for a 24/7 emergency policing service and its external partners. Responsibilities: Implement network security including firewall configurations, intrusiondetection/prevention systems, and access control lists To maintain the network architecture including Cisco routers and switches and Cisco ASA/Firepower … network infrastructure including layer 2 and 3 switching and routing. Must have experience of managing network security hardware and software, including firewalls and network intrusiondetection systems. Experience of network hardware and software including Cisco and Meraki solutions Must demonstrate in-depth understanding of datacentre network architectures, ICT more »
installing, commissioning, and maintaining electronic systems to safeguard individuals, homes, and properties Learn the ins and outs of installing and maintaining systems including fire detection, intrusiondetection, CCTV systems, and access control This is a site-based position in Canary Wharf servicing a key high security client more »
organisation accordingly. You will also manage any operational risk remediation to conclusion and take ownership within the team. Managing development and improvements required for detection engineering and associated technologies. Responsible for the operational and threat malware analysis for the group. Providing security input and for maintaining relationships with the … with IM/MIM teams (where required) and recording of all key security decisions. What you'll need: Knowledge and operational experience in firewalls, intrusiondetection and prevention systems, anti-virus and content filtering, URL filtering, authentication solutions, switches, routers, Voice over IP (VoIP), firewall zoning. Ability to … CompTIA CySA+ or similar level of certification It would be beneficial if you have: Experience with any of the following technologies: Data Loss Prevention, Intrusion Prevention/Detection Systems, Firewalls, SIEM. Knowledge of reporting suites such as Power BI Good understanding of Microsoft security suites and associated qualifications more »
security tools. Collaborate with the security governance teams to create and maintain security policies and procedures. Design and implement network security architectures, including firewalls, intrusiondetection/prevention systems, and secure access controls. Work closely with IT, compliance, and business teams to integrate security into all aspects of more »
road map Provide routine reporting on virtualization metrics to senior management Security Integration: Ensure network security by designing and implementing robust security protocols, firewalls, intrusiondetection systems, and encryption mechanisms Must have expertise in managing Cisco firewalls, Palo Alto host-based firewalls, Palo Alto WAF, SD-WAN technologies more »
Oversee the implementation and operation of controls to meet identified security control objectives. Advise operations teams supporting computer security incident response activities related to intrusiondetection monitoring, scanning, cyber threat reporting, and development/implementation of vulnerability mitigation strategies. Develop trusted advisor relationships for information risk management and more »
We are looking for a Vice President, Solution Engineering, Cyber Risk to advise our clients and prospective clients on Managed Detection and Response (MDR) services. In this role you will partner with our Sales and Incident Response teams to introduce, position and architect technical solutions to address our clients … detection and response needs. You will act as a trusted advisor and technical subject matter expert on Managed Detection and Response, which will include sound working knowledge of Endpoint Detection and Response (EDR), Security Incident and Event Management (SIEM), and Network Detection and Response (NDR) tools. … including C-suite and senior security engineering Deep understanding of security technologies such as EDR, SIEM, Cloud provider security solutions, Anti-virus, Firewall, Network Intrusiondetection Familiarity with security frameworks: CIS Critical Security Controls, NIST500:83, ISO27001 Familiarity with Enterprise Architecture frameworks: TOGAF, SABSA, etc. Relevant education and more »
You need awareness of Security Polices as they relate to all aspects of a company's operations globally. Expertise in information security technologies: Firewalls, intrusiondetection, assessment tools, encryption, certificate authority, etc. Knowledge in information security areas such as (ISO27001, PCI, NIST & GDPR), identity and access management, security more »
practices, and risk management methodologies. * Technologies: Advanced proficiency with AuditBoard is preferred. Experience with other key cybersecurity technologies such as SIEM, firewall management, and intrusiondetection systems is highly regarded. * Education: Bachelor's degree in computer science, information security, or a related field; a graduate degree is a more »
SOC Analysts work within a four-day operational rota, collaborating closely with Digital Forensic and Incident Response teams. Responsibilities include: Security Monitoring and Incident Detection: Utilizing SIEM tools to identify potential security incidents and anomalies. Analyzing alerts and log data to assess the severity and impact of threats. Incident … improvement recommendations. Maintaining accurate records of incidents, investigations, and security-related activities. Security Tools Management: Configuring, updating, and maintaining security tools such as firewalls, intrusiondetection/prevention systems, endpoint protection, and SIEM solutions. more »
such as: Risk Assessment and Risk Management Change Management Logical, Physical, and Administrative Access Controls Physical Security Encryption (in relation to compliance) Malicious Code: Detection and Response Systems and Software Development Life Cycle Personnel Security Media Controls Audit, Logging, and Monitoring Controls Vendor Management IntrusionDetection and more »
have been compromised with Ransomware/Data breaches. Tech, Experience & Qualifications: Experience working in Managed service provider (MSP) environments. Network security principles, including firewalls, intrusiondetection/prevention systems, and VPN technologies. Fortinet Firewall, FortiSIEM, FortiEDR beneficial or equivalent firewalls Certifications in relevant technologies such as Microsoft Azure more »
and information security roles. Strong knowledge of IT infrastructure, network security, and cybersecurity best practices. Proficiency in security tools and technologies such as firewalls, intrusiondetection systems, and antivirus software. Experience with compliance frameworks such as ISO 27001, NIST, GDPR, and HIPAA. Strong leadership and team management skills. more »
ITIL (Information Technology Infrastructure Library) and COBIT (Control Objectives for Information and Related Technologies) frameworks. Hands-on experience with security technologies such as firewalls, intrusiondetection/prevention systems, encryption, and identity/access management solutions. Excellent communication and interpersonal skills, with the ability to effectively communicate complex more »
East London, London, United Kingdom Hybrid / WFH Options
MECS Communications Ltd
of the following as possible: * Security operations management * DevOps or software development roles, with a focus on security. * Security tools such as vulnerability scanners, intrusiondetection systems, & security information & event management (SIEM) solutions. * Multi cloud environments AWS & Azure etc. * Using & managing Splunk including defining data streams, indices & ingests more »
On technologies. Mobile device management: Covering 300+ deployed mobile devices, applying best practice and industry standards. Cyber security and information assurance: Managing and maintaining intrusiondetection apparatus, supporting queries/investigations and hardened configuration of IT equipment. DevSecOps and Site Reliability Engineering: Supporting enterprise software teams and their more »
to identify weaknesses in systems and networks and propose mitigation plans where required 4.Recommend, design and implement security tools and technologies such as firewalls, intrusiondetection systems, endpoint protection and distributed denial of service (DDoS) mitigation solutions. 5.Build strong relationships with customers, providing ongoing cybersecurity consultation and support. more »
to identify weaknesses in systems and networks and propose mitigation plans where required 4.Recommend, design and implement security tools and technologies such as firewalls, intrusiondetection systems, endpoint protection and distributed denial of service (DDoS) mitigation solutions. 5.Build strong relationships with customers, providing ongoing cybersecurity consultation and support. more »
to identify weaknesses in systems and networks and propose mitigation plans where required 4.Recommend, design and implement security tools and technologies such as firewalls, intrusiondetection systems, endpoint protection and distributed denial of service (DDoS) mitigation solutions. 5.Build strong relationships with customers, providing ongoing cybersecurity consultation and support. more »
to identify weaknesses in systems and networks and propose mitigation plans where required 4.Recommend, design and implement security tools and technologies such as firewalls, intrusiondetection systems, endpoint protection and distributed denial of service (DDoS) mitigation solutions. 5.Build strong relationships with customers, providing ongoing cybersecurity consultation and support. more »
controls etc Technical Proficiency: Expertise in network & application security (Cloudflare and SonarQube), endpoint protection (SentinelOne), and cloud security technologies (AWS and Azure), including firewalls, intrusiondetection/prevention systems, and encryption methods Incident Response & Threat Analysis: Experience in incident detection, response, and management, as well as analysing more »
SD-WAN. Proficiency in utilizing network management and analysis tools, including LogicMonitor, Datadog, Solarwinds, Network Config Manager, and similar industry-standard products. Knowledgeable in intrusiondetection and prevention systems (IDS/IPS/AV) and other crucial network security measures. Services offered by Computappoint Limited are those of more »
Stone, Staffordshire, United Kingdom Hybrid / WFH Options
yolk recruitment
resolving hardware, software, and network-related problems to minimise downtime and ensure reliability. Implementing security best practices, such as access controls, encryption, firewalls, and intrusiondetection/prevention systems, to protect against cyber threats. The experience you will bring to the team: Experience in the design, build & maintenance more »