maintain Ceph clusters for distributed, fault-tolerant storage. Monitor and manage user identities and access permissions within cloud platforms using Cloud technologies such as Cloud IAM System and Cloud IntrusionDetection System. Set up and enforce networking policies: firewalls, NAT, VPN tunnels, and routing. Familiarity with virtualisation platform e.g. PVE, VMware Carry out Software and OS upgrades. Implement More ❯
assets, network traffic, and system vulnerabilities. Generate regular reports on system performance, security posture, and compliance status. Cybersecurity & Compliance: Cyber Protection Techniques: Implement advanced cyber protection measures, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans More ❯
Need 5-10 years of experience managing complex, geographically diverse physical security projects in the data center or high-tech sectors Deep knowledge of physical access control, video surveillance, intrusiondetection, and alarm management systems, their peripheral components, and expertise in synthesizing all into effective protection deployments Formal project management qualification such as CSPM, PMP, or Prince2 Security More ❯
wired and wireless), servers, storage, and security systems. Proactively monitor network performance and identify and resolve any connectivity issues. Manage and maintain network security, including firewalls, antivirus software, and intrusiondetection systems. Ensure that all IT systems and data are backed up regularly and securely. Oversee the implementation and maintenance of new IT infrastructure, including network upgrades and More ❯
depth knowledge of regulations like GDPR, Data Protection Act (DPA), and other regional or industry-specific standards. Understanding of cybersecurity principles, such as encryption, firewalls, secure coding practices, and intrusiondetection systems. Ability to conduct Data Protection Impact Assessments (DPIAs) and evaluate risks in data processing activities. Knowledge of database management systems, data flows, and data processing operations. More ❯
Active SC Clearance and eligible for DV Clearance. Proven expertise in Red Hat Enterprise Linux (RHEL) administration and design. Strong understanding of security controls, including host firewalls, SELinux, and intrusion detection. Knowledge of networking fundamentals, especially from a security perspective. Experience working in highly governed environments with tight SLAs. Skilled in patch management and system update procedures. It would More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
Active SC Clearance and eligible for DV Clearance. Proven expertise in Red Hat Enterprise Linux (RHEL) administration and design. Strong understanding of security controls, including host firewalls, SELinux, and intrusion detection. Knowledge of networking fundamentals, especially from a security perspective. Experience working in highly governed environments with tight SLAs. Skilled in patch management and system update procedures. It would More ❯
Meta’s Network Threat Detection team is seeking an experienced engineer to help secure the infrastructure that connects over a billion users. You will be responsible for building, implementing and operationally supporting network detection efforts throughout our entire infrastructure. We are looking for a candidate with a passion for security and innovation, who will research and develop new … security issues and eradicating them as well as a desire to make life hard for the bad guys. With focuses that range from signal development, data pipelines, data enrichment, detection engineering & security tool development. We defend against internal and external attacks and our scope delivers great opportunities to push your skills further while having a significant impact. Network Threat … Detection Engineer Responsibilities Iterate network security posture to better protect against attacks and detect new vectors. Develop automation and utilize frameworks to scale both protection and mitigation tools. Mentor and evangelize security practices through cross functional work with engineering teams throughout Meta. Keep Meta safe through active operation and defense of critical network infrastructure. Apply security expertise to guide More ❯
customers to identify and facilitate solutions to increase the impact of the team's work. Partner with cross-functional teams to solve challenges related to a broad spectrum of detection and response initiatives. Collaborate with software and production engineering teams to develop scalable and flexible Incident Response and Investigative solutions. Focus on ruthlessly prioritizing, automating and scaling every aspect … of our detection and response capabilities. Coach, mentor, support and care for the team in a way that enables long-term career development, happiness and success at scale. Minimum Qualifications 10+ years of work experience in Security Incident Response and Detection & Response Engineering in a large, regulated organization. Be a technical and process subject matter expert regarding Security … MacOS and Linux. Coding/scripting experience in one or more general purpose languages. Experience with attacker tactics, techniques, and procedures. Preferred Qualifications Background in malware analysis, digital forensics, intrusiondetection, and/or threat intelligence. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigate suspicious behavior across networks and systems. Broad knowledge More ❯
in a similar role ️ Solid understanding of networking protocols (TCP/IP, DNS, DHCP, VPN, etc.) ️ Experience with Cisco, Juniper, or similar network hardware and tools ️ Knowledge of firewalls, intrusiondetection/prevention systems, and endpoint security ️ Relevant certifications such as CCNA, CompTIA Network+, or equivalent are a plus #J-18808-Ljbffr More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Tunstall Healthcare Group
in this role? As a Senior Network Engineer you will deliver network and security enhancements and 3rd line support of Tunstall’s IT network infrastructure and security prevention and detection systems, working with Tunstall’s internal IT teams and external service providers. Main responsibilities of the role: Design, implement, and optimize scalable and resilient network architectures, including LAN, WAN … expertise in mitigating recurring problems. Conduct regular audits of network configurations to maintain consistency and compliance. Collaborate with security teams to implement and maintain robust protections, including firewalls, VPNs, intrusiondetection/prevention systems, and access control protocols. Conduct periodic vulnerability assessments, applying patches and updates to mitigate risks while maintaining compliance with regulatory standards. Proactively identify potential … with network protocols and networking technologies and with system, security, and network monitoring tools. Understanding of the latest security principles, techniques, protocols and experience in security systems, including firewalls, intrusiondetection/prevention systems, anti-virus software, authentication systems, log management, content filtering. Working knowledge of security devices, tools and service providers Experience in 3rd line, 24/ More ❯
sources to detect, investigate and respond to internal and external threats. You will also be working with our software and production engineering teams to develop scalable systems to automate detection and remediation and help us build the next generation of security operations and response platforms. Security Engineer, Incident Response Responsibilities Lead security incident response in a cross-functional environment … degree or equivalent experience in Security. Preferred Qualifications Experience as a Lead Security Incident Responder and Investigator in a large and regulated organization. Background in malware analysis, digital forensics, intrusiondetection, and/or threat intelligence. Experience in threat hunting including the ability to leverage intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and … systems. Broad knowledge across the Security domain, as well as deep focus in one (or more) areas such as Logs and events processing, Incident Management, Digital Forensics, Detection and/or response tool development. Locations Data Center About Meta Meta builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the More ❯
in network security, including a strong understanding of network security fundamentals, encryption technologies, and secure network design principles. Experience troubleshooting firewalls such as Cisco and Palo Alto. Knowledge of intrusiondetection/prevention systems and security incident response. Palo Alto Certification Commercial experience with Zscaler and Palo Alto is essential. If you believe this could be your next More ❯
in network security, including a strong understanding of network security fundamentals, encryption technologies, and secure network design principles. Experience troubleshooting firewalls such as Cisco and Palo Alto. Knowledge of intrusiondetection/prevention systems and security incident response. Palo Alto Certification Commercial experience with Zscaler and Palo Alto is essential. If you believe this could be your next More ❯
success of cross-functional teams. Qualifications & Experience 5+ years experience in security project management or security consulting, specifically in the deployment of integrated physical security systems (CCTV, Access Control, IntrusionDetection). 5+ years of experience in the design and/or installation of electronic security systems, with hands-on experience in systems integration. Engineering or technical background … analyse security vulnerabilities and recommend comprehensive solutions. Familiarity with IT infrastructure and security principles is a plus. Expertise in security systems, including Analog/IP CCTV, Access Control, and Intrusion Systems. Knowledge of industry-leading systems such as Lenel, Milestone, and Galaxy is highly desirable, but a willingness to learn is essential. Proficiency in IT systems and Microsoft Office More ❯
Crewe, England, United Kingdom Hybrid / WFH Options
Adecco
force behind the organisation’s cybersecurity initiatives. Your key responsibilities will include: Collaborating with control owners to develop and integrate security features, guiding the application of industry expertise in IntrusionDetection Systems (IDS), Secure Onboard Communication (SOC), and Vehicle Key Management Systems (VKMS). Conducting comprehensive risk analyses and vulnerability assessments for automotive components while continuously enhancing defence More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
University of Manchester
cryptography, and cyber-physical system security in various domains, including energy, transportation, finance, etc. The successful candidate should have the following research profile: Excellent knowledge of network security (e.g., intrusion and anomaly detection and prevention, denial-of-service attacks and countermeasures, wireless security, software-defined networks) and/or applied cryptography (e.g., algorithms and protocols, key management, real More ❯
required. Accomplished (3+ years of experience) in low voltage systems including: Experience in the following systems: Structured cabling, both inside and outside plant Electronic Physical Access Control Video Surveillance IntrusionDetection Overhead Paging Audio/Visual Experience in the following systems a plus: Nurse Call Real Time Locating Systems Infant (and memory care) Protection Emergency Responder Radio Communication More ❯
In this hands-on role, you will be responsible for the full delivery cycle - from infrastructure cabling through to the installation, configuration, and commissioning of access control, CCTV, and intrusiondetection systems. You'll work across data centres, campuses, and critical infrastructure sites, helping ensure that projects are delivered on time, to specification, and to the highest quality More ❯
Warwick, Warwickshire, United Kingdom Hybrid / WFH Options
WeAreTechWomen
enterprise environment. Strong experience maintaining, troubleshooting, supporting, and optimizing network security capabilities. Strong understanding of networking protocols and infrastructure designs, including cloud infrastructures, routing, firewall functionality, host and network intrusiondetection systems, encryption, load balancing, and other network devices. The following certifications would be a plus: - Cisco CCIE Security, Checkpoint CCSE/CCSM, Palo Alto PCNSE, F5 More ❯
Royal Leamington Spa, England, United Kingdom Hybrid / WFH Options
WeAreTechWomen
enterprise environment. Strong experience maintaining, troubleshooting, supporting, and optimizing network security capabilities. Strong understanding of networking protocols and infrastructure designs, including cloud infrastructures, routing, firewall functionality, host and network intrusiondetection systems, encryption, load balancing, and other network devices. The following certifications would be a plus: - Cisco CCIE Security, Checkpoint CCSE/CCSM, Palo Alto PCNSE, F5 More ❯
including intermediate knowledge of Excel PREFERRED QUALIFICATIONS Experience with data bases (querying and analyzing) such as SQL, MYSQL, Access, Exception Based Reporting, etc. * Experience with security equipment such as intrusiondetection devices, access control systems, and video review system * Experience with varies business types such as, logistics, warehouse, distribution center, multi-site loss management * Interviewing and Interrogation experience More ❯
including intermediate knowledge of Excel PREFERRED QUALIFICATIONS Experience with data bases (querying and analyzing) such as SQL, MYSQL, Access, Exception Based Reporting, etc. * Experience with security equipment such as intrusiondetection devices, access control systems, and video review system * Experience with varies business types such as, logistics, warehouse, distribution center, multi-site loss management * Interviewing and Interrogation experience More ❯
including intermediate knowledge of Excel PREFERRED QUALIFICATIONS Experience with data bases (querying and analyzing) such as SQL, MYSQL, Access, Exception Based Reporting, etc. * Experience with security equipment such as intrusiondetection devices, access control systems, and video review system * Experience with varies business types such as, logistics, warehouse, distribution center, multi-site loss management * Interviewing and Interrogation experience More ❯
Experiment with the newest technologies and keep abreast of new developments in the blockchain ecosystem. Reason about and improve the security properties of infrastructure. Secure key management, server hardening, intrusiondetection, and security best practices are important themes. Contribute to external partnerships that directly impact Jump’s bottom line. Engagement in public forums for community awareness and knowledge More ❯