
IT/OT Security, Telecom networking engineer
On site
Birmingham, United Kingdom
Full Time
26-02-2025
Job Specifications
Share this job
The Opportunity
At Hitachi Energy, we are committed to advancing a sustainable energy future for all. As an IT/OT Security & Telecom Networking Engineer, you will be at the forefront of integrating cutting-edge technology into our energy systems. Join our innovative team in Glasgow and contribute to projects that have a tangible impact on communities and society. Bring your passion and expertise to a global team that values diversity and collaboration, and be part of an environment where your potential is recognized and nurtured.
How You'll Make An Impact
Lead the technical aspects of project networking and cybersecurity.
Ensure compliance with standards and project specifications.
Collaborate with internal and external stakeholders to drive project success.
Validate design documents from suppliers.
Plan and follow up on project activities, conducting regular progress meetings with customers.
Guide and review the work of external partners to ensure it fits into the overall solution.
Your Background
7+ years of experience in Telecom & Networking.
Hands-on experience with MPLS Telecom systems and high-level network design.
Proficiency with FOX615, Nokia MPLS systems, and network management.
Knowledge of networking concepts such as IPSEC, MACSEC, VPN, IDS, and IPS.
Certification in Networking & Cybersecurity is advantageous.
Bachelor’s or Master’s degree in Electrical Engineering, Computer Science, or a related field.
Excellent communication skills and proficiency in English.
More About Us
At Hitachi Energy, we believe in the power of diversity and collaboration to drive innovation.
We offer continuous learning and development opportunities to help you grow both personally and professionally.
Join us and be part of a team that is committed to making a positive impact on the world.
Apply now
Location Birmingham, West Midlands, United Kingdom;
Glasgow, Scotland, United Kingdom Job type Full time Experience Experienced Job function Engineering & Science Contract Regular Publication date 2025-02-25 Reference number R0066930
About the Company
Hitachi Energy is a global technology leader that is advancing a sustainable energy future for all. We serve customers in the utility, industry and infrastructure sectors with innovative solutions and services across the value chain. Together with customers and partners, we pioneer technologies and enable the digital transformation required to accelerate the energy transition towards a carbon-neutral future. We are advancing the world’s energy system to become more sustainable, flexible and secure whilst balancing social, en... Know more
Related Jobs


- Company Name
- Cyderes
- Job Title
- Principal Security Analyst - SecOps (Chronicle)
- Job Description
- Cyderes (Cyber Defense and Response) is a pure-play, full life-cycle cybersecurity services provider with award-winning managed security services, identity and access management, and professional services designed to manage the cybersecurity risks of enterprise clients. We specialize in multi-technology, complex environments with the in speed and agility needed to tackle the most advanced cyber threats. We leverage our global scale and decades of experience to accelerate our clients’ cyber outcomes through a full lifecycle of cybersecurity services. We are a global company with operating centers in the United States, Canada, the United Kingdom, and India. About the Role: The Managed Services Principal Security Analyst Is a Customer-Facing Role Focused on Delivering Security Solutions and Exceptional Client Experiences. As A Trusted Advisor, The Principal Security Analyst Is Responsible for Strategic Advisory, Advanced Analysis, And Custom Security Content for Cyderes’ Managed Service Customers. This Role Requires Consistent Representation of The Cyderes Brand Through Effective Collaboration and Positive Engagement with Internal Teams and Clients. Responsibilities: Own security outcomes for assigned customers, ensuring high-quality SOC deliverables and alignment with client expectations Lead customer-facing calls to discuss incident investigations, provide strategic guidance, and offer recommendations for improving security posture Perform advanced threat hunting and proactive investigations to detect, isolate, and mitigate malicious activities in customer environments Act as a technical lead within the SOC, providing mentorship, guidance, and leadership to other Security Analysts Oversee real-time monitoring and detection activities using SIEM, EDR, and other security tools, ensuring timely identification and escalation of threats Collaborate with internal teams, such as Detection Engineering, to refine detection rules and enhance automation workflows to close gaps in customer security posture Maintain and update security operations processes and incident response playbooks to ensure they remain current and effective Provide training to Security Analysts on tools, processes, and emerging threats to enhance team capabilities Lead post-incident reviews, identifying lessons learned, and sharing findings to improve operational effectiveness Tailor detection and response strategies to meet the unique needs of individual customer environments Stay informed of the evolving threat landscape to provide actionable insights and ensure a proactive approach to security operations Requirements: Experience: Minimum 5+ years of professional experience in cybersecurity, with a strong background in security operations System Administration Knowledge/Experience: Expertise securing and investigating security incidents on Windows, Unix/Linux, and MacOS environments Networking Proficiency: Advanced understanding of networking concepts, including the ability to analyze network artifacts and logs effectively Endpoint Detection and Response (EDR): Hands-on experience with EDR tools such as SentinelOne, CrowdStrike, Microsoft Defender, or equivalent platforms Security Information and Event Management (SIEM): Advanced knowledge and experience with at least one SIEM platform, such as Microsoft Sentinel, Splunk, Google Chronicle, or IBM QRadar Technical Skills: Proficient in threat hunting, malware analysis, and leveraging security tools to investigate and mitigate threats Communication: Strong written and verbal communication skills, with the ability to create and present reports, dashboards, and strategic recommendations Certifications (Preferred): Industry-recognized certifications such as CISSP, GCIH, GCFA, OSCP, or equivalent Cyderes is an Equal Opportunity Employer (EOE). Qualified applicants are considered for employment without regard to race, religion, color, sex, age, disability, sexual orientation, genetic information, national origin, or veteran status. Note: This job posting is intended for direct applicants only. We request that outside recruiters do not contact us regarding this position.


- Company Name
- Ministry of Housing, Communities and Local Government
- Job Title
- Operational Security Manager
- Job Description
- Darlington, Leeds, London, Manchester, Wolverhampton Job Summary Here at the Ministry of Housing, Communities & Local Government (MHCLG), we work on things that make a real difference to people’s lives. Whether it's through the homes we live in, the work of our local councils, or the communities we’re all part of, our work is at the top of the political agenda. We have ambitious and far-reaching outcomes to achieve this year and, if you’re thinking of joining us, there’s never been a more exciting time. We have over 3,500 staff who are based in 20 offices across the UK and this Cyber Security role sits in the heart of the Technology team within our Digital Directorate. Our aim is to provide high quality Digital services for our staff, typically using evergreen cloud services. Delivering this responsibility comes with a high demand for adoption of new technologies, systems and applications that require security review and scrutiny to ensure the department operates in a safe and secure environment that is overseen by centralised security products such as a SIEM, vulnerability scanners and security validation tools. Security has never been more important in delivering services for our staff and citizens and the Department is committed to meeting the objectives set out in the Government Cyber Security Strategy. Now is an extremely exciting time to join our Cyber team as we use a modern tech stack, specialist external suppliers and a growing number of internal staff to mature our capabilities and deliver Departmental objectives. We particularly welcome candidates from an ethnic minority background and other underrepresented groups to apply, as we work to continually improve our ability to represent the places and communities we support through our work. Find out more about what it's like to work in a digital, data and technology role at MHCLG including our culture, ways of working, career progression and staff benefits. You can also read the MHCLG Digital blog to learn about the work we're doing. Job Description As an Operational Security Manager, you'll: provide cyber security advice and guidance to the Department, acting as the Champion and face of the team across numerous forums to enhance and maintain the positive perception and visibility of the Cyber Security Team lead on the development and maintenance of Security Policies and associated documentation lead on supporting all internal and external stakeholders in the alignment to the Policies and associated documentation provide Cyber Security input to governance forums as required, including Change Advisory Boards and Technical Design Authorities conduct periodic checks of various technologies and processes across stakeholders in an internal/external audit capacity, subsequently supporting those stakeholders in the development and implementation of remediation plans lead on the development and maintenance of the Departments cyber security oversight of, and support to, its ALBs lead on the conduct of GovAssure and wider Department alignment to the NCSC CAF input to the Cyber Security KPIs and Metrics across all areas of responsibility work with the Head of Security Awareness to design and implement cyber security awareness campaigns act as the overarching lead, join up and work with other elements of the team to support them in service adoption and improvement across all areas including Secure by Design, Supplier Security, Vulnerability Management and Security Operations Centre (SOC). This may on occasion include directly supporting across these teams where required collaborate with, and mentoring of, peers and stakeholders where appropriate As An Operational Security Manager, You'll provide cyber security advice and guidance to the Department, acting as the Champion and face of the team across numerous forums to enhance and maintain the positive perception and visibility of the Cyber Security Team lead on the development and maintenance of Security Policies and associated documentation lead on supporting all internal and external stakeholders in the alignment to the Policies and associated documentation provide Cyber Security input to governance forums as required, including Change Advisory Boards and Technical Design Authorities conduct periodic checks of various technologies and processes across stakeholders in an internal/external audit capacity, subsequently supporting those stakeholders in the development and implementation of remediation plans lead on the development and maintenance of the Departments cyber security oversight of, and support to, its ALBs lead on the conduct of GovAssure and wider Department alignment to the NCSC CAF input to the Cyber Security KPIs and Metrics across all areas of responsibility work with the Head of Security Awareness to design and implement cyber security awareness campaigns act as the overarching lead, join up and work with other elements of the team to support them in service adoption and improvement across all areas including Secure by Design, Supplier Security, Vulnerability Management and Security Operations Centre (SOC). This may on occasion include directly supporting across these teams where required collaborate with, and mentoring of, peers and stakeholders where appropriate Person specification We will use the essential criteria below to evaluate you during the recruitment process. Make sure your CV details how you meet the criteria. As An Operational Security Manager, You’ll Have significant experience in an Information Security/Assurance related role(s) knowledge of relevant laws, regulations, and industry/HMG standards including GDPR, NCSC CAF, Cyber Essentials and ISO27001, with a strong understanding of information security principles, concepts, and best practices experience with risk assessment methodologies and tools familiarity with security principles and technologies for cloud hosted services such as AWS, Azure and SaaS strong knowledge of typical threats and attack vectors with appropriate remediation methods excellent communication and interpersonal skills, with the ability to effectively communicate complex security concepts to non-technical stakeholders developed problem solving skills including addressing complex technical security and process challenges that ensure delivery at pace to an appropriate risk appetite professional certifications, such as CISSP, CISM, CRISC or equivalent experience experience leading deep dives into adherence against processes, policies and procedures that are mandated for suppliers, services and teams to use in delivery of Digital services Behaviours We'll assess you against these behaviours during the selection process: Making Effective Decisions Managing a Quality Service Communicating and Influencing Alongside your salary of £59,586, Ministry of Housing, Communities and Local Government contributes £17,262 towards you being a member of the Civil Service Defined Benefit Pension scheme. Find out wh...


- Company Name
- Cyberfort
- Job Title
- Cyber Security Engineer - Defence
- Job Description
- Job Title: Cyber Security Engineer Reporting to: Head of Defence and Aerospace Consultancy Location: Remote with travel to customer site (Feltham) Role Requirements: Must hold a current government security vetting at SC level OR Be eligible to obtain such clearance. Must be currently resident in the UK Must have resided in the UK for the last 5 years consecutively. Desirable Previous experience within defence. Delivering Security within agile projects Reward Package: Salary Package - £65,000 - £85,000 DOE 25 days annual holiday + Birthday off in addition and option to buy/sell additional 5 days Company Pension Scheme Private medical Cover Life Assurance Extensive non-taxable benefits THE ROLE This is an exciting opportunity to join our world class Consultancy arm, as a Senior/Lead Cyber Security Risk Consultant, supporting the next phase of Cyberfort’s growth. You’ll be joining a culture of knowledge sharing and continuous learning with expert peers in Secure Architecture and Risk planning. We work across a number of sectors with a diverse client base. We aim to create an environment where everyone can reach their full potential. We work together, we are passionate, creative, and we embrace difference. In this role you’ll work within our Consulting team, supporting new and existing clients across various sectors to define and implement security risk assessment and best practice solutions that match their requirements. You’ll work in close partnership with clients to ensure the delivery of expert services by complementing their inhouse Information and Cyber Security resources combining expertise in information security, solution architecture and business advice. As a Security Consultant, you will be involved in a variety of work which may include responsibility for leading, advising and implementing risk management frameworks, Information Security Management Systems, Enterprise Security Risk Management (2nd line assurance), 1st line identification of risks relating to Security Architecture, maintaining an awareness of published vulnerabilities and best practices across various platforms, especially cloud infrastructures, leading and delivering security assurance coordinator activities, providing Security & Information Risk Advice. Working across the business and multiple technology platforms, you will play a key role in ensuring our clients make the best use of their existing technology and make proportionate, risk-informed decisions, ensuring protection of client assets and transformation of their security architecture. This role forms part of the wider Consultancy team and will work cross functionally with the Delivery Managers and others to support and assure project delivery through all phases of the agile workflow. As a team we’re always looking to raise the bar, learn new things and incorporate new technologies and you will too! You’ll share your knowledge with the team and the wider Cyberfort community, contributing to Group blogs and undertaking research related to technology enhancements. Responsibilities: General Responsibilities: Vulnerability Scanning & Reporting Perform regular vulnerability scans and generate reports utilising the below tool sets. The process should be focused on ensuring that the below tool sets are kept up to date and ensure that scans are performed regularly to help assist the Vulnerability and Patch Manager with identifying weaknesses in the system. SonarQube: perform regular scans with SonarQube to audit code quality metrics, potential bugs, and security vulnerabilities. Trivvy: perform regular scans with Trivvy to identify vulnerabilities within containers. Nessus: perform regular Nessus scans and ensure that the warehouse and plugins are kept up to date to capture new vulnerabilities. Reporting: assist the Vulnerability and Patch Manager with generating regular vulnerability management reports, which are to be provided to the P-ASG cyber security and IA lead. Endpoint Security Trellix: perform regular updates to Trellix to ensure the latest packages are applied and policies are amended to keep up to date with new and emerging threats. Antivirus and Anti-malware Protection: perform compliance checks to ensure that antivirus and anti-malware protection is deployed successfully and being kept up to date by the relevant team. Firewalls: perform compliance checks and regular audits of Firewall rules to ensure that unauthorised access and threats are being blocked. Access Control: ensuring that access controls have been implemented correctly to only allow authorised users to gain access to certain data and systems. Incident Management & Tickets Incident Identification: help to recognise and confirm potential incidents through alerts, logs and user reports. This includes distinguishing between true threats and false positives. Incident Response: respond to potential security breaches or cyber-attacks. The main effort should focus on containment, mitigating the damage, investigation of the root cause of the incident and restoring to normal operations. Ticket Requests: respond to and resolve any tickets raised to the Leidos Security group on SD+ that require Cyber Security Engineering input. System Hardening Patch Updates to Security Products: ensure that the following security tool sets are kept up to date with regular security patches and software updates to fix vulnerabilities and improve system security: Trellix Bolden James Nessus SonarQube Trivvy System Compliance: perform regular system compliance audits and updates to ensure that the systems are compliant with industry best practices. This includes CIS, STIG, NIST etc. Security Enforcing Group Policy Objects (GPOs): perform regular reviews and updates to security enforcing GPOs to ensure that they are compliant and fit for purpose. Vulnerability Assessments: conduct periodic assessments to identify and address potential vulnerabilities. Change Work Security Impact Triage Tool (SITT): if a SITT is required for new software or hardware then it is the responsibility of the Cyber Security Engineer to fill out Section 2 of the SITT tool. Security Evaluation, Testing and Assurance (ST&V): perform Security, Evaluation, Testing and Assurance activities for any new changes that are planned in as part of PI Planning. Participation in Regular Meetings Cyber Security Engineers are expected to lead or attend numerous meetings that require their input. This includes the following: Security Working Group (SWG): Lead Cyber Security Engineer to attend. Vulnerability Triage: Lead Cyber Security Engineer to manage and other Cyber Security Engineers to attend. Security Workshop: All Cyber Security Engineers to attend. PI Planning: Change Cyber Security Engineers to participate and attend. Daily Standups (Blue/Green Team): Change Cyber Security Engineers to attend every day. Documentation Cyber Security Engineers are responsible for creating, maintaining and reviewing detailed documentation...


- Company Name
- Sanderson
- Job Title
- IT Security Engineer
- Job Description
- IT Security Engineer Bristol - Hybrid Working/1 or 2 days per week onsite £45,000 - £50,000 + benefits Fantastic new permanent opportunity for an experienced IT Security Engineer with this large financial services company based in Bristol. As a key member of the Planning, Architecture & Security services team, the role will be at the forefront of the company's security strategy, ensuring the confidentiality, integrity and availability of all their information and information systems. This role will focus on security and quality control in the IT department and will include designing, building and securing, scalable and robust systems. This role will help the company understand security threats and help create strategies to protect the businesses assets and interests. Main responsibilities: Proactively identify information security deficiencies or opportunities for improvement and facilitate development of pragmatic solutions. Plan, implement and upgrade security measures and controls. Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and/or destruction. Contribute to the IT Strategy planning process with regards to Information Security, ISO27001/27002 developments. Provide advisory and consulting support to help the Company improve its security posture and adhere to security policies, expected controls and regulatory requirements. Maintain data and monitor security access. Perform vulnerability testing, risk analyses and security assessments. Define, implement and maintain corporate security policies. Anticipate security alerts, incidents and disasters and reduce their likelihood. Perform information security reviews of the core business and group business as well as third parties. Identify and document areas of IT Risk related to Information/Cyber Security. Support IT Risk Management by proposing appropriate risk mitigation and control measures. Skills Required: A proven background within Security Operations/Network Security and Security Engineering. Able to demonstrate a good understanding of information security frameworks, standards and security best practice (ISO27001, NIST CSF, Mitre Att&ck Framework, OWASP). Experience in designing secure components (eg networks, systems, applications, security technologies) Knowledge of and skills in at least one Scripting language such as PowerShell. Comprehensive knowledge of network design, defence-in-depth principles and network security architecture. Extensive experience and understanding of security analysis tools, defensive technologies and other security technologies (eg SIEM, VAS, IDS/IPS, Firewalls, IAM, PAM, NAC, Email Security, Web filtering, Patch management, Anti-malware). Experience in identifying, detecting, applying protection, responding and remediating to security incidents to within business risk appetite. Strong working knowledge of authentication technologies (eg two-factor, multifactor). Strong proficiency in using the Microsoft Ecosystem such as Active Directory and MS Entra ID, including GPO, DNS, DHCP. Knowledge of endpoint security solutions (eg HIDS, anti-malware, file integrity, DLP). AWS, Azure and other cloud platforms, including hybrid cloud (eg SaaS, IaaS, PaaS). System administration, supporting multiple platforms and applications. Skilled in conducting vulnerability scans and identifying vulnerabilities in systems. Effective technical and non-technical communication skills to provide security support for colleagues, at all levels, across the business. For any further queries regarding the role or to apply, please contact Danny Palmer on at (see below)