Security Engineering teams with hands-on consultancy focused on WAF tuning and efficacy testing across F5 and cloud-native WAFs (covering at least two out of three major CSPs: AWS, Azure, GCP). A focus on tuning rules, analysing data, reducing false positives, and validating control efficacy in production-like conditions. Scope Includes: SOC/Threat/Forensics or CSIRT More ❯
Security Engineering teams with hands-on consultancy focused on WAF tuning and efficacy testing across F5 and cloud-native WAFs (covering at least two out of three major CSPs: AWS, Azure, GCP). A focus on tuning rules, analysing data, reducing false positives, and validating control efficacy in production-like conditions. Scope Includes: SOC/Threat/Forensics or CSIRT More ❯
Security Engineering teams with hands-on consultancy focused on WAF tuning and efficacy testing across F5 and cloud-native WAFs (covering at least two out of three major CSPs: AWS, Azure, GCP). A focus on tuning rules, analysing data, reducing false positives, and validating control efficacy in production-like conditions. Scope Includes: SOC/Threat/Forensics or CSIRT More ❯
Security Engineering teams with hands-on consultancy focused on WAF tuning and efficacy testing across F5 and cloud-native WAFs (covering at least two out of three major CSPs: AWS, Azure, GCP). A focus on tuning rules, analysing data, reducing false positives, and validating control efficacy in production-like conditions. Scope Includes: SOC/Threat/Forensics or CSIRT More ❯
Security Engineering teams with hands-on consultancy focused on WAF tuning and efficacy testing across F5 and cloud-native WAFs (covering at least two out of three major CSPs: AWS, Azure, GCP). A focus on tuning rules, analysing data, reducing false positives, and validating control efficacy in production-like conditions. Scope Includes: SOC/Threat/Forensics or CSIRT More ❯
Security Engineering teams with hands-on consultancy focused on WAF tuning and efficacy testing across F5 and cloud-native WAFs (covering at least two out of three major CSPs: AWS, Azure, GCP). A focus on tuning rules, analysing data, reducing false positives, and validating control efficacy in production-like conditions. Scope Includes: SOC/Threat/Forensics or CSIRT More ❯
Security Engineering teams with hands-on consultancy focused on WAF tuning and efficacy testing across F5 and cloud-native WAFs (covering at least two out of three major CSPs: AWS, Azure, GCP). A focus on tuning rules, analysing data, reducing false positives, and validating control efficacy in production-like conditions. Scope Includes: SOC/Threat/Forensics or CSIRT More ❯
Security Engineering teams with hands-on consultancy focused on WAF tuning and efficacy testing across F5 and cloud-native WAFs (covering at least two out of three major CSPs: AWS, Azure, GCP). A focus on tuning rules, analysing data, reducing false positives, and validating control efficacy in production-like conditions. Scope Includes: SOC/Threat/Forensics or CSIRT More ❯
Security Engineering teams with hands-on consultancy focused on WAF tuning and efficacy testing across F5 and cloud-native WAFs (covering at least two out of three major CSPs: AWS, Azure, GCP). A focus on tuning rules, analysing data, reducing false positives, and validating control efficacy in production-like conditions. Scope Includes: SOC/Threat/Forensics or CSIRT More ❯
Security Engineering teams with hands-on consultancy focused on WAF tuning and efficacy testing across F5 and cloud-native WAFs (covering at least two out of three major CSPs: AWS, Azure, GCP). A focus on tuning rules, analysing data, reducing false positives, and validating control efficacy in production-like conditions. Scope Includes: SOC/Threat/Forensics or CSIRT More ❯
Security Engineering teams with hands-on consultancy focused on WAF tuning and efficacy testing across F5 and cloud-native WAFs (covering at least two out of three major CSPs: AWS, Azure, GCP). A focus on tuning rules, analysing data, reducing false positives, and validating control efficacy in production-like conditions. Scope Includes: SOC/Threat/Forensics or CSIRT More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Networking People (UK) Limited
Security Engineering teams with hands-on consultancy focused on WAF tuning and efficacy testing across F5 and cloud-native WAFs (covering at least two out of three major CSPs: AWS, Azure, GCP). A focus on tuning rules, analysing data, reducing false positives, and validating control efficacy in production-like conditions. Scope Includes: SOC/Threat/Forensics or CSIRT More ❯
Handsworth, Birmingham, United Kingdom Hybrid / WFH Options
Networking People (UK) Limited
Security Engineering teams with hands-on consultancy focused on WAF tuning and efficacy testing across F5 and cloud-native WAFs (covering at least two out of three major CSPs: AWS, Azure, GCP). A focus on tuning rules, analysing data, reducing false positives, and validating control efficacy in production-like conditions. Scope Includes: SOC/Threat/Forensics or CSIRT More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
Networking People (UK) Limited
Security Engineering teams with hands-on consultancy focused on WAF tuning and efficacy testing across F5 and cloud-native WAFs (covering at least two out of three major CSPs: AWS, Azure, GCP). A focus on tuning rules, analysing data, reducing false positives, and validating control efficacy in production-like conditions. Scope Includes: SOC/Threat/Forensics or CSIRT More ❯
Experience with complex IT integrations, carve-outs and cloud migrations * Excellent stakeholder and vendor management skills * PRINCE2 or equivalent project management expertise * Knowledge of enterprise IT environments (Azure/AWS, networking, cybersecurity) * Ideally ITIL v4 Intermediate+ certified * Background in infrastructure, enterprise architecture or transformation will be highly favoured London based (initially 4 days per week onsite, dropping to 3 once More ❯
Experience with complex IT integrations, carve-outs and cloud migrations * Excellent stakeholder and vendor management skills * PRINCE2 or equivalent project management expertise * Knowledge of enterprise IT environments (Azure/AWS, networking, cybersecurity) * Ideally ITIL v4 Intermediate+ certified * Background in infrastructure, enterprise architecture or transformation will be highly favoured London based (initially 4 days per week onsite, dropping to 3 once More ❯
have a proven track record of winning direct awards in the public sector over several years. Leveraging partnerecosystems - You have knowledge and experience with partner-based sales, specifically with AWS and Azure, and multi-supplier sales. Tech-enabled and results-focused - You confidently use digital tools, AI and data to work smarter, make informed decisions, and drive real impact - staying More ❯
engineering, enterprise architecture, service management, management advisory services, and administrative/clerical support. Minimum eight years' experience leading data modeling, data warehousing, and data migration activities Eight years of AWS console and RDMS experience Eight years of Oracle database experience Five years of Informatica experience in implementing and supporting IICS, PowerCenter, and IDQ. Five years of experience as a business More ❯
risk and audit management Panorays – Third-party risk tooling Rapid7/Armis – Vulnerability management and threat detection Proofpoint – Phishing and awareness platform Microsoft Purview – Data governance and compliance Azure & AWS – Cloud IAM, encryption, monitoring (Sentinel experience valued) Why this role? High-impact GRC project work tied to new market expansion Strong internal security culture: backed by a collaborative team and More ❯
risk and audit management Panorays – Third-party risk tooling Rapid7/Armis – Vulnerability management and threat detection Proofpoint – Phishing and awareness platform Microsoft Purview – Data governance and compliance Azure & AWS – Cloud IAM, encryption, monitoring (Sentinel experience valued) Why this role? High-impact GRC project work tied to new market expansion Strong internal security culture: backed by a collaborative team and More ❯
Hanover, Maryland, United States Hybrid / WFH Options
ICS Nett, Inc
demands excellence in information security? If so, we have a thrilling opportunity for you! Position Overview: As an Information Windows or Linux System Security Administrator-Redhat/Amazon Linux- AWS Cloud , with SIEM experience Elastic and Or Splunk you will be at the forefront of ensuring the highest standards of information security operations for the Department of Defense. Red Team More ❯
pressure. Effective stakeholder engagement, alignment, and ethical decision-making. Fluent in English, both written and spoken. Skills: IT project and service delivery Enterprise network architecture Cloud computing (Azure, O365, AWS) Virtualization and hyperconverged infrastructure Cybersecurity and risk management IT governance and compliance Wireless network design and implementation Automation and digital transformation Vendor management and procurement Performance tuning and capacity planning More ❯
risk and audit management Panorays – Third-party risk tooling Rapid7/Armis – Vulnerability management and threat detection Proofpoint – Phishing and awareness platform Microsoft Purview – Data governance and compliance Azure & AWS – Cloud IAM, encryption, monitoring (Sentinel experience valued) Why this role? High-impact GRC project work tied to new market expansion Strong internal security culture: backed by a collaborative team and More ❯