National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Endpoint Security Engineer

Adecco
Cheshire West and Chester
9 months ago
Create job alert

Job Opportunity: Endpoint Security Engineer



Our client, a leading organisation in the technology field, is seeking a skilled and dedicated Endpoint Security Engineer to join their team on a temporary basis. This is an amazing opportunity to contribute to a renowned company and make a lasting impact in the world of cybersecurity. Get ready to elevate your career to new heights!



Location: Eaton and Eccleston, Chester (1 - 3 days onsite)



Compensation: Daily rate ranging from £ to £ (inside IR35 via umbrella)



Contract Length: 12 months



Perks: Enjoy the benefits of a hybrid working arrangement, providing you with flexibility and work-life balance.



Responsibilities



As the Endpoint Security Engineer, you will utilise your expertise in engineering and design to create cutting-edge endpoint security solutions. Leveraging platforms such as Trellix, BeyondTrust, and Crowdstrike, you'll lay the groundwork for a robust security infrastructure. Additionally, you will collaborate with Security Vendor consultants and Technical Account managers, promoting a seamless exchange of knowledge. Your role will involve closely partnering with compliance, audit, and information security teams, ensuring that all security measures align with established protocols. Furthermore, you'll conduct research and consultancy, staying at the forefront of industry advancements. When challenges arise, your agility and quick response will play a vital role in addressing and resolving any issues. Join a global company that values flexibility and a willingness to adapt to changing demands!



Technical Skills & Certifications Required



To thrive in this role, you should possess the following:



Proven experience in Endpoint Security Engineering



Advanced knowledge of Application Control, particularly BeyondTrust



Scripting skills, with a focus on Powershell and Python



Familiarity with Trellix ePO, BeyondTrust BeyondInsight Policy Management Platforms



Expertise in Microsoft Windows operating systems



Security certification, preferably CISSP



Proficiency in managing MAC IOS platforms



Strong analytical and problem-solving abilities, capable of addressing complex security issues and recommending effective solutions



Bonus Skills & Experience (not mandatory!)



If you have exposure to data analytic tools like Splunk or PowerBI, it would be beneficial. Additionally, your troubleshooting techniques and strategies should be well-developed, enabling you to overcome any challenges that may arise.



Don't miss out on this exciting opportunity with our client! Apply now to take your career to the next level and embark on an incredible professional journey!



Adecco is a disability-confident employer. It is important to us that we run an inclusive and accessible recruitment process to support candidates of all backgrounds and all abilities to apply. Adecco is committed to building a supportive environment for you to explore the next steps in your career. If you require reasonable adjustments at any stage, please let us know and we will be happy to support you.


To speak to a recruitment expert please contact

MoreInformation

Related Jobs

View all jobs

Endpoint Security Engineer

Security Engineer (Endpoint)

IT Security Engineer

Senior Security Engineer - Incident Management

Senior Cyber Security Engineer

Senior Cyber Security Engineer

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.