examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity analysts to detect, mitigate, and analyze threats. … meetings and provides expert input to ensure security is maintained. Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusiondetection and prevention, eDiscovery, and content filtering. Ability to manage and continuously improve upon vulnerability management program. Ability to propose solutions for closing more »
classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who more »
an IT Security Analyst, with a focus on Microsoft technologies and SIEM tools. - In-depth knowledge of security principles, protocols, and technologies, including firewalls, intrusiondetection/prevention systems, and endpoint security solutions. - Hands-on experience with Microsoft Azure, Active Directory, and related security features. - Proficiency in configuring more »
London, England, United Kingdom Hybrid / WFH Options
IP People Ltd
have been compromised with Ransomware/Data breaches. Tech, Experience & Qualifications: Experience working in Managed service provider (MSP) environments. Network security principles, including firewalls, intrusiondetection/prevention systems, and VPN technologies. Fortinet Firewall, FortiSIEM, FortiEDR beneficial or equivalent firewalls Certifications in relevant technologies such as Microsoft Azure more »
East London, London, United Kingdom Hybrid / WFH Options
MECS Communications Ltd
of the following as possible: * Security operations management * DevOps or software development roles, with a focus on security. * Security tools such as vulnerability scanners, intrusiondetection systems, & security information & event management (SIEM) solutions. * Multi cloud environments AWS & Azure etc. * Using & managing Splunk including defining data streams, indices & ingests more »
post-incident reviews. Enable threat hunting through the fusion of threat intelligence and business risk analysis. Requirements: Strong understanding of network protocols, firewalls, and intrusiondetection/prevention systems. Proficiency in securing operating systems such as Windows, Linux, and macOS. Knowledge of large-scale security technology deployments (SIEM more »
on’ IT Security analysis and engineering experience including securing systems, networks and infrastructure; operational support, including on-call experience.3+ years’ experience including combination of intrusiondetection, malware analysis, forensics and/or incident response, particularly in cloud environments. Working knowledge of cloud environments such as AWS. Monitor, tune more »
SD-WAN. Proficiency in utilizing network management and analysis tools, including LogicMonitor, Datadog, Solarwinds, Network Config Manager, and similar industry-standard products. Knowledgeable in intrusiondetection and prevention systems (IDS/IPS/AV) and other crucial network security measures. To be considered, please ensure you complete your more »
London, England, United Kingdom Hybrid / WFH Options
Amberstone Security
across the UK and Europe. Key Duties & Responsibilities will include: TSS (temporary) Install works will include the following. •Solar Powered CCTV towers •Wasps (perimeter intrusiondetection) •RSI Videofied Systems •Wireless fire systems including WES and Howler Systems •Full hard-wired CCTV Systems complete with Portable towers (Bastions) •Lewis more »
products, and would suit an experienced engineer with deep knowledge of security principles in line with the CISSP CBK domains such as security monitoring, intrusion prevention & detection, network security, endpoint management & protection, identity management, threat detection, vulnerability management. Whilst the position entails significant exposure to vendor products more »