and secure network design; web application security, security assessments and penetration testing, authentication and access control, applied cryptography and security protocols, security monitoring and intrusiondetection, Incident response and forensics, development of security tools, automation or frameworks. Excellent communication, written, presentation and problem-solving skills. About the job More ❯
Cardiff, Wales, United Kingdom Hybrid / WFH Options
SRT Marine
ensure high availability and efficiency Troubleshoot connectivity and hardware/software issues across diverse environments Apply and uphold network security best practices, including firewalls, intrusiondetection, and access controls Maintain documentation of network configurations, procedures, and standards Collaborate closely with other engineering and support teams, vendors, and stakeholders More ❯
fault-tolerant storage. Monitor and manage user identities and access permissions within cloud platforms using Cloud technologies such as Cloud IAM System and Cloud IntrusionDetection System. Set up and enforce networking policies: firewalls, NAT, VPN tunnels, and routing. Familiarity with virtualisation platform e.g. PVE, VMware Carry out More ❯
vulnerabilities. Generate regular reports on system performance, security posture, and compliance status. Cybersecurity & Compliance: Cyber Protection Techniques: Implement advanced cyber protection measures, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability More ❯
experience managing complex, geographically diverse physical security projects in the data center or high-tech sectors Deep knowledge of physical access control, video surveillance, intrusiondetection, and alarm management systems, their peripheral components, and expertise in synthesizing all into effective protection deployments Formal project management qualification such as More ❯
and security systems. Proactively monitor network performance and identify and resolve any connectivity issues. Manage and maintain network security, including firewalls, antivirus software, and intrusiondetection systems. Ensure that all IT systems and data are backed up regularly and securely. Oversee the implementation and maintenance of new IT More ❯
GDPR, Data Protection Act (DPA), and other regional or industry-specific standards. Understanding of cybersecurity principles, such as encryption, firewalls, secure coding practices, and intrusiondetection systems. Ability to conduct Data Protection Impact Assessments (DPIAs) and evaluate risks in data processing activities. Knowledge of database management systems, data More ❯
for DV Clearance. Proven expertise in Red Hat Enterprise Linux (RHEL) administration and design. Strong understanding of security controls, including host firewalls, SELinux, and intrusion detection. Knowledge of networking fundamentals, especially from a security perspective. Experience working in highly governed environments with tight SLAs. Skilled in patch management and More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
for DV Clearance. Proven expertise in Red Hat Enterprise Linux (RHEL) administration and design. Strong understanding of security controls, including host firewalls, SELinux, and intrusion detection. Knowledge of networking fundamentals, especially from a security perspective. Experience working in highly governed environments with tight SLAs. Skilled in patch management and More ❯
working in heavily regulated industries. Strong understanding of security principles. Hands-on experience with a variety of security tools, including: Secure Web Gateway, Endpoint detection and response (EDR), Data leak Prevention (DLP), Email Security (Gateway and DMARC). Proficiency in scripting and automation languages (e.g., PowerShell, Terraform). Secondary … Requirements Knowledge of Security Frameworks (NIST, MITRE, etc.) and Security information and event management (SIEM). Intrusiondetection and prevention systems (IDPS). Relevant security certifications (e.g., SSCP, Tooling Related). Who Are You? Independently solve problems: You can take on complex tasks and projects with minimal guidance More ❯
respond to internal and external threats. You will also be working with our software and production engineering teams to develop scalable systems to automate detection and remediation and help us build the next generation of security operations and response platforms. Security Engineer, Incident Response Responsibilities Lead security incident response … Security. Preferred Qualifications Experience as a Lead Security Incident Responder and Investigator in a large and regulated organization. Background in malware analysis, digital forensics, intrusiondetection, and/or threat intelligence. Experience in threat hunting including the ability to leverage intelligence data to proactively identify and iteratively investigates … across the Security domain, as well as deep focus in one (or more) areas such as Logs and events processing, Incident Management, Digital Forensics, Detection and/or response tool development. Locations Data Center About Meta Meta builds technologies that help people connect, find communities, and grow businesses. When More ❯
Qualifications & Experience 5+ years experience in security project management or security consulting, specifically in the deployment of integrated physical security systems (CCTV, Access Control, IntrusionDetection). 5+ years of experience in the design and/or installation of electronic security systems, with hands-on experience in systems … comprehensive solutions. Familiarity with IT infrastructure and security principles is a plus. Expertise in security systems, including Analog/IP CCTV, Access Control, and Intrusion Systems. Knowledge of industry-leading systems such as Lenel, Milestone, and Galaxy is highly desirable, but a willingness to learn is essential. Proficiency in More ❯
understanding of networking protocols (TCP/IP, DNS, DHCP, VPN, etc.) ️ Experience with Cisco, Juniper, or similar network hardware and tools ️ Knowledge of firewalls, intrusiondetection/prevention systems, and endpoint security ️ Relevant certifications such as CCNA, CompTIA Network+, or equivalent are a plus #J-18808-Ljbffr More ❯
strong understanding of network security fundamentals, encryption technologies, and secure network design principles. Experience troubleshooting firewalls such as Cisco and Palo Alto. Knowledge of intrusiondetection/prevention systems and security incident response. Palo Alto Certification Commercial experience with Zscaler and Palo Alto is essential. If you believe More ❯
strong understanding of network security fundamentals, encryption technologies, and secure network design principles. Experience troubleshooting firewalls such as Cisco and Palo Alto. Knowledge of intrusiondetection/prevention systems and security incident response. Palo Alto Certification Commercial experience with Zscaler and Palo Alto is essential. If you believe More ❯
Crewe, England, United Kingdom Hybrid / WFH Options
Adecco
cybersecurity initiatives. Your key responsibilities will include: Collaborating with control owners to develop and integrate security features, guiding the application of industry expertise in IntrusionDetection Systems (IDS), Secure Onboard Communication (SOC), and Vehicle Key Management Systems (VKMS). Conducting comprehensive risk analyses and vulnerability assessments for automotive More ❯
experience) in low voltage systems including: Experience in the following systems: Structured cabling, both inside and outside plant Electronic Physical Access Control Video Surveillance IntrusionDetection Overhead Paging Audio/Visual Experience in the following systems a plus: Nurse Call Real Time Locating Systems Infant (and memory care More ❯
you will be responsible for the full delivery cycle - from infrastructure cabling through to the installation, configuration, and commissioning of access control, CCTV, and intrusiondetection systems. You'll work across data centres, campuses, and critical infrastructure sites, helping ensure that projects are delivered on time, to specification More ❯
Warwick, Warwickshire, United Kingdom Hybrid / WFH Options
WeAreTechWomen
troubleshooting, supporting, and optimizing network security capabilities. Strong understanding of networking protocols and infrastructure designs, including cloud infrastructures, routing, firewall functionality, host and network intrusiondetection systems, encryption, load balancing, and other network devices. The following certifications would be a plus: - Cisco CCIE Security, Checkpoint CCSE/CCSM More ❯
Royal Leamington Spa, England, United Kingdom Hybrid / WFH Options
WeAreTechWomen
troubleshooting, supporting, and optimizing network security capabilities. Strong understanding of networking protocols and infrastructure designs, including cloud infrastructures, routing, firewall functionality, host and network intrusiondetection systems, encryption, load balancing, and other network devices. The following certifications would be a plus: - Cisco CCIE Security, Checkpoint CCSE/CCSM More ❯
PREFERRED QUALIFICATIONS Experience with data bases (querying and analyzing) such as SQL, MYSQL, Access, Exception Based Reporting, etc. * Experience with security equipment such as intrusiondetection devices, access control systems, and video review system * Experience with varies business types such as, logistics, warehouse, distribution center, multi-site loss More ❯
PREFERRED QUALIFICATIONS Experience with data bases (querying and analyzing) such as SQL, MYSQL, Access, Exception Based Reporting, etc. * Experience with security equipment such as intrusiondetection devices, access control systems, and video review system * Experience with varies business types such as, logistics, warehouse, distribution center, multi-site loss More ❯
PREFERRED QUALIFICATIONS Experience with data bases (querying and analyzing) such as SQL, MYSQL, Access, Exception Based Reporting, etc. * Experience with security equipment such as intrusiondetection devices, access control systems, and video review system * Experience with varies business types such as, logistics, warehouse, distribution center, multi-site loss More ❯
and keep abreast of new developments in the blockchain ecosystem. Reason about and improve the security properties of infrastructure. Secure key management, server hardening, intrusiondetection, and security best practices are important themes. Contribute to external partnerships that directly impact Jump’s bottom line. Engagement in public forums More ❯
to effectively convey security policies and procedures to staff and stakeholders. Technical Knowledge : Proficiency in security technologies and systems, including surveillance, access control, and intrusion detection. Crisis Management : Skills in crisis management and emergency response planning. Compliance Knowledge : Understanding of relevant security regulations and standards. Problem-Solving : Strong problem More ❯