with expertise in design, implementation, architecture, and third-party call routing support. Certifications: CCNA, CCNP, CCIE, or equivalent highly desirable. Youll be proficient in UC VOICE, Cisco Servers, VMware, Windows Server, VEEAM, Synology, SIP, G711alaw, Cisco CUBE SBCs, Gateways, and modems. Well need you to have strong problem-solving abilities for complex security issues. Excellent interpersonal skills; ability to More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Hamilton Barnes
Cleared) - Hybrid (Wokingham/Warwick) - Inside IR35 - 6 months We are seeking an experienced CNI Infrastructure IDS Administrator to manage, configure, and optimize enterprise Intrusion Detection Systems (IDS) across Windows and non-Windows environments. This hands-on role will involve patching, alert handling, and end-to-end change management to ensure the integrity and resilience of critical infrastructure. … small local team within a wider infrastructure and applications environment, ensuring system health and onboarding new services to the monitoring capabilities. Key Responsibilities: Patch and upgrade IDS applications on Windows and non-Windows operating systems. Review IDS alerts and logs, identify potential security incidents, and prioritize actions based on threat severity. Configure IDS software, including rules, signatures, and … clearance. Experience with Industrial Defender or Leidos IDS platforms (advantageous but not essential). Strong knowledge of IDS configuration, monitoring tools, and OS-level security operations. Proficiency with both Windows and Linux administration tools and processes. Understanding of network protocols, security principles, and common attack vectors. Hands-on experience with network troubleshooting, Scripting, or programming languages. Ability to manage More ❯
CNI Infrastructure IDS Administrator (SC cleared/Eligible) Location: Wokingham/Warwick Onsite (5 days) (Inside IR35) Contract (6months +) The Role Your responsibilities: Patching & upgrading IDS applications on Windows and Non windows operating systems. Reviewing IDS alerts and logs, identifying potential security incidents, and prioritizing actions based on the severity of the threat. Optimizing the performance of More ❯