Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
South Carolina, United States Hybrid / WFH Options
Arrow Electronics, Inc
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
LS1, Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Picture More Ltd
development and implementation of Azure security-related technologies An excellent understanding of infrastructure and application technologies An excellent understanding of security technologies: SIEM, firewalls, intrusiondetection/prevention systems, anti-virus software, authentication systems, log management, content filtering, etc. An excellent understanding of security approaches: ISMS, risk analysis more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Hitachi Energy
solutions. Experience with scripting languages and automation technologies. Experience with port-, vulnerability-, and malware scanners, able to digest and communicate the output. Knowledge of intrusiondetection systems, security information event monitoring, application control and other Security-relevant systems is a major plus. Knowledge of or experience in DataBase more »
products, and would suit an experienced engineer with deep knowledge of security principles in line with the CISSP CBK domains such as security monitoring, intrusion prevention & detection, network security, endpoint management & protection, identity management, threat detection, vulnerability management. Whilst the position entails significant exposure to vendor products more »