analytic platforms. The Contractor shall be directly responsible for solutions related to the Sponsor's analytic work in these key areas: availability, latency, performance, efficiency, documentation, change management, monitoring, security, emergency response, and capacity planning. The Contractor shall apply, develop and deploy cloud microservices and integration of cloud resources with on prem high performance computation servers to support the … and minimize proprietary dependencies at the direction of the Sponsor. The Contractor shall use a microservice-based architecture and agile coding for engineering and development activities to support reliable network performance, modern resource management, and security processes. The Contractor shall develop analytical software packages, pipelines, and custom virtual environments for deployment in secure environments including standalone workstations, standalone … compute clusters, secure cloud environments, and on-premises network infrastructure. 1. Demonstrated experience with Python, Bash, and Terraform. 2. Demonstrated experience Anaconda for development purposes. 3. Demonstrated experience building and maintaining CI/CD pipelines with software such as source control (Git/GitHub), continuous build/delivery (Jenkins), issue management (Jira), and documentation/collaboration (Confluence). 4. More ❯
As part of a large Cloud Migration programme my client is looking to hire and experienced Google Cloud Security Architect on a 1 year rolling remote working contract Role: Design and implement secure cloud architectures and strategies on GCP. Evaluate and recommend security tools, services and configurations to strengthen cloud security posture. Ensure compliance with security standards and frameworks such as ISO 27001, NIST, CIS, GDPR and others. Lead threat modelling, risk assessments, and security reviews for GCP infrastructure and applications. Define and enforce Identity and Access Management (IAM) policies, including roles, permissions and service accounts. Implement and maintain security monitoring, logging, and alerting tools (e.g., Cloud Logging, Cloud Monitoring, SCC). Skills … Extensive experience in cloud security architecture, with at least 3 years on Google Cloud Platform. Deep understanding of GCP services such as VPC, IAM, Cloud Armor, KMS, SCC, GKE and others. Strong knowledge of security protocols, authentication, authorisation, encryption and network security. Experience implementing Infrastructure as Code (IaC) with tools like Terraform or Deployment Manager. Familiarity with More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
TXP
Job Title: Complex Delivery Network Engineer Role Type: Contract Contract Length: 3 months initial Location: Fully Remote Do you have the technical expertise and proactive mindset needed to thrive in a fast-paced, enterprise-level organisation? If so, we want to hear from you! Our client is seeking an experienced Network Engineer to join their team, contributing to … the success of multiple high-impact projects. In this role, you'll apply your technical expertise to build secure, scalable, and resilient network infrastructures, while collaborating with a wide range of stakeholders. Key Responsibilities Design, implement, and support network infrastructure solutions for enterprise environments. Manage multiple projects while ensuring timely and high-quality deliverables. Consolidate technical knowledge from … various sources into end-to-end solutions that meet business and regulatory requirements. Communicate complex solutions to technical and non-technical stakeholders. Ensure networksecurity compliance and best practice is maintained across all projects. Essential Skills & Qualifications Cisco Certified - Minimum CCNP Enterprise Fortinet FortiGate Associate or Professional F5 LTM/GTM Certified Technical Specialist Cisco Routing and Switching More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
TXP
Job Title: Complex Delivery Network Engineer Role Type: Contract Contract Length: 3 months initial Location: Fully Remote Do you have the technical expertise and proactive mindset needed to thrive in a fast-paced, enterprise-level organisation? If so, we want to hear from you! Our client is seeking an experienced Network Engineer to join their team, contributing to … the success of multiple high-impact projects. In this role, you'll apply your technical expertise to build secure, scalable, and resilient network infrastructures, while collaborating with a wide range of stakeholders. Key Responsibilities Design, implement, and support network infrastructure solutions for enterprise environments. Manage multiple projects while ensuring timely and high-quality deliverables. Consolidate technical knowledge from … various sources into end-to-end solutions that meet business and regulatory requirements. Communicate complex solutions to technical and non-technical stakeholders. Ensure networksecurity compliance and best practice is maintained across all projects. Essential Skills & Qualifications Cisco Certified - Minimum CCNP Enterprise Fortinet FortiGate Associate or Professional F5 LTM/GTM Certified Technical Specialist Cisco Routing and Switching More ❯
on for the details and apply to make the most of your career. You like to do this: Conduct in-depth target analysis and research. Apply knowledge of computer security principles, vulnerability analysis, and exploitation methods. Develop innovative tradecraft, exploitation techniques, and concepts of operation. Leverage knowledge of AMOD and proficiency in AMOD tools. Work closely with operators and … variety of problems. Adapt to new information, changing conditions, and unexpected obstacles. You're required to have this: Clearance: Active TS/SCI with polygraph Degree Type: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security … experience requirement (i.e., 24-week JCAC course will count as 6 months of experience). You could also have this: Engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. SALARY RANGE: $90,000 to $157,000 The BlueHalo More ❯
Information Security & Risk Specialist (ISO 27001:2022) - Energy Location: Brussels Hybrid: 2 days a week My client is looking for an Information Security Specialist to join the team in Brussels. The successful candidate will have the opportunity to work in a hybrid model, allowing for a blend of remote and in-office work to support a good work … life balance. You will work within the Service Delivery team. You will be managing all security related activities for the software development and service coordination in scope of the business. This role will expand in the future into further business areas with a long-term security impact beyond. Responsibilities and tasks Maintain and continuously improve the specific security policies. Ensure security integration into the Software Development Lifecycle (SSDLC) by collaborating with product owners to implement security best practices. Lead and follow up on non-functional security testing (code scanning, penetration testing, threat modelling) and the yearly security auditing campaign, ensuring follow-up as part of the risk management process. Manage the related securityMore ❯
Create, maintain, evolve, and brief engineering documents at the Customer's approval board meeting. • The Candidate shall Support technical, architectural, and engineering discussions with the Customer's architecture and network engineering teams. • The Candidate shall Work collaboratively with multiple IT development and engineering teams to document, plan, and implement technological changes. • The Candidate shall collaborate with Customer IT, security, and stakeholders to implement and manage the network and associated infrastructure to transfer data from one domain to another and provide access to partner networks and applications. • The Candidate shall provide and monitor audit logs to meet network and infrastructure security requirements. • The Candidate shall complete required accreditation documentation and maintain approved and authorized accreditation status … Demonstrated experience evaluating cloud strategy and services, and selecting appropriate cloud services to design and deploy an capability based on given requirements. • Demonstrated experience designing, developing, and maintaining various network environments, including modern/current cloud environments. • Demonstrated experience building current technology servers and workstations: providing technical configuration, setup, installation services, hardware and coordination, and maintaining to current workstation More ❯
SECURITY CLEARANCE: Active Top Secret with SCI eligibility. Ability to obtain DHS Suitability. LOCATION: Based out of Arlington, Virginia HOURS OF OPERATION: You will be required to perform the services specified in this task order between the operating hours of 9:00 AM and 5:00 PM (ET) Monday through Friday except on Federal holidays or when the Government … to Government agencies and critical infrastructure owners who experience cyber-attacks. MicroSys provides HIRT advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation, using host-based, network-based and cloud-based cybersecurity analysis capabilities. Team personnel provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity. MicroSys is …/SCI clearance • Must be able to obtain DHS Suitability • 5+ years of directly relevant experience • Good understanding of intelligence analytical methods and sources • Demonstrated ability to integrate cyber security related data from relevant sources into investigative or analytical products • Ability to work within a multi-disciplined team • Must be able to work collaboratively across agencies and physical locations More ❯
ICT Network Leader Salary: £50,646 – £55,710 per annum (Scale PO4 – PO5, Spine points 37 – 42) Full-time, All Year Round Hours: 35 hours per week (Monday to Friday – times tbc) Required for: As soon as possible Application Closing Date: Wednesday 16th July 2025 at 8.30am Interview Date: TBC Please note that Cardinal Pole reserves the right to … prior to the closing date Starting salary dependent on experience Why Work For Us? Firstly, thank you for taking the time to consider applying for the post of ICT Network Leader. Our school is built on strong foundations of discipline and moral purpose. We offer a lively, dynamic and highly successful environment in which to achieve. We are also … apply) Teachers Pension Scheme or Local Government Pension Scheme which includes 3 x salary life assurance cover whilst you remain in service. Employee Assistance Programme Job Description Post: ICT Network Leader Salary: £50,646 – £55,710 (Scale PO4 – PO5, Spine points 37 - 42. Full-time, all year round). Responsible to: Director of Resources/CFO Cardinal Pole Catholic More ❯
SA) to support mission-critical systems in a dynamic and secure environment. This role is ideal for professionals with strong experience in UNIX/Linux administration, database systems, and network-aware system support. While the minimum requirements are listed, this position is flexible and may accommodate candidates with higher levels of experience and skill. An active TS/SCI … Core Responsibilities: • Administer and maintain UNIX/Linux operating systems, including performance tuning, patching, and system health monitoring • Support database-centric systems, including SQL Server, RDBMS administration, and database security configurations • Understand and respond to analytical requirements, including query syntax, data flows, and traffic manipulation • Maintain secure, compliant system environments aligned with mission and organizational goals Qualifications: • Minimum of … + Database-Focused: • Programming experience in C, Perl, or Bourne Shell • Experience supporting and administering database-centric systems • Knowledge of Relational Database Management Systems (RDBMS), SQL Server, and associated security features Skill Set 2 - OS & Hardware-Focused: • Experience administering Solaris, UNIX, or Linux systems • Experience managing SQL Server 2000/2005 RDBMS • Familiarity with SGI and HP hardware platforms More ❯
standards and promote seamless integration across various systems. Following the Scaled Agile Framework (SAFe) Agile methodology, the teams will ensure a continuous delivery model that meets rigorous standards of security, scalability, and reliability. Agile teams will bring expertise across essential domains, including data engineering and standards, software development, and enterprise tool support, ensuring comprehensive capabilities to meet the diverse … the cloud. Strong skills in monitoring and logging solutions (e.g., AWS CloudWatch, CloudTrail, Splunk, Prometheus, Grafana) for proactive cloud performance monitoring, anomaly detection, and troubleshooting. Solid understanding of cloud security best practices, including networksecurity, data encryption, multi-factor authentication, and integration with cloud security services like AWS Security Hub. Experience working in an Agile More ❯
a legacy that you can feel proud of. Join us and discover how our people write our story. MAIN PURPOSE OF THE ROLE & RESPONSIBILITIES IN THE BUSINESS: As a Security Architect (Consultant) in Kainos, you'll be responsible for the design and application of good security practices in the platforms and services we build for our customers. You … ll work with Agile delivery teams to develop good security practices throughout the software development journey. You'll learn about and apply new technologies and approaches, with talented colleagues who will help you develop and grow. You'll share knowledge and help educate people - both customers and Kainos team members. You'll manage, coach and develop a small number … leadership for your team as you solve challenging problems together. MINIMUM (ESSENTIAL) REQUIREMENTS Experience in the secure design and delivery of new cloud services and solutions. Experience in identifying security issues in existing system designs or products, including recommending sensible mitigations that balance cost, risk and usability. Knowledge of security standards and regulations (e.g. NCSC, ISO, SoC, NIST More ❯
M5, Salford, Greater Manchester, United Kingdom Hybrid / WFH Options
AJ Bell Business Solutions Limited
To support the Chief Information Security Officer in managing and reporting the Information Security Risks faced by Technology Services (TS) in delivering AJ Bell’s systems and services. This role is responsible for facilitating the secure delivery of AJ Bell’s technology and business change. The Information Security Architect will play a lead role in designing and … implementing security controls and processes. Key to this is assisting and supporting our colleagues in achieving their goals, but in a secure manner. The key responsibilities of the role are: Subject matter expertise for security best practice, ensuring the maintenance of the confidentiality, integrity and availability of AJ Bell’s systems and data. Design and implementation of enterprise … security technology controls and platforms, following industry best practices. Supporting and advising on projects and change initiatives to ensure that there is no negative impact on our security posture Carrying out internal security reviews both on solutions we develop in house and third-party solutions. Supporting audit and due diligence activities within Technology Services Working with Information More ❯
Press space or enter keys to toggle section visibility Location London Job Type Full Time Posted Date 16-Jun-2025 Ref # 62659 We are seeking a Principal Security Engineer to lead and drive security engineering efforts across our cloud and application environments. This strategic, hands-on role requires expertise in cloud security, secure development practices, and … the implementation of advanced security controls. You will serve as a leader within the Consumer Security Engineering team, driving security initiatives across cloud platforms, microservice architectures, digital products, application security, and enterprise security. You will define and build comprehensive security strategies in collaboration with developers, DevSecOps engineers, ensuring that security is seamlessly integrated into … our CI/CD pipelines and all layers of infrastructure. Additionally, you will supervise security tool management and ensure cyber resiliency for consumer applications. A deep understanding of Google Cloud Security, Application Security, API security, and customer security systems is crucial. Key Responsibilities: Design and Implement Security Strategy: Develop and implement the securityMore ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
AJ Bell
To support the Chief Information Security Officer in managing and reporting the Information Security Risks faced by Technology Services (TS) in delivering AJ Bell’s systems and services. This role is responsible for facilitating the secure delivery of AJ Bell’s technology and business change. The Information Security Architect will play a lead role in designing and … implementing security controls and processes. Key to this is assisting and supporting our colleagues in achieving their goals, but in a secure manner. The key responsibilities of the role are: Subject matter expertise for security best practice, ensuring the maintenance of the confidentiality, integrity and availability of AJ Bell’s systems and data. Design and implementation of enterprise … security technology controls and platforms, following industry best practices. Supporting and advising on projects and change initiatives to ensure that there is no negative impact on our security posture Carrying out internal security reviews both on solutions we develop in house and third-party solutions. Supporting audit and due diligence activities within Technology Services Working with Information More ❯
and services that meet the stringent demands across a variety of customer missions. Our people know they'll be doing work that matters at the heart of the national security mission, exploring new possibilities at the cutting edge of technology. They know they will be well-rewarded and recognized for their commitment. Our people know they will enjoy plentiful … Mechanical Engineer to join our classified hardware development team for a 12-18 month contract. The ideal candidate will lead mechanical and thermal design efforts for a cutting-edge networksecurity appliance. Key Responsibilities: • Design and validate thermal solutions for high-performance computing hardware • Develop mechanical layouts for chassis and PCB integration • Conduct thermal simulations and analyze results More ❯
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Collaborate with the Government to assess current operations and business processes through the examination of organization … required. 5 years experience utilizing Process Improvement methodologies (e.g. CMM/CMMI, ISO 9000, Six Sigma, agile) for COTS integration programs is required. Bachelor's degree in Information Technology, NetworkSecurity, business discipline or equivalent from an accredited college or university. In lieu of a Bachelor's degree, 4 additional years of Business Process Engineering experience may be More ❯
What do you want to search? Keyword Apprenticeship Type Location Level 4 Network Engineer Apprentice , Apply From: 01/05/2025 Learning Provider Delivered by BALTIC TRAINING SERVICES LIMITED Employer EXA NETWORKS LTD Vacancy Description Proactively monitor and investigate network issues using internal tools Act as a first/second line escalation point for customer and internal … technical queries Perform diagnostics and resolve connectivity, hardware, and software issues Assist with network configurations and project-related tasks, including the setup of routers, firewalls, and VPNs Escalate unresolved or complex issues to senior team members or relevant departments Document standard operating procedures, network diagrams, and troubleshooting guides Generate and deliver internal and external training materials. Maintain and … platforms Support adherence to industry regulatory standards and company policies Occasionally travel to customer sites or business points of presence within the UK Key Details Vacancy Title Level 4 Network Engineer Apprentice Employer Description Based in West Yorkshire, Exa has been at the forefront of delivering innovative connectivity solutions for schools, businesses, and local authorities across the UK. With More ❯
What do you want to search? Keyword Apprenticeship Type Location Level 4 Network Engineer Apprentice , Apply From: 01/05/2025 Learning Provider Delivered by BALTIC TRAINING SERVICES LIMITED Employer EXA NETWORKS LTD Vacancy Description Proactively monitor and investigate network issues using internal tools Act as a first/second line escalation point for customer and internal … technical queries Perform diagnostics and resolve connectivity, hardware, and software issues Assist with network configurations and project-related tasks, including the setup of routers, firewalls, and VPNs Escalate unresolved or complex issues to senior team members or relevant departments Document standard operating procedures, network diagrams, and troubleshooting guides Generate and deliver internal and external training materials. Maintain and … platforms Support adherence to industry regulatory standards and company policies Occasionally travel to customer sites or business points of presence within the UK Key Details Vacancy Title Level 4 Network Engineer Apprentice Employer Description Based in West Yorkshire, Exa has been at the forefront of delivering innovative connectivity solutions for schools, businesses, and local authorities across the UK. With More ❯
Meritus are recruiting for a leading Defence company in Stevenage who are looking for multiple SOC analysts to develop their in house cyber security function. SOC ANALYST - £45 TO £85PH INSIDE IR35 - ONSITE IN STEVENAGE - SC TO DV CLEARANCE - 6 MONTHS WILL BE EXTENDED Overview of department: An opportunity has arisen in the cyber security operations centre (SOC … within Information Management (IM) for a SOC Threat Detection Analyst. The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. Responsibilities: To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for … InfoSec Team and the IM Domains (Customer Support and Infrastructure/Information Systems). It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the More ❯
Join our client, a leader in the Financial sector, as a Checkpoint Firewall Engineer. In this critical role, you will: analyse the existing firewall estate to assess performance and security gaps. Collaborate with stakeholders to define technical requirements and align solutions. Design and implement migration strategies for firewall technologies, ensuring minimal disruption. Engage closely with Network Management partners … facilitate smooth delivery of firewall solutions. utilise your expertise in Check Point R81/R82 and Cisco ASA for command-line configurations. Provide technical guidance on best practises for networksecurity and maintenance. Essential Skills: Proven experience in Networking, including configuration and maintenance. Strong command of Network Analysis and Security protocols. Command line proficiency in Cisco … advantageous. Previous experience in the UK Financial sector is a plus. If you are a proactive Firewall Engineer with a sharp eye for detail and a passion for enhancing networksecurity, we want to hear from you! Apply now and take the next step in your career with our client. Pontoon is an employment consultancy. We put expertise More ❯
SOC Analyst Location: Stevenage Rate: £85 p/h - We are booking interviews next week! Please call or email for a slot An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the … Cyber Threat. The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. The Role: So, what will you be doing as a SOC Analyst To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber … InfoSec Team and the IM Domains (Customer Support and Infrastructure/Information Systems). It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the More ❯
be cleared to SC UK Eyes Only prior to starting this role AND be prepared to undergo DV clearance. Skillset/experience required: * A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily NetworkSecurity, Infrastructure and the secondary area being Operating Systems & Applications. * Knowledge of IT Security standard methodologies. … Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. * Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. * Hands on experience with IDS/IPS technologies and threat hunting activities. * Strong … frameworks. * Understanding of Malware capabilities, attack vectors, propagation and impact. * Good communication skills liaising with the business and suppliers. Overview of department: An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the More ❯
looking to bring in multiple SOC Analysts due to an increase in demand. We are looking for both mid-level and senior engineers. The role will support the cyber security operations centre (SOC), assisting with vital threat detection and analysis in a constantly evolving cyber environment. This contract position offers an exciting opportunity to work within one of the … most dynamic fields in defence. Key Responsibilities: The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM … Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of MBDA SecurityMore ❯
Stevenage, Hertfordshire, South East, United Kingdom
Defence
looking to bring in multiple SOC Analysts due to an increase in demand. We are looking for both mid-level and senior engineers. The role will support the cyber security operations centre (SOC), assisting with vital threat detection and analysis in a constantly evolving cyber environment. This contract position offers an exciting opportunity to work within one of the … most dynamic fields in defence. Key Responsibilities: The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM … Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of MBDA SecurityMore ❯