systems, with experience in tools such as Kafka, Kubernetes, Zookeeper, and HDFS. oProficiency in Linux, specifically Red Hat Enterprise Linux (RHEL). oFamiliarity with SIEM platforms (especially ArcSight) or legacy Java-based applications is a plus. • DevOps Mindset: An understanding of DevOps principles, with hands-on experience automating releases using More ❯
systems, with experience in tools such as Kafka, Kubernetes, Zookeeper, and HDFS. Proficiency in Linux, specifically Red Hat Enterprise Linux (RHEL). Familiarity with SIEM platforms (especially ArcSight) or legacy Java-based applications is a plus. DevOps Mindset: An understanding of DevOps principles, with hands-on experience automating releases using More ❯
Access Management (including RBAC and A/PBAC, permissions management), ZTA • Cryptographic techniques and implementations • IT asset managementand tracking • Vulnerability Managementand Patching • SIEM principles, products and supporting logging infrastructure • Containerisation and virtual machine security • Delivering secure solutions against project expectations • Strong awareness of and commitment to industry best More ❯
TrueSight Identity protection and corporate tools including AAIP, MDI, and MCAS PUAM systems, especially CyberArk Security logging and monitoring, preferably with PRISM or similar SIEM solutions Solid understanding of security frameworks (e.g., NIST, ISO 27001) and compliance requirements. Proven experience in low-level design (LLD) documentation and system integration. Our More ❯
TrueSight Identity protection and corporate tools including AAIP, MDI, and MCAS PUAM systems, especially CyberArk Security logging and monitoring, preferably with PRISM or similar SIEM solutions Solid understanding of security frameworks (e.g., NIST, ISO 27001) and compliance requirements. Proven experience in low-level design (LLD) documentation and system integration. Our More ❯
experience leading regulatory compliance programs Excellent communication skills and a talent for building strong stakeholder relationships Experience in security assurance across services like SOC, SIEM, IAM, and more Professional certifications (CISM, CISSP, ISO27001 Audit) highly desirable You’ll be part of a dynamic, purpose-driven team in a pivotal role More ❯
reading, south east england, United Kingdom Hybrid / WFH Options
Project People
a technology industry (mobile telecommunications desirable but not essential). A background of assuring a wide range of security solutions and services such as SIEM, IDS, SOC, IAM, PAM, TVM. A history of bringing industry best practice into an organisation and using this to drive continuous improvement. Demonstrable experience of More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Mobile Broadband Network Ltd (MBNL)
a technology industry (mobile telecommunications desirable but not essential). A background of assuring a wide range of security solutions and services such as SIEM, IDS, SOC, IAM, PAM, TVM. A history of bringing industry best practice into an organisation and using this to drive continuous improvement. Demonstrable experience of More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Project People
a technology industry (mobile telecommunications desirable but not essential). A background of assuring a wide range of security solutions and services such as SIEM, IDS, SOC, IAM, PAM, TVM. A history of bringing industry best practice into an organisation and using this to drive continuous improvement. Demonstrable experience of More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Mobile Broadband Network Limited
a technology industry (mobile telecommunications desirable but not essential). • A background of assuring a wide range of security solutions and services such as SIEM, IDS, SOC, IAM, PAM, TVM. • A history of bringing industry best practice into an organisation and using this to drive continuous improvement. • Demonstrable experience of More ❯
security reports and advisories to key stakeholders. Residual Risk Assessment: Deliver post-incident analysis, technical lessons learned, and reporting to assess residual risk. Advanced SIEM Tuning: Refine and tune SIEM tools to reduce false positives and detect more sophisticated threats, ensuring optimal alert configurations. Automating Response Actions: Develop and improve … in securityevent analysis and incident response. Deep knowledge of IPv4/IPv6, TCP networking protocols, and the OSI model. Expertise in security tools: SIEM (ArcSight, Sentinel, QRadar, Splunk), EDR (Microsoft Defender, FireEye), IDS/IPS, firewalls, proxies, web application firewalls, and anti-virus technologies. Strong knowledge of Linux andMore ❯
and externally Familiarity with ISO 27001, Cyber Essentials, Azure Cloud Platform, Mimecast, Microsoft defender, Fortinet Platforms (FortiAnalyzer). EDR: CrowdStrike, Microsoft Defender for Endpoint SIEM: Microsoft Sentinel, CrowdStrike Next-Gen SIEM Ensure Department/Contract meets SLA performance targets. Improve and maintain customer experience, satisfaction and retention. Ensure compliance of More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
non-technical audiences. • Strong understanding of OT infrastructure, networking, and end-user computing. • Proficiency in writing Kusto Query Language (KQL) for creating and tuning SIEM queries and alerts. • Experience in configuring and troubleshooting MFA, Privileged Access Management (PAM), andSecurityInformation & EventManagement (SIEM) systems, particularly Microsoft Sentinel. Desirable Experience More ❯