are seeking a Senior Security Engineer to join our team. If you have a passion for cybersecurity, thrive on solving complex security challenges, and are experienced in advanced threat detection and response, we’d love to hear from you! As a Senior Security Engineer, you will be responsible for protecting our systems, networks, and data from cyber threats. You … respond to threat intelligence feeds. Monitor systems and networks for suspicious activity and engage in response procedures as necessary. Manage and document all stages of security incident response, including detection, containment, and recovery. Work closely with the Crisis Management Team and be prepared to respond, liaise with customers and take action, as and when needed. Assist in the creation … security (AWS, Azure, Google Cloud) and network security architecture Experience conducting vulnerability assessments, incident response, and forensics using tools such as Nessus Proficiency in threat hunting, malware analysis, and intrusiondetection techniques Familiarity with compliance frameworks (e.g., NIST, ISO, PCI-DSS) and regulatory requirements Strong analytical skills with the ability to think like an attacker and find creative More ❯
implementation, T-shoot and mobile network security. Understanding of 3GPP mobile network CORE and RAN architectures and security requirements. Strong knowledge of network security protocols, VPN, firewall management, and intrusiondetection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks (e.g., GDPR, HIPAA, ISO 27001). In More ❯
authentication, authorization, network security, application security, cloud security, and threat intelligence. Security Technologies: Proficient in using different security technologies, such as firewalls, end point protection, web protection, email protection, intrusiondetection and prevention systems, vulnerability scanners, encryption software, VPNs, and SIEMs. Be able to configure, test, deploy, and troubleshoot these tools and technologies and integrate them with other More ❯
Role Responsibilities Key responsibilities for this role may include: Incident Detection & Response: Lead the triage, investigation, and classification of security events using SIEM and other tooling Take ownership of end-to-end handling of medium to high-severity incidents, coordinating containment and remediation efforts Maintain detailed incident records, including timelines, impact assessments, root cause analysis, and mitigation steps Act … and attribution patterns Lead threat intelligence sharing within the organisation and with external partners Mentor Tier 1 staff in interpreting threat data and logs during investigations Security Monitoring and Detection Engineering: Conduct continuous security monitoring of network traffic, endpoints, and critical systems Proactively tune and improve SIEM rules, alerts, and correlation logic to reduce false positives and increase detection … Development teams) to identify and resolve security issues Share insights, threat intelligence, and incident learnings to improve the overall security posture of the organization Continuous Improvement: Identify gaps in detection, response, or processes and propose pragmatic, measurable improvements Lead small initiatives to improve SOC efficiency, such as automating repetitive tasks or improving alert triage Contribute to maturity efforts such More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
In Technology Group Limited
data, and infrastructure against emerging threats. Key Responsibilities: Monitor, detect, and respond to security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusiondetection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with IT and development teams to ensure secure More ❯
cloud platforms such as AWS, Azure, Google Cloud, and M365 Familiarity with security frameworks and standards (e.g., ISO 27001, NIST, CIS) Experience with security tools and technologies, including firewalls, intrusiondetection/prevention systems, and encryption Excellent problem-solving skills and the ability to think critically and strategically Strong communication and interpersonal skills, with the ability to engage More ❯
and risk assessments to identify and address potential vulnerabilities. Develop and maintain security policies and procedures in accordance with industry standards. Configure and manage security tools, such as firewalls, intrusiondetection systems, and encryption technologies. Monitor network traffic and system logs for suspicious activity and respond to security incidents in a timely manner. Stay updated on the latest More ❯
platforms such as AWS, Azure, Google Cloud, and M365. Familiarity with security frameworks and standards (e.g., ISO 27001, NIST, CIS). Experience with security tools and technologies, including firewalls, intrusiondetection/prevention systems, and encryption. Excellent problem-solving skills and the ability to think critically and strategically. Strong communication and interpersonal skills, with the ability to engage More ❯
for protecting systems, networks, and data by designing, implementing, and maintaining security controls across the full lifecyclefrom architecture to operations. Key Responsibilities: Implement and manage security technologies, including firewalls, intrusiondetection/prevention systems (IDS/IPS), SIEMs, and endpoint protection Conduct threat and vulnerability assessments, penetration testing, and risk analysis activities Design and deploy security controls that … Strong knowledge of security technologies (e.g., firewalls, VPNs, SIEM, IDS/IPS, EDR, PKI, NAC) Hands-on experience with network, system, and application security Proficiency in security monitoring, threat detection, and incident response processes Familiarity with security frameworks and standards (e.g., ISO 27001, NIST, CIS Controls) Solid understanding of encryption, access control, authentication, and identity management Strong scripting or More ❯
incidents to management. Stay up to date with the latest cybersecurity threats, trends, and technologies. Skills and Qualifications: Proficiency with security information and event management (SIEM) systems. Experience with intrusiondetection/prevention systems (IDS/IPS), firewalls, and antivirus software. Familiarity with network protocols, operating systems, and security architectures. Strong analytical and problem-solving skills to assess More ❯
CCSP MCSA-Microsoft Windows Server MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional; CCNA/CCNP Experience with security tools and technologies such as intrusiondetection systems, SIEM, and vulnerability management tools. Familiarity with regulatory requirements and industry standards related to IT security. If you're interested in this role, click 'apply now More ❯
compliance with relevant regulatory standards (eg ISO 27001) as part of critical vendor performance assessment ensuring operational resilience is maintained. In collaboration with GT, manage security systems, including firewalls, intrusiondetection/prevention systems, and antivirus software. In collaboration with GT, Develop and test incident response plans and coordinate responses to security incidents and breaches Raise awareness of More ❯
for vulnerability management Strong knowledge of Splunk or other industry standard SIEM tool for security monitoring and analysis. Familiarity with security technologies and understanding of network protocols, firewalls, and intrusiondetection/prevention systems. Knowledge of Threat Intelligence, Digital Forensics and Data Loss Prevention Relevant certifications such as CISSP, CEH, or Splunk certifications are a plus Your security More ❯
or policies with regards to cyber security submitting them to the Information Security Officer for review and authorisation. Implementation & Execution within mandate Monitor and analyse Cybersecurity operational services, including intrusiondetection and prevention, situational awareness of: network intrusions. security events. data spillage; and. Incident response actions. Identify and resolve vulnerabilities in networks, servers, systems, and applications by performing More ❯
and preserve evidence in accordance with legal and regulatory requirements. Provide detailed forensic reports and recommendations for improving security posture. Incident Response: Lead and coordinate incident response efforts, including detection, containment, eradication, and recovery. Support development and maintenance of incident response plans and procedures. Conduct post-incident reviews and lessons learned sessions to improve response capabilities. Security Tools: Utilize … and maintain security tools and technologies, such as firewalls and intrusiondetection/prevention systems. Ensure security tools are properly configured and updated. Evaluate and recommend new security tools and technologies to enhance security operations. Documentation: Create and maintain detailed documentation of security incidents, forensic analysis, and vulnerability assessments. Prepare reports for management and stakeholders. Collaboration: Work closely … experience with IT technologies, including cloud infrastructure; experience of AWS an advantage. Understanding of the Secure Software Development Lifecycle. Security Tools Proficiency: Expertise in using firewalls (especially Palo Altos), intrusiondetection systems and endpoint security solutions. Network Security: Strong understanding of network protocols, VPNs, and network security architecture. Incident Response: Ability to detect, analyse, and respond to security More ❯
underpinning the MOD's Defensive Cyber Operation and freedom of action in cyberspace. The Defensive monitoring and incident response elements are responsible for the 24/7/365 detection of, and response to, cyber incidents impacting the MOD’s digital enterprise. As a Cyber Security Analyst in the SOC team, you’ll be collaborating with cross-functional teams … and Event Management (SIEM) tooling to proactively identify security risks and incidents. Conduct research, analysis and correlation across a variety of source data sets (indications and warnings) and validate intrusiondetection system (IDS) alerts against network traffic, using packet analysis tools. Support major incident response efforts and lead on incident responses, including containment, investigation, analysis and reporting. Support … and development of automated monitoring processes, using a variety of the latest SIEM and network analysis tools, techniques and procedures to detect malicious activity and ensure continuous improvement of detection and processes. Deliver operationally focused direction, guidance and advice to team members, providing coaching and mentoring as required. About you: We would expect to see knowledge and understanding of More ❯
and M365. An in-depth knowledge of the Microsoft Sentinel SIEM solution and configuration best practice and use. Use of advanced security assessment tools. Basic understanding of firewall and intrusiondetection system administration. Basic understanding of TCP/IP. Ability to tune and harden various operating systems. Ability to use security systems to correlate and respond to security … alerts and events. Detailed knowledge of: SIEM administration, log investigation, analysis and reporting. Common exploitation tools, tactics and procedures. Persistent attacks, detection methods and how malicious software persists on compromised systems. Security incident response procedures and best practices. We believe this is an excellent opportunity for candidates who have a strong understanding of IT security with experience of working More ❯
escalation point for noteworthy investigations, deeper investigations, and those that require critical attention. Continue to build out new capabilities within the program aligned with our attack surface. Opportunities include detection enhancements, improved or new standard operating procedures, and working with internal teams to tune and operationalize new technologies. Focus on continuing to develop dashboards, direct alerting, risk-based alerting … threat intelligence, breach attack simulation, or similar programs. Strong understanding of the fundamentals such as packet, file, and log analysis. Knowledgeable with various security infrastructure tools such as firewalls, intrusion prevention/detection systems, proxy servers, email controls, anonymizing technology, data loss prevention, Endpoint Detection and Response (EDR), and SIEM (Splunk) Strong understanding of common communication protocols More ❯
a technical authority within the team and department. What you'll need to succeed Security Operations & Incident Response Lead security operations services, including monitoring, incident response, threat management, and intrusiondetection, using both internal and external resources. Manage the outsourced 24/7 security operations service. Lead the organisation's response to security incidents, coordinating recovery efforts with … Degree or equivalent industry certification. Professional certification in security/identity (e.g. CREST, GIAC). ITIL Foundation certification. Incident response certification preferred. Technical Knowledge Proficient in SIEM, EDR, threat detection, and vulnerability management. Solid understanding of network security (firewalls, segmentation, IDS/IPS). Experience with Windows, Mac, Linux environments and security tooling. Familiarity with public cloud platforms (Azure More ❯
a technical authority within the team and department. What you'll need to succeed Security Operations & Incident Response Lead security operations services, including monitoring, incident response, threat management, and intrusiondetection, using both internal and external resources. Manage the outsourced 24/7 security operations service. Lead the organisation's response to security incidents, coordinating recovery efforts with … Degree or equivalent industry certification. Professional certification in security/identity (e.g. CREST, GIAC). ITIL Foundation certification. Incident response certification preferred. Technical Knowledge Proficient in SIEM, EDR, threat detection, and vulnerability management. Solid understanding of network security (firewalls, segmentation, IDS/IPS). Experience with Windows, Mac, Linux environments and security tooling. Familiarity with public cloud platforms (Azure More ❯
design and implementation within a Service Provider organization Experience with security frameworks such as NIST CSF, ISO 27001, or CIS Controls Deep understanding of security technologies, such as firewalls, intrusiondetection and prevention systems, vulnerability scanners, and endpoint protection Strong knowledge of cloud security concepts and technologies, such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud More ❯
London, England, United Kingdom Hybrid / WFH Options
V7 Labs
a similar role, demonstrating strong knowledge of the threat landscape relevant to SaaS products, preferably in a data-heavy environment Hands-on experience with security technologies such as firewalls, intrusiondetection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools You own relevant certifications (Security+, IAT II/III level or similar) You excel in risk assessments More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
assigned to work in a role with one of our trusted client partners as a 'Spartan' consultant. In this role you will undertake: Network Security - Understanding of firewall configuration, intrusiondetection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and More ❯
experience as a Security Engineer or in a similar role, with deep understanding of the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusiondetection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). More ❯
London, England, United Kingdom Hybrid / WFH Options
V7 Labs
a similar role, demonstrating strong knowledge of the threat landscape relevant to SaaS products, preferably in a data-heavy environment Hands-on experience with security technologies such as firewalls, intrusiondetection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools You own relevant certifications (Security+, IAT II/III level or similar) You excel in risk assessments More ❯