Warrington, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
team and customer. Collaborate with teams to design and implement Sentinel for specific client needs. Configure and optimise Sentinel for advanced security monitoring and threat detection. Conduct regular assessments and audits to ensure Sentinel effectiveness. Troubleshoot and resolve technical issues related to Sentinel deployments. Your Profile: Strong understanding of more »
Monitor and respond to security incidents and alerts within the Azure environment. Microsoft Defender: Configure and manage Microsoft Defender for Endpoint. Develop and implement threatdetection and response strategies. Analyze and respond to security threats and incidents. Required Skills and Qualifications: In-depth knowledge of MDM solutions such … of Microsoft Azure security features and best practices. Experience with Microsoft Defender for Endpoint or similar security tools. Familiarity with network security, encryption, and threat detection. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills. Preferred Qualifications: Relevant certifications such as CISSP, CISM, CEH, or Microsoft Certified more »
and cloud-native applications. Implement and manage IAM policies, ensuring least privilege principles are maintained. Evaluate and deploy security tools and technologies to enhance threatdetection and response capabilities. Provide guidance and mentorship to junior security engineers, fostering a culture of continuous learning and improvement. Stay current with … security engineering. Strong expertise in securing cloud environments such as AWS, Azure, or GCP. Proficiency in security technologies and tools such as firewalls, intrusion detection/prevention systems, SIEM, and vulnerability management. Experience with IaC tools like Terraform, CloudFormation, or ARM templates. Deep understanding of IAM, encryption, network security more »
and cloud-native applications. Implement and manage IAM policies, ensuring least privilege principles are maintained. Evaluate and deploy security tools and technologies to enhance threatdetection and response capabilities. Provide guidance and mentorship to junior security engineers, fostering a culture of continuous learning and improvement. Stay current with … security engineering. Strong expertise in securing cloud environments such as AWS, Azure, or GCP. Proficiency in security technologies and tools such as firewalls, intrusion detection/prevention systems, SIEM, and vulnerability management. Experience with IaC tools like Terraform, CloudFormation, or ARM templates. Deep understanding of IAM, encryption, network security more »
drive value for the organization. The suite of applications developed and maintained by the team are used to enhance the firm’s information security threatdetection, compliance, entitlement management architectures and audit assurance programs. Key Responsibilities: Analysing requirements from the business and understanding their processes. Documenting requirements in more »
Central (DACH, Cz, Pl etc.) Europe. This individual will be working within an established Telco sector Cybersecurity company whom are experts in Network Traffic, ThreatDetection and Telco Network centric cybersecurity solutions. This is a new position and whilst we would love to find someone with Telco Sector more »
Key Responsibilities : Endpoint Protection Deployment and Management: Install, configure, and maintain endpoint protection solutions such as antivirus software, anti-malware tools, host-based intrusion detection/prevention systems (HIDS/HIPS), and endpoint detection and response (EDR) platforms. Ensure that endpoint protection software is up-to-date with … the latest definitions, patches, and security updates to defend against emerging threats. ThreatDetection and Prevention: Monitor endpoint activities and network traffic for signs of malicious behavior, suspicious activities, or known attack patterns. Implement proactive measures to detect and prevent malware, ransomware, phishing attempts, and other types of … sensitive data on endpoints. Incident Response and Remediation: Respond to security alerts and incidents detected on endpoints by investigating the root cause, containing the threat, and initiating remediation actions. Isolate infected endpoints from the network, quarantine malicious files, and remove malware infections to prevent further spread across the organization. more »
and visualization of events for a critical operational system. She/he will demonstrate strong skills in system administration, log management, event correlation, and threatdetection and will support building and maintaining a system that analyzes collected data and derives facts, inferences, and projections to determine if the more »
the collection, parsing, correlation, and visualization of events for a critical operational system; demonstrate strong skills in system administration, log management, event correlation, and threatdetection and will support building and maintaining a system that analyzes collected data and derives facts, inferences, and projections to determine if the … and talent in data visualization. Experience creating workflows for Incident Response within a SIEM Tool. Security+ Certification. GIAC Certified Incident Handler Certification. GIAC Cyber Threat Intelligence Certification. Cybersecurity certifications. Formal SIEM training. Experience working on an Agile team/program. CSSKEY CONMD Original Posting Date: 2024-04-18 While more »
identifying, investigating and analyzing all response activities related to cybersecurity incidents within an organization. Identifies security flaws and vulnerabilities; responds to cybersecurity incidents, conducts threat analysis as directed and addresses detected incidents. Conducts network or software vulnerability assessments and penetration testing utilizing reverse engineering techniques. Perform vulnerability analysis and … exploitation of applications, operating systems or networks. Identifies intrusion or incident path and method. Isolates, blocks or removes threat access. Evaluates system security configurations. Evaluates findings and performs root cause analysis. Performs analysis of complex software systems to determine both functionality and intent of software systems. Resolves highly complex … degree of impact on business results, and typically manages one or more groups of professional employees. Job Description Responsibilities Lead daily operations of the ThreatDetection Engineering and the Security Operations Orchestration/Automation programs. Provide thought leadership for program improvements and new initiatives. Recommend and produce key more »
identifying, investigating and analyzing all response activities related to cybersecurity incidents within an organization. Identifies security flaws and vulnerabilities; responds to cybersecurity incidents, conducts threat analysis as directed and addresses detected incidents. Conducts network or software vulnerability assessments and penetration testing utilizing reverse engineering techniques. Perform vulnerability analysis and … exploitation of applications, operating systems or networks. Identifies intrusion or incident path and method. Isolates, blocks or removes threat access. Evaluates system security configurations. Evaluates findings and performs root cause analysis. Performs analysis of complex software systems to determine both functionality and intent of software systems. Resolves highly complex … degree of impact on business results, and typically manages one or more groups of professional employees. Job Description Responsibilities Lead daily operations of the ThreatDetection Engineering and the Security Operations Orchestration/Automation programs. Provide thought leadership for program improvements and new initiatives. Recommend and produce key more »
identifying, investigating and analyzing all response activities related to cybersecurity incidents within an organization. Identifies security flaws and vulnerabilities; responds to cybersecurity incidents, conducts threat analysis as directed and addresses detected incidents. Conducts network or software vulnerability assessments and penetration testing utilizing reverse engineering techniques. Perform vulnerability analysis and … exploitation of applications, operating systems or networks. Identifies intrusion or incident path and method. Isolates, blocks or removes threat access. Evaluates system security configurations. Evaluates findings and performs root cause analysis. Performs analysis of complex software systems to determine both functionality and intent of software systems. Resolves highly complex … investigative interest based on a review of system and application logs - differentiating likely malicious activity from benign false positives. Assist the team in prioritizing threatdetection alerts and related signals into the Security Operations Center. Serve as a technical subject matter expert for highly complex incidents, tracking and more »
identifying, investigating and analyzing all response activities related to cybersecurity incidents within an organization. Identifies security flaws and vulnerabilities; responds to cybersecurity incidents, conducts threat analysis as directed and addresses detected incidents. Conducts network or software vulnerability assessments and penetration testing utilizing reverse engineering techniques. Perform vulnerability analysis and … exploitation of applications, operating systems or networks. Identifies intrusion or incident path and method. Isolates, blocks or removes threat access. Evaluates system security configurations. Evaluates findings and performs root cause analysis. Performs analysis of complex software systems to determine both functionality and intent of software systems. Resolves highly complex … investigative interest based on a review of system and application logs - differentiating likely malicious activity from benign false positives. Assist the team in prioritizing threatdetection alerts and related signals into the Security Operations Center. Serve as a technical subject matter expert for highly complex incidents, tracking and more »
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
McGregor Boyall Associates Limited
Active Directory, Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security Expertise in securing virtualized environments, including threatdetection, incident response, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Experian Ltd
a Site Reliability Engineering Manager, you will lead a global team of talented SREs in the development, deployment, and continuous improvement of our Cyber ThreatDetection Pipeline. Your leadership will ensure the delivery of a scalable, efficient, and highly reliable ThreatDetection Engineering platform. Key Responsibilities … Security , Exabeam Advanced Analytics (UEBA), Security Data Lakes (e.g., Data Bricks or Snowflake), and Cribl for log ingestion. Drive the adoption and implementation of Detection as Code principles. Leveraging CI/CD pipelines to automate the deployment and management of detection rules and platform configurations, ensuring fast, reliable … great deal of SRE technical and managerial skills in a large enterprise environment, such as: A great background in theSRE field supporting a Cyber ThreatDetection function, with demonstrable experience in a leadership or managerial role overseeing a team. Scripting and Automation Proficiency: Demonstrated expertise in scripting and more »
audit requirements. Contribute to the development of a Cybersecurity Operations Resource and Capacity planner managed through BDO's Azure DevOps environment. Oversee incident response, threatdetection, and mitigation efforts You'll be someone with: A good understanding of monitoring frameworks eg MITRE ATT&CK and SIEM technologies eg more »
Stockport, England, United Kingdom Hybrid / WFH Options
Chapman Tate Associates
of Azure resources (VMs, storage, networking, databases, etc.) Implement and enforce security best practices within the Azure environment, including access control, identity management, and threatdetection Monitor Azure services for performance and identify opportunities for optimization Automate routine tasks using Azure automation tools (ARM templates, Azure CLI, PowerShell more »
leader in its field, and part of a globally successful UK-based business. They design, manufacture, sell and support a range of highly advanced threatdetection and security products for global markets in commercial, aviation, defence and security sectors. The products range from small hand-held devices through more »
opportunities for training and technical development. Day to day responsibilities will include: Incident triage and investigation. Analysis of all suspicious email activity. Participating in threat hunt and offensive security exercises. Analysis of all SIEM logs, and the opportunity to get involved in some threat detection. Working with technical … incidents Demonstrable business facing skills Experience of working with a SIEM platform – Splunk, QRadar, Elastic Security certifications highly desirable Experience of scripting/automation, threat hunting and offensive security highly desirable Please send your CV for immediate consideration. more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Raytheon
correct vetting procedures and the security management of visitors and contractors to meet HMG, UKSV and IPSA requirements. Review and manage security risk and threat assessments including regular practical exercises to assure effectiveness of measures to meet FSC and IPSA requirements, proactively managing threatdetection and vulnerability more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
the Job Leading the Response: Acting swiftly and decisively during security incidents to mitigate risks. Incident Lifecycle Management: Overseeing incidents from the moment of detection, through the containment and eradication stages, to the final resolution. Post-Incident Analysis: Conducting detailed investigations post-incident to understand the root cause and … to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on the organization's security systems to detect any suspicious activities early. Threat Analysis: Evaluating potential threats and vulnerabilities to ensure that the organization is prepared to defend against them. Strategic Defense Implementation: Putting in place robust … unified security strategy. This role demands a proactive mindset, deep technical expertise, and strong leadership skills to navigate the complex and ever-evolving cyber threat landscape. It's about being always prepared, constantly learning, and effectively communicating to maintain and enhance the organization's security posture. Tasks & Responsibilities Evaluate more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
McGregor Boyall Associates Limited
Active Directory, Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security Expertise in securing virtualized environments, including threatdetection, incident response, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management more »
London, England, United Kingdom Hybrid / WFH Options
Nexus Jobs
into Head of IT (CIO | CISO) Need an individual with a strong hands on network and security background Cisco networking Cisco firewalls (Firepower/ThreatDetection) Palo Alto firewalls SIEM experience ( Logarithm desirable) Web proxy (Forcepoint desirable) Governance skills Policy writing/reviewing Reporting KPI monitoring Certifications like more »
Birmingham, England, United Kingdom Hybrid / WFH Options
Digital Waffle
and on-premises environments. Conduct regular security assessments, vulnerability testing, and risk analysis to identify and mitigate security risks. Lead the implementation of advanced threatdetection and response strategies. Collaborate with IT and development teams to integrate security best practices into system designs and deployment processes. Monitor and more »
at the heart of everything they do. Key Responsibilities: Conduct security risk assessments, provide recommendations, and implement controls. Possess a thorough understanding of advanced threatdetection, continuous vulnerability assessment, and strategies for response and mitigation in information/cyber security operations. Contribute to the implementation IT security roadmap … regarding information security matters. Assist in the scope and execution of regular penetration testing at network perimeter, internal, and application levels. Monitor the external threat landscape and recommend appropriate actions for emerging threats. Provide guidance and support for cyber incident response during tests and actual breach/security incidents. … data protection. Experience working within Information Security or IT Security, Data Protection. Self-motivated, proactive, and able to take responsibility. Strong understanding of advanced threat detections, continuous vulnerability assessment, response and mitigation strategies used in Cyber Security operations. Ability to define the technology security requirements in conjunction with technical more »