Network Security Ops Engineer in Lincolnshire

Network Security Ops Engineer in Lincolnshire

Lincolnshire Full-Time 36000 - 60000 € / year (est.) No home office possible
UMass Boston

At a Glance

  • Tasks: Protect the university's network by monitoring and responding to security threats.
  • Company: Join UMass Boston, a leader in higher education with a focus on innovation.
  • Benefits: Enjoy competitive pay, professional growth opportunities, and a supportive work environment.
  • Other info: Collaborate with diverse teams and enhance your skills in a dynamic setting.
  • Why this job: Make a real difference in cybersecurity while working with cutting-edge technology.
  • Qualifications: Master's degree in Cybersecurity and 5 years of experience in network security.

The predicted salary is between 36000 - 60000 € per year.

General Summary: Reporting to the Director of Network Services, the Network Security Operations Engineer (NSOE) is a vital hybrid role that combines advanced technical skills with operational management to safeguard the university’s on-premises and cloud (Azure) network infrastructure, fulfilling comprehensive network security visibility requirements at the campus Network and Security Operations Center (NSOC). As a key liaison between Network Services, Cloud Operations, and the Information Security Office (ISO), the NSOE oversees hybrid (on-prem/Azure) network security operations, improves workflows, and manages the entire lifecycle of security incidents, service requests, and NSOC tasks—ensuring alignment with zero-trust principles and cybersecurity best practices.

The NSOE proactively monitors, investigates, and responds to threats using Azure-native and integrated security tools, including SIEM (Sentinel), CASB, SolarWinds Observability Platform, Azure Firewall, Network Security Groups for micro-segmentation, VPN gateways, GlobalProtect, Infoblox, and Aruba NetEdit. The role also involves optimizing configurations for firewalls, edge switches, DMZs, and secure network segmentation. Responsibilities include conducting root cause analyses, vulnerability assessments, and risk mitigation, as well as coordinating with the ISO team to contain breaches and improve detection through AI/ML/DL network behavioral analytics. Additionally, the NSOE will assist in network design, performance testing, capacity planning, and policy development to ensure compliance with industry standards.

Beyond technical tasks, the NSOE plays a managerial role by aligning network security with the NSOC, refining incident response protocols, and fostering collaboration between network and security teams. This position bridges the cloud and on-premises security gaps, maintaining a unified defense posture across the university’s expanding hybrid ecosystem. It ensures that the organization maintains a single source of truth for network infrastructure, enabling efficient troubleshooting, risk assessment, and strategic planning. The role may require after-hours support for emergencies, network upgrades, and critical security events. The ideal candidate will have strong expertise in SOC/NOC environments, network security administration, and multi-vendor device management, as well as the ability to drive continuous improvement in both security posture and operational efficiency.

Examples of Duties:

  • Serve as the primary network security incident coordinator at the Network and Security Operations Center (NSOC), overseeing security, event monitoring, investigation, and response in alignment with enterprise incident response protocols.
  • Design and refine detection rules, alerts, and signatures based on threat intelligence, behavioral analytics (AI/ML), and attack trends.
  • Conduct proactive threat hunting using SIEM analytics, endpoint telemetry (EDR/XDR), and network forensics (e.g., PCAP analysis) to identify advanced threats and stealthy attack patterns.
  • Monitor and secure cloud/hybrid environments (e.g., Azure NSGs, SaaS applications) to ensure consistent visibility and policy enforcement across on-premises and cloud assets.
  • Implement and enforce Zero Trust Network Access (ZTNA) policies, including micro-segmentation, identity-aware proxies, and device posture checks (e.g., via Aruba ClearPass).
  • Perform malware traffic analysis using sandboxing tools (e.g., Cuckoo, VirusTotal) and correlate findings with network IDS/IPS alerts.
  • Act as a liaison between Network Services, ISO, and Desktop Support to ensure security compliance across IT environments.
  • Develop and report KPIs to measure security control effectiveness.
  • Proactively monitor, analyze, and respond to threats using various tools, including SIEM (Microsoft Sentinel), SolarWinds, Infoblox, Aruba NetEdit, and other security tools, to ensure the rapid containment of breaches and vulnerabilities.
  • Create, update, and maintain detailed internal network topology diagrams to ensure precise documentation and accurate planning.
  • Proactively secure and maintain all network infrastructure devices (routers, switches, firewalls, wireless controllers) through systematic hardening of configurations, timely patching of vulnerabilities, and continuous monitoring of access controls.
  • Conduct regular vulnerability assessments of network infrastructure using automated scanning tools and manual verification techniques to identify and remediate security gaps in compliance with the CIS framework control 12.
  • Develop, maintain, and version-control comprehensive network architecture diagrams (including logical/physical topologies, data flows, and security zones) using industry-standard tools (e.g., Visio).
  • Collaborate with network engineering and security teams to validate diagrams against real-time configurations, ensuring alignment with actual deployments and minimizing discrepancies.
  • Document and audit network configurations, capturing IP/MAC addresses, VLAN assignments, and ARP tables.
  • Align documentation with NIST SP 800-53 (CM-2, CM-6) and CIS Controls for audit readiness and risk management.
  • Support disaster recovery and business continuity planning by ensuring network documentation reflects failover paths, redundant systems, and critical dependencies.
  • Integrate diagrams with Sentinel to support real-time impact analysis during incidents and facilitate cross-team validation sessions with Security, Networks, and Operations teams to ensure accuracy and compliance.
  • Operate and optimize SIEM (e.g., Microsoft Sentinel) to centralize security event alerting (CIS Safeguard 13.1), correlating logs from network devices, endpoints, and cloud services.
  • Tune alert thresholds (CIS Safeguard 13.11) to reduce false positives and prioritize critical threats.
  • Deploy and manage network/host-based IDS/IPS solutions (CIS Safeguards 13.2, 13.3, 13.7, 13.8), including NIDS, EDR, and CSP-native tools (e.g., Azure Network Watcher), to detect and block malicious activity across enterprise assets.
  • Enforce traffic filtering between network segments (CIS Safeguard 13.4) and port-level access controls (802.1X/Certificates) (CIS Safeguard 13.9).
  • Implement application-layer filtering (CIS Safeguard 13.10) via proxies/firewalls to mitigate lateral threats.
  • Govern remote access security (CIS Safeguard 13.5) through Zero Trust policies (e.g., conditional access, endpoint compliance).
  • Collect and analyze network flow logs (CIS Safeguard 13.6) to identify anomalies and support forensic investigations.
  • Develop and execute an audit framework to inventory all network assets, including switches, routers, wireless controllers, and security appliances.
  • Implement automated discovery tools (such as Aruba NetEdit, SolarWinds, or custom scripts) to continuously monitor network state, detect configuration drift, identify shadow IT devices, validate compliance with security baselines, and produce yearly gap analysis reports.
  • Collaborate cross-functionally with various teams to ensure alignment and successful execution of key initiatives, including working with the Information Security Office to support Zero Trust initiatives, partnering with Network Engineering teams to validate migration plans, and coordinating with the Service Desk to update knowledge base articles.
  • Drive efforts to minimize mean time to repair (MTTR), strengthen the organization’s security posture, and maintain seamless business continuity during the network modernization initiative led by the Director of Network Services.
  • Manage and troubleshoot network devices using SecureCRT for secure CLI access, real-time monitoring, and diagnostics—resolving misconfigurations, performance issues, and connectivity problems to minimize downtime.
  • Automate and standardize network operations by developing SecureCRT scripts (VBScript/Python/Expect) and configuration templates, ensuring consistency, security compliance, and efficiency in upgrades, migrations, and capacity planning.
  • Lead and coordinate incident response efforts, collaborating with cross-functional teams (Network Services, ISO, IT, IT Partners, and other stakeholders) to mitigate security incidents efficiently.
  • Conduct post-incident reviews to identify gaps, refine security controls, and minimize future risks.
  • Assist in network design, capacity planning, and performance testing, ensuring alignment with security best practices and industry standards.
  • Partner with Network Services and ISO to develop and deliver clear, timely communications regarding network security initiatives, outages, and critical updates to stakeholders.
  • Translate complex network security concepts into accessible messaging for non-technical audiences, ensuring campus-wide awareness of cybersecurity risks and best practices.
  • Assist in the creation of network status dashboards, outage notifications, and service bulletins to keep the community informed of operational changes.
  • Assist with risk assessments, security audits, and penetration testing to identify and mitigate weaknesses.
  • Stay informed about emerging cyber threats, attacker tactics, and industry trends to refine defensive strategies.
  • Perform after-hours support for critical security incidents, network upgrades, and emergency response.
  • Participate in the training and supervision of student employees, supporting their professional development.
  • Deliver high-quality customer service, including awareness training and coaching.

Qualifications:

Required Qualifications (non-negotiable):

  • Master’s degree in Cybersecurity, Information Technology, or a related field and coursework.
  • Minimum five (5) years of hands-on cumulative experience in a Network and Security Operations Center (NSOC) environment, with higher education experience preferred.
  • CISSP (Certified Information Systems Security Professional) certification or eligibility to be earned within 6 months of hire.
  • Experience with security frameworks (NIST, CIS, ISO 27001) and compliance standards.
  • Proven ability to diagnose and resolve complex network security issues in enterprise environments.
  • Strong technical skills across Microsoft Windows and Macintosh Operating System platforms, common applications (Excel), and utilities required.
  • Demonstrated proficiency with enterprise security and network tools, including but not limited to: SIEM, IDS/IPS, EDR/XDR, firewall platforms, behavioral analytics, and SolarWinds for network monitoring.
  • Network access control (NAC) implementations (Aruba ClearPass).
  • Network forensic tools (i.e., Wireshark).
  • Vulnerability management platforms (Nessus, TenableOne, Rapid7).
  • Cloud security tools (Azure Security Center).
  • NetEdit for Aruba switch and config management.
  • SecureCRT and Putty for SSH and console to equipment.
  • CoPilot AI for packet trace analysis for threat hunting.
  • Wireshark for packet analysis.
  • Airwave wireless monitoring.
  • Aruba Wireless controllers and conductors.
  • Integrated ClearPass for 802.1x and RADIUS.
  • Access Points dedicated to RF and IDS analysis.
  • XMC (eXtreme Management Center) for eXtreme switch and config management.
  • UXI (User Experience Sensor) monitoring.
  • Visio and Draw.io.
  • Excel Spreadsheets.
  • Hands-on experience configuring, monitoring, and troubleshooting security and network technologies in production environments.
  • Working knowledge of industry-standard network and security platforms and their implementation best practices.

Application Instructions: Please apply online with your resume, cover letter and list of three professional references. Review of candidates will begin following the application closing date. Only Internal candidates in the Professional Staff Bargaining Unit will be considered during the first 10 business days of the posting. All other candidates will be considered after that period.

UMass Boston is committed to the full inclusion of all qualified individuals. As part of this commitment, we will ensure that persons with disabilities are provided reasonable accommodations for the hiring process. If reasonable accommodation is needed, please contact HRDirect@umb.edu or 617-287-5150.

Network Security Ops Engineer in Lincolnshire employer: UMass Boston

UMass Boston is an exceptional employer that fosters a collaborative and innovative work culture, particularly for the Network Security Ops Engineer role. With a strong commitment to employee growth, the university offers extensive professional development opportunities, competitive benefits, and a supportive environment that values diversity and inclusion. Located in the vibrant city of Boston, employees enjoy access to a rich array of cultural and recreational activities, making it an ideal place for both personal and professional fulfillment.

UMass Boston

Contact Detail:

UMass Boston Recruiting Team

StudySmarter Expert Advice🤫

We think this is how you could land Network Security Ops Engineer in Lincolnshire

Tip Number 1

Network with industry professionals! Attend meetups, webinars, or conferences related to network security. Engaging with others in the field can lead to valuable connections and job opportunities.

Tip Number 2

Show off your skills! Create a portfolio showcasing your projects, certifications, and any relevant experience. This can be a great conversation starter during interviews and helps us stand out from the crowd.

Tip Number 3

Prepare for technical interviews by brushing up on key concepts and tools mentioned in the job description. Practice common interview questions and scenarios that relate to network security operations.

Tip Number 4

Don’t forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, we often have exclusive features and resources to help you along the way.

We think you need these skills to ace Network Security Ops Engineer in Lincolnshire

Network Security Operations
Azure Cloud Security
SIEM (Microsoft Sentinel)
Incident Response Coordination
Threat Hunting
Vulnerability Assessments
Zero Trust Network Access (ZTNA)

Some tips for your application 🫡

Tailor Your Resume:Make sure your resume highlights the skills and experiences that align with the Network Security Ops Engineer role. Use keywords from the job description to show we’re a perfect match!

Craft a Compelling Cover Letter:Your cover letter is your chance to shine! Share your passion for network security and how your background makes you the ideal candidate. Don’t forget to mention why you want to join us at UMass Boston!

Showcase Relevant Experience:When detailing your experience, focus on specific projects or roles where you’ve tackled network security challenges. We love seeing real-world examples of your problem-solving skills!

Apply Through Our Website:To make sure your application gets noticed, apply directly through our website. It’s the best way to ensure we see your amazing qualifications and enthusiasm for the role!

How to prepare for a job interview at UMass Boston

Know Your Tools

Familiarise yourself with the specific security tools mentioned in the job description, like SIEM (Sentinel), Azure Firewall, and SolarWinds. Be ready to discuss how you've used these tools in past roles or how you would approach using them in this position.

Demonstrate Your Problem-Solving Skills

Prepare to share examples of how you've tackled complex network security issues. Use the STAR method (Situation, Task, Action, Result) to structure your responses, highlighting your analytical skills and ability to work under pressure.

Understand Zero Trust Principles

Since the role emphasises zero-trust principles, brush up on what that means in practice. Be prepared to discuss how you would implement these principles in a hybrid environment, ensuring security across both on-premises and cloud infrastructures.

Show Your Collaborative Spirit

This role requires liaising between various teams. Think of examples where you've successfully collaborated with different departments, especially in high-stakes situations. Highlight your communication skills and ability to foster teamwork in your answers.