and stakeholders. Demonstrable experience in supporting large, complex Networks and Hosting Estates using multiple technologies including: Managing SIEM's - (Qradar Preferred) (e.g. ArcSight/AlienVault/Microsoft Sentinel/LogRhythm). Enterprise level Operating Systems RedHat Linux & Windows Server command line required. Vulnerability Management Technologies (e.g. Qualys, Tenable, Rapid7) or More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
L3 SOC/Cyber Security Engineer - Threat Hunter/SIEM Sentinel – £55-65K – Home/Office 2x per month My client is one of the most recognisable names in IT and have some of the best people in the More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
L3 SOC/Cyber Security Engineer - Threat Hunter/SIEM Sentinel – £55-65K – Home/Office 2x per month My client is one of the most recognisable names in IT and have some of the best people in the More ❯
and manage key stakeholders within the business. Relevant Security industry certifications, CISSP/CISM Strong understanding of sophisticated threat actor methodologies, technical tools (Sentinel, Alienvault ect.) and experience in incident response and forensic investigations. Strong knowledge of ITIL processes. To discuss this exciting opportunity in more detail, please APPLY NOW More ❯
and manage key stakeholders within the business. Relevant Security industry certifications, CISSP/CISM. Strong understanding of sophisticated threat actor methodologies, technical tools (Sentinel, Alienvault ect.) and experience in incident response and forensic investigations. Strong knowledge of ITIL processes. Title: Head of Security Operations Location: Manchester Salary: Up to More ❯
and manage key stakeholders within the business. Relevant Security industry certifications, CISSP/CISM Strong understanding of sophisticated threat actor methodologies, technical tools (Sentinel, Alienvault ect.) and experience in incident response and forensic investigations. Strong knowledge of ITIL processes. To discuss this exciting opportunity in more detail, please APPLY NOW More ❯
and manage key stakeholders within the business.' • Relevant Security industry certifications, CISSP/CISM' • Strong understanding of sophisticated threat actor methodologies, technical tools (Sentinel, Alienvault ect.) and experience in incident response and forensic investigations.' • Strong knowledge of ITIL processes. To discuss this exciting opportunity in more detail, please APPLY NOW More ❯
L2 & L3 SOC/Cyber Security Engineer - Threat Hunter/SIEM Sentinel - £45-65K + 25% Shift - Home/Office 2x per month My client is one of the most recognisable names in IT and have some of the More ❯
least 2 years' experience in a SOC environment, preferably MSSP, or in a technical security role. Experience with SIEM tools such as MS Sentinel, AlienVault, or Splunk. Cybersecurity qualifications, certifications, or degrees e.g., CySA+, CompTIA SEC+, or similar experience. Microsoft SC-200 certifications are desirable. Strong knowledge of threat actor … analysis for ongoing investigations. Conduct proactive threat hunts, RCAs, and develop detection capabilities. Monitor and investigate security alerts from SIEM platforms like MS Sentinel, AlienVault, or Splunk. Respond to security alerts, incidents, and requests, managing threats and vulnerabilities effectively. Document cases and generate reports with insightful recommendations. Assist in recovery More ❯
least 2 years' experience in a SOC environment, preferably MSSP, or in a technical security role. Experience with SIEM tools such as MS Sentinel, AlienVault, or Splunk. Cybersecurity qualifications, certifications, or degrees e.g., CySA+, CompTIA SEC+, or similar experience. Microsoft SC-200 certifications are desirable. Strong knowledge of threat actor … analysis for ongoing investigations. Conduct proactive threat hunts, RCAs, and develop detection capabilities. Monitor and investigate security alerts from SIEM platforms like MS Sentinel, AlienVault, or Splunk. Respond to security alerts, incidents, and requests, managing threats and vulnerabilities effectively. Document cases and generate reports with insightful recommendations. Assist in recovery More ❯