Hemel Hempstead, Hertfordshire, United Kingdom Hybrid / WFH Options
The People Network
SIEM or Cyber Engineer Are you a skilled SIEM Engineer or Cyber Security professional with strong SIEM experience looking to make a real impact? We have an exciting opportunity for a talented individual to join a security team protecting country critical systems in Aerospace and Defence clients based in Hemel … Hempstead with the flexibility of working from home 2 days a week! In this SIEM role, you'll play a vital role in: Designing and implementing best-in-class SIEM solutions (Splunk and/or Sentinel) to fortify our clients' security posture, with a focus on Defence and National Security. … robust detection rules to stay ahead of evolving threats. Actively participating in the design and optimization of security platforms. Im looking for Cyber/SIEM professional with a strong skillset in: SIEM or Cyber Security engineering: Deep understanding of security concepts and experience with SIEM solutions (Splunk and/or more »
Vulnerability Analysis, reviewing as-built documentation, security assessments and improvement programmes. Monitoring and managing a 3rd party Security Operations Centre (SOC), reviewing and monitoring SIEM inputs/outputs with the SOC team and ensuring that appropriate logs are ingested and monitored. Building policies and procedures to enhance the controls andmore »
and data security. Some knowledge of GDPR & PCI-DSS Strong experience of AWS and ideally certified Forensic investigation techniques. Experience with security technologies (e.g., SIEM, DLP, IDS, IPS). Knowledge of Microsoft Security Centre and Sentinel. Understanding of ISO27001:22, NIST, and secure software development. Attributes: Excellent communication and stakeholder more »
Leeds, England, United Kingdom Hybrid / WFH Options
Cyber Security Jobsite
operation with four shift teams working in a standard rotation. They are responsible for utilising the SOC's Security Incident andEventManagement (SIEM) toolsets to detect and investigate potential Securityand Service Incidents occurring within the monitored networks. These roles require a minimum of SC clearance and be prepared more »
in a similar technical IT Security role involving a broad range of tech including some of the following: Knowledge & understanding of security principles surrounding SIEM, Antivirus, DLP, Firewalls, Open Source Filtering tools, Cloud security (Azure), IdAM (PAM on-prem/cloud), EDR, Scanning/vulnerability tools, etc. Windows Server & Networking more »
Bonus + Bens dep on exp and certifications Environment:- Architecture, LLD, Implementation, Microsoft Defender, Microsoft Azure Security Centre, Azure, Intune, Endpoint Protection Platforms, EDR, SIEM, SOC, Risk Assessments, MDM, IAM, Customer Facing, Configuration. My client, a prestigious provider of managed services is looking to hire at Microsoft Security Consultant/ more »
EC3V, Walbrook, Greater London, United Kingdom Hybrid / WFH Options
Ignite Digital Search Limited
and data security. Some knowledge of GDPR & PCI-DSS Strong experience of AWS and ideally certified Forensic investigation techniques. Experience with security technologies (e.g., SIEM, DLP, IDS, IPS). Knowledge of Microsoft Security Centre and Sentinel. Understanding of ISO27001:22, NIST, and secure software development. Attributes: Excellent communication and stakeholder more »
Employment Type: Permanent
Salary: £85000 - £95000/annum 10% pension, bonus, medical
preferred. Proven experience in cybersecurity roles, with a strong understanding of security principles, technologies, and best practices. Proficiency in using security tools such as SIEM, IDS/IPS, antivirus, firewalls, and vulnerability scanners. Hands-on experience with Microsoft Defender Security & Compliance Suite, Exchange Online Protection, CASB, Mimecast, Inutne Policy Deployment more »
in securing cloud environments such as AWS, Azure, or GCP. Proficiency in security technologies and tools such as firewalls, intrusion detection/prevention systems, SIEM, and vulnerability management. Experience with IaC tools like Terraform, CloudFormation, or ARM templates. Deep understanding of IAM, encryption, network security, and data protection strategies in more »
in securing cloud environments such as AWS, Azure, or GCP. Proficiency in security technologies and tools such as firewalls, intrusion detection/prevention systems, SIEM, and vulnerability management. Experience with IaC tools like Terraform, CloudFormation, or ARM templates. Deep understanding of IAM, encryption, network security, and data protection strategies in more »
F5 Advanced WAF). Strong knowledge of web application security practices, including OWASP Top Ten vulnerabilities. Experience with security tools and technologies such as SIEM, IDS/IPS, and vulnerability scanners. Analytical and Problem-Solving Skills: Ability to analyze complex security issues and develop effective solutions. Strong attention to detail more »
identity and access management Developing and upskilling a cybersecurity workforce Delivering cybersecurity culture change, awareness, and training Performing continuous monitoring activities such as using SIEM tools, APT hunting, implementing UBA, etc. Designing/implementing vulnerability management, including conducting vulnerability assessments Performing penetration testing, incident management, BCP, and/or DRP more »
identity and access management Developing and upskilling a cybersecurity workforce Delivering cybersecurity culture change, awareness, and training Performing continuous monitoring activities such as using SIEM tools, APT hunting, implementing UBA, etc. Designing/implementing vulnerability management, including conducting vulnerability assessments Performing penetration testing, incident management, BCP, and/or DRP more »
identity and access management Developing and upskilling a cybersecurity workforce Delivering cybersecurity culture change, awareness, and training Performing continuous monitoring activities such as using SIEM tools, APT hunting, implementing UBA, etc. Designing/implementing vulnerability management, including conducting vulnerability assessments Performing penetration testing, incident management, BCP, and/or DRP more »
identity and access management Developing and upskilling a cybersecurity workforce Delivering cybersecurity culture change, awareness, and training Performing continuous monitoring activities such as using SIEM tools, APT hunting, implementing UBA, etc. Designing/implementing vulnerability management, including conducting vulnerability assessments Performing penetration testing, incident management, BCP, and/or DRP more »
identity and access management Developing and upskilling a cybersecurity workforce Delivering cybersecurity culture change, awareness, and training Performing continuous monitoring activities such as using SIEM tools, APT hunting, implementing UBA, etc. Designing/implementing vulnerability management, including conducting vulnerability assessments Performing penetration testing, incident management, BCP, and/or DRP more »
identity and access management Developing and upskilling a cybersecurity workforce Delivering cybersecurity culture change, awareness, and training Performing continuous monitoring activities such as using SIEM tools, APT hunting, implementing UBA, etc. Designing/implementing vulnerability management, including conducting vulnerability assessments Performing penetration testing, incident management, BCP, and/or DRP more »
identity and access management Developing and upskilling a cybersecurity workforce Delivering cybersecurity culture change, awareness, and training Performing continuous monitoring activities such as using SIEM tools, APT hunting, implementing UBA, etc. Designing/implementing vulnerability management, including conducting vulnerability assessments Performing penetration testing, incident management, BCP, and/or DRP more »
identity and access management Developing and upskilling a cybersecurity workforce Delivering cybersecurity culture change, awareness, and training Performing continuous monitoring activities such as using SIEM tools, APT hunting, implementing UBA, etc. Designing/implementing vulnerability management, including conducting vulnerability assessments Performing penetration testing, incident management, BCP, and/or DRP more »
identity and access management Developing and upskilling a cybersecurity workforce Delivering cybersecurity culture change, awareness, and training Performing continuous monitoring activities such as using SIEM tools, APT hunting, implementing UBA, etc. Designing/implementing vulnerability management, including conducting vulnerability assessments Performing penetration testing, incident management, BCP, and/or DRP more »
identity and access management Developing and upskilling a cybersecurity workforce Delivering cybersecurity culture change, awareness, and training Performing continuous monitoring activities such as using SIEM tools, APT hunting, implementing UBA, etc. Designing/implementing vulnerability management, including conducting vulnerability assessments Performing penetration testing, incident management, BCP, and/or DRP more »
identity and access management Developing and upskilling a cybersecurity workforce Delivering cybersecurity culture change, awareness, and training Performing continuous monitoring activities such as using SIEM tools, APT hunting, implementing UBA, etc. Designing/implementing vulnerability management, including conducting vulnerability assessments Performing penetration testing, incident management, BCP, and/or DRP more »
identity and access management Developing and upskilling a cybersecurity workforce Delivering cybersecurity culture change, awareness, and training Performing continuous monitoring activities such as using SIEM tools, APT hunting, implementing UBA, etc. Designing/implementing vulnerability management, including conducting vulnerability assessments Performing penetration testing, incident management, BCP, and/or DRP more »
andsecurity monitoring Understanding of threat modelling Investigation experience into Informationand Cyber security incidents Broad technical understanding covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware, SSL and others Experience and knowledge of NIST, COBIT, GCIA, GCIH, GCFA etc. This is an excellent opportunity more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM Identity Access ManagementSIEMand MDR VA Vulnerability Analysis and mitigation DLP Data loss prevention PKI Public key infrastructure Ability to guide engineering teams through the deployment where required more »