cloud environments (AWS, Azure, GCP) and understanding of cloud security risks. Awareness of Agile environments and practices. Familiarity with advanced cybersecurity technologies such as SIEM, IDS/IPS, and endpoint detection solutions. Key Skills The job holder is expected to possess the following skill set: Ability to extract clarity from More ❯
Key Requirements: Technical Skills: Deep understanding of security frameworks (e.g., NIST, ISO 27001, CIS Controls, etc.). Practical experience with security tools such as SIEM, firewalls, IDS/IPS, endpoint protection, and vulnerability scanners. Proficiency in risk management practices and tools. Knowledge of cloud security, network security, and data protection More ❯
operation with four shift teams working in a standard rotation. They are responsible for utilising the SOC's Security Incident andEventManagement (SIEM) toolsets to detect and investigate potential Securityand Service Incidents occurring within the monitored networks. These roles require a minimum of SC clearance and be prepared More ❯
leeds, west yorkshire, yorkshire and the humber, United Kingdom
Anson McCade
of SOC analysts in a high-security environment. Oversee real-time security monitoring and incident response activities. Investigate, triage, and manage security incidents using SIEM, EDR, and NDR tools. Coordinate threat intelligence integration to enhance detection capabilities. Develop and refine SOC processes to improve efficiency and resilience. Requirements: 5+ years More ❯
including executive briefings, and actionable recommendations to technical and non-technical stakeholders Set yourself apart: Monitoring, incident response and playbook development Detection creation within SIEM tools and using GitHub Vulnerability scanning, managementand reporting Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols andMore ❯
including executive briefings, and actionable recommendations to technical and non-technical stakeholders Set yourself apart: Monitoring, incident response and playbook development Detection creation within SIEM tools and using GitHub Vulnerability scanning, managementand reporting Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols andMore ❯
leeds, west yorkshire, yorkshire and the humber, United Kingdom
Communicate Technology
4+ years of experience in a SOC environment, with at least 1 year in a leadership role Strong technical knowledge of security tools, including SIEM, SOAR, EDR, Firewalls, and Threat Intelligence platforms Hands-on experience with security incident handling, threat hunting, and forensic analysis Excellent understanding of attack tactics, techniques More ❯
ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerability scanning, penetration testing, SIEM, IDS Experience with vulnerability management tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to the ISO27001 standard Cloud computing cyber securityMore ❯
relevant industry certifications (e.g. CySA+, Security+) and risk management knowledge (essential) Knowledge and experience working across a diverse range of cyber security tools, including SIEM technologies, EDR, NIDS etc. (essential) Self-motivated with a willingness to go the extra mile to achieve important goals (essential) Excellent verbal and written communication More ❯
collaborating with other teams to ensure a secure environment. To be successful as a Security Engineer, you should have the following skills/experience: SIEM experience - Azure Sentinel or Splunk (proficiency in writing KQL and SPL; log sources, ingestion patterns, and correlation rules). DevOps knowledge (Git/BitBucket/ More ❯
security br solutions. br br This role also requires experience of key cybersecurity controls such as br Anti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, Vulnerability br Management, SOAR/automation . Additionally, you’ll have an understanding of br common cybersecurity threats and mitigation techniques More ❯
security br solutions. br br This role also requires experience of key cybersecurity controls such as br Anti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, Vulnerability br Management, SOAR/automation . Additionally, you’ll have an understanding of br common cybersecurity threats and mitigation techniques More ❯
security br solutions. br br This role also requires experience of key cybersecurity controls such as br Anti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, Vulnerability br Management, SOAR/automation . Additionally, you’ll have an understanding of br common cybersecurity threats and mitigation techniques More ❯
security br solutions. br br This role also requires experience of key cybersecurity controls such as br Anti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, Vulnerability br Management, SOAR/automation . Additionally, you’ll have an understanding of br common cybersecurity threats and mitigation techniques More ❯
security br solutions. br br This role also requires experience of key cybersecurity controls such as br Anti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, Vulnerability br Management, SOAR/automation . Additionally, you’ll have an understanding of br common cybersecurity threats and mitigation techniques More ❯
security br solutions. br br This role also requires experience of key cybersecurity controls such as br Anti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, Vulnerability br Management, SOAR/automation . Additionally, you’ll have an understanding of br common cybersecurity threats and mitigation techniques More ❯
security br solutions. br br This role also requires experience of key cybersecurity controls such as br Anti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, Vulnerability br Management, SOAR/automation . Additionally, you’ll have an understanding of br common cybersecurity threats and mitigation techniques More ❯
security br solutions. br br This role also requires experience of key cybersecurity controls such as br Anti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, Vulnerability br Management, SOAR/automation . Additionally, you’ll have an understanding of br common cybersecurity threats and mitigation techniques More ❯
APIs (Application Programming Interfaces) for integrating securitysolutions. This role also requires experience of key cybersecurity controls such asAnti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, VulnerabilityManagement, SOAR/automation . Additionally, you’ll have an understanding ofcommon cybersecurity threats and mitigation techniques with a keen interest More ❯
tadcaster, yorkshire and the humber, united kingdom
Drax
APIs (Application Programming Interfaces) for integrating securitysolutions. This role also requires experience of key cybersecurity controls such asAnti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, VulnerabilityManagement, SOAR/automation . Additionally, you’ll have an understanding ofcommon cybersecurity threats and mitigation techniques with a keen interest More ❯
APIs (Application Programming Interfaces) for integrating securitysolutions. This role also requires experience of key cybersecurity controls such asAnti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, VulnerabilityManagement, SOAR/automation . Additionally, you’ll have an understanding ofcommon cybersecurity threats and mitigation techniques with a keen interest More ❯
pontefract, yorkshire and the humber, united kingdom
Drax
APIs (Application Programming Interfaces) for integrating securitysolutions. This role also requires experience of key cybersecurity controls such asAnti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, VulnerabilityManagement, SOAR/automation . Additionally, you’ll have an understanding ofcommon cybersecurity threats and mitigation techniques with a keen interest More ❯
knottingley, yorkshire and the humber, united kingdom
Drax
APIs (Application Programming Interfaces) for integrating securitysolutions. This role also requires experience of key cybersecurity controls such asAnti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, VulnerabilityManagement, SOAR/automation . Additionally, you’ll have an understanding ofcommon cybersecurity threats and mitigation techniques with a keen interest More ❯