assess, and respond to security incidents. Lead the team in conducting thorough investigations and root cause analysis of incidents.Security Monitoring: Oversee security monitoring and threatdetection processes, leveraging security information and event management (SIEM) and other security tools to proactively identify and address potential security threats.Vulnerability Management: Coordinate … security policies, standards, and procedures in line with industry best practices and compliance requirements.Security Incident Reporting: Provide timely and accurate reports on security incidents, threat trends, and the effectiveness of security measures to senior management.Security Awareness Training: Collaborate with the training team to conduct security awareness programs for employees … security operations management and cybersecurity, with a track record of successful incident response and security incident management.Strong knowledge of security technologies, including SIEM, intrusion detection/prevention systems, endpoint protection, and security analytics tools.Experience with vulnerability assessment tools and vulnerability management processes.Understanding of security best practices, standards, and frameworks.Knowledge more »
CEH, ECSA, LPT, OSCP, AWS certified security, or equivalent are highly desirable.You have an in-depth knowledge of security principles, technologies, and best practices, threatdetection and mitigation strategies.Mature understanding/experience with cloud security architecture (AWS, Azure) with a proven track record and work ethic that covers … make sure the organization is compliant with PCI DSS, ISO/IEC 27001, SOC & HIPAA & IRAP controls.Strong understanding of network protocols & practices, firewalls, intrusion detection/prevention systems and WAFs.Knowledge of security compliance standards relevant to the SaaS industry, such as PCI, GDPR, ISO 27001, SOC2, NIST.Experience undertaking internal more »
CD pipelines and cloud-native applications.Implement and manage IAM policies, ensuring least privilege principles are maintained.Evaluate and deploy security tools and technologies to enhance threatdetection and response capabilities.Provide guidance and mentorship to junior security engineers, fostering a culture of continuous learning and improvement.Stay current with emerging cloud … in cloud security engineering.Strong expertise in securing cloud environments such as AWS, Azure, or GCP.Proficiency in security technologies and tools such as firewalls, intrusion detection/prevention systems, SIEM, and vulnerability management.Experience with IaC tools like Terraform, CloudFormation, or ARM templates.Deep understanding of IAM, encryption, network security, and data more »
and cloud-native applications. Implement and manage IAM policies, ensuring least privilege principles are maintained. Evaluate and deploy security tools and technologies to enhance threatdetection and response capabilities. Provide guidance and mentorship to junior security engineers, fostering a culture of continuous learning and improvement. Stay current with … security engineering. Strong expertise in securing cloud environments such as AWS, Azure, or GCP. Proficiency in security technologies and tools such as firewalls, intrusion detection/prevention systems, SIEM, and vulnerability management. Experience with IaC tools like Terraform, CloudFormation, or ARM templates. Deep understanding of IAM, encryption, network security more »
Monitor and respond to security incidents and alerts within the Azure environment. Microsoft Defender: Configure and manage Microsoft Defender for Endpoint. Develop and implement threatdetection and response strategies. Analyze and respond to security threats and incidents. Required Skills and Qualifications: In-depth knowledge of MDM solutions such … of Microsoft Azure security features and best practices. Experience with Microsoft Defender for Endpoint or similar security tools. Familiarity with network security, encryption, and threat detection. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills. Preferred Qualifications: Relevant certifications such as CISSP, CISM, CEH, or Microsoft Certified more »
Warrington, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
team and customer. Collaborate with teams to design and implement Sentinel for specific client needs. Configure and optimise Sentinel for advanced security monitoring and threat detection. Conduct regular assessments and audits to ensure Sentinel effectiveness. Troubleshoot and resolve technical issues related to Sentinel deployments. Your Profile: Strong understanding of more »
drive value for the organization. The suite of applications developed and maintained by the team are used to enhance the firm’s information security threatdetection, compliance, entitlement management architectures and audit assurance programs. Key Responsibilities: Analysing requirements from the business and understanding their processes. Documenting requirements in more »
Central (DACH, Cz, Pl etc.) Europe. This individual will be working within an established Telco sector Cybersecurity company whom are experts in Network Traffic, ThreatDetection and Telco Network centric cybersecurity solutions. This is a new position and whilst we would love to find someone with Telco Sector more »
as Key Account Manager for one such interesting customer, for whom we significantly contribute to designing and developing conceptual models into the future of threatdetection and countermeasures, influencing the EW domain. Whilst our main hubs of engineering activity are at our Cambridgeshire and Lincolnshire HQs, this role more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
the Job Leading the Response: Acting swiftly and decisively during security incidents to mitigate risks. Incident Lifecycle Management: Overseeing incidents from the moment of detection, through the containment and eradication stages, to the final resolution. Post-Incident Analysis: Conducting detailed investigations post-incident to understand the root cause and … to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on the organization's security systems to detect any suspicious activities early. Threat Analysis: Evaluating potential threats and vulnerabilities to ensure that the organization is prepared to defend against them. Strategic Defense Implementation: Putting in place robust … unified security strategy. This role demands a proactive mindset, deep technical expertise, and strong leadership skills to navigate the complex and ever-evolving cyber threat landscape. It's about being always prepared, constantly learning, and effectively communicating to maintain and enhance the organization's security posture. Tasks & Responsibilities Evaluate more »
Stockport, England, United Kingdom Hybrid / WFH Options
Chapman Tate Associates
of Azure resources (VMs, storage, networking, databases, etc.) Implement and enforce security best practices within the Azure environment, including access control, identity management, and threatdetection Monitor Azure services for performance and identify opportunities for optimization Automate routine tasks using Azure automation tools (ARM templates, Azure CLI, PowerShell more »
opportunities for training and technical development. Day to day responsibilities will include: Incident triage and investigation. Analysis of all suspicious email activity. Participating in threat hunt and offensive security exercises. Analysis of all SIEM logs, and the opportunity to get involved in some threat detection. Working with technical … incidents Demonstrable business facing skills Experience of working with a SIEM platform – Splunk, QRadar, Elastic Security certifications highly desirable Experience of scripting/automation, threat hunting and offensive security highly desirable Please send your CV for immediate consideration. more »
office 2 3 days per week. This role will revolve around keeping on top of their security risk with efforts to manage their prevention, detection, analysis, and remediation work. You will be maintaining and providing advice on the organisation's security operations tooling and procedures. Responsibilities: Evaluate, respond and … resolve security incidents Threat Analysis, threatdetection, threat response and threat remediation Support the information security strategy through developing the operational systems Maintain, support and develop their security procedures and tooling Assist and support the wider security teams including Architecture, Audits, Vulnerability Management, Project Management more »
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
McGregor Boyall Associates Limited
Active Directory, Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security Expertise in securing virtualized environments, including threatdetection, incident response, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management more »
Intelligence & Operations Team. This is a hands-on role that involves responding to cyber threats and incidents, performing digital forensics and investigations, and automating threat response playbooks. As a member of the team, you will have the opportunity to work on complex security challenges and work with engineers across … cyber threats, alerts and incidentsDrive end-to-end incident response investigationsPerform host and network based log analysis in a cloud first environmentDevelop and codify threat response processes and playbooksPerform digital forensic investigations to include analysis, collection, and preservation of evidenceBuild security tools to automate threat response tasksDevelop detailed … post incident and investigation reportsCollaborate with detection engineers to identify threatdetection use cases Work with engineering stakeholders to improve security posture post investigationsWe’d love to hear from you if you have:2+ years of hands-on security operations experience in cloud-native environmentsExperience in triaging more »
the Security Engineer will design and implement security solutions in the Microsoft Security stack. The ideal candidate will come from a Security Operations or Threat Hunting background. Being the Liaison between SOC teams and clients, you will need strong expertise in cloud security concepts (ideally within Azure), and be … able to perform security assessments and scan for vulnerabilities. If you have prior experience with Microsoft Defender, Azure Sentinel, threatdetection and are able to accurately consult clients about their needs, whilst implementing effective security solutions, I strongly recommend applying. An excellent opportunity to upskill and develop your more »
their test case writing ability. The suite of applications developed and maintained by the team are used to enhance the firm’s information security threatdetection, compliance, entitlement management architectures and audit assurance programs. You'll have the freedom to challenge the status quo, mentor fellow engineers, and more »
Warrington, England, United Kingdom Hybrid / WFH Options
Tata Consultancy Services
team and customer. Collaborate with teams to design and implement Sentinel for specific client needs. Configure and optimise Sentinel for advanced security monitoring and threat detection. Conduct regular assessments and audits to ensure Sentinel effectiveness. Troubleshoot and resolve technical issues related to Sentinel deployments. Your Profile: Technical key skills … during problem solving. Collaborative attitude to refine and progress understanding of requirements and deliverables. Good to have: Experience in Security Operations OR in a threat hunting role. Rewards & Benefits: TCS is consistently voted a Top Employer in the UK and globally. Our competitive salary packages feature pension, health care more »
correct vetting procedures and the security management of visitors and contractors to meet HMG, UKSV and IPSA requirements. Review and manage security risk and threat assessments including regular practical exercises to assure effectiveness of measures to meet FSC and IPSA requirements, proactively managing threatdetection and vulnerability more »
audit requirements. Contribute to the development of a Cybersecurity Operations Resource and Capacity planner managed through BDO's Azure DevOps environment. Oversee incident response, threatdetection, and mitigation efforts You'll be someone with: A good understanding of monitoring frameworks eg MITRE ATT&CK and SIEM technologies eg more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Experian Ltd
a Site Reliability Engineering Manager, you will lead a global team of talented SREs in the development, deployment, and continuous improvement of our Cyber ThreatDetection Pipeline. Your leadership will ensure the delivery of a scalable, efficient, and highly reliable ThreatDetection Engineering platform. Key Responsibilities … Security , Exabeam Advanced Analytics (UEBA), Security Data Lakes (e.g., Data Bricks or Snowflake), and Cribl for log ingestion. Drive the adoption and implementation of Detection as Code principles. Leveraging CI/CD pipelines to automate the deployment and management of detection rules and platform configurations, ensuring fast, reliable … great deal of SRE technical and managerial skills in a large enterprise environment, such as: A great background in theSRE field supporting a Cyber ThreatDetection function, with demonstrable experience in a leadership or managerial role overseeing a team. Scripting and Automation Proficiency: Demonstrated expertise in scripting and more »
Preston, Lancashire, United Kingdom Hybrid / WFH Options
BAE Systems
KQL combined with the ability to create custom KQL scripts that are used to conduct sophisticated security data analysis and uplift incident response and threatdetection capabilities within a SIEM Highly motivated with the ability to work autonomously to complete a range of tasks to time and quality more »
Employment Type: Permanent
Salary: £60000/annum Depending on skills and experience
South West London, London, United Kingdom Hybrid / WFH Options
MASS Consultants
as Key Account Manager for one such interesting customer, for whom we significantly contribute to designing and developing conceptual models into the future of threatdetection and countermeasures, influencing the EW domain. Whilst our main hubs of engineering activity are at our Cambridgeshire and Lincolnshire HQs, this role more »
Oldham, Greater Manchester, North West, United Kingdom
BluetownOnline Ltd
IT infrastructure components, including databases, storage solutions, and backup systems Ability to translate business requirements into efficient IT solutions Proficiency in cybersecurity practices, including threatdetection, prevention, and incident response Professional work ethic with a client-driven focus and attention to detail Familiarity with IT project management methodologies more »