our internal threat library. What You Bring Must-Haves Bachelor’s degree in Cybersecurity, Computer Science, or related field. Practical experience with at least one SIEM platform (e.g., Splunk, QRadar). Understanding of networking fundamentals, TCP/IP, and common protocols. Strong investigative mindset and attention to detail. Clear, concise communication skills for both technical and business audiences. Nice More ❯
Employment Type: Full-Time
Salary: £36,000 - £43,000 per annum, Negotiable, OTE
standards Desirable Experience/Skills: In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g., ArcSight, Splunk, Nitro/McAfee Enterprise Security Manager, QRadar, LogLogic). Understanding of event and incident investigations and incident response in a 24/7 SOC environment. Proficiency in configuring and managing security technologies such as firewalls, IDS More ❯
standards Desirable Experience/Skills: In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g., ArcSight, Splunk, Nitro/McAfee Enterprise Security Manager, QRadar, LogLogic). Understanding of event and incident investigations and incident response in a 24/7 SOC environment. Proficiency in configuring and managing security technologies such as firewalls, IDS More ❯
standards Desirable Experience/Skills: In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g., ArcSight, Splunk, Nitro/McAfee Enterprise Security Manager, QRadar, LogLogic). Understanding of event and incident investigations and incident response in a 24/7 SOC environment. Proficiency in configuring and managing security technologies such as firewalls, IDS More ❯