luton, bedfordshire, east anglia, United Kingdom Hybrid / WFH Options
Intec Select
cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (SecurityInformationandEventManagement) tools and log analysis Develop and enforce security policies, standards, and procedures Work with IT and development teams to implement secure system designs … experience in an informationsecurity or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge More ❯
environments (e.g., Azure) and end-user devices. Hands-on expertise with security tools and technologies, such as Defender for Cloud, Defender for Endpoint, andSIEM solutions. Solid background in implementing and managing security policies via Microsoft Intune and Group Policy (GPO) to secure endpoints and applications. Proven ability to monitor More ❯
improvements. Prepare comprehensive reports for clients. Technical skills: Demonstrated experience in responding to and investigating incidents whilst utilizing various monitoring, detection and investigation tooling – SIEM, SOAR, EDR etc. Proficiency in log analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding More ❯
to transition into securityand gain hands-on experience with cutting-edge technology. Gain hands on experience: - Threat Detection & Response – Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct forensic investigations, and support remediation efforts. Vulnerability More ❯
luton, bedfordshire, east anglia, United Kingdom Hybrid / WFH Options
The Guide Dogs for the Blind Association
experience working in cyber security, system engineering, or a similar role, with hands-on knowledge of security tools such as anti-malware, content filtering, SIEMand threat detection solutions . A strong understanding of Windows OS, Linux, and MacOS is essential, along with experience working with technology suppliers and outsourced More ❯
luton, bedfordshire, east anglia, United Kingdom Hybrid / WFH Options
Lawrence Harvey
against basic and advanced threat actors. You will be responsible for the automation workflow design and use case development. You will work on the SIEM detection content development and false positive reduction. You will be in charge of robust and detailed incident response to threats, investigation, and triage of day More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
Crimson
prioritize workload, and manage competing demands. * Experience in analyzing IT logs andevent sources is preferred. * Monitor and administer SecurityInformationandEventManagement (SIEM). * Malware analysis and forensics research. * Understanding/differentiation of intrusion attempts and false positives. * Investigation tracking and threat resolution. * Familiarity with data storage systems … prioritize workload, and manage competing demands. * Experience in analyzing IT logs andevent sources is preferred. * Monitor and administer SecurityInformationandEventManagement (SIEM). * Malware analysis and forensics research. * Understanding/differentiation of intrusion attempts and false positives. * Investigation tracking and threat resolution. * Familiarity with data storage systems More ❯
scripting or programming languages. Practical knowledge and demonstrated experience in areas such as Data Loss Prevention (DLP), Data Privacy/Protection, DSPM/CSPM, SIEM, or vulnerability management is highly preferred. Proven success in a technical, customer-facing role within a software or SaaS company. Full spec available, please apply More ❯
global business risk/objectives. This role is focused on technical operations and support of various informationsecurity tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and … will be done monthly. Deploy new informationsecurity tools, services, processes, and procedures to support the informationsecurity roadmap. Support informationsecurity services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership More ❯
Hands-on expertise in any of the following vendors: Fortinet, Palo Alto, Cisco, Juniper, Zscaler, CrowdStrike... Experience in any of the following is advantageous: SIEM, SOAR, MSSP, DDoS, WAF, EDR, IDAM... Excellent communication skills and the ability to simplify complex concepts for a range of stakeholders A proactive, can-do More ❯
/Open API specs for vulnerabilities Advise on secure API design patterns Familiar with fallback controls such as WAF's, API gateways Experience using SIEM/logging tools to track API threats Familiarity with NIST, OWASP SAMM, or internal security frameworks Experience producing risk dashboards/reports for API's More ❯
luton, bedfordshire, east anglia, United Kingdom Hybrid / WFH Options
asobbi
This role offers an opportunity to work with market-leading vendors across networking (Cisco), data infrastructure (NetApp, IBM, cloud), andsecurity solutions (NOC, SOC, SIEM) . While the focus is on new business development , there’s potential to inherit a small number of key accounts to support your success. What More ❯
Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (Secrets Management) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. 3. Operational Management: Monitor and maintain the CyberArk environment to ensure optimal performance … PVWA, PSM, AAM, Conjur). Strong understanding of privileged access management concepts and best practices. Experience with integrating CyberArk with other security tools (e.g., SIEM, IAM, ITSM). Proficiency in scripting languages (e.g., PowerShell, Python) for automation and customization. Excellent problem-solving and troubleshooting skills. Preferred: Experience with cloud platforms More ❯
Luton, England, United Kingdom Hybrid / WFH Options
Crimson
prioritize workload, and manage competing demands. • Experience in analyzing IT logs andevent sources is preferred. • Monitor and administer SecurityInformationandEventManagement (SIEM). • Malware analysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data storage systems More ❯
Luton, south west england, United Kingdom Hybrid / WFH Options
Crimson
prioritize workload, and manage competing demands. • Experience in analyzing IT logs andevent sources is preferred. • Monitor and administer SecurityInformationandEventManagement (SIEM). • Malware analysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data storage systems More ❯
luton, bedfordshire, east anglia, United Kingdom Hybrid / WFH Options
Crimson
prioritize workload, and manage competing demands. • Experience in analyzing IT logs andevent sources is preferred. • Monitor and administer SecurityInformationandEventManagement (SIEM). • Malware analysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data storage systems More ❯
Luton, south east england, United Kingdom Hybrid / WFH Options
Crimson
prioritize workload, and manage competing demands. • Experience in analyzing IT logs andevent sources is preferred. • Monitor and administer SecurityInformationandEventManagement (SIEM). • Malware analysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data storage systems More ❯
luton, bedfordshire, east anglia, United Kingdom Hybrid / WFH Options
Context Recruitment
SIEM Automation Engineer – Leading Microsoft MSSP An opportunity to work with one of the top 1% Microsoft MSSPs globally, where cutting-edge security solutions meet expert cyber defense. With a 16-person SOC team, this role offers the chance to automate, optimize, and strengthen security operations at scale. A key … with security analysts, engineers, and SOC teams to develop automated responses to cyber threats. Continuously improve security monitoring strategies and contribute to the overall SIEM architecture. Experience required: Proven experience working with Microsoft Sentinel and Defender for Endpoint. Strong proficiency in KQL for deep threat hunting andsecurity analytics. Knowledge … of SIEM automation, playbooks, and integrations. Experience in cybersecurity operations, threat detection, and incident response. Passion for security automation and proactive cyber defense strategies. Paying up to 60k + on-call (65k total package) Remote based Must be eligible for SC clearance. More ❯
luton, bedfordshire, east anglia, United Kingdom Hybrid / WFH Options
Dynamic Search Solutions
Job Title: SIEM Engineer Location: Remote Salary: £40,000 - £50,000 The Company An exciting opportunity has arisen at an award-winning Microsoft Partner for a SIEM Engineer. The business is a fast-growing, industry-leading managed service and managed security service provider, delivering to mid-sized and large enterprise … clients. This is a fantastic opportunity for a SIEM Engineer to continue developing their expertise in security platforms at an established Microsoft Partner. The company places strong emphasis on staff development, offering support for training and professional certifications. You’ll also gain exposure to cutting-edge technologies, working across securityMore ❯
technologies. Create and maintain detection rules and logic to identify suspicious activity and potential security threats. Participate in the creation, implementation, and optimisation of SIEMevent correlation rules, logic, and content to filter out security events associated with known network behaviour, false positives, and errors. Support the transition of project … technologies such as NDR/content filtering/FW/IPS/IDS/DDOS, EDR/MDR, DAST/SAST, Identity Access Management, SIEM & SOAR, log management. Preferable experience in Azure, AWS, Defender, Darktrace. Experience and technical knowledge in multiple areas of cyber defence operations. Experience as a Cyber More ❯
DNS filtering, HTTP inspection, etc.) for secure browsing and egress control Integrate Cloudflare services with: Entra ID/Azure Active Directory for identity managementSIEM platforms (likely Microsoft Sentinel) for log forwarding and visibility Coordinate with the client’s Azure infrastructure partners to ensure smooth integration Produce documentation and operational … especially ZTNA and Gateway Proven experience implementing Zero Trust access policies in cloud environments Experience integrating Cloudflare with Azure AD/Entra ID andSIEM tools Understanding of secure cloud networking principles and Zero Trust architecture Experience in multi-cloud environments (Azure required) If this role sounds like it could More ❯