Experience with network security, incident management, and penetration testing. Strong up-to-date knowledge of Cyber Security. Experience with EDR and Anti-Virus/Malware management such as SentinelOne, CrowdStrike and Defender. Demonstrated ability working with IT System Administration of Azure, Defender (ATP), M365 and Windows. Experience with Identity Access and Management (IDAM) solutions. CyberArk and ENTRA ID Familiarity More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
The MRJ Group
culture and technical operations, ensuring resilient and secure environments. Cloud Security Operations : Securely manage Azure, M365 & AWS security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID … and influencing without authority. Vulnerability Management: Expertise in managing vulnerabilities across diverse assets and implementing application security in cloud environments. Security tooling: experience in any of the following; (Wiz, CrowdStrike, Proofpoint, BitSight, Akamai, CATO) Experience with security engineering, incident response, threat hunting, or digital forensics. Preferred Qualifications: Relevant cybersecurity certifications such as CISSP, CISM, CEH, Microsoft Security Certifications, AWS More ❯
Microsoft cloud services (Intune, Azure, Entra), security auditing, and modern endpoint protection such as CrowdStrike. Responsibilities Monitor and respond to security incidents using EDR/XDR tools such as CrowdStrike, Microsoft Defender, and SIEM platforms. Perform regular audits and security assessments across cloud (AWS, Azure) and SaaS platforms to identify risks and ensure compliance with internal policies and industry … background in cloud security (AWS/Azure), including the shared responsibility model. Familiarity with compliance frameworks (ISO 27001, GDPR, SOC 2, NIST). Hands-on experience with EDR tools (CrowdStrike, Defender for Endpoint) and SIEM/SOAR platforms. Basic scripting for automation and reporting using PowerShell or Python. Working knowledge of network security protocols, VPNs, firewalls, and web filtering More ❯
ISO 27001, Cyber Essentials, etc.) Tech Environment: Microsoft 365 Defender, Intune, Azure Security Center Firewalls: Palo Alto, Fortinet, SonicWall SIEM: Sentinel, Splunk, or equivalent EDR/XDR solutions (Sophos, CrowdStrike, Defender) Scripting knowledge (PowerShell preferred) What We’re Looking For: 5 years’ experience in a cyber security role (ideally within an MSP or multi-client setting) Security certifications like More ❯
City of London, London, United Kingdom Hybrid / WFH Options
ZenTech Talent
ISO 27001, Cyber Essentials, etc.) Tech Environment: Microsoft 365 Defender, Intune, Azure Security Center Firewalls: Palo Alto, Fortinet, SonicWall SIEM: Sentinel, Splunk, or equivalent EDR/XDR solutions (Sophos, CrowdStrike, Defender) Scripting knowledge (PowerShell preferred) What We’re Looking For: 5 years’ experience in a cyber security role (ideally within an MSP or multi-client setting) Security certifications like More ❯
South East London, England, United Kingdom Hybrid / WFH Options
ZenTech Talent
ISO 27001, Cyber Essentials, etc.) Tech Environment: Microsoft 365 Defender, Intune, Azure Security Center Firewalls: Palo Alto, Fortinet, SonicWall SIEM: Sentinel, Splunk, or equivalent EDR/XDR solutions (Sophos, CrowdStrike, Defender) Scripting knowledge (PowerShell preferred) What We’re Looking For: 5 years’ experience in a cyber security role (ideally within an MSP or multi-client setting) Security certifications like More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Experian Ltd
Anti-Virus, Intrusion Prevention, Web Application Firewalls) Interest in developing knowledge across common Incident Response and Security Monitoring applications such as SIEM (e.g., Qradar, Splunk), EDR (e.g., FireEye HX, CrowdStrike Falcon, Microsoft Defender), and SOAR (Palo Alto XSOAR, Google Secops/Chronicle) Desire to build technical skills and hands-on knowledge in the following areas of security operations and More ❯
support of all aspects of an information security program, including Governance Risk & Compliance, Security Operations, and Security Engineering with hands on engineering and administration of security tools, such as CrowdStrike, Qualys, and Splunk in collaboration with fellow security and IT professionals. Required Skills and Qualifications: Demonstrable experience across multiple cybersecurity domains including vulnerability management, risk management, network security, Splunk … deliver solutions on time. Experience with security industry frameworks, such as NIST CSF, ISO 27000 series, FAIR risk analysis, and privacy regulations. Proficiency with security tools such as Qualys, Crowdstrike, and Splunk. Experience with incident response and threat hunting. Excellent analytical and problem-solving skills. Effective communication and interpersonal skills, with the ability to effectively convey technical information to More ❯
Barton upon Humber, England, United Kingdom Hybrid / WFH Options
Wren Kitchens
frameworks such as ISO 27001 and NIST CSF. Cybersecurity certifications like Security+, CSA, SC-900, CC, CySA+, GSEC are beneficial but not mandatory. Familiarity with tools like Zscaler, Mimecast, CrowdStrike, SIEM, Cisco, Microsoft Defender, Azure, AWS, Cloudflare, Jamf. About The Company Wren Kitchens is passionate about both kitchens and our people! We have achieved milestones like opening over More ❯
working in a 24/7 rota within IT or Security. Understanding of PCI-DSS compliance. Scripting skills, especially with PowerShell and Bash. Familiarity with tools like zScaler, Solarwinds, Crowdstrike, Splunk. Experience with batch automation, Linux, and Azure. Knowledge of SIEM tools. Experience in Event Analysis, Triage, Incident Handling, and Root-Cause analysis. What can we do for you More ❯
. Certifications in security governance and frameworks: ISO/IEC 27001, NIST CSF, CAF, or CIS Controls. Additional vendor or platform-specific certifications (AWS, Azure, Microsoft, GCP, Palo Alto, CrowdStrike, Tenable) are advantageous. OT/ICS/SCADA-focused certifications: IEC 62443, GRID/GRID+ (SANS/GIAC), GICSP, or equivalent industrial cybersecurity training are desirable. Demonstrable commitment to More ❯
Acadian’s cloud IAAS environments for Indicators of Misconfiguration (IOMs) utilizing AWS built-in and third-party assessment tools. Utilizing tools like AWS Config, Security Hub, Inspector, Guardduty, and Crowdstrike Falcon, assess monitor and prioritize remediation of Cloud security vulnerabilities.· Develop and maintain tools to detect and remove secrets from code check-ins.· Establish development best practices for working More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
APM Terminals
collaborate with other teams, and build streamlined cross-departmental processes. Automation Development Identify repetitive tasks and develop automation ideas. Collaborate with automation teams to build capabilities using platforms like CrowdStrike Fusion, AWS Lambda, Azure Logic Apps, XSOAR, and Python scripts. Languages Good experience in query languages like KQL and Logscale for investigations and log analysis is highly desirable Managing More ❯
London, England, United Kingdom Hybrid / WFH Options
Damco Spain SL
collaborate with other teams, and build streamlined cross-departmental processes. Automation Development Identify repetitive tasks and develop automation ideas. Collaborate with automation teams to build capabilities using platforms like CrowdStrike Fusion, AWS Lambda, Azure Logic Apps, XSOAR, and Python scripts. Languages Good experience in query languages like KQL and Logscale for investigations and log analysis is highly desirable Managing More ❯
/800-171, HIPAA, etc.). Understanding and experience with computer networking fundamentals, operating systems, SIEM, vulnerability scanning, EDR, email and cloud security platforms. Experience with platforms such as CrowdStrike and Splunk is a plus. Experience in penetration testing, threat/vulnerability assessments, and operational technology (OT) security. Proven ability to adapt to changing priorities and make decisions with More ❯
and infrastructure-as-code initiatives. Qualifications We're looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like Carbon Black, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and container technologies (e.g., Docker) Threat Hunting, Detection Engineering, Incident Response Security More ❯
and Response (EDR), Security Orchestration, Automation, and Response (SOAR), Security Information and Event Management (SIEM, particularly Splunk and/or Splunk Cloud), firewalls, and other core security products. (e.g. Crowdstrike, Carbon Black, Splunk, and/or the Microsoft security technologies) A solid working knowledge of Windows Azure Active Directory, Windows OS, Mac OS, Virtualization, SQL Server, networking protocols, certificates More ❯
and Response (EDR), Security Orchestration, Automation, and Response (SOAR), Security Information and Event Management (SIEM, particularly Splunk and/or Splunk Cloud), firewalls, and other core security products. (e.g. Crowdstrike, Carbon Black, Splunk, and/or the Microsoft security technologies) A solid working knowledge of Windows Azure Active Directory, Windows OS, Mac OS, Virtualization, SQL Server, networking protocols, certificates More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Liberty Global
We’re looking for a Senior Security Analyst to join us in either Amsterdam or Reading In this role you'll be part of the technical leadership driving our operational security incident response across our global network. You'll work More ❯
on-premise AD with EntraID (Azure AD) and Okta Configure and manage AD delegation models following least privilege principles Implement and maintain identity protection solutions (eg: Defender for Identity, CrowdStrike Identity Protection, Quest Active Roles, etc) Develop and enforce security standards for Windows Server deployments, including bare metal, VMware and public cloud (AWS, Azure, GCP) Collaborate with Endpoint Engineering … general knowledge of core infrastructure (Networking, storage, virtualization/VMware, etc) Advanced knowledge of AD delegation models and associated best practices Experience with identity protection platforms (Defender for Identity, CrowdStrike Identity Protection, etc.) Proficiency navigating and triaging Windows event logs Familiarity with Centrify as means of integrating Linux with Active Directory Familiarity with Quest Active Directory security products (eg More ❯