a comprehensive security plan. Test cyber-attacks regularly to address vulnerabilities. Monitor security trends, adapt strategies. Oversee incident monitoring, detection, response via SOC and MSSPs. Manage security tools like SIEMand endpoint protection. Lead incident response and post-incident analysis. Enforce policies for data privacy (GDPR & NIST). Conduct regular security audits. Manage vendor relationships and negotiate contracts. Report service More ❯
solution design input. Staying ahead of emerging threats and technologies to continuously improve SOC capabilities . What You’ll Bring: Strong experience in designing and implementing SOC platforms (e.g., SIEM, SOAR, EDR). Deep understanding of security operations workflows, threat intelligence, and incident response. Hands-on experience with tools like Splunk, Sentinel, QRadar, or similar. Ability to engage with both More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
adversarial attacks, model poisoning, and data privacy issues. Deep knowledge of: Identity & Access Management (IAM) Network and Application Security Data Protection & Encryption Kubernetes, Containers, and DevSecOps/MLOps practices SIEM, logging, and monitoring Zero Trust architectures Skilled in applying frameworks such as NIST CSF, ISO 27001, PCI DSS, CSA CCM, NIST AI RMF . Hands-on with tools for vulnerability More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Stack Recruitment
Systems, or related field 📜 Certifications such as CISSP, CISM, CEH, or CompTIA Security+ (desirable) 🧠 Strong analytical mindset and attention to detail 🧮 Proficient in operating systems, firewalls, encryption, VPNs, andSIEM tools 🗣️ Excellent communicator, able to engage both technical and non-technical audiences 🚀 Proactive, curious, and passionate about staying ahead of cyber threats 🧬 Culture Snapshot 🏢 Hybrid working (Tues & Thurs in-office More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Qurated
Qualifications Required: 5+ years in cyber security leadership with a strong technical security background. Expertise in Microsoft & Azure security environments (cloud, hybrid, on-prem). Hands-on experience with SIEM, EDR, and XDR solutions for security monitoring. Certifications preferred: CISSP, CISM, AZ-500, SC-200, SC-100. Strong knowledge of ISO 27001, NIST, CIS benchmarks, andsecurity governance. Experience leading More ❯
NAC solutions. Career growth - mentor others, lead projects, and become a go-to technical expert. What you’ll be doing: Taking ownership of CrowdStrike EDR , including policy configuration andSIEM tuning. Working with network teams on segmentation, NAC, and firewall controls . Leading on incident response , root cause analysis, and runbook development. Managing and optimising a wide suite of tools More ❯
Working closely with the SOC Manager across daily activities of the Security Operations Center (SOC) to ensure Service Level Objectives are achieved. Continuously monitoring security alerts and incidents using SIEM tools and other security technologies. Creating detection use cases in the SIEM, analysing securityevent data for proactive threat hunting, and conducting research on the latest threats and vulnerabilities to … CISM, GCIA, GCIH, GCFE, GCFA, GREM, Splunk Power User and/or similar certifications is preferred. Verifiable experience in Security Operations and Incident Response. Experience in performing analysis with SIEM technologies such as Splunk and/or Google Chronicle. Experience in performing proactive and reactive threat hunting using MITRE ATT&CK or similar frameworks. In-depth understanding and working knowledge More ❯