Expert Systems Engineer USA OR London, United Kingdom Shared services Permanent Remote Overview The Nutanix Flow Network Security Architect is responsible for designing, implementing, and managing network security solutions within the Nutanix Flow environment. This role involves ensuring the security, integrity, and availability of network resources and data across the Nutanix infrastructure. The architect will work closely … with IT teams, security professionals, and stakeholders to develop and enforce security policies, manage security tools, and respond to security incidents. Key Responsibilities Design and Architecture : Develop and implement network security architectures and solutions within the Nutanix Flow environment. Policy Development : Create and enforce security policies and procedures to protect network resources and data. Security Management : Manage and … and regulations, such as GDPR, HIPAA, and PCI-DSS. Collaboration : Work with IT teams, security professionals, and stakeholders to identify security requirements and implement solutions. Monitoring and Analysis : Monitor network traffic and security alerts, analyze security data, and identify potential threats and vulnerabilities. Training and Awareness : Provide training and awareness programs to educate staff on security best practices and More ❯
City of London, London, United Kingdom Hybrid/Remote Options
CSC
Expert Systems Engineer USA OR London, United Kingdom Shared services Permanent Remote Overview The Nutanix Flow Network Security Architect is responsible for designing, implementing, and managing network security solutions within the Nutanix Flow environment. This role involves ensuring the security, integrity, and availability of network resources and data across the Nutanix infrastructure. The architect will work closely … with IT teams, security professionals, and stakeholders to develop and enforce security policies, manage security tools, and respond to security incidents. Key Responsibilities Design and Architecture : Develop and implement network security architectures and solutions within the Nutanix Flow environment. Policy Development : Create and enforce security policies and procedures to protect network resources and data. Security Management : Manage and … and regulations, such as GDPR, HIPAA, and PCI-DSS. Collaboration : Work with IT teams, security professionals, and stakeholders to identify security requirements and implement solutions. Monitoring and Analysis : Monitor network traffic and security alerts, analyze security data, and identify potential threats and vulnerabilities. Training and Awareness : Provide training and awareness programs to educate staff on security best practices and More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Insight International (UK) Ltd
list as opposed to essential requirements. If a candidate has some of the below, they will still be considered. 1. Proactively use security engineering tools to identify and mitigate network & security risks. 2.Develop and implement security measures using specialised tools based on Cyber security best practices. 3. Support and build networksegmentation capabilities, including deciding on the … granularities of segmentation from a threat-led perspective (e.g., application level, environment level, network level, network policies, mapping attack paths, and building mitigations). 4. Hands-on exposure and knowledge of Cyber & network security, e.g. management of firewalls, IDS, Web Gateways etc. 5· Familiarity with deploying Infrastructure as Code and using CI/CD technologies, such … as Azure DevOps. 6· Hands-on experience working with cloud networking with a focus on security. For example, working with virtual networks, network security groups, virtual firewalling, Web Application Firewalls, and cloud networking security monitoring. 7· Previous experience working with security best practices – e.g. Zero trust, defence in depth, least privilege, security hardening. 8· Experience in applying zero-trust More ❯
list as opposed to essential requirements. If a candidate has some of the below, they will still be considered. 1. Proactively use security engineering tools to identify and mitigate network & security risks. 2.Develop and implement security measures using specialised tools based on Cyber security best practices. 3. Support and build networksegmentation capabilities, including deciding on the … granularities of segmentation from a threat-led perspective (e.g., application level, environment level, network level, network policies, mapping attack paths, and building mitigations). 4. Hands-on exposure and knowledge of Cyber & network security, e.g. management of firewalls, IDS, Web Gateways etc. 5· Familiarity with deploying Infrastructure as Code and using CI/CD technologies, such … as Azure DevOps. 6· Hands-on experience working with cloud networking with a focus on security. For example, working with virtual networks, network security groups, virtual firewalling, Web Application Firewalls, and cloud networking security monitoring. 7· Previous experience working with security best practices – e.g. Zero trust, defence in depth, least privilege, security hardening. 8· Experience in applying zero-trust More ❯
london, south east england, united kingdom Hybrid/Remote Options
Crown Agents Bank
FX and cross-border payments are often complex and expensive, especially when operating in emerging markets. Crown Agents Bank (CAB) wraps its deep and trusted relationships and strength of network around innovative digital capabilities, and cross-border transaction banking solutions to enable fintech, corporates, governments, development organisations and banks to move money to, from, and across often hard-to … to ensure architectural consistency and governance across teams, reducing duplicate efforts. Design and oversee AWS networking configurations (VPCs, subnets, routing) and multi-account setups. Implement cloud security standards, including networksegmentation and security groups, identity & access management, and encryption. Drive automation across the cloud environment—Utilise Infrastructure-as-Code tools, such as Terraform and AWS CDK, to provision … ECR, KMS, RDS, SQS, SNS, Lambda, VPC, IAM, API Gateway, etc. Solid understanding of AWS networking and security controls. Expertise in designing secure VPCs (subnets, routing, NACLs) and implementing network security measures (security groups, firewalls), as well as identity management (AWS IAM). Knowledge of cloud security best practices (encryption, key management, vulnerability management) and experience in securing mission More ❯
Horsham, Sussex, United Kingdom Hybrid/Remote Options
Benchmark Capital Limited
throughout our technology landscape. Your work will help us meet the expectations of our customers, clients, and regulators What you'll do Design and maintain secure cloud environments, including networksegmentation, WAFs, DDoS protection, secret and certificate management, and encryption. Embed secure SDLC practices such as SAST/DAST, dependency scanning, secure coding standards, threat modelling, and API More ❯
Horsham, West Sussex, United Kingdom Hybrid/Remote Options
Benchmark Capital Limited
throughout our technology landscape. Your work will help us meet the expectations of our customers, clients, and regulators What you'll do Design and maintain secure cloud environments, including networksegmentation, WAFs, DDoS protection, secret and certificate management, and encryption. Embed secure SDLC practices such as SAST/DAST, dependency scanning, secure coding standards, threat modelling, and API More ❯
design using GitHub Actions and a good working knowledge of Infrastructure-as-Code (Terraform), observability and monitoring tools You have a good knowledge of security architecture, identity management and networksegmentation in cloud environments You have a good understanding of data flows, APIs and asynchronous messaging (Kafka, SQS, SNS) You're collaborative and pragmatic with experience of managing More ❯
pipelines for application and infrastructure deployments. Monitoring & Troubleshooting: Implement observability solutions (CloudWatch, Datadog, Splunk) and resolve incidents promptly. Security & Compliance: Apply AWS security best practices, including IAM, encryption, and network segmentation. Cost Optimization: Monitor and optimize AWS resource usage for cost efficiency. Collaboration: Work with cross-functional teams on deployments, migrations, and performance tuning. Essential Skills & Experience Proven experience More ❯
Excellent ability to learn new technologies, systems, and languages A keen interest in embedded systems, IoT and hardware Demonstrated hardware security skills either in professional or hobbyist sphere Strong network protocol analysis using tools such as Wireshark An understanding of reverse engineering, experience using tools such as Ghidra, with particular focus on ARM and x86 architectures Ability to script … to allow it to be serviceable long into the future Attempting to bypass a custom digital rights management system to provide assurance that their product is adequately secure Testing networksegmentation and infrastructure on a variety of ships, including cruise ships and oil rigs Working in ICS environments using a risk-averse methodology using document review, visual survey More ❯
Hertfordshire, England, United Kingdom Hybrid/Remote Options
Cpl Life Sciences
/11 and Microsoft 365: Deep understanding of modern desktop environments and integration with Microsoft cloud services. Networking Fundamentals: Solid understanding of TCP/IP, DNS, DHCP, VPN, and network segmentation. If you are interested please apply or send your CV to luke.sandilands@cpl.com More ❯