it job board logo
  • Home
  • Find IT Jobs
  • Register CV
  • Career Advice
  • Contact us
  • Employers
    • Register as Employer
    • Pricing Plans
  • Recruiting? Post a job
  • Sign in
  • Sign up
  • Home
  • Find IT Jobs
  • Register CV
  • Career Advice
  • Contact us
  • Employers
    • Register as Employer
    • Pricing Plans
Sorry, that job is no longer available. Here are some results that may be similar to the job you were looking for.

4 jobs found

Email me jobs like this
Refine Search
Current Search
cyber security analyst l4
CYBER SECURITY ANALYST L4
Test Triangle Bristol, Gloucestershire
Supporting Products within the Digital Edge & Cyber Security Product Offerings. Mainly CDN to secure and optimise the banking infrastructure SSL Handshake EDGE load implementation for Web Apps Skillsets Required Understanding of Networking and Cybersecurity principles including: DNS Resolution and IP HTTP/S Methods, Headers, Status Codes TCP handshake OSI Model and Communications Framework Attack Vectors and Methods such as DDoS, SQL, CSS, CMD Injection, LFI and Web Protocol Attacks, Botnet Certificates and TLS Encryption Caching and Storage on Edge Content Delivery Network and Edge Computing Border Gateway Protocol (BGP) and ACL's Zero Trust Architecture Threat Intelligence, SIEM Data and Traffic Reporting Proxies and Reverse Proxies to manage Ingress/Egress Cloud infrastructure, particularly Scope of Services Mainly via CDN to secure and optimise the banking infrastructure: Ability to carry out WAF/Security/Bot Manager Reviews and Inspection of traffic to the edge and origin to determine threats/vulnerabilities Implement Alerting and Monitoring appropriate for system errors and threats Generation and Upload of Certificates for SSL handshake Implement load balancing capabilities at the Edge for Web Apps Implement path based routing of client traffic to relevant infrastructure Proactively manage security configurations associated with hostnames by interacting with the application teams for max availability, smallest attack surface prioritisation Ability to implement caching and storage Ability to edit/Implement sorry pages that handle errors effectively on Net storage based on use case Validation and implementation of different HTTP methods based on Application requirements - security implications of this and mitigation Respond to both production and pre-production incidents in a timely manner. Support teams on digital modernisation journey with technical debugging both in the Akamai layer and downstream infrastructure
17/05/2026
Full time
Supporting Products within the Digital Edge & Cyber Security Product Offerings. Mainly CDN to secure and optimise the banking infrastructure SSL Handshake EDGE load implementation for Web Apps Skillsets Required Understanding of Networking and Cybersecurity principles including: DNS Resolution and IP HTTP/S Methods, Headers, Status Codes TCP handshake OSI Model and Communications Framework Attack Vectors and Methods such as DDoS, SQL, CSS, CMD Injection, LFI and Web Protocol Attacks, Botnet Certificates and TLS Encryption Caching and Storage on Edge Content Delivery Network and Edge Computing Border Gateway Protocol (BGP) and ACL's Zero Trust Architecture Threat Intelligence, SIEM Data and Traffic Reporting Proxies and Reverse Proxies to manage Ingress/Egress Cloud infrastructure, particularly Scope of Services Mainly via CDN to secure and optimise the banking infrastructure: Ability to carry out WAF/Security/Bot Manager Reviews and Inspection of traffic to the edge and origin to determine threats/vulnerabilities Implement Alerting and Monitoring appropriate for system errors and threats Generation and Upload of Certificates for SSL handshake Implement load balancing capabilities at the Edge for Web Apps Implement path based routing of client traffic to relevant infrastructure Proactively manage security configurations associated with hostnames by interacting with the application teams for max availability, smallest attack surface prioritisation Ability to implement caching and storage Ability to edit/Implement sorry pages that handle errors effectively on Net storage based on use case Validation and implementation of different HTTP methods based on Application requirements - security implications of this and mitigation Respond to both production and pre-production incidents in a timely manner. Support teams on digital modernisation journey with technical debugging both in the Akamai layer and downstream infrastructure
Cyber Security Analyst L4
Test Triangle Ltd
The Security Operations Analyst is a member of the Security Operations team, reporting to the Security Operations Lead. The purpose of this role is to maintain strong oversight of the 24x7 Security Operations Centre, manage a number of operational security services related to this, review the security impact of infrastructure changes within the environment monitor & manage associated toolsets. Mandatory Skills: Forcepoint DLP Key Accountabilities/Responsibilities Cyber Security Operations Responsible for overseeing the day-to-day operational delivery of services provided to DLG by its third party 24x7 Security Operations Centre. These services include Denial Of Service Protection (DDoS), Web Application Firewall, Intrusion Prevention & Detection, File Integrity Monitoring, Vulnerability Scanning, Privileged Access Management, SIEM. Responsible for operating and maintaining data leakage prevention toolsets, responding to alerts for data loss events including investigation and management of any data loss incidents that breach corporate data handling requirements and/or industry standards (such as PCI DSS). Participate in the rotational 24/7 security incident response capability. Must be capable of acting as the single point of contact for all security related response actions and decisions. This includes management of each incident from a security perspective, interaction with IM/MIM teams (where required) and recording of all key security decisions. Responsible for maintaining security oversight of the technical infrastructure delivered by third party suppliers and raising concerns/issues that pose a security risk to the organisation accordingly. Must also manage any operational risk remediation to conclusion. Responsible for operational support of the security certificate provisioning platform, including all operational functions. This includes alerting key stakeholders, scheduled and ad-hoc reporting, renewal and revocation of certificates and updates to procedural documentation. Responsible for managing the governance of the firewall rule bases and associated change management process. Responsible for providing security input and for maintaining relationships with the Service Management function in relation to change management, problem management and incident management. Responsible for overseeing the management of web proxy policy configuration provided by third party providers. Responsible for monitoring the operational security communication channels responding appropriately to queries/requests from the business. Responsible for monitoring and responding to emerging threat patterns, vulnerabilities and anomalies and providing escalations of any unknown threats to relevant areas within the company. Responsible for reporting metrics on the status of technical information security controls across the DLG estate, highlighting risk areas and working to develop and manage remediation plans as required.
16/05/2026
Full time
The Security Operations Analyst is a member of the Security Operations team, reporting to the Security Operations Lead. The purpose of this role is to maintain strong oversight of the 24x7 Security Operations Centre, manage a number of operational security services related to this, review the security impact of infrastructure changes within the environment monitor & manage associated toolsets. Mandatory Skills: Forcepoint DLP Key Accountabilities/Responsibilities Cyber Security Operations Responsible for overseeing the day-to-day operational delivery of services provided to DLG by its third party 24x7 Security Operations Centre. These services include Denial Of Service Protection (DDoS), Web Application Firewall, Intrusion Prevention & Detection, File Integrity Monitoring, Vulnerability Scanning, Privileged Access Management, SIEM. Responsible for operating and maintaining data leakage prevention toolsets, responding to alerts for data loss events including investigation and management of any data loss incidents that breach corporate data handling requirements and/or industry standards (such as PCI DSS). Participate in the rotational 24/7 security incident response capability. Must be capable of acting as the single point of contact for all security related response actions and decisions. This includes management of each incident from a security perspective, interaction with IM/MIM teams (where required) and recording of all key security decisions. Responsible for maintaining security oversight of the technical infrastructure delivered by third party suppliers and raising concerns/issues that pose a security risk to the organisation accordingly. Must also manage any operational risk remediation to conclusion. Responsible for operational support of the security certificate provisioning platform, including all operational functions. This includes alerting key stakeholders, scheduled and ad-hoc reporting, renewal and revocation of certificates and updates to procedural documentation. Responsible for managing the governance of the firewall rule bases and associated change management process. Responsible for providing security input and for maintaining relationships with the Service Management function in relation to change management, problem management and incident management. Responsible for overseeing the management of web proxy policy configuration provided by third party providers. Responsible for monitoring the operational security communication channels responding appropriately to queries/requests from the business. Responsible for monitoring and responding to emerging threat patterns, vulnerabilities and anomalies and providing escalations of any unknown threats to relevant areas within the company. Responsible for reporting metrics on the status of technical information security controls across the DLG estate, highlighting risk areas and working to develop and manage remediation plans as required.
Cyber Security Analyst L4
Test Triangle Ltd Norwich, Norfolk
The Security Operations Analyst is a member of the Security Operations team, reporting to the Security Operations Lead. The purpose of this role is to maintain strong oversight of the 24x7 Security Operations Centre, manage a number of operational security services related to this, review the security impact of infrastructure changes within the environment monitor & manage associated toolsets. Mandatory Skills: Forcepoint DLP Key Accountabilities/Responsibilities Cyber Security Operations Responsible for overseeing the day-to-day operational delivery of services provided to DLG by its third party 24x7 Security Operations Centre. These services include Denial Of Service Protection (DDoS), Web Application Firewall, Intrusion Prevention & Detection, File Integrity Monitoring, Vulnerability Scanning, Privileged Access Management, SIEM. Responsible for operating and maintaining data leakage prevention toolsets, responding to alerts for data loss events including investigation and management of any data loss incidents that breach corporate data handling requirements and/or industry standards (such as PCI DSS). Participate in the rotational 24/7 security incident response capability. Must be capable of acting as the single point of contact for all security related response actions and decisions. This includes management of each incident from a security perspective, interaction with IM/MIM teams (where required) and recording of all key security decisions. Responsible for maintaining security oversight of the technical infrastructure delivered by third party suppliers and raising concerns/issues that pose a security risk to the organisation accordingly. Must also manage any operational risk remediation to conclusion. Responsible for operational support of the security certificate provisioning platform, including all operational functions. This includes alerting key stakeholders, scheduled and ad-hoc reporting, renewal and revocation of certificates and updates to procedural documentation. Responsible for managing the governance of the firewall rule bases and associated change management process. Responsible for providing security input and for maintaining relationships with the Service Management function in relation to change management, problem management and incident management. Responsible for overseeing the management of web proxy policy configuration provided by third party providers. Responsible for monitoring the operational security communication channels responding appropriately to queries/requests from the business. Responsible for monitoring and responding to emerging threat patterns, vulnerabilities and anomalies and providing escalations of any unknown threats to relevant areas within the company. Responsible for reporting metrics on the status of technical information security controls across the DLG estate, highlighting risk areas and working to develop and manage remediation plans as required.
16/05/2026
Full time
The Security Operations Analyst is a member of the Security Operations team, reporting to the Security Operations Lead. The purpose of this role is to maintain strong oversight of the 24x7 Security Operations Centre, manage a number of operational security services related to this, review the security impact of infrastructure changes within the environment monitor & manage associated toolsets. Mandatory Skills: Forcepoint DLP Key Accountabilities/Responsibilities Cyber Security Operations Responsible for overseeing the day-to-day operational delivery of services provided to DLG by its third party 24x7 Security Operations Centre. These services include Denial Of Service Protection (DDoS), Web Application Firewall, Intrusion Prevention & Detection, File Integrity Monitoring, Vulnerability Scanning, Privileged Access Management, SIEM. Responsible for operating and maintaining data leakage prevention toolsets, responding to alerts for data loss events including investigation and management of any data loss incidents that breach corporate data handling requirements and/or industry standards (such as PCI DSS). Participate in the rotational 24/7 security incident response capability. Must be capable of acting as the single point of contact for all security related response actions and decisions. This includes management of each incident from a security perspective, interaction with IM/MIM teams (where required) and recording of all key security decisions. Responsible for maintaining security oversight of the technical infrastructure delivered by third party suppliers and raising concerns/issues that pose a security risk to the organisation accordingly. Must also manage any operational risk remediation to conclusion. Responsible for operational support of the security certificate provisioning platform, including all operational functions. This includes alerting key stakeholders, scheduled and ad-hoc reporting, renewal and revocation of certificates and updates to procedural documentation. Responsible for managing the governance of the firewall rule bases and associated change management process. Responsible for providing security input and for maintaining relationships with the Service Management function in relation to change management, problem management and incident management. Responsible for overseeing the management of web proxy policy configuration provided by third party providers. Responsible for monitoring the operational security communication channels responding appropriately to queries/requests from the business. Responsible for monitoring and responding to emerging threat patterns, vulnerabilities and anomalies and providing escalations of any unknown threats to relevant areas within the company. Responsible for reporting metrics on the status of technical information security controls across the DLG estate, highlighting risk areas and working to develop and manage remediation plans as required.
CYBER SECURITY ANALYST L4(CONTRACT)
Wipro Technologies Leeds, Yorkshire
Job Title: CYBER SECURITY ANALYST L4 (CONTRACT) State/Province: West Yorkshire Posting Start Date: 4/28/26 Job Description Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information. Responsibilities Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills Akamai WAF Equal Opportunity Statement We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, caste, creed, religion, gender, marital status, age, ethnic and national origin, gender identity, gender expression, sexual orientation, political orientation, disability status, protected veteran status, or any other characteristic protected by law. Wipro is committed to creating an accessible, supportive, and inclusive workplace. Reasonable accommodation will be provided to all applicants including persons with disabilities, throughout the recruitment and selection process. Accommodations must be communicated in advance of the application, where possible, and will be reviewed on an individual basis. Wipro provides equal opportunities to all and values diversity. If you encounter any suspicious mail, advertisements, or persons who offer jobs at Wipro, please email us at . Do not email your resume to this ID as it is not monitored for resumes and career applications. Any complaints or concerns regarding unethical/unfair hiring practices should be directed to our Ombuds Group at .
07/05/2026
Full time
Job Title: CYBER SECURITY ANALYST L4 (CONTRACT) State/Province: West Yorkshire Posting Start Date: 4/28/26 Job Description Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information. Responsibilities Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills Akamai WAF Equal Opportunity Statement We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, caste, creed, religion, gender, marital status, age, ethnic and national origin, gender identity, gender expression, sexual orientation, political orientation, disability status, protected veteran status, or any other characteristic protected by law. Wipro is committed to creating an accessible, supportive, and inclusive workplace. Reasonable accommodation will be provided to all applicants including persons with disabilities, throughout the recruitment and selection process. Accommodations must be communicated in advance of the application, where possible, and will be reviewed on an individual basis. Wipro provides equal opportunities to all and values diversity. If you encounter any suspicious mail, advertisements, or persons who offer jobs at Wipro, please email us at . Do not email your resume to this ID as it is not monitored for resumes and career applications. Any complaints or concerns regarding unethical/unfair hiring practices should be directed to our Ombuds Group at .

Modal Window

  • Home
  • Contact
  • About Us
  • FAQs
  • Terms & Conditions
  • Privacy
  • Employer
  • Post a Job
  • Search Resumes
  • Sign in
  • Job Seeker
  • Find Jobs
  • Create Resume
  • Sign in
  • IT blog
  • Facebook
  • Twitter
  • LinkedIn
  • Youtube
© 2008-2026 IT Job Board