East London, London, United Kingdom Hybrid / WFH Options
MECS Communications Ltd
of the following as possible: * Security operations management * DevOps or software development roles, with a focus on security. * Security tools such as vulnerability scanners, intrusiondetection systems, & security information & event management (SIEM) solutions. * Multi cloud environments AWS & Azure etc. * Using & managing Splunk including defining data streams, indices & ingests more »
analytical and SIEM platforms. * Knowledge of network security implementations (e.g., host-based IDS, IPS), including their function and placement in a network. * Knowledge of intrusiondetection systems and signature development. * Knowledge of front-end collection systems, including network traffic collection, filtering, and selection. * Knowledge of system administration concepts more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
security Interpret and assess impact from device scanning (device discovery, Operating System (OS) fingerprinting, service scanning), and passive (non-intrusive) scanning, monitoring and operating intrusiondetection systems Act as IS focal point for cyber incidents and lead IS response to security incidents and alerts Conduct vulnerability assessments and more »
incidents. Conduct regular risk assessments and vulnerability scans to identify potential security weaknesses and prioritize remediation efforts. Implement and manage security controls, including firewalls, intrusiondetection/prevention systems, endpoint protection, and encryption technologies. Develop and deliver cyber security awareness training and education programs for employees. Qualifications/ more »
COBIT, and NIST. Strong knowledge of network security, operating systems, databases, web applications, and cloud computing. Strong understanding of security technologies, such as firewalls, intrusiondetection/prevention systems, SIEM, antivirus, and data loss prevention. Experience with security assessment tools and techniques, including vulnerability scanning and penetration testing. more »
post-incident reviews. Enable threat hunting through the fusion of threat intelligence and business risk analysis. Requirements: Strong understanding of network protocols, firewalls, and intrusiondetection/prevention systems. Proficiency in securing operating systems such as Windows, Linux, and macOS. Knowledge of large-scale security technology deployments (SIEM more »
analytical (RCA) skills. Good working knowledge of Cisco Meraki and associated technologies. Practical knowledge of Continual Service Improvement (CSI) methodologies. Vulnerability management and assessment. Intrusiondetection and prevention analysis/frameworks. Solid exposure to cloud based applications security and provisioning. Experience in writing policy, process, and standard playbooks. more »
senior engineers to assess client requirements and develop tailored OT security solutions. Assist in the deployment and configuration of security technologies, such as firewalls, intrusiondetection systems, and security information and event management (SIEM) solutions. Conduct vulnerability assessments and penetration tests to identify potential weaknesses in OT environments. more »
and safe practices Risk Assessment: Evaluate risks associated with new technologies or system changes Network Security: Advise in the configuration and maintenance of firewalls, intrusiondetection/prevention systems, and other security infrastructure Security Documentation: Maintain accurate records of security configurations, incidents, and procedures Security Policies: Help enforce more »
deployment, migration, and upkeep of Microsoft 365 cloud services. Hyper-V and VMWare infrastructures, including clustering. implement, and manage network security solutions, including firewalls, intrusiondetection/prevention systems, VPNs, and secure access controls. regular security assessments and penetration testing to identify vulnerabilities and recommend remediation measures. network more »
actions taken, and recommendations for improvement. Maintain accurate records of incidents, investigations, and security-related activities. Configure, update, and maintain security tools, including firewalls, intrusiondetection/prevention systems, endpoint protection, and SIEM solutions. Who? I would be interested in speaking with both candidates with experience in cyber more »
Cramlington, Northumberland, North East, United Kingdom
Sterling Pharma Solutions Limited
of all network hardware and equipment, including routers, switches, wireless hubs and UPSs. Assisting with management of security solutions, including firewalls, anti-virus, and intrusiondetection systems. Investigating and troubleshooting network problems and performing LAN/WAN communication repair during and after hours. Monitoring and testing network performance. more »
to diagnose and resolve complex network issues. Relevant certifications (e.g., CCNA, CCNP, CISSP) preferred. Strong knowledge of network security principles and practices, including firewalls, intrusiondetection/prevention systems, and access control. If your interested and have prior Higher Education experience please apply now more »
Stone, Staffordshire, United Kingdom Hybrid / WFH Options
yolk recruitment
resolving hardware, software, and network-related problems to minimise downtime and ensure reliability. Implementing security best practices, such as access controls, encryption, firewalls, and intrusiondetection/prevention systems, to protect against cyber threats. The experience you will bring to the team: Experience in the design, build & maintenance more »
User-ID) Solid understanding of Cisco ASA/Firepower firewalls and configuration best practices Strong knowledge of network security principles and concepts (e.g., firewalls, intrusiondetection/prevention systems, VPNs) Familiarity with security protocols (e.g., IPSec, SSL/TLS) Excellent problem-solving and troubleshooting skills Strong analytical and more »
protocols, including TCP/IP, DNS, DHCP, VLANs, and routing protocols (e.g., OSPF, BGP). with network security technologies such as firewalls, VPNs, and intrusiondetection/prevention systems. in network monitoring and management tools (e.g., Wireshark, Nagios, Cisco Prime). If you’re interested, please apply now more »
Proven experience in cyber security incident response, with a strong understanding of incident handling methodologies and best practices. Familiarity with network security monitoring tools, intrusiondetection/prevention systems, and forensic analysis tools. Knowledge of common cyber threats and attack vectors, including malware, phishing, and ransomware. Relevant certifications more »
City Of London, England, United Kingdom Hybrid / WFH Options
Computappoint
SD-WAN. Proficiency in utilizing network management and analysis tools, including LogicMonitor, Datadog, Solarwinds, Network Config Manager, and similar industry-standard products. Knowledgeable in intrusiondetection and prevention systems (IDS/IPS/AV) and other crucial network security measures. Services offered by Computappoint Limited are those of more »
assessments and threat modelling Be generally proficient in Linux operating systems (e.g., Red Hat, CentOS, Alma, ubuntu) Have familiarity with security technologies, including firewalls, intrusiondetection systems, and encryption techniques Possess professional certifications, such as CISSP, CISA, or CRISC, similar Have experience in the identification and capture of more »
On technologies. Mobile device management: Covering 300+ deployed mobile devices, applying best practice and industry standards. Cyber security and information assurance: Managing and maintaining intrusiondetection apparatus, supporting queries/investigations and hardened configuration of IT equipment. DevSecOps and Site Reliability Engineering: Supporting enterprise software teams and their more »
and best practices. Security Architecture: develop and design the cybersecurity architecture for our automotive systems, considering secure communication protocols, access controls, authentication mechanisms, and intrusion detection. Risk Assessment: perform risk assessments to evaluate the potential impact of cybersecurity threats and develop risk mitigation strategies. Regulatory Compliance: ensure compliance with more »
change the landscape of FICO network operations.” – Senior Manager, Network Engineering. What You’ll Do Design and manage security solutions, including firewall, and network intrusiondetection systems. Manage all network hardware and equipment, including routers, switches, and UPSs. Implement and maintain all equipment, hardware, and software upgrades. Implement … operate worldwide: Credit Scoring — 150+ billion FICO Scores have been sold to date, making it the most used credit score in the world. Fraud Detection and Security — 2.6+ billion payment cards globally are protected by FICO fraud systems. Lending — 3/4 of US mortgages are approved using the more »
SOC experience and a knack for investigation Proficiency in Sentinel or Splunk SIEM Familiarity with Mitre Att&ck Framework Skilled in log analysis and intrusiondetection Detail-oriented with organizational prowess Ability to secure and maintain eSC level clearance Basic knowledge of networking and security tools Advance your more »
LS1, Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Picture More Ltd
development and implementation of Azure security-related technologies An excellent understanding of infrastructure and application technologies An excellent understanding of security technologies: SIEM, firewalls, intrusiondetection/prevention systems, anti-virus software, authentication systems, log management, content filtering, etc. An excellent understanding of security approaches: ISMS, risk analysis more »
excellence. Maintain security measures to protect systems, networks, and data from unauthorised access, cyber threats, and malware, installing and maintaining firewalls, antivirus software, and intrusiondetection systems, and conducting security audits and assessments. Document and maintain accurate records of technical configurations, procedures, and troubleshooting steps. Stay current with more »