SOC Analysts work within a four-day operational rota, collaborating closely with Digital Forensic and Incident Response teams. Responsibilities include: Security Monitoring and Incident Detection: Utilizing SIEM tools to identify potential security incidents and anomalies. Analyzing alerts and log data to assess the severity and impact of threats. Incident … improvement recommendations. Maintaining accurate records of incidents, investigations, and security-related activities. Security Tools Management: Configuring, updating, and maintaining security tools such as firewalls, intrusiondetection/prevention systems, endpoint protection, and SIEM solutions. more »
Exchange 2016+), IIS, SQL 2012+, Linux appliances, architecture and OS, backup technologies, Citrix, and Cisco networking. Expertise in security technologies such as SIEM, firewalls, intrusiondetection/prevention systems, anti-virus software, authentication systems, log management, and content filtering. Solid grasp of security approaches including ISMS, risk analysis more »
analytical and SIEM platforms. • Knowledge of network security implementations (e.g., host-based IDS, IPS), including their function and placement in a network. • Knowledge of intrusiondetection systems and signature development. • Knowledge of front-end collection systems, including network traffic collection, filtering, and selection. • Knowledge of system administration concepts more »
analytical and SIEM platforms. Knowledge of network security implementations (eg, host-based IDS, IPS), including their function and placement in a network. Knowledge of intrusiondetection systems and signature development. Knowledge of Front End collection systems, including network traffic collection, filtering, and selection. Knowledge of system administration concepts more »
analytical and SIEM platforms. Knowledge of network security implementations (e.g., host-based IDS, IPS), including their function and placement in a network. Knowledge of intrusiondetection systems and signature development. Knowledge of front-end collection systems, including network traffic collection, filtering, and selection. Knowledge of system administration concepts more »
analytical and SIEM platforms. Knowledge of network security implementations (e.g., host-based IDS, IPS), including their function and placement in a network. Knowledge of intrusiondetection systems and signature development. Knowledge of front-end collection systems, including network traffic collection, filtering, and selection. Knowledge of system administration concepts more »
analytical and SIEM platforms. Knowledge of network security implementations (e.g., host-based IDS, IPS), including their function and placement in a network. Knowledge of intrusiondetection systems and signature development. Knowledge of front-end collection systems, including network traffic collection, filtering, and selection. Knowledge of system administration concepts more »
have been compromised with Ransomware/Data breaches. Tech, Experience & Qualifications: Experience working in Managed service provider (MSP) environments. Network security principles, including firewalls, intrusiondetection/prevention systems, and VPN technologies. Fortinet Firewall, FortiSIEM, FortiEDR beneficial or equivalent firewalls Certifications in relevant technologies such as Microsoft Azure more »
Oxfordshire, England, United Kingdom Hybrid / WFH Options
University of Oxford
collaboration with the Head of Information Security Operations and the rest of the team. OxCERT runs an on-premises Elasticsearch-based SIEM solution, an IntrusionDetection System (IDS), and a vulnerability scanning service as well as other open source and commercial tools. We are one of the first more »
to the growth and expansion of a very successful SOC Team. What you will ideally have experience of? Excellent communication skills (verbal & written) Governance Intrusiondetection and analysis Cyber Security Incident management Threat Intelligence and understanding Cyber security qualifications are desirable *Must have Security Clearance or be eligible more »
to diagnose and resolve complex network issues. Relevant certifications (e.g., CCNA, CCNP, CISSP) preferred. Strong knowledge of network security principles and practices, including firewalls, intrusiondetection/prevention systems, and access control. If your interested and have prior Higher Education experience please apply now more »
incidents. Conduct regular risk assessments and vulnerability scans to identify potential security weaknesses and prioritize remediation efforts. Implement and manage security controls, including firewalls, intrusiondetection/prevention systems, endpoint protection, and encryption technologies. Develop and deliver cyber security awareness training and education programs for employees. Qualifications/ more »
Technical Proficiency In-depth knowledge of firewall technologies and products (e.g., Cisco ASA, Palo Alto, Check Point, Fortinet) Understanding of network protocols, VPNs, and intrusiondetection/prevention systems Relevant certifications in specific Firewall vendors Ability to troubleshoot and resolve complex network security issues Experience in assessing and more »
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Matchtech
in leading a technical security team. Demonstrated experience in planning, developing, and implementing Azure security technologies. Familiarity with security technologies such as SIEM, firewalls, intrusiondetection/prevention systems, antivirus software, authentication systems, and log management. Strong knowledge of security approaches, including risk analysis, attack vectors, cryptography, and more »
working in Information/Cyber Security, ideally in a technical hands on/engineering role. Hands-on experience with security tools such as firewalls, intrusiondetection/prevention systems, antivirus software, and SIEM solutions. Experience with cloud security principles and practices with either AWS or Azure. Experience implementing more »
working in Information/Cyber Security, ideally in a technical hands on/engineering role. Hands-on experience with security tools such as firewalls, intrusiondetection/prevention systems, antivirus software, and SIEM solutions. Experience with cloud security principles and practices with either AWS or Azure. Experience implementing more »
Stone, Staffordshire, United Kingdom Hybrid / WFH Options
yolk recruitment
resolving hardware, software, and network-related problems to minimise downtime and ensure reliability. Implementing security best practices, such as access controls, encryption, firewalls, and intrusiondetection/prevention systems, to protect against cyber threats. The experience you will bring to the team: Experience in the design, build & maintenance more »
On technologies. Mobile device management: Covering 300+ deployed mobile devices, applying best practice and industry standards. Cyber security and information assurance: Managing and maintaining intrusiondetection apparatus, supporting queries/investigations and hardened configuration of IT equipment. DevSecOps and Site Reliability Engineering: Supporting enterprise software teams and their more »
Brighton, England, United Kingdom Hybrid / WFH Options
15below
on what you need to achieve, whilst knowing how to have some fun Skills to impress: Network Security and devices (i.e. Web Application Firewalls, IntrusionDetection Systems and load balancers) Cloud concepts and technologies, preferably Microsoft Azure Containerisation and orchestration technologies e.g. Kubernetes Site to Site (L2L) and more »
Hinckley, England, United Kingdom Hybrid / WFH Options
DP World
resource utilization Implement and manage multi-factor authentication solutions for enhanced security across various systems and applications. Manage and monitor Endpoint security Platforms including detection and respond to advanced threats. Implement and maintain web and reverse proxy solutions, ensuring secure and reliable access to internal and external resources. Implement … services. Implementing security measures and protocols to safeguard the organization's IT infrastructure from potential threats and cyberattacks. This may include setting up firewalls, intrusiondetection systems, and access controls. Investigating and resolving technical issues related to hardware, software, and network components. Troubleshooting may involve diagnosing problems, working … self starter, adaptable who welcomes challenge and problem solving Solid experience in managing and maintaining Windows Server environments, knowledge of Endpoint protection for threat detection and response. Exposure and experience in implementing various IT infrastructure in a fast paced challenging environment Proficiency in backup and replication technologies, such as more »
and Qualifications: In-depth knowledge of firewall technologies and products (e.g., Cisco ASA, Palo Alto, Check Point, Fortinet) Understanding of network protocols, VPNs, and intrusiondetection/prevention systems Relevant certifications in specific Firewall vendors Ability to troubleshoot and resolve complex network security issues Experience in assessing and more »
Proven experience in cyber security incident response, with a strong understanding of incident handling methodologies and best practices. Familiarity with network security monitoring tools, intrusiondetection/prevention systems, and forensic analysis tools. Knowledge of common cyber threats and attack vectors, including malware, phishing, and ransomware. Relevant certifications more »
City Of London, England, United Kingdom Hybrid / WFH Options
Computappoint
SD-WAN. Proficiency in utilizing network management and analysis tools, including LogicMonitor, Datadog, Solarwinds, Network Config Manager, and similar industry-standard products. Knowledgeable in intrusiondetection and prevention systems (IDS/IPS/AV) and other crucial network security measures. Services offered by Computappoint Limited are those of more »
implement network infrastructure solutions based on business requirements and industry best practices. Solid knowledge of network security concepts, including firewall configuration, VPN setup, and intrusiondetection systems. Install, configure, and maintain network equipment including routers, switches, firewalls, and wireless controllers. Hands-on experience with network equipment such as more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Delaney & Bourton
a network, phishing, port scanning, web application attacks, DDoS, lateral movement. Experience with security monitoring, incident response, and vulnerability management. Understanding of malware analysis, intrusiondetection/prevention systems, and endpoint security solutions. Ability to analyze and interpret security logs and data. Role can work hybrid, for a more »