understanding of security frameworks and regulations (e.g., NIST CSF, ISO 27001, GDPR, CIS controls). Familiarity with security technologies such as SIEM, endpoint security, intrusiondetection, and secure coding practices. Excellent problem-solving skills and the ability to translate security concepts into technical solutions. Strong communication skills, with More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Lorien
Demonstrative experience in Cyber Security and leading on security architecture Cloud Security, Firewalls, Network security protocols, VPNs, and encryption DDoS, Access controls, systems logging, intrusiondetection, and prevention Risk Management - analysing and assessing security risks effectively Able to design solutions and troubleshoot complex security issues Explain security concepts More ❯
eg ISO 27001) as part of critical vendor performance assessment ensuring operational resilience is maintained. In collaboration with GT, manage security systems, including firewalls, intrusiondetection/prevention systems, and antivirus software. In collaboration with GT, Develop and test incident response plans and coordinate responses to security incidents More ❯
knowledge of the threat landscape relevant to SaaS products, preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusiondetection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools. You own relevant certifications (Security+, IAT II/III level or similar More ❯
implement comprehensive security strategies, policies, and procedures to protect the organization's information assets. Design, deploy, and manage security solutions, including PAM/IAM, intrusiondetection/prevention systems, endpoint protection, data loss prevention, encryption, and vulnerability management tools. Design and manage security in the cloud, including AWS More ❯
Experience of threat and risk modeling. Strong understanding of network security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusiondetection/prevention systems, security information and event management (SIEM) systems, and vulnerability assessment tools, and their configuration options. Familiarity with cloud security More ❯
Experience of threat and risk modeling. Strong understanding of network security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusiondetection/prevention systems, security information and event management (SIEM) systems, and vulnerability assessment tools, and their configuration options. Familiarity with cloud security More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Experience of threat and risk modeling. Strong understanding of network security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusiondetection/prevention systems, security information and event management (SIEM) systems, and vulnerability assessment tools, and their configuration options. Familiarity with cloud security More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Experience of threat and risk modeling. Strong understanding of network security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusiondetection/prevention systems, security information and event management (SIEM) systems, and vulnerability assessment tools, and their configuration options. Familiarity with cloud security More ❯
City, Edinburgh, United Kingdom Hybrid / WFH Options
Deloitte LLP
Experience of threat and risk modeling. Strong understanding of network security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusiondetection/prevention systems, security information and event management (SIEM) systems, and vulnerability assessment tools, and their configuration options. Familiarity with cloud security More ❯
passion to be part of a fast-paced, successful team. This is a hands-on technical lead role, requiring expertise in security assessments, threat detection and incident response. We are looking for someone with a solid technical background who is willing to take on a broader remit and take … or similar technical role Strong understanding of cloud security (AWS, Azure, Google Cloud), network security, and endpoint protection Hands-on experience with SIEM tools, intrusiondetection, firewalls, and threat analysis Knowledge of identity and access management (IAM), zero-trust architectures, and encryption techniques Experience conducting vulnerability assessments, and More ❯
in Azure and M365 environments. Strong knowledge of security frameworks (e.g., NIST, ISO27000 series). Expertise in network security protocols, Azure security solutions, firewalls, intrusiondetection systems, VPNs, etc. Proficient in vulnerability assessment tools, incident response frameworks, and risk management methodologies. Ability to collaborate effectively with cross-functional More ❯
Splunk or other industry-standard SIEM tools for security monitoring and analysis. Familiarity with security technologies and an understanding of network protocols, firewalls, and intrusiondetection/prevention systems. Knowledge of Threat Intelligence , Digital Forensics , and Data Loss Prevention . Relevant certifications such as CISSP , CEH , or Splunk More ❯
Strategic Resources European Recruitment Consultants Ltd
desirable. Strong expertise in network security concepts, protocols, security standards and best practices is essential. Additionally, experience with security tools and technologies, including firewalls, intrusiondetection/prevention systems, and security information and event management (SIEM) tools is particularly valued. More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
role with one of our trusted client partners as a 'Spartan' consultant. In this role you will undertake: Network Security - Understanding of firewall configuration, intrusiondetection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through More ❯
Service Provider organization. Experience with security frameworks such as NIST CSF, ISO 27001, or CIS Controls. Deep understanding of security technologies , such as firewalls, intrusiondetection and prevention systems, vulnerability scanners, and endpoint protection. Strong knowledge of cloud security concepts and technologies , such as Amazon Web Services (AWS More ❯
analytical (RCA) skills. Good working knowledge of Cisco Meraki and associated technologies. Practical knowledge of Continual Service Improvement (CSI) methodologies. Vulnerability management and assessment. Intrusiondetection and prevention analysis/frameworks. Solid exposure to cloud-based applications security and provisioning. Experience in writing policy, process, and standard playbooks. More ❯
Aberdeen, Aberdeenshire, United Kingdom Hybrid / WFH Options
Cammach Bryant
desirable. Strong expertise in network security concepts, protocols, security standards and best practices is essential. Additionally, experience with security tools and technologies, including firewalls, intrusiondetection/prevention systems, and security information and event management (SIEM) tools is particularly valued. More ❯
Aberdeen, City of Aberdeen, United Kingdom Hybrid / WFH Options
Cammach Bryant
desirable. Strong expertise in network security concepts, protocols, security standards and best practices is essential. Additionally, experience with security tools and technologies, including firewalls, intrusiondetection/prevention systems, and security information and event management (SIEM) tools is particularly valued. More ❯
to identify weaknesses in systems and networks and propose mitigation plans where required. Recommend, design and implement security tools and technologies such as firewalls, intrusiondetection systems, endpoint protection and distributed denial of service (DDoS) mitigation solutions. Build strong relationships with customers, providing ongoing cybersecurity consultation and support. More ❯
to identify weaknesses in systems and networks and propose mitigation plans where required. Recommend, design and implement security tools and technologies such as firewalls, intrusiondetection systems, endpoint protection and distributed denial of service (DDoS) mitigation solutions. Build strong relationships with customers, providing ongoing cybersecurity consultation and support. More ❯
to identify weaknesses in systems and networks and propose mitigation plans where required. Recommend, design and implement security tools and technologies such as firewalls, intrusiondetection systems, endpoint protection and distributed denial of service (DDoS) mitigation solutions. Build strong relationships with customers, providing ongoing cybersecurity consultation and support. More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of log data and intrusiondetection systems. Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP … POP, LDAP. It would be great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Understanding of network security, firewalls, IAM, cloud platforms (AWS, Azure), and endpoint protection. Familiarity with standards including NIST CSF & ISO 27001. Knowledge of SIEM, intrusiondetection, endpoint security, and secure coding. This role is onsite 2 days per week No sponsorship is available This role is looking to More ❯