Key Responsibilities : Endpoint Protection Deployment and Management: Install, configure, and maintain endpoint protection solutions such as antivirus software, anti-malware tools, host-based intrusion detection/prevention systems (HIDS/HIPS), and endpoint detection and response (EDR) platforms. Ensure that endpoint protection software is up-to-date with … the latest definitions, patches, and security updates to defend against emerging threats. ThreatDetection and Prevention: Monitor endpoint activities and network traffic for signs of malicious behavior, suspicious activities, or known attack patterns. Implement proactive measures to detect and prevent malware, ransomware, phishing attempts, and other types of … sensitive data on endpoints. Incident Response and Remediation: Respond to security alerts and incidents detected on endpoints by investigating the root cause, containing the threat, and initiating remediation actions. Isolate infected endpoints from the network, quarantine malicious files, and remove malware infections to prevent further spread across the organization. more »
and cloud-native applications. Implement and manage IAM policies, ensuring least privilege principles are maintained. Evaluate and deploy security tools and technologies to enhance threatdetection and response capabilities. Provide guidance and mentorship to junior security engineers, fostering a culture of continuous learning and improvement. Stay current with … security engineering. Strong expertise in securing cloud environments such as AWS, Azure, or GCP. Proficiency in security technologies and tools such as firewalls, intrusion detection/prevention systems, SIEM, and vulnerability management. Experience with IaC tools like Terraform, CloudFormation, or ARM templates. Deep understanding of IAM, encryption, network security more »
Monitor and respond to security incidents and alerts within the Azure environment. Microsoft Defender: Configure and manage Microsoft Defender for Endpoint. Develop and implement threatdetection and response strategies. Analyze and respond to security threats and incidents. Required Skills and Qualifications: In-depth knowledge of MDM solutions such … of Microsoft Azure security features and best practices. Experience with Microsoft Defender for Endpoint or similar security tools. Familiarity with network security, encryption, and threat detection. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills. Preferred Qualifications: Relevant certifications such as CISSP, CISM, CEH, or Microsoft Certified more »
Warrington, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
team and customer. Collaborate with teams to design and implement Sentinel for specific client needs. Configure and optimise Sentinel for advanced security monitoring and threat detection. Conduct regular assessments and audits to ensure Sentinel effectiveness. Troubleshoot and resolve technical issues related to Sentinel deployments. Your Profile: Strong understanding of more »
drive value for the organization. The suite of applications developed and maintained by the team are used to enhance the firm’s information security threatdetection, compliance, entitlement management architectures and audit assurance programs. Key Responsibilities: Analysing requirements from the business and understanding their processes. Documenting requirements in more »
Central (DACH, Cz, Pl etc.) Europe. This individual will be working within an established Telco sector Cybersecurity company whom are experts in Network Traffic, ThreatDetection and Telco Network centric cybersecurity solutions. This is a new position and whilst we would love to find someone with Telco Sector more »
Stockport, England, United Kingdom Hybrid / WFH Options
Chapman Tate Associates
of Azure resources (VMs, storage, networking, databases, etc.) Implement and enforce security best practices within the Azure environment, including access control, identity management, and threatdetection Monitor Azure services for performance and identify opportunities for optimization Automate routine tasks using Azure automation tools (ARM templates, Azure CLI, PowerShell more »
leader in its field, and part of a globally successful UK-based business. They design, manufacture, sell and support a range of highly advanced threatdetection and security products for global markets in commercial, aviation, defence and security sectors. The products range from small hand-held devices through more »
opportunities for training and technical development. Day to day responsibilities will include: Incident triage and investigation. Analysis of all suspicious email activity. Participating in threat hunt and offensive security exercises. Analysis of all SIEM logs, and the opportunity to get involved in some threat detection. Working with technical … incidents Demonstrable business facing skills Experience of working with a SIEM platform – Splunk, QRadar, Elastic Security certifications highly desirable Experience of scripting/automation, threat hunting and offensive security highly desirable Please send your CV for immediate consideration. more »
London, England, United Kingdom Hybrid / WFH Options
Nexus Jobs
into Head of IT (CIO | CISO) Need an individual with a strong hands on network and security background Cisco networking Cisco firewalls (Firepower/ThreatDetection) Palo Alto firewalls SIEM experience ( Logarithm desirable) Web proxy (Forcepoint desirable) Governance skills Policy writing/reviewing Reporting KPI monitoring Certifications like more »
Birmingham, England, United Kingdom Hybrid / WFH Options
Digital Waffle
and on-premises environments. Conduct regular security assessments, vulnerability testing, and risk analysis to identify and mitigate security risks. Lead the implementation of advanced threatdetection and response strategies. Collaborate with IT and development teams to integrate security best practices into system designs and deployment processes. Monitor and more »
at the heart of everything they do. Key Responsibilities: Conduct security risk assessments, provide recommendations, and implement controls. Possess a thorough understanding of advanced threatdetection, continuous vulnerability assessment, and strategies for response and mitigation in information/cyber security operations. Contribute to the implementation IT security roadmap … regarding information security matters. Assist in the scope and execution of regular penetration testing at network perimeter, internal, and application levels. Monitor the external threat landscape and recommend appropriate actions for emerging threats. Provide guidance and support for cyber incident response during tests and actual breach/security incidents. … data protection. Experience working within Information Security or IT Security, Data Protection. Self-motivated, proactive, and able to take responsibility. Strong understanding of advanced threat detections, continuous vulnerability assessment, response and mitigation strategies used in Cyber Security operations. Ability to define the technology security requirements in conjunction with technical more »
the Security Engineer will design and implement security solutions in the Microsoft Security stack. The ideal candidate will come from a Security Operations or Threat Hunting background. Being the Liaison between SOC teams and clients, you will need strong expertise in cloud security concepts (ideally within Azure), and be … able to perform security assessments and scan for vulnerabilities. If you have prior experience with Microsoft Defender, Azure Sentinel, threatdetection and are able to accurately consult clients about their needs, whilst implementing effective security solutions, I strongly recommend applying. An excellent opportunity to upskill and develop your more »
their test case writing ability. The suite of applications developed and maintained by the team are used to enhance the firm’s information security threatdetection, compliance, entitlement management architectures and audit assurance programs. You'll have the freedom to challenge the status quo, mentor fellow engineers, and more »
leader in its field, and part of a globally successful UK-based business. They design, manufacture, sell and support a range of highly advanced threatdetection and security products for global markets in commercial, aviation, defence and security sectors. The products range from small hand-held devices through more »
Warrington, England, United Kingdom Hybrid / WFH Options
Tata Consultancy Services
team and customer. Collaborate with teams to design and implement Sentinel for specific client needs. Configure and optimise Sentinel for advanced security monitoring and threat detection. Conduct regular assessments and audits to ensure Sentinel effectiveness. Troubleshoot and resolve technical issues related to Sentinel deployments. Your Profile: Technical key skills … during problem solving. Collaborative attitude to refine and progress understanding of requirements and deliverables. Good to have: Experience in Security Operations OR in a threat hunting role. Rewards & Benefits: TCS is consistently voted a Top Employer in the UK and globally. Our competitive salary packages feature pension, health care more »
Hemel Hempstead, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Redline Group Ltd
leader in its field, and part of a globally successful UK-based business. They design, manufacture, sell and support a range of highly advanced threatdetection and security products for global markets in commercial, aviation, defence and security sectors. The products range from small hand-held devices through more »
Preston, Lancashire, United Kingdom Hybrid / WFH Options
BAE Systems
KQL combined with the ability to create custom KQL scripts that are used to conduct sophisticated security data analysis and uplift incident response and threatdetection capabilities within a SIEM Highly motivated with the ability to work autonomously to complete a range of tasks to time and quality more »
Employment Type: Permanent
Salary: £60000/annum Depending on skills and experience
South West London, London, United Kingdom Hybrid / WFH Options
MASS Consultants
as Key Account Manager for one such interesting customer, for whom we significantly contribute to designing and developing conceptual models into the future of threatdetection and countermeasures, influencing the EW domain. Whilst our main hubs of engineering activity are at our Cambridgeshire and Lincolnshire HQs, this role more »
Oldham, Greater Manchester, North West, United Kingdom
BluetownOnline Ltd
IT infrastructure components, including databases, storage solutions, and backup systems Ability to translate business requirements into efficient IT solutions Proficiency in cybersecurity practices, including threatdetection, prevention, and incident response Professional work ethic with a client-driven focus and attention to detail Familiarity with IT project management methodologies more »
SK5, Heaton Norris, Borough of Stockport, Greater Manchester, United Kingdom Hybrid / WFH Options
Chapman Tate Associates
of Azure resources (VMs, storage, networking, databases, etc.) Implement and enforce security best practices within the Azure environment, including access control, identity management, and threatdetection Monitor Azure services for performance and identify opportunities for optimization Automate routine tasks using Azure automation tools (ARM templates, Azure CLI, PowerShell more »
Hemel Hempstead, Hertfordshire, United Kingdom Hybrid / WFH Options
The People Network
on Defence and National Security. Crafting and delivering seamless onboarding experiences for our Managed SOC clients. Providing expert engineering support to analysts for efficient threatdetection and response. Developing and maintaining robust detection rules to stay ahead of evolving threats. Actively participating in the design and optimization more »