teams to integrate security protocols into network architecture and operations. Be involved in the deployment and maintenance of network security devices such as firewalls, intrusiondetection systems, and VPNs. Act on and recover from security incidents, including conducting post-event analyses to prevent future incidents. Stay abreast of More ❯
of QA’s organisational infrastructure and associated IT systems. As a Head of Cyber Security Operations you will be responsible for safeguarding QA from intrusion, security threats, security weaknesses, software bugs and exploits. You will be responsible for direct and virtual teams involved in keeping QA secure. Role Responsibilities … IDS/IPS, Active Directory, endpoint protection, Windows Server, networks and cloud services Comprehensive knowledge or experience of information security principles, including risk assessment, intrusiondetection, Security Incident and Event Management (SIEM) tools, threat and vulnerability management Detailed knowledge or experience of application or network based penetration testing More ❯
incidents, and coordinate incident response across teams. Security software testing: Test company software, firmware, and firewalls. Security software design: Design software security systems like intrusiondetection systems and firewalls. Security system maintenance: Maintain and proof network security systems. Security system analysis: Analyse security systems and seek improvements on More ❯
Bedford, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
frameworks and standards, such as NIST, ISO 27001, CyberEssentials Plus, and CIS. Strong understanding of networking protocols, operating systems, and security technologies like firewalls, intrusiondetection/prevention systems, and SIEM. Excellent analytical, problem-solving, and communication skills. Ability to work independently and collaboratively. Strong work ethic and More ❯
The team aims to minimize and control damage from cybersecurity incidents, ensuring incident management and response controls are effective to enable the identification, protection, detection, response, and recovery of RLG information assets. The role contributes to our purpose by: Helping build financial resilience Moving fairly to a sustainable world … generate reports and analytics to improve future incident response Collect supporting information and artifacts for incident response activities Identify and execute projects to enhance intrusiondetection and incident response capabilities Conduct technical analysis on impacted systems to determine impact, scope, and recovery from active and potential cyber incidents More ❯
resulting from cybersecurity incidents, ensuring that appropriate incident management and response controls are in place and operating as required to enable the identification, protection, detection, response, and recovery of RLG information assets. It outlines how the role contributes to our purpose: Helping build financial resilience Moving fairly to a … analytics to improve future incident response Collect supporting information and relevant artifacts in support of incident response activities Identify and execute projects to improve intrusiondetection and incident response capabilities Conduct technical analysis on impacted systems to determine impact, scope, and recovery from cyber incidents Leverage cybersecurity tools More ❯
/objectives. This role focuses on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. The position will support the Director of IT Security in reviewing and evaluating new, cost-effective information … Industry certifications preferred: CISSP, CompTIA+, CEH, SSCP, Security+, etc. Solid understanding of IT and security practices, including host security, platform architecture, network perimeter security, intrusiondetection/prevention, application security modeling, physical security, systems integrity, and continuity planning. Experience with security policies, standards development, implementation, and review. Experience More ❯
hunting queries Experience Needed: Managing serious cyber incidents as a digital forensic responder Working within large, complex enterprise environments Understanding of security monitoring and intrusiondetection systems Technical expertise in networks, malware analysis, and digital forensics Effective communication with senior stakeholders Company Overview: Element is a global testing More ❯
writing advanced queries. Experience Needed: Managing serious cyber incidents as a digital forensic responder. Working in large, complex enterprise environments. Knowledge of security monitoring, intrusiondetection, firewalls, antivirus, web proxies. Technical expertise in networks, malware, and forensics. Effective communication with senior stakeholders. Company Overview: Element is a global More ❯
hunting queries Experience Needed: Managing serious cyber incidents as a digital forensic incident responder Working within large, complex enterprise environments Understanding of security monitoring, intrusiondetection, firewalls, antivirus, web proxies Technical expertise in networks, malware analysis, digital forensics Effective communication with senior stakeholders Company Overview: Element is a More ❯
Experience Needed: Extensive experience managing serious cyber incidents as a digital forensic responder. Proven success in large, complex enterprise environments. Understanding of security monitoring, intrusiondetection, firewalls, antivirus, web proxies. Technical expertise in networks, malware analysis, digital forensics. Effective communication with senior stakeholders. Company Overview: Element is a More ❯
advanced hunting queries. Experience Needed: Managing serious cyber incidents as a digital forensic responder. Operating within large, complex enterprise environments. Understanding of security monitoring, intrusiondetection/prevention, and control systems. Technical expertise in networks, malware analysis, and digital forensics. Effective communication with senior stakeholders. Company Overview: Element More ❯
hunting queries. Experience Needed: Managing serious cyber incidents as a digital forensic incident responder. Operating within large, complex enterprise environments. Understanding of security monitoring, intrusiondetection, firewalls, anti-virus, web proxies. Technical expertise in networks, malware analysis, digital forensics. Effective communication with senior stakeholders. Company Overview: Element is More ❯
hunting queries. Experience Needed: Managing serious Cyber Incidents as a Digital Forensic Incident Responder. Working successfully in large, complex enterprise environments. Understanding security monitoring, intrusiondetection, firewalls, anti-virus, and web proxies. Technical expertise in networks, malware analysis, digital forensics. Effective communication with senior stakeholders. Company Overview: Element More ❯
advanced hunting queries. Experience Needed: Managing serious cyber incidents as a digital forensic incident responder. Operating within large, complex enterprise environments. Understanding security monitoring, intrusiondetection, firewalls, anti-virus, and web proxies. Technical expertise in networks, malware analysis, digital forensics. Strong communication skills with senior stakeholders. Company Overview More ❯
of Microsoft platforms with a focus on Intune, Microsoft Exchange Online, Office 365 support technologies, and Azure Active Directory. Strong experience configuring anti-malware, intrusiondetection, firewalls and vulnerability scanning systems and network security. Extensive experience and working knowledge with Microsoft Azure Infrastructure as a Service platform and More ❯
procedures to ensure the protection of network infrastructure and communication systems. Oversee the design and implementation and maintenance of network security solutions, including firewalls, intrusiondetection/prevention systems and secure communication channels. Monitor network reports for security incidents and respond promptly to mitigate risks and breaches. Work More ❯
experience managing serious Cyber Incidents as a Digital Forensic Incident Responder. Proven success operating within large, complex, federated enterprise environments. Understanding of security monitoring, intrusiondetection, prevention, and control systems, including firewalls, anti-virus, and web proxies. Technical expertise in networks, malware analysis, digital forensics, etc. Attention to More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Sodexo
improve security posture. Performance Metrics : Establishing and monitoring KPIs to measure security program effectiveness. Technical Expertise : Deep understanding of cybersecurity technologies such as firewalls, intrusiondetection, encryption, and network security protocols. Regulatory Compliance : Knowledge of laws, regulations, and standards like GDPR, Cyber Essentials, ISO/IEC 27001, and More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
Murnen Design
and motivate others. Deep understanding of cyber security threats, vulnerabilities, and mitigation techniques. Experience with a wide range of security technologies and practices, including: Intrusiondetection and prevention systems (IDPS) Security information and event management (SIEM) system Vulnerability scanning and penetration testing Cloud security Identity and access management More ❯
/Security Ensure IT systems and networks are secure from threats and vulnerabilities Implement and manage security measures, such as firewalls, antivirus software, and intrusiondetection systems Conduct regular security audits and vulnerability assessments Work within the parameters of ISO 27001, taking guidance from the compliance team as More ❯
/Security Ensure IT systems and networks are secure from threats and vulnerabilities Implement and manage security measures, such as firewalls, antivirus software, and intrusiondetection systems Conduct regular security audits and vulnerability assessments Work within the parameters of ISO 27001, taking guidance from the compliance team as More ❯
guidelines aligned with industry standards (e.g., ISO 27001, NIST). Assist in the deployment, configuration, and management of security infrastructure and technologies, including firewalls, intrusiondetection/prevention systems, and secure network architectures. Provide guidance and support on Azure security practices, leveraging expertise in Microsoft Azure security frameworks More ❯
and evaluate the effectiveness of existing security controls. Design and implement security solutions to mitigate identified risks. Implement, and manage security systems, including firewalls, intrusiondetection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerability management etc. Respond to security events and incidents. Perform regular security audits More ❯
fully secure information, computer, network, and processing systems. Manage the administration of all computer security systems and their corresponding or associated software, including firewalls, intrusiondetection systems, cryptography systems, and anti-virus software. Manage the administration of the facility's security systems and their corresponding equipment or software … including fire alarms, locks, intruder detection systems, sprinkler systems, and anti-theft measures. Develop, track, and control the security services annual operating and capital budgets for purchasing, staffing, and operations. Ensure that facilities, premises, and equipment adhere to all applicable laws and regulations. Recommend and implement changes in security More ❯