function, helping to shape and improve their cyber capabilities. What they are looking for : Someone comfortable with SIEM, EDR, and vulnerability management tooling (Rapid7, CrowdStrike, Qualys etc.) Scripting and automation Strong foundational IT and networking knowledge Familiarity with patching solutions and email security tools A proactive mindset and good More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
Affectionate Gifts
is immersed in the company culture What skills do you need to be an Application Security Engineer? Splunk - Also happy with other SIEM tools CrowdStrike - Also happy with other EDR tools Qualys - Also happy with other Vulnerability tools SAST/DAST experience Performing Windows & Linux sys admin AWS ideally More ❯
technologies and Cloud Architecture (Microsoft and AWS). Vendor experience/accreditations with any (or all) of the following: Microsoft, IBM, Palo Alto, Fortinet, Crowdstrike, and Cisco. Pre-sales experience within the cyber security market. Experience contributing to the building of new routes to market. #J-18808-Ljbffr More ❯
technologies and Cloud Architecture (Microsoft and AWS). Vendor experience/accreditations with any (or all) of the following: Microsoft, IBM, Palo Alto, Fortinet, Crowdstrike, and Cisco. Pre-sales experience within the cyber security market. Experience contributing to the building of new routes to market. #J-18808-Ljbffr More ❯
HP, Cisco Meraki and Ubiquiti experience is advantageous Experience supporting typical enterprise security technologies such as Single Sign On, EDR, spam filtering & phishing controls. Crowdstrike skills are advantageous Experience supporting & administering Mobile Device Management Solutions JumpCloud experience is advantageous Experience in implementing or improving security controls & recommendations You are More ❯
Wakefield, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
experience leading full-cycle incident response operations Comfortable handling breached customer communications under high-pressure situations Expertise with industry tools such as Microsoft Sentinel, CrowdStrike, Defender, or equivalent Strong technical writing skills for producing post-incident reports Understanding of security frameworks like MITRE ATT&CK, NIST, or similar Eligibility More ❯
Bradford, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
experience leading full-cycle incident response operations Comfortable handling breached customer communications under high-pressure situations Expertise with industry tools such as Microsoft Sentinel, CrowdStrike, Defender, or equivalent Strong technical writing skills for producing post-incident reports Understanding of security frameworks like MITRE ATT&CK, NIST, or similar Eligibility More ❯
of a new Security Information and Event Management (SIEM) solution. The scope of work includes replacing the existing Trend Micro infrastructure and rolling out CrowdStrike across all server environments to enhance threat detection and response capabilities. Job Title: Security Consultant Job Type: 3 month Contract Location: Remote Responsibilities: Collaborate More ❯
of a new Security Information and Event Management (SIEM) solution. The scope of work includes replacing the existing Trend Micro infrastructure and rolling out CrowdStrike across all server environments to enhance threat detection and response capabilities. Job Title: Security Consultant Job Type: 3 month Contract Location: Remote Responsibilities: Collaborate More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
Sanderson Government & Defence
playing a key role in improving detection and response processes. You’ll be working across platforms like: Elastic SIEM Microsoft Sentinel Defender for Endpoint CrowdStrike Falcon MISP (Malware Information Sharing Platform) As the team scales, this role offers both strategic involvement and technical depth. There’s also the option … how to prevent it Comfortable being an escalation point for technical and analytical issues Working knowledge of key SIEM and EDR platforms (Elastic, Sentinel, CrowdStrike, etc.) Natural curiosity and willingness to get hands-on with data and investigations Broad exposure across cyber domains beyond pure SOC is highly valued More ❯