Birmingham, West Midlands, England, United Kingdom
TXP
promote secure coding standards Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls and identitymanagement systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident response protocols … DLP, VPNs, and firewalls Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identity and access management (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
promote secure coding standards Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls and identitymanagement systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident response protocols … DLP, VPNs, and firewalls Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identity and access management (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
TXP
promote secure coding standards Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls and identitymanagement systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident response protocols … DLP, VPNs, and firewalls Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identity and access management (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP More ❯
certifications desirable). Proficiency in IaC tools such as Terraform, ARM templates, or CloudFormation. Hands-on experience with CI/CD pipelines and automation frameworks. Solid understanding of networking, identitymanagement, and cloud security principles. Familiarity with containerisation (Docker, Kubernetes) preferred. Excellent problem-solving skills and ability to work in a secure, mission-driven environment. The client are More ❯
Birmingham, West Midlands, England, United Kingdom
Tank Recruitment
Sync , DFS , and virtualisation technologies . Implement and maintain Azure Application Gateway , Load Balancers , and App Service Plans to deliver secure, high-performing, scalable services. Lead incident and problem management , acting as an escalation point for complex issues and driving root cause analysis. Support and improve backup, disaster recovery, and business continuity solutions across hybrid platforms. Automate repetitive tasks … Science , or equivalent practical experience. 5+ years' experience in IT Systems Engineering across cloud and on-premises environments. Proven expertise with Microsoft Azure services - including compute, storage, networking, and identity management. Strong understanding of Windows Server , Active Directory , Group Policy , and hybrid identity configurations. Experience implementing security, monitoring , and compliance in enterprise environments. Solid knowledge of virtualisation, networking More ❯