configure, and command a symphony of security tools - EDR/XDR, vulnerability management, email gateways, you name it. Fine-tune rules and detections, optimising threatdetection and reducing false alarms. • Network Security Sage: Possess a deep understanding of network protocols, security concepts, and monitoring tools. Firewalls, IDS/ more »
designing, developing, and maintaining our security information and event management (SIEM) system. Your focus will be on leveraging Elasticsearch and related technologies to enhance threatdetection, incident response, and overall security posture. What you’ll be doing • Data Ingestion and Enrichment: o Configure Elasticsearch pipelines for data ingestion … from various sources, primarily from Kafka o Enhance data enrichment by integrating threat intelligence feeds and contextual information. • SIEM Solution Development: o Collaborate with security analysts and architects to design and implement SIEM solutions using Elasticsearch. o Optimize SIEM rules, alerts, and dashboards for efficient threat detection. • Query more »
a focus on safeguarding sensitive data and intellectual property.Security Operations: Oversee the day-to-day management of security systems and protocols, including incident response, threatdetection, and vulnerability management.Security Awareness: Develop and deliver comprehensive training programs to promote a culture of security awareness and best practices among employees.Vendor … of relevant regulatory frameworks, such as ISO, GDPR, HIPAA, and FDA regulations.Strong understanding of security technologies and methodologies, including encryption, access control, and intrusion detection systems.Excellent communication and leadership skills, with the ability to collaborate effectively across diverse teams and stakeholders.Relevant certifications such as CISSP, CISM, or CRISC are more »
Cambridge, England, United Kingdom Hybrid / WFH Options
Opus Talent Solutions
focus on safeguarding sensitive data and intellectual property. Security Operations: Oversee the day-to-day management of security systems and protocols, including incident response, threatdetection, and vulnerability management. Security Awareness: Develop and deliver comprehensive training programs to promote a culture of security awareness and best practices among … relevant regulatory frameworks, such as ISO, GDPR, HIPAA, and FDA regulations. Strong understanding of security technologies and methodologies, including encryption, access control, and intrusion detection systems. Excellent communication and leadership skills, with the ability to collaborate effectively across diverse teams and stakeholders. Relevant certifications such as CISSP, CISM, or more »
the first line of defence for our client, responding to alerts and conducting initial triage to determine appropriate actions. With a primary focus on threatdetection, incident assessment and vulnerability management the Tier 1 Security analyst will be a critical role in maintaining the cybersecurity for our client. more »
IT infrastructure components, including databases, storage solutions, and backup systems Ability to translate business requirements into efficient IT solutions Proficiency in cybersecurity practices, including threatdetection, prevention, and incident response Professional work ethic with a client-driven focus and attention to detail Familiarity with IT project management methodologies more »
mission to help organizations stay protected against emerging threats.About the Company:This leading provider of cybersecurity solutions is dedicated to empowering businesses with comprehensive threatdetection and response capabilities. Their platform offers real-time insights and actionable intelligence to defend against cyber-attacks, ensuring clients' security posture remains more »
to help organizations stay protected against emerging threats. About the Company: This leading provider of cybersecurity solutions is dedicated to empowering businesses with comprehensive threatdetection and response capabilities. Their platform offers real-time insights and actionable intelligence to defend against cyber-attacks, ensuring clients' security posture remains more »
to help organizations stay protected against emerging threats. About the Company: This leading provider of cybersecurity solutions is dedicated to empowering businesses with comprehensive threatdetection and response capabilities. Their platform offers real-time insights and actionable intelligence to defend against cyber-attacks, ensuring clients' security posture remains more »
the software development lifecycle. Conduct Code Reviews and utilize Static Code Analysis to identify and mitigate security risks in software code. Implement monitoring and threatdetection tools and practices to proactively identify and resolve performance issues and bottlenecks. Troubleshoot issues until root causes are understood on high traffic more »
one in their specialist area and currently rebuilding their entire pricing & risk management platform from scratch. Responsibilities: Evaluate new security technologies and tools. Improve threatdetection and response capabilities with a code-first approach Automation of manual process utilising IAC Collaborate and co-develop with external suppliers and … internal engineering teams to ensure data sources and detection rules are well enriched. Required: Strong understanding of the latest security threats, threat actors, and the tactics and techniques adopted. Proven experience with programming - Python, Rust, C++ or other major languages Knowledge of SecOps tooling (SIEM, SOAR, TI). more »
number of robust controls. Requirements: Deep understanding of security engineering and implementing security controls Hands on experience of SecOps and security systems Understanding of threatdetection, Vulnerability management Cloud & network security Scripting experience - Preferably Python Ability to lead projects and resolve complex issues Please note you will need more »
Manchester Area, United Kingdom Hybrid / WFH Options
Chapman Tate Associates
of Azure resources (VMs, storage, networking, databases, etc.) Implement and enforce security best practices within the Azure environment, including access control, identity management, and threatdetection Monitor Azure services for performance and identify opportunities for optimization Automate routine tasks using Azure automation tools (ARM templates, Azure CLI, PowerShell more »
Stockport, England, United Kingdom Hybrid / WFH Options
Chapman Tate Associates
of Azure resources (VMs, storage, networking, databases, etc.) Implement and enforce security best practices within the Azure environment, including access control, identity management, and threatdetection Monitor Azure services for performance and identify opportunities for optimization Automate routine tasks using Azure automation tools (ARM templates, Azure CLI, PowerShell more »
SK5, Heaton Norris, Borough of Stockport, Greater Manchester, United Kingdom Hybrid / WFH Options
Chapman Tate Associates
of Azure resources (VMs, storage, networking, databases, etc.) Implement and enforce security best practices within the Azure environment, including access control, identity management, and threatdetection Monitor Azure services for performance and identify opportunities for optimization Automate routine tasks using Azure automation tools (ARM templates, Azure CLI, PowerShell more »
of Azure resources (VMs, storage, networking, databases, etc.) Implement and enforce security best practices within the Azure environment, including access control, identity management, and threatdetection Monitor Azure services for performance and identify opportunities for optimization Automate routine tasks using Azure automation tools (ARM templates, Azure CLI, PowerShell more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
McGregor Boyall Associates Limited
Active Directory, Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security Expertise in securing virtualized environments, including threatdetection, incident response, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management more »
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
IT Human Resources
Active Directory, Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security. Expertise in securing virtualized environments, including threatdetection, incident response, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
McGregor Boyall Associates Limited
Active Directory, Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security Expertise in securing virtualized environments, including threatdetection, incident response, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management more »
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
IT Human Resources
Active Directory, Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security. Expertise in securing virtualized environments, including threatdetection, incident response, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management more »
and utilize expertise to map the attack chain across complex environments, encompassing cloud, identity, email, network, and endpoint. In-depth understanding of the cyber threat landscape, particularly in the aviation sector. Demonstrated ability to translate threat knowledge into proactive threat detection. Proficient in analyzing and researching new … or trending attacks, threat actors, malware samples, and tactics, techniques, and procedures (TTPs) Excellent English language skills in reading, writing, and speaking, with the capability to articulate security insights effectively, both in creating and interpreting security metrics, and in presenting them clearly to all levels of hierarchy, including senior … leadership. Experience: Minimum of 5 years of experience in endpoint security, malware analysis, threat hunting, penetration testing, incident response, reverse engineering, or digital forensics. Familiarity with AWS cloud infrastructure, with hands-on experience monitoring associated logs, including GuardDuty, CloudTrail, and VPC Flow. Proven experience with Akamai security tools such more »
and has previously built user - facing privacy and security capabilities knows how to ensure the integrity and protection of data , i.e. encryption , access controls , threatdetection , incident response, GDPR, etc has worked on large corporate accounts , and is confident with the longer-lifecycle enterprise selling process is excited more »
Greater London, England, United Kingdom Hybrid / WFH Options
Anson McCade
create large sets of data, which can be efficiently processed to provide actionable intelligence. • Candidates will be working with Big Data, innovative security and threatdetection systems in turn contributing to the system design and development decisions, which affect the integration of both future and existing systems. • The more »
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Denholm Associates
Manager, you will help to deliver improvements across a number of our cyber security domains including; Security Data & Analytics, Security Automation, Incident Response and Threat Detection. Additionally, you will work closely with our Cyber Security Operation Centre and with other security functions as well as specialist 3rd party security … network, cloud and logging technologies Security Orchestration Automation and Response, building security automation playbooks and integration's Security Data & Analytics, onboarding data and developing detection logic and analytics Essential Criteria: Demonstrable experience working in cyber security Experience supporting security tools, such as SOAR, SIEM, EDR, NGFW, CSPM, WAF, AV … microservices architecture, Kubernetes, Containers, CI/CD pipelines and DevSecOps Passion for security and self-development to keep up to date with the evolving threat and vulnerability landscape, new technologies and service improvements If you would like more information on this role, please get in touch to discuss. more »
opportunities for training and technical development. Day to day responsibilities will include: Incident triage and investigation. Analysis of all suspicious email activity. Participating in threat hunt and offensive security exercises. Analysis of all SIEM logs, and the opportunity to get involved in some threat detection. Working with technical … incidents Demonstrable business facing skills Experience of working with a SIEM platform – Splunk, QRadar, Elastic Security certifications highly desirable Experience of scripting/automation, threat hunting and offensive security highly desirable Please send your CV for immediate consideration. more »