Our client, the UK's trusted Ministry of Defence partner, is seeking an experienced SOC Threat Detection Analyst to join the cyber security operations centre (SOC) within Information Management (IM). The successful candidate will support Senior SOC analysts in addressing the challenges of countering cyber threats, driving a proactive ethos in a dynamic environment, and providing robust threat … the UK InfoSec Team, and the IM Domains (Customer Support and Infrastructure/Information Systems). Responsibilities cover analysis, monitoring, reporting, alerting, and investigation activities using a variety of security platforms, including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture, Anti-Malicious Code, and Threat Detection technologies across the UK Network … incident response team with investigations that need to be escalated to an embedded staff member. The SOC Analyst key responsibilities are: Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of MBDA Security technologies Assisting the SOC Solutions Lead with project More ❯
Employment Type: Contract
Rate: £45.00 - £85.00/hour In IR35 (PAYE & Umbrella) available
successful implementation. Key Responsibilities: Lead and manage networking-related projects from initiation to completion, ensuring timely delivery and alignment with business objectives. Work closely with cross-functional teams, including network engineers, system architects, and developers, to design and implement scalable networking solutions. Develop detailed project plans, allocate resources, and monitor progress to ensure milestones and deliverables are met. Provide … technical guidance on networking protocols, infrastructure design, and security best practices. Identify potential risks, develop mitigation strategies, and ensure compliance with industry standards and regulatory requirements. Collaborate with stakeholders to translate business requirements into technical solutions and facilitate smooth project execution. Optimize network performance and troubleshoot technical issues in collaboration with the engineering team. Prepare reports, documentation, and … stakeholders, ensuring transparency and effective communication. What We're Looking For: Technical Skills: Strong understanding of networking protocols (TCP/IP, BGP, OSPF, MPLS, VPN, etc.). Experience with network infrastructure, including routers, switches, firewalls, and load balancers. Hands-on experience with cloud networking (AWS, Azure, Google Cloud) and SDN (Software-Defined Networking). Knowledge of networksecurityMore ❯
Role: Cyber Security Consultant Location: Leeds, West Yorkshire Salary: £60,000 - £75,000 PLUS 25 Days Holiday, Vendor Certifications, International Travel, Private Pension About the Company: Our client, a global leader in Sustainability Consulting, is looking for a Cybersecurtiy Consultant to join their growing Information Security Team. This exciting role provides an opportunity to shape and strengthen security … a strong technical background, and thrive in a fast-paced environment, we want to hear from you. Position Overview: As a Cybersecurity Consultant, you will collaborate with the IT Security Team to advise, develop, and maintain security processes and policies. Your expertise will guide the organization in enhancing security capabilities across its global infrastructure. This role offers … a chance to make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly, and monthly monitoring of systems and resolving More ❯
A large enterprise organisation is seeking an experiencedLevel 3 SOC Analyst for an initial 6-month rolling contract. This is a key role within a mature and well-established Security Operations Centre, offering the opportunity to work on complex threats and contribute to a high-performing cybersecurity function. This is a challenging, rewarding role for a seasoned SOC professional … make a tangible impact. Apply now to join a team focused on protecting enterprise assets against evolving cyber threats. Key Responsibilities: Lead investigations and response efforts for high-severity security incidents. Conduct proactive threat hunting using Microsoft Sentinel and the Defender suite. Develop and fine-tune analytic rules, workbooks, and automation playbooks in Sentinel. Perform deep-dive analysis of … malware, phishing, and lateral movement techniques. Collaborate with engineering teams to optimise Microsoft security tool integrations. Maintain and enhance incident response procedures and documentation. Skills/Must have: Over 5 years of experience in cybersecurity, including a minimum of 2 years in a Level 3 SOC or equivalent role. Expert-level proficiency with Microsoft Sentinel, including KQL, custom analytic More ❯
The goal is to deliver a seamless, high-quality, and interactive experience for both internal teams and external clients. You'll be working on challenges such as data synchronization , network performance optimization , and video stream security . xSTUDIO is already in daily use by over 7,000 artists, producers, and supervisors across DNEG. Now, we're pushing the … Degree in Computer Science, Engineering or similar, or equivalent experience Strong programming skills in modern C/C++ (2011, 2017) A good understanding of networking technologies, protocols and physical network infrastructure Knowledge of networksecurity and data encryption Ability and enthusiasm for learning new technologies and APIs rapidly Interpersonal: Excellent written, verbal, and graphical communication Experience drafting … technical documentation Working experience in the Agile Development model Knowledge of product development best practices Nice to have: Familiarity with video codecs, encode/decode APIs (e.g. ffmpeg) and network video streaming Experience of software development in a Linux environment (shells, version management etc) Experience of cross platform development including exposure to MacOS and Windows environments An understanding of More ❯
IT Service Desk Engineer (1st Line) Full-time Company Profile An exciting, forward-thinking and innovative provider of complete, bespoke, managed IT, communication and networksecurity solutions for businesses of all sizes for over 10 years. Now hiring for multiple talented IT Support Engineers to join the team due to continued growth and expansion in customer base and … demand. They offer and encourage development and progression, with the opportunity of great career with unrivalled job security and stability. Job Profile The job will suit skilled IT support engineers with a minimum of 1 year proven and demonstrable experience within a Managed Service Provider (MSP) environment. The successful candidates will need a customer focused approach and a commitment More ❯
success, driving adoption, value realization, and customer satisfaction while partnering closely with Sales, Technical Services, Product, and Engineering. You'll combine relationship management with a strong grasp of IT security infrastructure to guide customers through successful adoption and expansion. Reporting to: VP, Global Customer Success Location : UK (Home office) Direct employment Responsibilities: Drive Customer Adoption: Identify adoption gaps, build … Internally: Represent the customer's voice and ensure their needs are championed across the organization. Requirements: 5+ years in Customer Success or similar roles within enterprise software, preferably in security or systems integration. Proven experience managing strategic and enterprise-level customers with measurable success. Strong understanding of networksecurity, governance, audit, risk, and compliance practices. Customer-first … mindset, highly proactive, and comfortable with client-facing engagements (calls/visits). Excellent consulting, project management, and data-driven decision-making skills. Solid knowledge of security tech (firewalls, IDS/IPS, SDN, compliance) and APIs (Java, REST). Familiarity with infrastructure, cloud (public/private/hybrid), and networking (LAN/WAN). Resilient and adaptable in dynamic More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
CACI Limited
You will play a pivotal role in designing, implementing, and overseeing advanced cloud infrastructure solutions for mission-critical systems. In this role, you will use your deep knowledge of security architecture on cloud platforms to provide technical leadership and strategic direction in building scalable, secure, and resilient cloud-native systems based on AWS, Kubernetes, Kafka, microservices, Java, and event … cloud-based systems and solutions, utilising AWS and modern architectural patterns such as microservices, event-driven architectures, and serverless computing to meet both current and future business needs. • Cloud Security: Develop and implement robust security architectures for cloud solutions, ensuring data protection, regulatory compliance, and alignment with industry best practices (e.g., AWS IAM, encryption, VPC, security monitoring … with a focus on Java-based backend services. • Technical Leadership: Provide technical leadership and mentorship to architecture and development teams, guiding them through complex technical challenges and architectural decisions. • Security & Compliance: Ensure that cloud architectures are compliant with industry regulations (e.g., GDPR, HIPAA) and company security policies, and implement security controls across the infrastructure. • CI/CD More ❯
Functions. Monitor system health and performance using tools like Prometheus, Grafana, or Datadog or NewRelic. Collaborate closely with development teams to automate builds, performance tests, and deployments. Ensure system security, compliance, and best practices are followed in deployment pipelines. Ensure networksecurity with VCN across deployments and infrastructure for public and private access control. Troubleshoot infrastructure and … version control (e.g., Git). Preferred qualifications: Certifications (e.g., OCI Certified, Certified DevOps Engineer). Experience with service mesh, Helm, or advanced Kubernetes features. Understanding of networking, firewalls, and security best practices. Exposure to agile and DevOps cultures and methodologies. Design, implement, and maintain container orchestration systems such as Kubernetes or ECS. Experience with container orchestration i.e, Kubernetes or More ❯
vendors. Coordinate plans for SCADA hardware and software changes and enhancements with other stakeholders. Develop necessary policies, procedures and methodologies to support and maintain SCADA infrastructure, including adequate OT networksecurity for SCADA systems. Ensure that SCADA infrastructure is adequately documented. Ensure internal process documentation is adequate. Develop, update and assure conformance to documentation standards required by policy. … technical experience is required.) A minimum of seven years of experience with SCADA systems. A minimum of three years of direct people management experience. Advanced technical knowledge of SCADA, network and telecommunication technologies, and a thorough understanding of enterprise OT environments including hardware configurations, energy management systems, and disaster recovery practices. Knowledge of SCADA, utility and information technology terms More ❯
redhat family OS, including RHEL, Alma and some legacy CentOS Core internet applications protocols DHCP/DNS Monitoring Systems Icinga2/Elastic Stack/InfluxDB/Grafana Application and networksecurity best practices SSH/Iptables/TLS AWS (EC2/VPS/RDS/EKS/S3) Terraform Databases PostgreSQL/MySQL CI/CD and DevOps More ❯
redhat family OS, including RHEL, Alma and some legacy CentOS Core internet applications protocols – DHCP/DNS Monitoring Systems – Icinga2/Elastic Stack/InfluxDB/Grafana Application and networksecurity best practices – SSH/Iptables/TLS AWS (EC2/VPS/RDS/EKS/S3) Terraform Databases – PostgreSQL/MySQL CI/CD and DevOps More ❯
Security Engineer Remote with occasional trave to their London office 10 - 12 month contract - starting in August Inside IR35 £450 - £475pd iO are working with an established and successful Consultancy in their search for an experienced NetworkSecurity Engineer They have a global presence providing expertise in Cloud, Security and Networking. They provide services from Strategy … and design through to implementation and support This position is critical for designing, implementing, managing, and optimizing the organization's complex network infrastructure, ensuring its stability, security, and scalability, particularly during critical transition and integration phases To be considered for this role you must have experience in the following: Palo Alto Networks Firewalls/Global Protect/decryption …/DLP Fortinet Juniper Routers/Firewalls Good with knowledge of network automations and infrastructure as code Terraform, Ansible and Git Interested in hearing more? Please get in touch with Rebecca Long on/ More ❯
Security Engineer Remote with occasional trave to their London office 10 - 12 month contract - starting in August Inside IR35 £450 - £475pd iO are working with an established and successful Consultancy in their search for an experienced NetworkSecurity Engineer They have a global presence providing expertise in Cloud, Security and Networking. They provide services from Strategy … and design through to implementation and support This position is critical for designing, implementing, managing, and optimizing the organization's complex network infrastructure, ensuring its stability, security, and scalability, particularly during critical transition and integration phases To be considered for this role you must have experience in the following: Palo Alto Networks Firewalls/Global Protect/decryption …/DLP Fortinet Juniper Routers/Firewalls Good with knowledge of network automations and infrastructure as code Terraform, Ansible and Git Interested in hearing more? Please get in touch with Rebecca Long on 0117 332 8100/r.long @ ioassociates.co.uk More ❯
Job Number: 304 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 2 (304) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 120K- 130K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in … developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Develop new tradecraft needed to perform this analysis as technologies … Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area More ❯
Job Number: 301 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 2 (301) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 120K- 130K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in … developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Develop new tradecraft needed to perform this analysis as technologies … Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area More ❯
Job Number: 257 Job Category: GovTech Job Title: TARGET DIGITAL NETWORK ANALYST (257) - UTAH - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Draper UT Salary: 190K-230K Background Conducting advanced analysis of collection and open-source data to generate insights and leads, ensure target continuity, profile targets … tasking, and analysis Identifying intelligence gaps to tailor current collection or enable new collection to close the gaps; employing multiple analysis disciplines such as pattern recognition against targets' communications, network usage and digital footprints Applying knowledge and understanding of IC needs and missions, as well as the targets' culture, behaviors, and communications technologies Mentoring other analysts on the tools … Relevant experience must be in computer or information systems design/development/analysis roles may include may also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Excellent communication and collaboration skills to interface across NSA More ❯
war on terror. Subsidium and its employees are committed to mission accomplishment and organizational excellence. Location: Naval Station Norfolk, VA Salary Range: $60,000-$62,000 Job Summary: The Network Operations Specialist is responsible for the installation, configuration, management, and troubleshooting of network devices and infrastructure supporting JECC operations. This role ensures the reliability, security, and performance … of network systems across multiple environments, including SIPRNet, NIPRNet, JWICS, and other networks. The specialist collaborates with service providers to maintain network functionality and resolve issues promptly, ensuring mission-critical operations are supported effectively. Responsibilities/Duties: Network Device Management: Install, configure, update, manage, and remove network-enabled devices and associated software. Perform initial troubleshooting to … identify and resolve network device issues in coordination with service providers. Controlled Interfaces/Security Devices: Work closely with Computer Network Defense Service Providers (CNDSP) to install, configure, and manage networksecurity and controlled interface devices. Ensure compliance with DoD security policies and guidelines. Performance Monitoring: Monitor network infrastructure performance using authorized tools More ❯
Job Description 2nd Line NetworkSecurity Engineer Location: Bracknell This role is shift-based We are seeking a shift-based engineer to provide 24x7x365 support for gateway, sensor, and DHCP technologies. The role involves technical oversight and guidance for shift technicians managing security enforcement devices, resolving complex faults, and liaising with Third Line support for escalations. Our … purpose is to make the world more sustainable by building trust in society through innovation. As a Security Engineer, you will contribute by ensuring the operational effectiveness of our security technologies. Your role Your responsibilities include providing continuous support for gateway, sensor, and DHCP technologies, offering technical oversight and expertise to shift technicians responsible for managing security … complex faults, liaise with the Third Line team for escalations, and cover technician responsibilities when needed. Your experience Experience in technical support within a service operations environment. Understanding of network concepts such as communication protocols and security technologies. Good communication skills. Ability to develop positive working relationships across teams to achieve business objectives. Please note: It's worth More ❯
Job Number: 303 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 2 (303) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 125K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing … detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Involved in developing new tradecraft needed to perform this analysis as … + 2 yrs Relevant experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area More ❯
Job Number: 302 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 2 (302) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 125K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing … detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Involved in developing new tradecraft needed to perform this analysis as … + 2 yrs Relevant experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area More ❯
Job Number: 308 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 3 (308) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Annapolis Junction MD Salary: 150K- 155K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in … developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Involved in developing new tradecraft needed to perform this analysis … + 4 yrs Relevant experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area More ❯
Job Number: 395 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 4 (395) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: AK Anchorage Salary: 210K -215K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in … developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Involved in developing new tradecraft needed to perform this analysis … + 7 yrs Relevant experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area More ❯
Job Number: 312 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 3 (312) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 150K- 155K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in … developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Involved in developing new tradecraft needed to perform this analysis … + 4 yrs Relevant experience must be in computer or information systems design/development/analysis. May also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area More ❯