scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
ownership and work independently as needed to resolve customer issues. Duties and Responsibilities: Maintain Industry Training - This involves keeping up-to-date on security technologies, threats, and risk mitigation techniques Maintain Knowledge of Current Threats - Keep up-to-date on current threats by regularly reading industry-related articles Case Management - ensuring the case management process is handled efficiently … analysis for information technology is required Excellent writing and communications skills Familiarization with a variety of information and network security monitoring tools (ArcSight SIEM, QRadar SIEM, Splunk, Arbor DDoSMitigation, Cisco IDS/IPS, Netcool, and Imperva WAF, among others) Ability to work in a dynamic team-centered environment Education Preferred: Bachelors Degree in Computer Information More ❯
Automate Azure resource provisioning and configuration using Terraform, Azure Resource Manager (ARM) templates, and Ansible. Implement Azure cloud security best practices, including role-based access control (RBAC), Azure DDoSProtection, Microsoft Defender for Cloud, encryption at rest/in transit, and alignment with FedRAMP, NIST, and DoD compliance standards. Develop and manage CI/CD pipelines using GitLab More ❯
Automate Azure resource provisioning and configuration using Terraform, Azure Resource Manager (ARM) templates, and Ansible. Implement Azure cloud security best practices, including role-based access control (RBAC), Azure DDoSProtection, Microsoft Defender for Cloud, encryption at rest/in transit, and alignment with FedRAMP, NIST, and DoD compliance standards. Develop and manage CI/CD pipelines using GitLab More ❯
Amherst, Massachusetts, United States Hybrid / WFH Options
University of Massachusetts Amherst
institutional web resources. Implements, monitors, analyzes, and routinely updates web security measures in alignment with industry best practices, including web application filtering, encryption, distributed denial of service attack mitigation, and vulnerability management. Serves as Tier 3 escalation point for complex web infrastructure issues, ensuring timely resolution and providing root cause analyses. Design and implement improvements to existing processes More ❯
NAC), and VPN gateways. Support the implementation and enforcement of Trusted Internet Connections (TIC) 3.0 security capabilities. Design, deploy, and manage Cloudflare services, including Web Application Firewall (WAF), DDoSProtection, CDN, and DNS. Design, configure, and maintain Palo Alto firewalls and configure and optimize Panorama for centralized firewall management and policy deployment. Ensure secure connectivity and segmentation between More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
1st Choice Rec
Cybersecurity Consultant to join their UK team. This is a hands-on, client-facing role where you'll help businesses improve their cyber defences, especially in areas like DDoSprotection and Web Application & API Protection (WAAP). You’ll receive full training in DDoSmitigation and WAAP technologies, making this a great opportunity to … fast-growing area. Responsibilities: Conduct cybersecurity audits, simulations, and assessments Develop clear and practical recommendations for clients Deliver training and guidance to client teams Help clients improve their DDoS and WAAP readiness Stay up to date on the latest cyber threats and technologies Requirements: Essential: Experience in information security or networking Understanding of network protocols (e.g. TCP/ More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
An understanding of network and boundary protection controls for both Cloud and On-Premises solutions including but not limited to Firewalls, Network Access Control Lists, Network Security Groups, DDoSProtection, VPNs, Mail Gateways, Web Proxies, Load Balancers including Web Application Firewalls, Intrusion Prevention System, and Intrusion Detection Systems. Communication and Soft Skills Good verbal and written communication skills More ❯
and other Azure PaaS offerings. Hands-on experience with Azure DevOps for CI/CD pipeline creation and automation. Cloudflare Knowledge:Deep understanding of Cloudflare Workers, caching strategies, DDoSprotection, and WAF (Web Application Firewall). API Integration:Proficiency in interfacing with RESTful APIs and GraphQL services. Leadership Skills:Demonstrated ability to mentor and lead teams in technical More ❯