experience as a Security Engineer or in a similar role, with deep understanding of the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusiondetection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). More ❯
experience of commissioning large facilities and managing commissioning teams to deliver successful outcomes within Electronic Security systems. In depth knowledge of enterprise security systems including card access control, intruder detection systems, CCTV systems and perimeter intrusiondetection systems. Experience in delivering and understanding design aspects of electronic security systems. Proven track record in complex project delivery, in More ❯
tools such as Splunk, Flexera, and other industry-standard SIEM platforms. You'll investigate security incidents, coordinate with other IT and security teams, and support continuous improvement of threat detection and response processes. Key Requirements: Previous experience in a SOC Analyst or similar cybersecurity role Strong expertise in Splunk or similar SIEM tools Familiarity with Flexera for vulnerability management … Understanding of firewalls, network protocols, intrusiondetection/prevention systems Relevant certifications (e.g., CISSP, CEH, Splunk) advantageous Must be eligible for Developed Vetting (DV) clearance , requiring 10 years continuous UK residency Please Note: All offers will be subject to standard pre-employment checks including ID, employment history (last 3 years), immigration status, and an unspent criminal record check. More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Sopra Steria
Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of log data and intrusiondetection systems. Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be … great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and experience are exactly what we’re looking for, please do apply, we’d love to More ❯
activity. Support incident response efforts including containment, investigation, and remediation. Ensure security processes align with Cyber Essentials and other best practice frameworks. Optimise SIEM tooling for enhanced visibility and detection capability. Produce clear reporting and recommendations for senior stakeholders. Collaborate with IT and security colleagues to strengthen organisational defences. Skills & Experience Required Previous experience as a SOC Analyst or … security operations role. Strong hands-on knowledge of SIEM platforms (e.g., Splunk, Sentinel, QRadar, or similar). Understanding of Cyber Essentials and broader security standards. Knowledge of incident response, intrusiondetection, and threat analysis. Familiarity with endpoint security, IDS/IPS, firewalls, and vulnerability management. Strong problem-solving skills and a proactive, analytical mindset. Comfortable working onsite More ❯
bolton, greater manchester, north west england, united kingdom
Explore Group
activity. Support incident response efforts including containment, investigation, and remediation. Ensure security processes align with Cyber Essentials and other best practice frameworks. Optimise SIEM tooling for enhanced visibility and detection capability. Produce clear reporting and recommendations for senior stakeholders. Collaborate with IT and security colleagues to strengthen organisational defences. Skills & Experience Required Previous experience as a SOC Analyst or … security operations role. Strong hands-on knowledge of SIEM platforms (e.g., Splunk, Sentinel, QRadar, or similar). Understanding of Cyber Essentials and broader security standards. Knowledge of incident response, intrusiondetection, and threat analysis. Familiarity with endpoint security, IDS/IPS, firewalls, and vulnerability management. Strong problem-solving skills and a proactive, analytical mindset. Comfortable working onsite More ❯
warrington, cheshire, north west england, united kingdom
Explore Group
activity. Support incident response efforts including containment, investigation, and remediation. Ensure security processes align with Cyber Essentials and other best practice frameworks. Optimise SIEM tooling for enhanced visibility and detection capability. Produce clear reporting and recommendations for senior stakeholders. Collaborate with IT and security colleagues to strengthen organisational defences. Skills & Experience Required Previous experience as a SOC Analyst or … security operations role. Strong hands-on knowledge of SIEM platforms (e.g., Splunk, Sentinel, QRadar, or similar). Understanding of Cyber Essentials and broader security standards. Knowledge of incident response, intrusiondetection, and threat analysis. Familiarity with endpoint security, IDS/IPS, firewalls, and vulnerability management. Strong problem-solving skills and a proactive, analytical mindset. Comfortable working onsite More ❯
Designing, building, and maintaining secure systems that keep the bad guys out. Running regular security audits, spotting weak spots, and fixing them before anyone else notices. Working with firewalls, intrusiondetection systems, and endpoint protection tools, making sure everything is watertight. Collaborating with developers, IT teams, and business users to keep security practical (not just theoretical). Staying More ❯
Essex, South East, United Kingdom Hybrid / WFH Options
LJ Recruitment Limited
Designing, building, and maintaining secure systems that keep the bad guys out. Running regular security audits, spotting weak spots, and fixing them before anyone else notices. Working with firewalls, intrusiondetection systems, and endpoint protection tools, making sure everything is watertight. Collaborating with developers, IT teams, and business users to keep security practical (not just theoretical). Staying More ❯
a complex large environment. · Strong knowledge of TCP/IP networking including routing, switching, firewall configuration and network security. · Hands-on experience with security best practices and tools (firewalls, intrusiondetection/prevention systems, etc.). · Strong communication and problem-solving skills. · The ability to prioritise work effectively while working under pressure. · Ability to work independently and as More ❯
and independent mindset. Effective communication and teamwork skills. Desirable: C programming skills for low-level or performance-critical development. Experience with containerisation (Docker, Kubernetes). Familiarity with endpoint security, intrusiondetection, or system hardening. Contributions to Linux or open-source projects. Experience with debugging, profiling, or performance optimisation tools. Why Join Us Shape the future of secure endpoint More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Career poster
and independent mindset. Effective communication and teamwork skills. Desirable: C programming skills for low-level or performance-critical development. Experience with containerisation (Docker, Kubernetes). Familiarity with endpoint security, intrusiondetection, or system hardening. Contributions to Linux or open-source projects. Experience with debugging, profiling, or performance optimisation tools. Why Join Us Shape the future of secure endpoint More ❯
maintaining robust security solutions. Key Responsibilities Security Assessments & Vulnerability Management: Identifying weaknesses in systems and networks through vulnerability assessments and penetration testing. Implementing Security Solutions: Putting in place firewalls, intrusiondetection systems (IDS), and other tools to actively block and monitor for threats. Patch Management: Ensuring all systems are up-to-date with the latest security patches to More ❯
TCP/IP networking Knowledge of virtual desktop infrastructure RDS, Citrix, VMware Horizon, Parallels, etc Aruba/HP/Brocade Switch configuration and management Remote access and VPN technologies Intrusiondetection & prevention solutions Knowledge of Database technology such as MariaDB/Postgres Experience of working with Cisco, Sophos, Fortinet, Palo Alto firewalls Hands on experience with log aggregation More ❯
technologies in a senior or lead role Deep understanding of network design configuration and troubleshooting Proficiency in managing LAN WAN and VPN environments Experience with network security including firewalls, intrusiondetection and prevention, and mobile device management Excellent stakeholder communication and project delivery skills Relevant certifications such as CCNA CCNP CWNA or ITIL are desirable Desirable technical knowledge More ❯
research and development, and innovation within one or more of the Cybersecurity sciences (e.g. network, endpoint and cloud security, cryptography, malware analysis, vulnerability assessment, privileged access management, anomaly/intrusiondetection, incident response, or offensive security). The Principal Cybersecurity Analytics Engineer role is a key leadership, hands on technical role, contributing to, coordinating, and leading delivery of More ❯
Poole, Dorset, United Kingdom Hybrid / WFH Options
VITAPROTECH Group
of the VITAPROTECH Group. Supported by Seven2 and BPI, Vitaprotech is an international group of leading companies specialized in the development and manufacturing of solutions in the sectors of intrusiondetection, access control, video and intelligent monitoring software. As a leader in the high-end security market, Vitaprotech offers a comprehensive, consolidated approach to securing physical access to More ❯
Cisco Nexus switches, Cisco ASA firewalls, F5 LTM and DNS load balancers. Strong network design and management skills and experience, including setting up firewall rules, dynamic routing, load balancing, intrusiondetection and prevention, setting up remote access and site-to-site VPNs. Strong practical experience of following ITIL processes in a 24x7 operations environment with tight SLA and More ❯
networks Fibre optic cable systems CCTV systems Access control systems Public Address General Alarm (PAGA) systems PABX and hotline systems Wireless, microwave, and TMR radio systems Perimeter/fence intrusiondetection systems Key Responsibilities: Ensure safety, reliability, and quality standards are met across all telecom systems. Produce block diagrams, schematic diagrams, cable schedules, datasheets, interconnection/wiring diagrams More ❯
Metasys Closed-circuit television (CCTV) Electronic Security Systems (ESS) Supervisory control and data acquisition (SCADA) Programmable logic controller (PLC) Lighting Control Systems. Heating, Ventilation, Air Conditioning (HVAC) Control System IntrusionDetection Systems (IDS) Environmental Monitoring Systems Fire & Life Safety (FLS) Control Systems Utility Control System (UCS) Industrial Control System Required Education: Candidates must possess a Bachelor's degree More ❯
escalation point for noteworthy investigations, deeper investigations, and those that require critical attention. Continue to build out new capabilities within the program aligned with our attack surface. Opportunities include detection enhancements, improved or new standard operating procedures, and working with internal teams to tune and operationalize new technologies. Focus on continuing to develop dashboards, direct alerting, risk-based alerting … threat intelligence, breach attack simulation, or similar programs. Strong understanding of the fundamentals such as packet, file, and log analysis. Knowledgeable with various security infrastructure tools such as firewalls, intrusion prevention/detection systems, proxy servers, email controls, anonymizing technology, data loss prevention, Endpoint Detection and Response (EDR), and SIEM (Splunk) Strong understanding of common communication protocols More ❯