London, England, United Kingdom Hybrid / WFH Options
Smart Communications group
Advocating for infrastructure/application Security Design. Reviewing new technologies and methodologies and introducing integration opportunities (where feasible). Support Management in enhancing security detection and incident response efforts/playbooks. Monitoring, remediating, and reporting on security events. Network management fundamentals are required to be able to enhance security …/master’s degree in computer science, Information Security, or a related field. Good understanding of security principles, technologies, and best practices, including threat detection and mitigation strategies. Good level of knowledge on cloud security architecture, specifically with Azure (preferable) and AWS. Demonstrated proven ability to ensure data confidentiality … and creation of external penetration testing scopes. Knowledge of security frameworks & controls, hardening standards & security best practices. An understanding of network protocols & practices, firewalls, intrusiondetection/prevention systems, and WAFs. Our values S peak Openly - We are positive, creative, helpful, kind and we have fun. We listen More ❯
The team aims to minimize and control damage from cybersecurity incidents, ensuring incident management and response controls are effective to enable the identification, protection, detection, response, and recovery of RLG information assets. The role contributes to our purpose by: Helping build financial resilience Moving fairly to a sustainable world … generate reports and analytics to improve future incident response Collect supporting information and artifacts for incident response activities Identify and execute projects to enhance intrusiondetection and incident response capabilities Conduct technical analysis on impacted systems to determine impact, scope, and recovery from active and potential cyber incidents More ❯
resulting from cybersecurity incidents, ensuring that appropriate incident management and response controls are in place and operating as required to enable the identification, protection, detection, response, and recovery of RLG information assets. It outlines how the role contributes to our purpose: Helping build financial resilience Moving fairly to a … analytics to improve future incident response Collect supporting information and relevant artifacts in support of incident response activities Identify and execute projects to improve intrusiondetection and incident response capabilities Conduct technical analysis on impacted systems to determine impact, scope, and recovery from cyber incidents Leverage cybersecurity tools More ❯
/objectives. This role focuses on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. The position will support the Director of IT Security in reviewing and evaluating new, cost-effective information … Industry certifications preferred: CISSP, CompTIA+, CEH, SSCP, Security+, etc. Solid understanding of IT and security practices, including host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modeling, physical security, systems integrity, and continuity planning. Experience with security policies, standards development, implementation, and review. Experience More ❯
develop and maintain the information security architecture and will have proven experience with compliance, vulnerability management, network security, cloud security (AWS & Azure), firewalls and intrusiondetection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threat analysis and act More ❯
field (or equivalent work experience). 2+ years of experience in a cybersecurity or IT security role. Technical Skills: Knowledge of networking protocols, firewalls, intrusiondetection/prevention systems, and endpoint protection. Experience with SIEM tools such as Splunk, QRadar, or Sentinel. Familiarity with security frameworks and standards More ❯
of experience in a security operations, cybersecurity, or IT role. Experience with SIEM platforms (e.g., Splunk, QRadar, ArcSight). Familiarity with log analysis and intrusiondetection systems. Certifications (Preferred but not required): CompTIA Security+ Certified SOC Analyst (CSA) GIAC Security Essentials (GSEC) Certified Ethical Hacker (CEH) Skills: Strong More ❯
hunting queries Experience Needed: Managing serious cyber incidents as a digital forensic responder Working within large, complex enterprise environments Understanding of security monitoring and intrusiondetection systems Technical expertise in networks, malware analysis, and digital forensics Effective communication with senior stakeholders Company Overview: Element is a global testing More ❯
Service Provider organization. Experience with security frameworks such as NIST CSF, ISO 27001, or CIS Controls. Deep understanding of security technologies , such as firewalls, intrusiondetection and prevention systems, vulnerability scanners, and endpoint protection. Strong knowledge of cloud security concepts and technologies , such as Amazon Web Services (AWS More ❯
writing advanced queries. Experience Needed: Managing serious cyber incidents as a digital forensic responder. Working in large, complex enterprise environments. Knowledge of security monitoring, intrusiondetection, firewalls, antivirus, web proxies. Technical expertise in networks, malware, and forensics. Effective communication with senior stakeholders. Company Overview: Element is a global More ❯
hunting queries Experience Needed: Managing serious cyber incidents as a digital forensic incident responder Working within large, complex enterprise environments Understanding of security monitoring, intrusiondetection, firewalls, antivirus, web proxies Technical expertise in networks, malware analysis, digital forensics Effective communication with senior stakeholders Company Overview: Element is a More ❯
ensuring that the network environment remains secure and compliant with industry standards. Key Responsibilities: Design and implement secure network architectures, including firewalls, VPNs, and intrusiondetection systems. Monitor network traffic and respond to security incidents and breaches in a timely manner. Conduct regular vulnerability assessments and penetration tests More ❯
Experience Needed: Extensive experience managing serious cyber incidents as a digital forensic responder. Proven success in large, complex enterprise environments. Understanding of security monitoring, intrusiondetection, firewalls, antivirus, web proxies. Technical expertise in networks, malware analysis, digital forensics. Effective communication with senior stakeholders. Company Overview: Element is a More ❯
advanced hunting queries. Experience Needed: Managing serious cyber incidents as a digital forensic responder. Operating within large, complex enterprise environments. Understanding of security monitoring, intrusiondetection/prevention, and control systems. Technical expertise in networks, malware analysis, and digital forensics. Effective communication with senior stakeholders. Company Overview: Element More ❯
hunting queries. Experience Needed: Managing serious cyber incidents as a digital forensic incident responder. Operating within large, complex enterprise environments. Understanding of security monitoring, intrusiondetection, firewalls, anti-virus, web proxies. Technical expertise in networks, malware analysis, digital forensics. Effective communication with senior stakeholders. Company Overview: Element is More ❯
hunting queries. Experience Needed: Managing serious Cyber Incidents as a Digital Forensic Incident Responder. Working successfully in large, complex enterprise environments. Understanding security monitoring, intrusiondetection, firewalls, anti-virus, and web proxies. Technical expertise in networks, malware analysis, digital forensics. Effective communication with senior stakeholders. Company Overview: Element More ❯
and trends and escalate risks promptly. Ensure compliance with relevant industry regulations and standards (e.g., GDPR, ISO 27001). Manage security systems, including firewalls, intrusiondetection/prevention systems, and antivirus software, in collaboration with GT. Develop and test incident response plans and coordinate responses to security incidents More ❯
advanced hunting queries. Experience Needed: Managing serious cyber incidents as a digital forensic incident responder. Operating within large, complex enterprise environments. Understanding security monitoring, intrusiondetection, firewalls, anti-virus, and web proxies. Technical expertise in networks, malware analysis, digital forensics. Strong communication skills with senior stakeholders. Company Overview More ❯
of Microsoft platforms with a focus on Intune, Microsoft Exchange Online, Office 365 support technologies, and Azure Active Directory. Strong experience configuring anti-malware, intrusiondetection, firewalls and vulnerability scanning systems and network security. Extensive experience and working knowledge with Microsoft Azure Infrastructure as a Service platform and More ❯
procedures to ensure the protection of network infrastructure and communication systems. Oversee the design and implementation and maintenance of network security solutions, including firewalls, intrusiondetection/prevention systems and secure communication channels. Monitor network reports for security incidents and respond promptly to mitigate risks and breaches. Work More ❯
experience managing serious Cyber Incidents as a Digital Forensic Incident Responder. Proven success operating within large, complex, federated enterprise environments. Understanding of security monitoring, intrusiondetection, prevention, and control systems, including firewalls, anti-virus, and web proxies. Technical expertise in networks, malware analysis, digital forensics, etc. Attention to More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Sodexo
improve security posture. Performance Metrics : Establishing and monitoring KPIs to measure security program effectiveness. Technical Expertise : Deep understanding of cybersecurity technologies such as firewalls, intrusiondetection, encryption, and network security protocols. Regulatory Compliance : Knowledge of laws, regulations, and standards like GDPR, Cyber Essentials, ISO/IEC 27001, and More ❯
London, England, United Kingdom Hybrid / WFH Options
Sodexo
improve security posture. Performance Metrics : Establishing and monitoring KPIs to measure security program effectiveness. Technical Expertise : Deep understanding of cybersecurity technologies such as firewalls, intrusiondetection, encryption, and network security protocols. Regulatory Compliance : Knowledge of laws, regulations, and standards like GDPR, Cyber Essentials, ISO/IEC 27001, and More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
Murnen Design
and motivate others. Deep understanding of cyber security threats, vulnerabilities, and mitigation techniques. Experience with a wide range of security technologies and practices, including: Intrusiondetection and prevention systems (IDPS) Security information and event management (SIEM) system Vulnerability scanning and penetration testing Cloud security Identity and access management More ❯
/Security Ensure IT systems and networks are secure from threats and vulnerabilities Implement and manage security measures, such as firewalls, antivirus software, and intrusiondetection systems Conduct regular security audits and vulnerability assessments Work within the parameters of ISO 27001, taking guidance from the compliance team as More ❯