standards. Skills Proven experience in cyber security engineering or related roles, with a strong understanding of network security principles, protocols and technologies. Experience with security tools such as firewalls, intrusiondetection/prevention systems, SIEM solutions (i.e. Splunk, Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools More ❯
standards. Skills Proven experience in cyber security engineering or related roles, with a strong understanding of network security principles, protocols and technologies. Experience with security tools such as firewalls, intrusiondetection/prevention systems, SIEM solutions (i.e. Splunk, Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools More ❯
standards. Skills Proven experience in cyber security engineering or related roles, with a strong understanding of network security principles, protocols and technologies. Experience with security tools such as firewalls, intrusiondetection/prevention systems, SIEM solutions (i.e. Splunk, Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools More ❯
standards. Skills Proven experience in cyber security engineering or related roles, with a strong understanding of network security principles, protocols and technologies. Experience with security tools such as firewalls, intrusiondetection/prevention systems, SIEM solutions (i.e. Splunk, Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools More ❯
london (city of london), south east england, united kingdom
RiverSafe
standards. Skills Proven experience in cyber security engineering or related roles, with a strong understanding of network security principles, protocols and technologies. Experience with security tools such as firewalls, intrusiondetection/prevention systems, SIEM solutions (i.e. Splunk, Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools More ❯
assets, network traffic, and system vulnerabilities. Generate regular reports on system performance, security posture, and compliance status. Cybersecurity & Compliance: Cyber Protection Techniques: Implement advanced cyber protection measures, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans More ❯
assets, network traffic, and system vulnerabilities. Generate regular reports on system performance, security posture, and compliance status. Cybersecurity & Compliance: Cyber Protection Techniques: Implement advanced cyber protection measures, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans More ❯
london (new malden), south east england, united kingdom
Northrop Grumman UK
assets, network traffic, and system vulnerabilities. Generate regular reports on system performance, security posture, and compliance status. Cybersecurity & Compliance: Cyber Protection Techniques: Implement advanced cyber protection measures, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans More ❯
assets, network traffic, and system vulnerabilities. Generate regular reports on system performance, security posture, and compliance status. Cybersecurity & Compliance: Cyber Protection Techniques: Implement advanced cyber protection measures, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans More ❯
support of business requirements. Knowledge, Skills, Experience & Qualifications Education and Qualifications Networks -Network Security Technology experience in this area includes but is not limited to: • Perimeter Security, including firewalls, intrusiondetection/prevention (IDS/IPS), anti-malware and threat prevention (Check Point, Palo Alto Networks and Cisco). • Cloud network security (Check Point and Microsoft Azure). More ❯
Bromsgrove, Worcestershire, United Kingdom Hybrid / WFH Options
First Choice Recruitment Services
IT and security teams to contain and resolve threats. Keep incident logs, reports, and tickets updated within incident tracking systems. Assist in threat intelligence gathering and analysis to enhance detection capabilities. Participate in vulnerability management activities. Update and oversee the software inventory. Support compliance reporting and audits. Assist in IT service desk activities. Stay updated with emerging cyber threats … management of the Company. Key skills: Candidates will need recent work history of working in a similar role. Degree Educated would be an advantage A strong understanding of firewalls, intrusiondetection systems and other security technologies is essential. Familiar with ethical hacking and penetration testing an advantage. The ability to analyse complex data and identify potential security threats More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Hamilton Barnes
CNI Infrastructure IDS Administrator (SC Cleared) - Hybrid (Wokingham/Warwick) - Inside IR35 - 6 months We are seeking an experienced CNI Infrastructure IDS Administrator to manage, configure, and optimize enterprise IntrusionDetection Systems (IDS) across Windows and non-Windows environments. This hands-on role will involve patching, alert handling, and end-to-end change management to ensure the integrity … and prioritize actions based on threat severity. Configure IDS software, including rules, signatures, and alerts to detect various threat types. Optimize IDS performance to minimize false positives and enhance detection accuracy. Manage, patch, and maintain IDS configurations, traps, and alert systems. Work collaboratively with IT and security teams to support a comprehensive security strategy. Maintain detailed documentation for IDS More ❯
Cisco Nexus switches, Cisco ASA firewalls, F5 LTM and DNS load balancers. Strong network design and management skills and experience, including setting up firewall rules, dynamic routing, load balancing, intrusiondetection and prevention, setting up remote access and site-to-site VPNs. Strong practical experience of following ITIL processes in a 24x7 operations environment with tight SLA and More ❯
Buckinghamshire, United Kingdom Hybrid / WFH Options
infrastructure, cloud environments, and cybersecurity operations. Hands-on experience with tools such as SIEM, DLP, endpoint protection, and network monitoring. Skilled in networking fundamentals firewalls, VPNs, routers, LANs, and intrusion detection. Free standard class leisure travel for you and eligible dependants across several major rail operators. Defined Benefit Pension Plan. Generous annual leave (25 days + bank holidays). More ❯
bristol, south west england, united kingdom Hybrid / WFH Options
Leonardo
lifecycle, from requirements analysis through to implementation and operations. Develop practical knowledge of security technologies, such as identity and access management (IAM), public key encryption (PKI), encryption, firewalls, and intrusiondetection/prevention systems (IDPS), and how they fit into architectural designs. Role Requirements All of our roles require (a) a minimum of a 2 2 Bachelors/ More ❯
requirements. Preparing for and completing all required audits. Essential skills/knowledge/experience: Experience of Industrial Defender/Leidos would be an advantage, but not essential! Managing, patching IntrusionDetection system alerts; config; traps etc. Raising, representing and managing end-to-end delivery of own changes. Working in a small local team, part of a wider Infra More ❯
proven experience designing and managing resilient secure and high availability network environments supporting internal and customer services strong grasp of network security best practices and technologies including firewalls, segmentation, intrusiondetection/prevention and encryption. More ❯
proven experience designing and managing resilient secure and high availability network environments supporting internal and customer services strong grasp of network security best practices and technologies including firewalls, segmentation, intrusiondetection/prevention and encryption. More ❯
proven experience designing and managing resilient secure and high availability network environments supporting internal and customer services strong grasp of network security best practices and technologies including firewalls, segmentation, intrusiondetection/prevention and encryption. More ❯
proven experience designing and managing resilient secure and high availability network environments supporting internal and customer services strong grasp of network security best practices and technologies including firewalls, segmentation, intrusiondetection/prevention and encryption. More ❯
london (city of london), south east england, united kingdom
Radius
proven experience designing and managing resilient secure and high availability network environments supporting internal and customer services strong grasp of network security best practices and technologies including firewalls, segmentation, intrusiondetection/prevention and encryption. More ❯
Harlow, Essex, England, United Kingdom Hybrid / WFH Options
New Era Fuels Ltd
Responsible for and manage IT support for infrastructure components, including servers, storage systems, and networking devices. Ensure data security by implementing and maintaining robust security measures, such as firewalls, intrusiondetection systems, and encryption protocols. Lead vulnerability and patch management activities to identify and remediate security vulnerabilities in IT systems and applications, with support from managed SOC. Monitor More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Project Recruit
team to manage technical deliverables and change management; engaging with Application and Infrastructure teams to ensure alignment and resolve issues Desirable Skills: Strong understanding of monitoring tools, operating systems, intrusiondetection systems (IDS), and network security principles Good grasp of network protocols, security best practices, and common cyber attack vectors Special Working Conditions Required to travel to office More ❯
of related experience in the industry. Able to perform project management activities related to the design, engineering, installation/troubleshooting of IP based Surveillance Systems, Access Control, Gate Systems, IntrusionDetection and related Security Systems. Additional background sought would be knowledge of Data Networks and Systems Programming. Pre-Sales and/or technician experience would be a great More ❯
bradford, yorkshire and the humber, united kingdom
Squires Resources Inc
of related experience in the industry. Able to perform project management activities related to the design, engineering, installation/troubleshooting of IP based Surveillance Systems, Access Control, Gate Systems, IntrusionDetection and related Security Systems. Additional background sought would be knowledge of Data Networks and Systems Programming. Pre-Sales and/or technician experience would be a great More ❯