Warwick, England, United Kingdom Hybrid / WFH Options
Vallum Associates
Job Title: Security SME- IntrusionDetection Specialist (IDS, HIDS) Location: Warwick or Wokingham (Hybrid – 2 Days/Week Onsite) Duration: 6+ Months Contract Inside IR35 Active SC Clearance (mandatory) Job Overview: We are seeking an experienced Security Subject Matter Expert (SME) with deep expertise in IntrusionDetection … across the estate and managing HIDS systems to detect and prevent intrusions effectively. Key Responsibilities: Lead the design, deployment, and management of Host-based IntrusionDetection Systems (HIDS) Monitor, analyze, and respond to security alerts from IDS platforms Continuously assess and improve the overall security posture of the … and IDS Ability to commute to Warwick or Wokingham 2 days per week Excellent communication skills and stakeholder management Strong hands-on experience with IntrusionDetection Systems (especially HIDS) Proven background in cybersecurity monitoring and incident response Familiarity with broader estate security management Strong analytical and problem-solving More ❯
Warwick, north west england, united kingdom Hybrid / WFH Options
Vallum Associates
Job Title: Security SME- IntrusionDetection Specialist (IDS, HIDS) Location: Warwick or Wokingham (Hybrid – 2 Days/Week Onsite) Duration: 6+ Months Contract Inside IR35 Active SC Clearance (mandatory) Job Overview: We are seeking an experienced Security Subject Matter Expert (SME) with deep expertise in IntrusionDetection … across the estate and managing HIDS systems to detect and prevent intrusions effectively. Key Responsibilities: Lead the design, deployment, and management of Host-based IntrusionDetection Systems (HIDS) Monitor, analyze, and respond to security alerts from IDS platforms Continuously assess and improve the overall security posture of the … and IDS Ability to commute to Warwick or Wokingham 2 days per week Excellent communication skills and stakeholder management Strong hands-on experience with IntrusionDetection Systems (especially HIDS) Proven background in cybersecurity monitoring and incident response Familiarity with broader estate security management Strong analytical and problem-solving More ❯
Royal Leamington Spa, England, United Kingdom Hybrid / WFH Options
Vallum Associates
Job Description Job Title: Security SME- IntrusionDetection Specialist (IDS, HIDS) Location: Warwick or Wokingham (Hybrid – 2 Days/Week Onsite) Duration: 6+ Months Contract Inside IR35 Active SC Clearance (mandatory) Job Overview: We are seeking an experienced Security Subject Matter Expert (SME) with deep expertise in IntrusionDetection Systems (IDS), particularly Host-based IDS (HIDS). The ideal candidate will be responsible for overseeing the security posture across the estate and managing HIDS systems to detect and prevent intrusions effectively. Key Responsibilities: Lead the design, deployment, and management of Host-based IntrusionDetectionMore ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
Skye Business Solutions
Rule fine-tuning, and integration of applicable changes from upstream rule repositories into our repo. Collaborate with Analysts and client cybersecurity professionals to refine detection strategies, improve detection accuracy and reduce false positives. Analyse security logs from various sources including cloud platforms services, firewalls, intrusiondetection … administration. Solid experience working with security logs across multiple domains - identity and access, network, system, data, application, cloud - and multiple product types, e.g. firewalls, intrusiondetection systems, VPN, web application firewalls, web and email filtering, identity directories and SSO, endpoint protection and EDR, and other security tools. Strong More ❯
software-defined data center to hybrid cloud computing and the mobile workspace. We have an exciting opportunity for a Principal Engineer on our Network Detection and Research Team part of the ANS Business Unit. Our team is responsible for the development of the network intrusiondetection capabilities … for VMware vDefend Advanced Threat Prevention (ATP), a cutting-edge networking and security analytics solution for the detection and prevention of advanced threats. The team has been operating since 2014 and has built the award-winning network detection capabilities in the Lastline Defender product, now part of the … NSX family. We are passionate about network detection and threat research, and combine in a single team C/C++ developers responsible for engine development with developers maintaining the data collection infrastructure (on top of GCP/k8s) and the development of new detection capabilities in the product. More ❯
algorithms Assist customers in implementing sound and secure logging practices, deployment of agents and sensors Leverage advanced knowledge of security operations, cyber security tools, intrusiondetection, and secured networks to integrate with the SIEM platform Triage emerging threats to protect assets and information in client environments. Partner with … level of analytical and problem-solving abilities Positive attitude with strong oral and written communication skills Knowledge of IP networking and network security including IntrusionDetection Familiarity with common network vulnerability/penetration testing tools Familiarity with service management software such as ServiceNow Familiarity with data visualization platforms … provider (MSSP) experience is a plus Certifications or work toward any of the following is strongly desired: GIAC Certified Incident Handler (GCIH) GIAC Certified Intrusion Analyst (GCIA) GIAC Certified Forensic Analyst (GCFA) GIAC Certified Forensic Examiner (GCFE) GIAC Network Forensic Analyst (GNFA) Cisco Certified Network Associate (CCNA) Microsoft Certified More ❯
network infrastructure and data. - Manage risk assessments and vulnerability assessments to identify potential security threats. - Oversee the implementation of security measures such as firewalls, intrusiondetection systems, and data encryption technologies. - Provide training and guidance to staff on information security best practices. - Stay updated on the latest cybersecurity … MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional;CCNA/CCNP Experience with security tools and technologies such as intrusiondetection systems, SIEM, and vulnerability management tools. Familiarity with regulatory requirements and industry standards related to IT security. Hays Specialist Recruitment Limited acts More ❯
london (city of london), south east england, united kingdom
Hays
network infrastructure and data. - Manage risk assessments and vulnerability assessments to identify potential security threats. - Oversee the implementation of security measures such as firewalls, intrusiondetection systems, and data encryption technologies. - Provide training and guidance to staff on information security best practices. - Stay updated on the latest cybersecurity … MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional;CCNA/CCNP Experience with security tools and technologies such as intrusiondetection systems, SIEM, and vulnerability management tools. Familiarity with regulatory requirements and industry standards related to IT security. Hays Specialist Recruitment Limited acts More ❯
Dundee, Angus, United Kingdom Hybrid / WFH Options
DC Thomson
and risks Develop and implement threat models to identify potential security threats and design mitigation strategies Oversee the implementation of security solutions, including firewalls, intrusiondetection/prevention systems, security information and event management (SIEM) tools, and data loss prevention (DLP) solutions Adhere to relevant security standards and … or more years Strong understanding of security principles, methodologies, and best practices Hands-on experience with a wide range of security technologies, including firewalls, intrusiondetection/prevention systems, SIEM, and vulnerability scanners Experience with cloud security in AWS and Azure environments Knowledge of security standards and compliance More ❯
and enterprise technologies, advising on secure architecture patterns, cloud automation, and evolving security threats. Own the evaluation of security tools and recommend technologies for intrusiondetection and prevention, security monitoring, web application firewalls (WAF), and data encryption, among others. Lead the evaluation of security tools and recommend technologies … for intrusiondetection and prevention, security monitoring, web application firewalls (WAF), and data encryption, among others. Who we are The UK's fastest broadband network. The nation's best-loved mobile brand. And, one of the UK's biggest companies too. Diverse, high performing teams - jam packed with More ❯
and enterprise technologies, advising on secure architecture patterns, cloud automation, and evolving security threats. Own the evaluation of security tools and recommend technologies for intrusiondetection and prevention, security monitoring, web application firewalls (WAF), and data encryption, among others. Lead the evaluation of security tools and recommend technologies … for intrusiondetection and prevention, security monitoring, web application firewalls (WAF), and data encryption, among others. Who we are The UK's fastest broadband network. The nation's best-loved mobile brand. And, one of the UK's biggest companies too. Diverse, high performing teams - jam packed with More ❯
Stevenage, Hertfordshire, United Kingdom Hybrid / WFH Options
GlaxoSmithKline
to have in-depth understanding of network architecture to design, implement, and manage secure and efficient networks and proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. The OT Network Security Engineer will have ownership … are in place for all critical areas. People Management: Collaborate with internal owners of security technologies such as antivirus, IDS/IPS, SIEM, endpoint detection & response, configuration management, privileged identity management, etc. Why you? Basic Qualifications: We are looking for professionals with these required skills to achieve our goals … Engineering, Information Technology In-depth understanding of network architecture to design, implement, and manage secure and efficient networks. Proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. Strong ability to collaborate with cross-functional teams More ❯
to have in-depth understanding of network architecture to design, implement, and manage secure and efficient segmentation and proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and respond to security incidents. The OT Security Engineer will have ownership and responsibility to lead and drive security … Engineering, Information Technology. In-depth understanding of network architecture to design, implement, and manage secure and efficient networks. Proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. Strong ability to collaborate with cross-functional teams More ❯
to have in-depth understanding of network architecture to design, implement, and manage secure and efficient segmentation and proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and respond to security incidents. The OT Security Engineer will have ownership and responsibility to lead and drive security … Engineering, Information Technology. In-depth understanding of network architecture to design, implement, and manage secure and efficient networks. Proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. Strong ability to collaborate with cross-functional teams More ❯
to have in-depth understanding of network architecture to design, implement, and manage secure and efficient segmentation and proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and respond to security incidents. The OT Security Engineer will have ownership and responsibility to lead and drive security … Engineering, Information Technology In-depth understanding of network architecture to design, implement, and manage secure and efficient networks. Proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. Strong ability to collaborate with cross-functional teams More ❯
to have in-depth understanding of network architecture to design, implement, and manage secure and efficient segmentation and proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and respond to security incidents. The OT Security Engineer will have ownership and responsibility to lead and drive security … Engineering, Information Technology In-depth understanding of network architecture to design, implement, and manage secure and efficient networks. Proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. Strong ability to collaborate with cross-functional teams More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Tunstall Healthcare (UK) Ltd
Senior Network Engineer you will deliver network and security enhancements and 3rd line support of Tunstall's IT network infrastructure and security prevention and detection systems, working with Tunstall's internal IT teams and external service providers. Main responsibilities of the role: Design, implement, and optimize scalable and resilient … Conduct regular audits of network configurations to maintain consistency and compliance. Collaborate with security teams to implement and maintain robust protections, including firewalls, VPNs, intrusiondetection/prevention systems, and access control protocols. Conduct periodic vulnerability assessments, applying patches and updates to mitigate risks while maintaining compliance with … technologies and with system, security, and network monitoring tools. Understanding of the latest security principles, techniques, protocols and experience in security systems, including firewalls, intrusiondetection/prevention systems, anti-virus software, authentication systems, log management, content filtering. Working knowledge of security devices, tools and service providers Experience More ❯
ensure that, in close collaboration with the Head of Cyber Security & IT Project Manager, that all Infrastructure assets have appropriate threat mitigation controls/IntrusionDetection controls, Infrastructure Risks and Project Deliverables. Conduct regular one-to-one meetings to provide coaching, reinforce leadership values, and support personal and … ensure that, in close collaboration with the Head of Cyber Security & IT Project Manager, that all Infrastructure assets have appropriate threat mitigation controls/IntrusionDetection controls, Infrastructure Risks and Project Deliverables. Conduct regular one-to-one meetings to provide coaching, reinforce leadership values, and support personal and More ❯
install, commission, and maintain electronic systems designed to protect people, properties, and assets. Gain in-depth knowledge about our cutting-edge systems, including fire detection, intrusiondetection, CCTV, and access control solutions. Hit the road in your own company van, visiting a variety of sites, from residential More ❯
install, commission, and maintain electronic systems designed to protect people, properties, and assets. Gain in-depth knowledge about our cutting-edge systems, including fire detection, intrusiondetection, CCTV, and access control solutions. Hit the road in your own company van, visiting a variety of sites, from residential More ❯
install, commission, and maintain electronic systems designed to protect people, properties, and assets. Gain in-depth knowledge about our cutting-edge systems, including fire detection, intrusiondetection, CCTV, and access control solutions. Hit the road in your own company van, visiting a variety of sites, from residential More ❯
Engineer to join our team. If you have a passion for cybersecurity, thrive on solving complex security challenges, and are experienced in advanced threat detection and response, we’d love to hear from you! As a Senior Security Engineer, you will be responsible for protecting our systems, networks, and … Monitor systems and networks for suspicious activity and engage in response procedures as necessary. Manage and document all stages of security incident response, including detection, containment, and recovery. Work closely with the Crisis Management Team and be prepared to respond, liaise with customers and take action, as and when … and network security architecture Experience conducting vulnerability assessments, incident response, and forensics using tools such as Nessus Proficiency in threat hunting, malware analysis, and intrusiondetection techniques Familiarity with compliance frameworks (e.g., NIST, ISO, PCI-DSS) and regulatory requirements Strong analytical skills with the ability to think like More ❯
examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity analysts to detect, mitigate, and analyze threats. … meetings and provides expert input to ensure security is maintained. Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusiondetection and prevention, eDiscovery, and content filtering. Ability to manage and continuously improve upon vulnerability management program. Ability to propose solutions for closing More ❯
security, cloud security, and threat intelligence. Security Technologies: Proficient in using different security technologies, such as firewalls, end point protection, web protection, email protection, intrusiondetection and prevention systems, vulnerability scanners, encryption software, VPNs, and SIEMs. Be able to configure, test, deploy, and troubleshoot these tools and technologies More ❯
network security. Understanding of 3GPP mobile network CORE and RAN architectures and security requirements. Strong knowledge of network security protocols, VPN, firewall management, and intrusiondetection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks (e.g., GDPR More ❯