London, England, United Kingdom Hybrid / WFH Options
In Technology Group
data, and infrastructure against emerging threats. Key Responsibilities: Monitor, detect, and respond to security incidents and threats in real–time. Design and implement security solutions and controls, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and development teams to ensure secure More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
In Technology Group Limited
data, and infrastructure against emerging threats. Key Responsibilities: Monitor, detect, and respond to security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and development teams to ensure secure More ❯
London, England, United Kingdom Hybrid / WFH Options
Onyx-Conseil
mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity analysts to detect, mitigate, and analyze threats. Works closely with other teams … organization. • Participates in change management meetings and provides expert input to ensure security is maintained. • Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusiondetection and prevention, eDiscovery, and content filtering. • Ability to manage and continuously improve upon vulnerability management program. • Ability to propose solutions for closing identified vulnerabilities in the infrastructure. More ❯
Brighton, England, United Kingdom Hybrid / WFH Options
Anson McCade
compliance with security policies and standards Contribute to network optimisation and continuous improvement initiatives Ideal Candidate: Proven experience in network engineering and IT security roles Strong knowledge of firewalls, intrusiondetection systems (IDS/IPS), and endpoint security Hands-on experience with Cisco, Fortinet, Palo Alto, or similar technologies Familiarity with cloud network security (e.g., AWS, Azure) is More ❯
Security Management Systems (ISMS) is essential. Strong knowledge of information security standards such as ISO 27001:2022, ISO 27002. Technical expertise in security technologies such as cryptography, network security, intrusiondetection, access control models, authentication mechanisms, and security policies (GPOs). Experience with security monitoring tools (e.g., SIEM, IDS/IPS). Strong analytical and risk management skills More ❯
a similar role, demonstrating strong knowledge of the threat landscape relevant to SaaS products, preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusiondetection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools. You own relevant certifications (Security+, IAT II/III level or similar). You excel in risk More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Liberty Global
threat hunting, adversary emulation, and cutting-edge threat mitigation methodologies. Knowledge Sharing: Assist in developing training sessions and workshops to continuously enhance the team's technical skills and capabilities. Detection Engineering & Security Enhancements Proactive Defence: Develop and fine-tune detection rules, playbooks, and automation scripts that improve SOC efficiency and help pre-empt potential attacks. Security Architecture: Collaborate … people with: Extensive experience in managing, investigating, and responding to cyber incidents, with hands-on experience in a dynamic SOC or Incident Response role. Technical Expertise: Strong understanding of intrusiondetection, forensic investigations, vulnerability management, and advanced security technologies (SIEM, IDS/IPS, EDR, and firewalls). Analytical Skills: Proficiency in analysing log sources and data normalization using More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
assigned to work in a role with one of our trusted client partners as a 'Spartan' consultant. In this role you will undertake: Network Security - Understanding of firewall configuration, intrusiondetection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
Pepper Mill
assigned to work in a role with one of our trusted client partners as a 'Spartan' consultant. In this role you will undertake: Network Security - Understanding of firewall configuration, intrusiondetection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and More ❯
London, England, United Kingdom Hybrid / WFH Options
Bondsmith
experience as a Security Engineer or in a similar role, with deep understanding of the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusiondetection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). More ❯
experience as a Security Engineer or in a similar role, with deep understanding of the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusiondetection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). More ❯
London, England, United Kingdom Hybrid / WFH Options
V7 Labs
a similar role, demonstrating strong knowledge of the threat landscape relevant to SaaS products, preferably in a data-heavy environment Hands-on experience with security technologies such as firewalls, intrusiondetection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools You own relevant certifications (Security+, IAT II/III level or similar) You excel in risk assessments More ❯
Falls Church, Virginia, United States Hybrid / WFH Options
Epsilon Inc
regulations. Work with DevOps teams to implement secure coding practices and foster secure CI/CD development pipelines. Support the evaluation and deployment of security tools, including endpoint protection, intrusiondetection/prevention systems, and threat intelligence platforms. Maintain awareness of the latest security trends, vulnerabilities, and threat intelligence to proactively protect the organization. Assist in developing and More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
KBC Technologies Group
and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusiondetection/prevention systems, and encryption technologies. Adhere to enterprise governance & review processes to deliver project goals & deliverables. Follow enterprise ITSM & CMDB processes Monitor and analyze security alerts … network security fundamentals, encryption technologies, and secure network design principles. Zscaler Private Access & Internet Access Proficiency in configuring, managing, and troubleshooting firewalls. Cisco, Palo Alto etc,. Experience with intrusiondetection/prevention systems, as well as with SIEM tools and security incident response. Excellent problem-solving skills, analytical thinking, and the ability to communicate effectively with diverse More ❯
London, England, United Kingdom Hybrid / WFH Options
Client Server
profitable, Investment Management firm. As a Cyber Defence Analyst you will take a proactive approach to threat hunting and security incident response. You'll play a key role in detection enhancements, improvements to standard operating procedures and will collaborate with internal teams to tune and put new technologies into operation. There's a broad range of responsibilities and projects … threat intelligence, breach attack simulation You have a strong knowledge of SIEM and deep Splunk experience You have a good understanding of various security infrastructure tools such as firewalls, intrusion prevention/detection systems, proxy servers, email controls, anonymising technology, data loss prevention, Endpoint Detection and Response (EDR) You have experience of working with Microsoft cloud technologies More ❯
London, England, United Kingdom Hybrid / WFH Options
Yokoy
for a Security Operations Engineer to help us reach our goals. As a Security Operations Engineer at Yokoy, you will be responsible for designing, implementing, and maintaining advanced threat detection solutions. Collaborating with the TechOps/IT team and various engineering squads at Yokoy as well as TravelPerk, you will ensure robust security measures are applied, and capabilities are … staying ahead of emerging threats and possess strong technical expertise in security operations, this is an exciting opportunity to make a significant impact. What You’ll Do Enhance threat detection & response by designing, implementing, and optimizing security tools, detection mechanisms, and secure configurations to identify and mitigate cybersecurity threats. Develop and optimize detection rules, signatures, and indicators … across multiple cloud technologies (e.g. AWS GuardDuty/Security Hub/Inspector, GCP Security Command Center). Enhance threat hunting, incident response, and security operations through continuous improvement in detection, analysis, and automation. ️ What You’ll Need You hold a degree (University/University of Applied Sciences) in Computer Science, Information Technology, or a related field. You’re an More ❯
controls and consider lessons learnt in order to protect the bank from potential cyber-attacks and respond to threats. Accountabilities: * Management of security monitoring systems, including intrusive prevention and detection systems, to alert, detect and block potential cyber security incidents, and provide a prompt response to restore normal operations with minimised system damage. * Identification of emerging cyber security threats … analysis, and threat intelligence. * Incident response skills, including proficiency in PCAP capture, network analysis, and traffic pattern recognition. * Knowledge of attack techniques (MITRE ATT&CK framework, malware analysis, and intrusiondetection). * Proficiency in analyzing network traffic (PCAP), endpoint logs, IDS/IPS alerts, and security telemetry. * Stakeholder management skills, with the ability to communicate and articulate security More ❯
London, England, United Kingdom Hybrid / WFH Options
Barclays
controls and consider lessons learnt in order to protect the bank from potential cyber-attacks and respond to threats. Accountabilities Management of security monitoring systems, including intrusive prevention and detection systems, to alert, detect and block potential cyber security incidents, and provide a prompt response to restore normal operations with minimised system damage. Identification of emerging cyber security threats … analysis, and threat intelligence. Incident response skills, including proficiency in PCAP capture, network analysis, and traffic pattern recognition. Knowledge of attack techniques (MITRE ATT&CK framework, malware analysis, and intrusiondetection). Proficiency in analyzing network traffic (PCAP), endpoint logs, IDS/IPS alerts, and security telemetry. Stakeholder management skills, with the ability to communicate and articulate security More ❯
London, England, United Kingdom Hybrid / WFH Options
Starling Bank
DevSecOps mindset that we have created across our technology teams Requirements What skills are essential: You have an in-depth knowledge of security principles, technologies, best practices and threat detection and mitigation strategies Knowledge of common attack vectors and methodologies (OWASP Top 10, Mitre ATT&CK Framework and social engineering tactics The ability to identify potential threats, attack vectors … qualifications are a plus) Container security knowledge including container image provenance (e.g. Sigstore, Notary) with an in-depth knowledge of container runtimes Strong understanding of network protocols & practices, firewalls, intrusiondetection/prevention systems and WAFs Understanding of integrating security into the software development lifecycle Experience performing secure code reviews and security approvals including the use of static … and dynamic application security testing (SAST/DAST) tools. Experience in Cryptography management & enhancements Experience configuring and utilising cloud-native security logging, monitoring, and detection services Relevant security certifications such as ISC2 CC, CISSP, CCSP, CISM, AWS Security Specialist or GCP Professional Cloud Security Engineer Our Interview process Interviewing is a two way process and we want you to More ❯
traffic, systems, and logs for unusual or malicious activity. Conducting regular security assessments and audits to identify vulnerabilities and risks. Implementing and maintaining security tools and protocols, including firewalls, intrusiondetection systems, and endpoint protection solutions. Investigating security incidents, responding to potential breaches, and documenting findings. Leading security-focused projects across the network, Windows Desktop/Server environments More ❯
Bedford, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
highly desirable. Experience with security frameworks and standards, such as NIST, ISO 27001, CyberEssentials Plus, and CIS. Strong understanding of networking protocols, operating systems, and security technologies like firewalls, intrusiondetection/prevention systems, and SIEM. Excellent analytical, problem-solving, and communication skills. Ability to work independently and collaboratively. Strong work ethic and commitment to security best practices. More ❯
London, England, United Kingdom Hybrid / WFH Options
Iceberg
trenches and know what it takes to stay ahead of threat actors. Ideally, you bring: Hands-on experience with SIEM platforms , especially Splunk. Strong familiarity with MITRE ATT&CK , intrusiondetection/prevention systems, and malware behaviour. Confidence in network traffic analysis (PCAP, NetFlow) and endpoint forensics. The ability to explain technical risk in plain English — whether you More ❯
Amherst, Massachusetts, United States Hybrid / WFH Options
University of Massachusetts Amherst
database platforms such as MySQL and/or Postgres and/or Microsoft SQL in clustered environments desirable. Knowledge of system and network security, including virus and spam management, intrusiondetection, firewalls, VPN, and disaster management. Experience with system monitoring solutions such as Solarwinds. Physical Demands/Working Conditions Typical Office Environment. Work Schedule Monday - Friday 9:00am More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
CenterXchange Inc
team responsible for implementing, managing and enhancing the technology underpinning N Browns cyber security services. Youll have a good understanding of a range of tools like web application firewalls, intrusiondetection technologies, vulnerability scanners and SIEMs; and the technical knowledge to integrate them to enhance our protection. Youll also need a good understanding of the native tooling available … will you do as a Cyber Security Engineer at N Brown? To identify opportunities to improve efficiency in processes through automation Onboarding and integrating AWS native tools to enable detection and response to incidents, vulnerabilities, misconfigurations, etc in our AWS environments. Developing self-service tools for N Brown's engineering teams To work with other operational departments to ensure … of working within PCI DSS, or other compliance frameworks. Software and Technology Coding languages (Python, Teraform) Build pipeline tools (Gitlab, Jenkins) IaaS (AWS, Azure, GCP) & SIEM (ideally Splunk) Endpoint Detection and Response (EDR) tools such as MS Defender APT. Network and Host IntrusionDetection/Prevention tools Web Application Firewalls (ideally Akamai) Vulnerability scanning tools (ideally Rapid7 More ❯
or CISM accreditation. You will develop and maintain the information security architecture and will have proven experience with compliance, vulnerability management, network security, cloud security (AWS & Azure), firewalls and intrusiondetection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threat analysis and act as a subject matter expert More ❯