our internal threat library. What You Bring Must-Haves Bachelor’s degree in Cybersecurity, Computer Science, or related field. Practical experience with at least one SIEM platform (e.g., Splunk, QRadar). Understanding of networking fundamentals, TCP/IP, and common protocols. Strong investigative mindset and attention to detail. Clear, concise communication skills for both technical and business audiences. Nice More ❯
Employment Type: Full-Time
Salary: £36,000 - £43,000 per annum, Negotiable, OTE
West Midlands, United Kingdom Hybrid / WFH Options
Stackstudio Digital Ltd
Web Content Filtering, Database Activity Monitoring (DAM), PKI, DLP, IAM, and SOC technologies such as EDR and SOAR Good knowledge of SIEM tools like Google Chronicle, Splunk ES, or QRadar In-depth familiarity with security policies based on industry standards and best practices Experienced in security operations, incident management, intrusion analysis, device installation, configuration, and troubleshooting Experience with log More ❯
West Midlands, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Ltd
PKI), Data Loss Prevention (DLP), Identity and Access Management (IAM) and SOC advancements such as EDR and SOAR Good knowledge of SIEM technologies, like Google Chronicle, Splunk ES or QRadar In-depth familiarity with security policies based on industry standards and best practices Experienced within the information security field, with emphasis on security operations, incident management, intrusion analysis, securityMore ❯
Bristol, Avon, England, United Kingdom Hybrid / WFH Options
Sanderson
operating systems (Windows, Linux, macOS), and common enterprise applications. Expertise in analysing network traffic (e.g., packet analysis with Wireshark). Proficiency with security tools such as SIEM (e.g., Splunk, QRadar), EDR (e.g., CrowdStrike, SentinelOne) and threat intelligence platforms. Strong scripting skills in at least one language (e.g., Python, PowerShell). Solid understanding of the MITRE ATT&CK framework and More ❯
Peterborough, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
Sanderson
operating systems (Windows, Linux, macOS), and common enterprise applications. Expertise in analysing network traffic (e.g., packet analysis with Wireshark). Proficiency with security tools such as SIEM (e.g., Splunk, QRadar), EDR (e.g., CrowdStrike, SentinelOne) and threat intelligence platforms. Strong scripting skills in at least one language (e.g., Python, PowerShell). Solid understanding of the MITRE ATT&CK framework and More ❯
uplift. Minimum Qualifications Experience in detection engineering, security engineering, or software development with a focus on cybersecurity. Proven experience developing detections and integrations within SIEM platforms (e.g., Splunk, Elastic, QRadar), ideally making use of Risk Based Alerting. Strong skills in Python and JavaScript, with familiarity in NodeJS and Kubernetes environments. Familiarity with cybersecurity frameworks (e.g., MITRE ATT&CK, Cyber More ❯
uplift. Minimum Qualifications Experience in detection engineering, security engineering, or software development with a focus on cybersecurity. Proven experience developing detections and integrations within SIEM platforms (e.g., Splunk, Elastic, QRadar), ideally making use of Risk Based Alerting. Strong skills in Python and JavaScript, with familiarity in NodeJS and Kubernetes environments. Familiarity with cybersecurity frameworks (e.g., MITRE ATT&CK, Cyber More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Catorfaen
SOAR (Security orchestration, automation, and response) solutions toachieve positive outcomes. Our tools include Google ChronicleSIEM/Siemplify SOAR and LogRhythm, but experience with other platformssuch as Microsoft Sentinel, Splunk, Qradar, or Humio/Logscale is alsovaluable. Backgroundknowledge in another IT discipline (e.g. Public Cloud, Windows Server,Linux, or Networking). Someexperience with scripting tools such as Powershell, Python, Bash More ❯
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria
be great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and experience are exactly what were looking for, please do apply, wed love to hear More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Analyst will be responsible for providing Protective Monitoring Services across a range of Secure Customers. They will be responsible for the day to day monitoring using various SIEM Tools (Qradar, Sentinel & LogRhythm). Some of the responsibilities that come along with this role include the following: Security Analytics Incident investigation, triage and escalation Threat monitoring and response Trend reporting More ❯
you will be responsible for providing Protective Monitoring Services across a range of Secure Customers. You will be responsible for the day-to-day monitoring using various SIEM Tools (Qradar, Sentinel & LogRhythm). Some of the responsibilities that come along with this role include the following: Security Analytics Incident investigation, triage and escalation Threat monitoring and response Trend reporting More ❯
role). What You’ll Bring 3–5 years’ experience in a SOC environment (Tier 2-level maturity). Hands-on experience with SIEM platforms (Sentinel/Splunk/QRadar or similar). Strong understanding of incident response and threat investigation. Comfortable working autonomously in a developing function Relevant certifications (Security+, CEH, GCIA, CISSP or similar). Package Salary More ❯
role). What You’ll Bring 3–5 years’ experience in a SOC environment (Tier 2-level maturity). Hands-on experience with SIEM platforms (Sentinel/Splunk/QRadar or similar). Strong understanding of incident response and threat investigation. Comfortable working autonomously in a developing function Relevant certifications (Security+, CEH, GCIA, CISSP or similar). Package Salary More ❯
role). What You’ll Bring 3–5 years’ experience in a SOC environment (Tier 2-level maturity). Hands-on experience with SIEM platforms (Sentinel/Splunk/QRadar or similar). Strong understanding of incident response and threat investigation. Comfortable working autonomously in a developing function Relevant certifications (Security+, CEH, GCIA, CISSP or similar). Package Salary More ❯
. What You'll Bring 3-5 years' experience in a SOC environment (Tier 2-level maturity preferred). Hands-on experience with SIEM platforms (Sentinel/Splunk/QRadar or similar). Strong understanding of incident response and threat investigation. Comfortable working autonomously in a developing function Relevant certifications (Security+, CEH, GCIA, CISSP or similar). Package Salary More ❯
containment strategies. Perform malware analysis, reverse engineering, and develop detection signatures. Integrate threat intelligence into SOC operations, staying ahead of emerging attack techniques. Manage and optimise SIEM tools (Splunk, QRadar, Microsoft Sentinel). Develop SOC use cases, runbooks, and playbooks to improve response capability. Collaborate with IT, legal, and management teams during incident response. Support pre-sales, client demonstrations … opportunities. Contribute to continual service improvement and security tool enhancements Skills & Experience Strong background in incident response, SOC operations, and security investigations. Hands-on expertise with SIEM tools (Splunk, QRadar, Microsoft Sentinel). Deep understanding of network traffic analysis, vulnerability management, and penetration testing. Knowledge of DFIR principles, malware reverse engineering, and digital forensics. Familiarity with ITIL processes (Incident More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Morson Talent
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/Security Operations Centre (SOC) Level 3 Analyst More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
Morson Talent
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract | Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/Security Operations Centre (SOC) Level 3 Analyst More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria
Our Cyber team look after some complicated and compelling areas within Aero, Defence and Security. If you want to lead from the front, gain experience working with multiple clients, and always have access to the latest technologies, then join the More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Hemel Hempstead, Hertfordshire, England, United Kingdom
Sopra Steria
Our Cyber team look after some complicated and compelling areas within Aero, Defence and Security. If you want to lead from the front, gain experience working with multiple clients, and always have access to the latest technologies, then join the More ❯
Essential skills/knowledge/experience: Strong knowledge in Authentication, End Point Security, Internet Policy Enforcement, Firewalls, Web Content Filtering, Database Activity Monitoring (DAM), Public Key Infrastructure (PKI), Data Loss Prevention (DLP), Identity and Access Management (IAM) and SOC advancements More ❯
Essential skills/knowledge/experience: Strong knowledge in Authentication, End Point Security, Internet Policy Enforcement, Firewalls, Web Content Filtering, Database Activity Monitoring (DAM), Public Key Infrastructure (PKI), Data Loss Prevention (DLP), Identity and Access Management (IAM) and SOC advancements More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Sopra Steria
We have a large SOC team that can boast some very high profile clients within the Defence sector. Due to expansion, we have this new role for a Senior SOC SIEM Content Engineer with broad experience of Cyber. If you More ❯