and log management. Experience analysing log data and network security events. Desirable Skills: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst certification. Familiarity with additional SIEM tools such as QRadar. Benefits: 25 days annual leave, with the option to purchase more Health cash plan Life assurance Pension scheme Generous flexible benefits fund More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Walsh Employment
nights (6pm6am), 4 days off . Essential Skills and Experience: Proven experience in a Security Operations Centre (SOC) environment Previous people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier … Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1 Familiarity with additional SIEM technologies, especially QRadar Role & Responsibilities As a SOC Shift Lead , you will ensure the smooth operation and continual enhancement of SOC processes and personnel. You will play a pivotal role More ❯
Identify and design security solutions. Assess potential cyber risks, evaluate their impact, and develop mitigation strategies. Collaborate with Security Architecture to advise on security solution design for SOC/SIEM solutions. Formulate security strategies, applying technical andmanagement principles creatively. What you’ll bring: Proficiency in Splunk is essential. Candidates with either the Splunk Cloud Certified Admin or Splunk Enterprise More ❯
6pm–6am), 4 days off . Essential Skills and Experience: Proven experience in a Security Operations Centre (SOC) environment Previous people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier … Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1 Familiarity with additional SIEM technologies, especially QRadar Role & Responsibilities As a SOC Shift Lead , you will ensure the smooth operation and continual enhancement of SOC processes and personnel. You will play a pivotal role More ❯
Experience: 7+ years of experience in cybersecurity, with at least 3 years in an architect role. Hands-on experience with Cisco Cyber Vision including deployment, configuration, and integration with SIEM/SOC tools. Deep understanding of OT protocols (Modbus, DNP3, PROFINET, etc.) and ICS/SCADA systems. Strong knowledge of network security , firewalls, VPNs, IDS/IPS, andsecurity zoning. More ❯
on evolving threats, attack techniques, and industry best practices For the SOC role you will have: Hands-on experience working in a Security Operations Centre (SOC) Solid knowledge of SIEM tools such as Microsoft Sentinel or Splunk Familiarity with the MITRE ATT&CK framework and threat detection methodologies Strong analytical skills with a keen eye for detail in log analysis More ❯
in malware analysis or reverse engineering. Experience with scripting or programming (Python, PowerShell, Bash, etc.). Relevant SOC certifications (e.g., CREST, Blue Team Level 1). Exposure to additional SIEM tools such as QRadar. Benefits: 25 days annual leave (plus option to purchase more). Health cash plan, life assurance, and company pension. Flexible benefits fund tailored to your lifestyle More ❯
Overview We are seeking a contract XSIAM Engineer with deep expertise in Palo Alto Networks technologies, ideally coming from an XSOAR background, and possessing strong experience across XDR andSIEM environments. This is a key role within our security operations function, focused on enhancing detection, automation, and response capabilities. *For this role you must be eligible for SC Clearance* Key … SOC efficiency and visibility Design and manage security automation workflows, drawing from previous XSOAR experience Integrate and optimize XDR capabilities to support proactive threat detection Set up and maintain SIEM-style log ingestion, correlation rules, and enrichment pipelines Build custom dashboards and reporting tools for real-time security insights Troubleshoot complex issues related to XSIAM, XSOAR, and related integrations Ensure … Ideally experience implementing and managing XSIAM in real-world environments but will consider strong XSOAR Consultants who want to evolve into XSIAM. Strong understanding of Security Operations, XDR, andSIEM principles Proficient in scripting and automation (e.g., Python, PowerShell) Solid experience with log analysis, event correlation, and alert tuning Needs to be eligible for SC Clearance Desirable Qualifications Palo Alto More ❯
protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and experience are exactly what we More ❯
clients across defence, aerospace, and national security. Whether you’re an experienced analyst or an ambitious junior ready to move up, this is your opportunity to work with leading SIEM platforms like Microsoft Sentinel and Splunk in a dynamic, threat-rich environment that never stands still. What You’ll Be Doing Monitoring and triaging alerts across secure environments Investigating complex … teams Staying one step ahead of attackers by integrating evolving threat intel What We’re Looking For Proven hands-on experience in a SOC environment Strong working knowledge of SIEM tools, especially Microsoft Sentinel or Splunk Solid understanding of core network protocols and modern security architecture DV clearance eligibility (must have lived in the UK for 10+ years) Aa a More ❯
clients across defence, aerospace, and national security. Whether you’re an experienced analyst or an ambitious junior ready to move up, this is your opportunity to work with leading SIEM platforms like Microsoft Sentinel and Splunk in a dynamic, threat-rich environment that never stands still. What You’ll Be Doing Monitoring and triaging alerts across secure environments Investigating complex … teams Staying one step ahead of attackers by integrating evolving threat intel What We’re Looking For Proven hands-on experience in a SOC environment Strong working knowledge of SIEM tools, especially Microsoft Sentinel or Splunk Solid understanding of core network protocols and modern security architecture DV clearance eligibility (must have lived in the UK for 10+ years) Aa a More ❯
trends. Work with the customer to understand technical capabilities to ensure solutions align with security challenges and business objectives. Technical Requirements: Hands-on experience with security technologies such as SIEM, EDR, SOAR, vulnerability, threat intelligence etc. Experience in pre-sales, solution consulting, or technical advisory roles Proactive mindset and strong customer engagement skills Please apply or contact Olivia at Olivia More ❯
trends. Work with the customer to understand technical capabilities to ensure solutions align with security challenges and business objectives. Technical Requirements: Hands-on experience with security technologies such as SIEM, EDR, SOAR, vulnerability, threat intelligence etc. Experience in pre-sales, solution consulting, or technical advisory roles Proactive mindset and strong customer engagement skills Please apply or contact Olivia at [emailprotected More ❯