London, England, United Kingdom Hybrid / WFH Options
Barclays
controls and consider lessons learnt in order to protect the bank from potential cyber-attacks and respond to threats. Accountabilities Management of security monitoring systems, including intrusive prevention and detection systems, to alert, detect and block potential cyber security incidents, and provide a prompt response to restore normal operations with minimised system damage. Identification of emerging cyber security threats … analysis, and threat intelligence. Incident response skills, including proficiency in PCAP capture, network analysis, and traffic pattern recognition. Knowledge of attack techniques (MITRE ATT&CK framework, malware analysis, and intrusiondetection). Proficiency in analyzing network traffic (PCAP), endpoint logs, IDS/IPS alerts, and security telemetry. Stakeholder management skills, with the ability to communicate and articulate security More ❯
London, England, United Kingdom Hybrid / WFH Options
Starling Bank
DevSecOps mindset that we have created across our technology teams Requirements What skills are essential: You have an in-depth knowledge of security principles, technologies, best practices and threat detection and mitigation strategies Knowledge of common attack vectors and methodologies (OWASP Top 10, Mitre ATT&CK Framework and social engineering tactics The ability to identify potential threats, attack vectors … qualifications are a plus) Container security knowledge including container image provenance (e.g. Sigstore, Notary) with an in-depth knowledge of container runtimes Strong understanding of network protocols & practices, firewalls, intrusiondetection/prevention systems and WAFs Understanding of integrating security into the software development lifecycle Experience performing secure code reviews and security approvals including the use of static … and dynamic application security testing (SAST/DAST) tools. Experience in Cryptography management & enhancements Experience configuring and utilising cloud-native security logging, monitoring, and detection services Relevant security certifications such as ISC2 CC, CISSP, CCSP, CISM, AWS Security Specialist or GCP Professional Cloud Security Engineer Our Interview process Interviewing is a two way process and we want you to More ❯
traffic, systems, and logs for unusual or malicious activity. Conducting regular security assessments and audits to identify vulnerabilities and risks. Implementing and maintaining security tools and protocols, including firewalls, intrusiondetection systems, and endpoint protection solutions. Investigating security incidents, responding to potential breaches, and documenting findings. Leading security-focused projects across the network, Windows Desktop/Server environments More ❯
Bedford, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
highly desirable. Experience with security frameworks and standards, such as NIST, ISO 27001, CyberEssentials Plus, and CIS. Strong understanding of networking protocols, operating systems, and security technologies like firewalls, intrusiondetection/prevention systems, and SIEM. Excellent analytical, problem-solving, and communication skills. Ability to work independently and collaboratively. Strong work ethic and commitment to security best practices. More ❯
London, England, United Kingdom Hybrid / WFH Options
EVORA Global Limited
understanding of network and system architecture, including cloud environments. Familiarity with security frameworks and standards (e.g., ISO 27001). Experience with security tools and technologies (firewalls, SIEM, vulnerability scanners, intrusiondetection/prevention systems). Experience Required: Extensive experience in IT operations, cyber security, and business systems management. Proven experience in business systems analysis, implementation, and administration. Strong More ❯
London, England, United Kingdom Hybrid / WFH Options
Iceberg
trenches and know what it takes to stay ahead of threat actors. Ideally, you bring: Hands-on experience with SIEM platforms , especially Splunk. Strong familiarity with MITRE ATT&CK , intrusiondetection/prevention systems, and malware behaviour. Confidence in network traffic analysis (PCAP, NetFlow) and endpoint forensics. The ability to explain technical risk in plain English — whether you More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
PURVIEW
and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusiondetection/prevention systems, and encryption technologies. Adhere to enterprise governance & review processes to deliver project goals & deliverables. Follow enterprise ITSM & CMDB processes Monitor and analyse security alerts … network security fundamentals, encryption technologies, and secure network design principles. Zscaler Private Access & Internet Access Proficiency in configuring, managing, and troubleshooting firewalls. Cisco, Palo Alto etc,. Experience with intrusiondetection/prevention systems, as well as with SIEM tools and security incident response. Excellent problem-solving skills, analytical thinking, and the ability to communicate effectively with diverse More ❯
Stevenage, Hertfordshire, United Kingdom Hybrid / WFH Options
GlaxoSmithKline
the OT Network Security Engineer to have in-depth understanding of network architecture to design, implement, and manage secure and efficient networks and proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. The OT Network Security Engineer will have ownership and responsibility to deliver secure … and that Tech continuity plans are in place for all critical areas. People Management: Collaborate with internal owners of security technologies such as antivirus, IDS/IPS, SIEM, endpoint detection & response, configuration management, privileged identity management, etc. Why you? Basic Qualifications: We are looking for professionals with these required skills to achieve our goals: Bachelor's Degree - Technical Degree … e.g. Engineering, Information Technology In-depth understanding of network architecture to design, implement, and manage secure and efficient networks. Proficiency with cybersecurity tools (e.g., firewalls, intrusiondetection/prevention systems) and techniques to protect network integrity and respond to security incidents. Strong ability to collaborate with cross-functional teams and communicate technical insights effectively to support secure file More ❯
or CISM accreditation. You will develop and maintain the information security architecture and will have proven experience with compliance, vulnerability management, network security, cloud security (AWS & Azure), firewalls and intrusiondetection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threat analysis and act as a subject matter expert More ❯
of the role include: Advocating for infrastructure/application Security and providing support for security projects. Competence in reviewing new technologies, methodologies and integration opportunities. Support in enhancing security detection and incident response efforts/playbooks. Monitoring, remediating, and reporting on security events. Supporting team and activities required for maintaining Smart Communications standards and certification requirements. What we're … have skills and experience : At least 3 years of hands-on, proven industry experience in a similar role. Good understanding of security principles, technologies, and best practices, including threat detection and mitigation strategies. Good level of knowledge of cloud security: AWS and Azure. Experience ensuring data confidentiality, integrity, and availability throughout its lifecycle, including during transmission, storage, and processing. … An understanding of application security principals, best practices, OWASP/related standards. Knowledge of security frameworks & controls, hardening standards & security best practices. An understanding of network protocols & practices, firewalls, intrusiondetection/prevention systems and WAFs. We look for the following SMART values in everyone we hire at Smart Communications: S peak Openly - We are positive, creative, helpful More ❯
London, England, United Kingdom Hybrid / WFH Options
Smart Communications group
of the role include: Advocating for infrastructure/application Security and providing support for security projects. Competence in reviewing new technologies, methodologies and integration opportunities. Support in enhancing security detection and incident response efforts/playbooks. Monitoring, remediating, and reporting on security events. Supporting team and activities required for maintaining Smart Communications standards and certification requirements. What we’re … have skills and experience : At least 3 years of hands-on, proven industry experience in a similar role. Good understanding of security principles, technologies, and best practices, including threat detection and mitigation strategies. Good level of knowledge of cloud security: AWS and Azure. Experience ensuring data confidentiality, integrity, and availability throughout its lifecycle, including during transmission, storage, and processing. … An understanding of application security principals, best practices, OWASP/related standards. Knowledge of security frameworks & controls, hardening standards & security best practices. An understanding of network protocols & practices, firewalls, intrusiondetection/prevention systems and WAFs. We look for the following SMART values in everyone we hire at Smart Communications: S peak Openly - We are positive, creative, helpful More ❯
London, England, United Kingdom Hybrid / WFH Options
Smart Communications group
existing infrastructure/application architecture. Advocating for infrastructure/application Security Design. Reviewing new technologies and methodologies and introducing integration opportunities (where feasible). Support Management in enhancing security detection and incident response efforts/playbooks. Monitoring, remediating, and reporting on security events. Network management fundamentals are required to be able to enhance security posture across network tools. Supporting … in a similar role. Bachelor/master’s degree in computer science, Information Security, or a related field. Good understanding of security principles, technologies, and best practices, including threat detection and mitigation strategies. Good level of knowledge on cloud security architecture, specifically with Azure (preferable) and AWS. Demonstrated proven ability to ensure data confidentiality, integrity, and availability throughout its …/undertaking internal pen testing and creation of external penetration testing scopes. Knowledge of security frameworks & controls, hardening standards & security best practices. An understanding of network protocols & practices, firewalls, intrusiondetection/prevention systems, and WAFs. Our values S peak Openly - We are positive, creative, helpful, kind and we have fun. We listen and provide constructive feedback. Through More ❯
design and implementation within a Service Provider organization. Experience with security frameworks such as NIST CSF, ISO 27001, or CIS Controls. Deep understanding of security technologies , such as firewalls, intrusiondetection and prevention systems, vulnerability scanners, and endpoint protection. Strong knowledge of cloud security concepts and technologies , such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
testing Statement of Works, and manage the remediation of identified vulnerabilities. Security Tools & Technologies Advice: Provide guidance on the selection, implementation, and optimization of security tools such as firewalls, intrusiondetection systems (IDS), intrusion prevention systems (IPS), and security information and event management (SIEM) systems. Support Security Architecture & Design: Assess the design, implementation, and maintenance of developed More ❯
flows. Use Git for source control and collaboration. Write and optimize queries in SQL (PostgreSQL, MySQL, Oracle). Support the implementation and maintenance of cybersecurity tools (e.g., firewalls, antivirus, intrusiondetection systems). Participate in vulnerability assessments and help remediate identified risks. Assist with incident detection, response, and reporting. Help document security policies, procedures, and technical guidelines. More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Southern Communications Ltd
to attack vectors and security incidents, and coordinate incident response across teams Security software testing:?Test company software, firmware, and firewalls Security software design:?Design software security systems like intrusiondetection systems and firewalls Security system maintenance:?Maintainand proof network security systems Security system analysis:?Analyse security systems and seek improvements on a continuous basis? Help develop platforms More ❯
with the latest cybersecurity threats and trends and escalate risks promptly. Ensure compliance with relevant industry regulations and standards (e.g., GDPR, ISO 27001). Manage security systems, including firewalls, intrusiondetection/prevention systems, and antivirus software, in collaboration with GT. Develop and test incident response plans and coordinate responses to security incidents and breaches. Raise cybersecurity awareness More ❯
London, England, United Kingdom Hybrid / WFH Options
Sodexo
Management : Leading change initiatives to improve security posture. Performance Metrics : Establishing and monitoring KPIs to measure security program effectiveness. Technical Expertise : Deep understanding of cybersecurity technologies such as firewalls, intrusiondetection, encryption, and network security protocols. Regulatory Compliance : Knowledge of laws, regulations, and standards like GDPR, Cyber Essentials, ISO/IEC 27001, and ensuring compliance. Incident Response : Developing More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Sodexo
Management : Leading change initiatives to improve security posture. Performance Metrics : Establishing and monitoring KPIs to measure security program effectiveness. Technical Expertise : Deep understanding of cybersecurity technologies such as firewalls, intrusiondetection, encryption, and network security protocols. Regulatory Compliance : Knowledge of laws, regulations, and standards like GDPR, Cyber Essentials, ISO/IEC 27001, and ensuring compliance. Incident Response : Developing More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
Murnen Design
with the ability to influence and motivate others. Deep understanding of cyber security threats, vulnerabilities, and mitigation techniques. Experience with a wide range of security technologies and practices, including: Intrusiondetection and prevention systems (IDPS) Security information and event management (SIEM) system Vulnerability scanning and penetration testing Cloud security Identity and access management (IAM) Data loss prevention (DLP More ❯
proposals - balancing compliance, risk, and performance. Implementing and testing security components like Windows Server, Active Directory, WSUS, antivirus , backup systems , I ndustrial Network Elements , Network Management Solutions (NMS) and IntrusionDetection Solutions (IDS) . Configuring and troubleshooting routers, switches, and firewalls . Configuring and maintaining virtualized environments . Creating and maintaining as-built documentation that ensures clarity and More ❯
London, England, United Kingdom Hybrid / WFH Options
Modulr Finance Limited
Operations: Design and implement security architecture to protect critical assets, including on-premise and cloud-based systems (with a focus on AWS). Manage security technologies such as firewalls, intrusiondetection systems, data loss prevention tools, and cloud security posture management (CSPM) solutions for AWS. Oversee security operations, including monitoring, incident response, and vulnerability management, with a focus More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
KBC Technologies Group
and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusiondetection/prevention systems, and encryption technologies. Adhere to enterprise governance & review processes to deliver project goals & deliverables. Follow enterprise ITSM & CMDB processes Monitor and analyze security alerts … network security fundamentals, encryption technologies, and secure network design principles. Zscaler Private Access & Internet Access Proficiency in configuring, managing, and troubleshooting firewalls. Cisco, Palo Alto etc,. Experience with intrusiondetection/prevention systems, as well as with SIEM tools and security incident response. Excellent problem-solving skills, analytical thinking, and the ability to communicate effectively with diverse More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
N Brown Group
responsible for implementing, managing and enhancing the technology underpinning N Browns cyber security services. Youll have a good understanding of a range of security tools like web application firewalls, intrusiondetection technologies, vulnerability scanners and SIEMs; and the technical knowledge to integrate them to enhance our protection and build automated responses. Youll need a good understanding of the … creating correlation searches and dashboards is a plus. Experience of working within PCI DSS, or other compliance frameworks. Software and Technology SIEM (ideally Splunk) & IaaS (AWS, Azure, GCP) Endpoint Detection and Response (EDR) tools such as MS Defender APT. Network and Host IntrusionDetection/Prevention tools Web Application Firewalls (ideally Akamai) Vulnerability scanning tools (ideally Rapid7 More ❯
Reston, Virginia, United States Hybrid / WFH Options
RedKey Solutions
and upgrade security measures and tools for protecting information systems and networks. • Automate repeatable tasks and provide consultative support. • Design, configure, implement, troubleshoot, and maintain security platforms (e.g., firewalls, intrusiondetection/prevention, anti-virus/malware, cryptography systems, SIEM, MDM). • Formulate systems and methodologies, respond to security events, and assist in remediation efforts. • Participate in the … years of relevant experience (or equivalent experience/certifications). Preferred Qualifications: • Experience with additional security tools and processes (IDS/IPS, VPN, Webinspect, Appdetective). • Experience in incident detection, response, and forensics. • Proficiency in scripting languages (Python, PowerShell). • Experience with Cloud Computing Technologies/AWS. • Agile Software Development experience. • AWS Certification. • Knowledge of maintaining VPNs, firewalls, and More ❯