to identify weaknesses in systems and networks and propose mitigation plans where required. Recommend, design and implement security tools and technologies such as firewalls, intrusiondetection systems, endpoint protection and distributed denial of service (DDoS) mitigation solutions. Build strong relationships with customers, providing ongoing cybersecurity consultation and support. More ❯
to identify weaknesses in systems and networks and propose mitigation plans where required. Recommend, design and implement security tools and technologies such as firewalls, intrusiondetection systems, endpoint protection and distributed denial of service (DDoS) mitigation solutions. Build strong relationships with customers, providing ongoing cybersecurity consultation and support. More ❯
to identify weaknesses in systems and networks and propose mitigation plans where required. Recommend, design and implement security tools and technologies such as firewalls, intrusiondetection systems, endpoint protection and distributed denial of service (DDoS) mitigation solutions. Build strong relationships with customers, providing ongoing cybersecurity consultation and support. More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of log data and intrusiondetection systems. Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP … POP, LDAP. It would be great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Understanding of network security, firewalls, IAM, cloud platforms (AWS, Azure), and endpoint protection. Familiarity with standards including NIST CSF & ISO 27001. Knowledge of SIEM, intrusiondetection, endpoint security, and secure coding. This role is onsite 2 days per week No sponsorship is available This role is looking to More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Context
progress your career. As well as involvement in the design and implementation of Cyber Security Strategy, you'll gain considerable experience in Vulnerability Monitoring, IntrusionDetection, Incident Response (including assurance of Business Continuity), and Cyber Investigations. You'll be learning from some of the best in the business More ❯
london, south east england, united kingdom Hybrid / WFH Options
Syntax Integration Limited
concepts and protocols (TCP/IP, VLAN, VPN, BGP, OSPF, etc.). Solid knowledge of network security concepts, including firewall configuration, VPN setup, and intrusiondetection systems. Hands-on experience with network equipment such as Cisco routers and switches, firewalls, and wireless controllers. Experience with Remote Management and More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
OFWAT
maturity of an organisation Proven experience and expertise in one or more of the following: SIEM systems preferably Microsoft Sentinel, network and systems security, intrusiondetection/prevention, and malware analysis. Professional Qualifications: At least one professional qualification such as CISSP, CISM, SANS, or equivalent. Strong analytical skills More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Allica Bank Limited
awareness programs. Be a key player in the organisation's incident response efforts. Personal Attributes & Experience Deep experience with endpoint monitoring, CSPM, network security, intrusiondetection and management. Proven track record in managing continuous threat exposure management programs and responding to security incidents. Strong understanding of identity and More ❯
Skills and Qualifications Strong knowledge of system and network security, protocols, and best practices, including ISO27001, SOC2 and Cyber Essentials controls. Experience with firewalls, intrusiondetection systems, anti-virus software, and data encryption. Knowledge of risk assessment tools, technologies, and methods. Experience designing secure networks, systems, and application More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Michael Page (UK)
Conduct root cause analysis and implement preventative measures for recurring issues. Security and Compliance Implement and maintain network security measures, including firewalls, VPNs, and intrusiondetection/prevention systems (IDS/IPS). Ensure compliance with industry regulations and best-practices (GDPR, HIPAA, PCI-DSS, CIS). Conduct More ❯
Conduct root cause analysis and implement preventative measures for recurring issues Security and Compliance Implement and maintain network security measures, including firewalls, VPNs, and intrusiondetection/prevention systems (IDS/IPS) Ensure compliance with industry regulations and best-practices (GDPR, HIPAA, PCI-DSS, CIS) Conduct regular vulnerability More ❯
Adamson House, Centenary Way, Salford, Manchester, England
Morson Projects
experience with a variety of software platforms, while gaining a nationally recognised qualification. Role Administer and support digital security platforms including door access systems, intrusiondetection, biometrics, and CCTV AI analytics Conduct audits and assess compliance with key standards such as ISO 27001, Secure by Design, and Cyber More ❯
switches, firewalls, and other infrastructure components. Diagnosing and resolving hardware, software, and network issues to minimise downtime. Implementing and managing security measures, including firewalls, intrusiondetection systems, and data encryption to protect against cyber threats. Optimising the performance of IT infrastructure to improve speed, efficiency, and reliability. Planning More ❯
pipelines. Utilize big data technologies (Databricks, Spark). Develop custom security applications, APIs, AI/ML models, and advanced analytic technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusiondetection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and analytics in Databricks, Synapse Analytics, and large-scale data warehouses (Snowflake, Redshift, Presto). Proficiency in data visualization tools (Databricks, PowerBI) and the Python data science ecosystem (Jupyter, Pandas More ❯
pipelines. Utilize big data technologies (Databricks, Spark). Develop custom security applications, APIs, AI/ML models, and advanced analytic technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusiondetection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and analytics in Databricks, Synapse Analytics, and large-scale data warehouses (Snowflake, Redshift, Presto). Proficiency in data visualization tools (Databricks, PowerBI) and the Python data science ecosystem (Jupyter, Pandas More ❯
pipelines. Utilize big data technologies (Databricks, Spark). Develop custom security applications, APIs, AI/ML models, and advanced analytic technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusiondetection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and analytics in Databricks, Synapse Analytics, and large-scale data warehouses (Snowflake, Redshift, Presto). Proficiency in data visualization tools (Databricks, PowerBI) and the Python data science ecosystem (Jupyter, Pandas More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Michael Page (UK)
recovery and business continuity planning. The Successful Applicant Essential Proven experience in IT infrastructure security. Strong knowledge of network security principles, firewalls, VPNs, and intrusiondetection systems. Desirable Experience in a manufacturing or industrial environment, Operational Technologies. Knowledge of security frameworks and compliance requirements (e.g., NIST, ISO More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Crimson
Previous 1st and 2nd line support experience Cloud administration, (Azure) Proficiency in databases, networks (LAN, WAN), and patch management Understanding of system security, including intrusiondetection systems, and proficiency in data backup and recovery Deploy and set up software and hardware configurations. Oversee network servers and technology tool More ❯
for any irregularities. Assist with security audits and testing to identify vulnerabilities and contribute to implementing solutions. Help manage security tools such as firewalls, intrusiondetection systems, and anti-virus software. Support system backups and updates, ensuring data protection and system integrity. Provide basic security guidance to users More ❯
for any irregularities. Assist with security audits and testing to identify vulnerabilities and contribute to implementing solutions. Help manage security tools such as firewalls, intrusiondetection systems, and anti-virus software. Support system backups and updates, ensuring data protection and system integrity. Provide basic security guidance to users More ❯
Omagh, Northern Ireland, United Kingdom Hybrid / WFH Options
Digital Waffle
issues, outages, and security incidents. Conduct capacity planning and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusiondetection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Digital Waffle
issues, outages, and security incidents. Conduct capacity planning and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusiondetection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other More ❯
Londonderry, Northern Ireland, United Kingdom Hybrid / WFH Options
Digital Waffle
issues, outages, and security incidents. Conduct capacity planning and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusiondetection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other More ❯
Monitor network performance and troubleshoot issues to ensure minimal downtime and optimal performance. Implement and manage network security measures, including VLANs, firewalls, VPNs, and intrusiondetection systems. Perform regular network maintenance and upgrades to ensure the latest security patches and firmware updates are applied. Collaborate with other IT More ❯