auditing security measures, security response, and incident management. Possess a working knowledge of Cisco network switches, routers, firewalls and VPN, network security, administration of DLP, antivirusantimalware, IDS/IPS, SIEM, SMTP, Email security, AD, Group Policy, DNS, DHCP, and VLANs. Experience with identity access management solutions, such as SAMLOATH Experience with HIDS and NIDS The ideal candidate possesses relevant informationMore ❯
threats. You’ll play a crucial role in delivering technical excellence, leading customer engagements, and mentoring team members. Key Responsibilities: Design, implement, and manage enterprise-grade security solutions (firewalls, SIEM, IDS/IPS, endpoint protection, cloud security). Shape strategic security recommendations and collaborate on technical win plans. Maintain and update security policies, procedures, and incident response plans. Deliver security … Looking For: A degree in Cybersecurity, IT, or equivalent experience. 4+ years in a cybersecurity role, preferably within an MSP or fast-paced environment. Strong hands-on experience with SIEM, EDR, VPNs, firewalls, and cloud platforms (AWS, Azure, GCP). Expertise in Microsoft Sentinel, Cisco Splunk or Palo Alto QRadar, and KQL. Proven skills in threat detection, incident response, andMore ❯
threats. You’ll play a crucial role in delivering technical excellence, leading customer engagements, and mentoring team members. Key Responsibilities: Design, implement, and manage enterprise-grade security solutions (firewalls, SIEM, IDS/IPS, endpoint protection, cloud security). Shape strategic security recommendations and collaborate on technical win plans. Maintain and update security policies, procedures, and incident response plans. Deliver security … Looking For: A degree in Cybersecurity, IT, or equivalent experience. 4+ years in a cybersecurity role, preferably within an MSP or fast-paced environment. Strong hands-on experience with SIEM, EDR, VPNs, firewalls, and cloud platforms (AWS, Azure, GCP). Expertise in Microsoft Sentinel, Cisco Splunk or Palo Alto QRadar, and KQL. Proven skills in threat detection, incident response, andMore ❯
threats. You’ll play a crucial role in delivering technical excellence, leading customer engagements, and mentoring team members. Key Responsibilities: Design, implement, and manage enterprise-grade security solutions (firewalls, SIEM, IDS/IPS, endpoint protection, cloud security). Shape strategic security recommendations and collaborate on technical win plans. Maintain and update security policies, procedures, and incident response plans. Deliver security … Looking For: A degree in Cybersecurity, IT, or equivalent experience. 4+ years in a cybersecurity role, preferably within an MSP or fast-paced environment. Strong hands-on experience with SIEM, EDR, VPNs, firewalls, and cloud platforms (AWS, Azure, GCP). Expertise in Microsoft Sentinel, Cisco Splunk or Palo Alto QRadar, and KQL. Proven skills in threat detection, incident response, andMore ❯
access for you and your household Onsite perks including free parking, tea and coffee stations, and a subsidized café with free breakfast toast Responsibilities Security Monitoring & Incident Response: Use SIEM tools like Exabeam, LogRhythm, Splunk, or Arcsight to monitor security events, detect threats, and analyze data to address incidents swiftly. Vulnerability Management Tools: Conduct regular vulnerability assessments, prioritize and remediate More ❯
Security: Skilled in implementing information protection tools, key and secrets management, data loss prevention, and protective marking and classification capabilities. Cyber Security Operations: Proficient in incident response, vulnerability management, SIEM, SOAR, threat modeling, threat hunting, intelligence, data analytics, and anti-phishing methodologies. Infrastructure and Endpoint Security: Experience with endpoint security control technologies (EDR, EPP, UEBA, baseline configurations) including the Microsoft More ❯
Policies and Standards and a proficient understanding of the Microsoft 365/Azure platforms/AWS Responsibilities: Monitor securityevent logs and alerts generated by various security technologies, including SIEM, IDS/IPS, firewalls, and endpoint protection systems. Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Identify, analyze, and assess potential insider More ❯
Policies and Standards and a proficient understanding of the Microsoft 365/Azure platforms/AWS Responsibilities: Monitor securityevent logs and alerts generated by various security technologies, including SIEM, IDS/IPS, firewalls, and endpoint protection systems. Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Identify, analyze, and assess potential insider More ❯
desirable. Minimum 5 years experience in Information Security. Proficiency in security frameworks like NIST, implementing and auditing security measures. Knowledge of Cisco networking, firewalls, VPN, DLP, IDS/IPS, SIEM, and related technologies. Experience with identity access management solutions such as SAML, OAuth. Relevant security certifications (e.g., CISSP, CISM, CEH) are highly desirable. Ability to analyze and recommend security improvements. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Infinigate Group
security as a primary requirement). Drive adoption and integration of the latest security technologies. Installing, configuring, updating, and monitoring security tools and software, such as antivirus, encryption, authentication, SIEM etc. Evaluate, research and manage emerging cyber security threats. Support the incident management process, through Root Cause Analysis. Responding to and resolving security incidents and events, such as malware infections More ❯
security as a primary requirement). Drive adoption and integration of the latest security technologies. Installing, configuring, updating, and monitoring security tools and software, such as antivirus, encryption, authentication, SIEM etc. Evaluate, research and manage emerging cyber security threats. Support the incident management process, through Root Cause Analysis. Responding to and resolving security incidents and events, such as malware infections More ❯
3GPP mobile network CORE and RAN architectures andsecurity requirements. Strong knowledge of network security protocols, VPN, firewall management, and intrusion detection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks (e.g., GDPR, HIPAA, ISO 27001). In-depth understanding of routers, switches, firewalls, and switching/routing protocols More ❯
knowledge of networking protocols, operating systems, and cloud technologies. Strong understanding of security principles, practices, and frameworks (e.g., PCI, NIST, ISO 27001). Experience with security tools such as SIEM, IDS/IPS, endpoint protection, and penetration testing tools. Experience with public cloud security, specifically AWS, Azure, and Google Cloud Platform (GCP). You will have an advantage if you More ❯
knowledge of the threat landscape relevant to SaaS products, preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusion detection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools. You own relevant certifications (Security+, IAT II/III level or similar). You excel in risk assessments, vulnerability management, and data-driven decision More ❯
similar role, with deep understanding of the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III More ❯
the following: - Automation of SOC Processes Design and implement automation solutions to streamline repetitive tasks such as alert triaging, incident response, and reporting - Tool Integration Integrate various security tools (SIEM, SOAR, firewalls, etc.) to improve data flow and response coordination. - Optimization of Workflows Enhance and optimize SOC workflows for improved efficiency and reduced manual effort. - Development of Playbooks Create automated … SOAR platforms, Ansible, Phantom or similar). Proficiency in scripting languages (e.g., Python, PowerShell, Bash). Strong understanding of SOC processes, including incident response and threat detection. Experience with SIEM platforms (e.g., Splunk). Knowledge of security frameworks (e.g., NIST, MITRE ATT&CK). Skills Proficiency in automation tools (e.g., SOAR platforms, Ansible, Phantom). Expertise in scripting languages (e.g. … Python, PowerShell, Bash). Strong knowledge of SOC processes (incident response, threat detection). Experience with SIEM platforms (e.g., Splunk). Ability to integrate and automate security tools. Strong problem-solving and analytical skills. Experience in developing automated workflows and playbooks. Knowledge of security frameworks (e.g., MITRE ATT&CK, NIST). Strong collaboration and communication skills. Experience with log managementMore ❯
understanding of network infrastructure, including firewalls, VPNs, and cloud-based networking solutions. Experience with IAM systems (e.g., Azure AD/Microsoft Entra) andsecurity tools (e.g., endpoint protection, DLP, SIEM). Hands-on expertise with troubleshooting hardware, software, and SaaS issues. Security Knowledge: Familiarity with security frameworks and standards such as SOC 2, ISO 27001, GDPR, or NIST. Experience with More ❯
solid working knowledge of cloud security (AWS, Azure, GCP). Apply risk-based and threat-based approaches to evaluate and recommend appropriate and proportionate security technologies and solutions (e.g., SIEM, IAM, CASB, container security). Outline key security components, interfaces, and dependencies. Develop architectural diagrams and overviews. Document security design principles and provide rationale. Ensure designs align with business objectives More ❯
collaborating internally with infrastructure, network, and support teams to deliver joined-up solutions. Key responsibilities: Manage and respond to security incidents across client environments Configure and maintain security tools (SIEM, EDR, firewalls, email filtering, etc.) Perform vulnerability scans and recommend remediation Deliver client security assessments and reports Support compliance initiatives (ISO 27001, Cyber Essentials, etc.) Tech Environment: Microsoft 365 Defender … Intune, Azure Security Center Firewalls: Palo Alto, Fortinet, SonicWall SIEM: Sentinel, Splunk, or equivalent EDR/XDR solutions (Sophos, CrowdStrike, Defender) Scripting knowledge (PowerShell preferred) What We’re Looking For: 5 years’ experience in a cyber security role (ideally within an MSP or multi-client setting) Security certifications like Security+, CySA+, or equivalent (working toward CISSP or equivalent a bonus More ❯
City of London, London, United Kingdom Hybrid / WFH Options
ZenTech Talent
collaborating internally with infrastructure, network, and support teams to deliver joined-up solutions. Key responsibilities: Manage and respond to security incidents across client environments Configure and maintain security tools (SIEM, EDR, firewalls, email filtering, etc.) Perform vulnerability scans and recommend remediation Deliver client security assessments and reports Support compliance initiatives (ISO 27001, Cyber Essentials, etc.) Tech Environment: Microsoft 365 Defender … Intune, Azure Security Center Firewalls: Palo Alto, Fortinet, SonicWall SIEM: Sentinel, Splunk, or equivalent EDR/XDR solutions (Sophos, CrowdStrike, Defender) Scripting knowledge (PowerShell preferred) What We’re Looking For: 5 years’ experience in a cyber security role (ideally within an MSP or multi-client setting) Security certifications like Security+, CySA+, or equivalent (working toward CISSP or equivalent a bonus More ❯
South East London, England, United Kingdom Hybrid / WFH Options
ZenTech Talent
collaborating internally with infrastructure, network, and support teams to deliver joined-up solutions. Key responsibilities: Manage and respond to security incidents across client environments Configure and maintain security tools (SIEM, EDR, firewalls, email filtering, etc.) Perform vulnerability scans and recommend remediation Deliver client security assessments and reports Support compliance initiatives (ISO 27001, Cyber Essentials, etc.) Tech Environment: Microsoft 365 Defender … Intune, Azure Security Center Firewalls: Palo Alto, Fortinet, SonicWall SIEM: Sentinel, Splunk, or equivalent EDR/XDR solutions (Sophos, CrowdStrike, Defender) Scripting knowledge (PowerShell preferred) What We’re Looking For: 5 years’ experience in a cyber security role (ideally within an MSP or multi-client setting) Security certifications like Security+, CySA+, or equivalent (working toward CISSP or equivalent a bonus More ❯
Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, andSIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO 27001, NIST, GDPR, SOC2, FCA). Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. … Azure AD, MFA, Conditional Access, Single Sign-On (SSO), and Privileged Access Management (PAM). Threat Management & Incident Response: Ability to detect, respond to, and mitigate cyber threats using SIEM, endpoint security, and vulnerability management tools. Networking & Infrastructure Security: Understanding of firewalls, VPNs, SD-WAN, DNS security, endpoint protection, and cloud security controls. IT Service Management & Automation: Experience implementing ITIL More ❯
Experts (SME), Security Engineers are required to be technically equipped to take over responsibility of services operated and offered internally. The services in scope currently cover typical SOC solutions (SIEM, NIDS, SOAR, WAF, etc.). THE CHALLENGE: Take responsibility over a set of tool sets. Design, architect and implement technical solutions based on business requirements. Perform regular maintenance to mature … etc.) Understanding of fundamental security concepts and terminologies (CIA, basic cryptography knowledge etc.) Advanced scripting skills in Python, Bash, PowerShell etc. Advanced Network knowledge, including Firewall management. Familiarity with SIEM tools (Splunk, Elastic Stack etc.) Good knowledge of identified operating system platforms; routers, network protocols, andsecurity architecture. Good knowledge of industry standard security tools for implementation, administration and usage. More ❯
strong understanding of informationsecurity principles, including confidentiality, integrity, and availability. Experience with security tools and technologies, including vulnerability scanners, intrusion detection systems, andsecurityinformationandeventmanagement (SIEM) systems. Excellent communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams. Strong problem-solving and analytical skills, with the ability to identify and mitigate complex More ❯
to align security goals with business objectives. Lead risk assessments and threat modelling exercises for internal systems and third-party services. Manage the deployment and maintenance of security solutions (SIEM, firewalls, endpoint protection, DLP, etc.). Oversee the organization's incident response and business continuity plans, including simulations and real-time responses. Conduct regular security audits and work with internal … ISO/IEC 27001, NIST CSF, CIS Controls) and cybersecurity principles, practices, and regulatory requirements in the finance sector. Experience in security technologies such as firewalls, IDS/IPS, SIEM, encryption, and identity management. Experience with secure cloud computing platforms (e.g., Azure) in a regulated environment. Familiarity with data analytics platforms and financial data governance tooling. Strong working knowledge of More ❯