a comprehensive security plan. Test cyber-attacks regularly to address vulnerabilities. Monitor security trends, adapt strategies. Oversee incident monitoring, detection, response via SOC and MSSPs. Manage security tools like SIEMand endpoint protection. Lead incident response and post-incident analysis. Enforce policies for data privacy (GDPR & NIST). Conduct regular security audits. Manage vendor relationships and negotiate contracts. Report service More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Qurated
Qualifications Required: 5+ years in cyber security leadership with a strong technical security background. Expertise in Microsoft & Azure security environments (cloud, hybrid, on-prem). Hands-on experience with SIEM, EDR, and XDR solutions for security monitoring. Certifications preferred: CISSP, CISM, AZ-500, SC-200, SC-100. Strong knowledge of ISO 27001, NIST, CIS benchmarks, andsecurity governance. Experience leading More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Nextech
and help shape our strategy using frameworks such as OWASP, SASE, and Zero Trust. What We're Looking For Essential: Proven experience in cyber security engineering, including vulnerability management, SIEM, WAFs, and secure infrastructure design. Strong knowledge of TCP/IP, firewalls, routing, access controls, and threat-based security approaches. Excellent communication skills with the ability to create and maintain More ❯
onboarding 67 critical services and 72+ services proactively monitored by our in-house SOC (Security Operations Centre). Essential Criteria for the Role 2+ years in security platforms management (SIEM, SOAR). Expertise in enterprise-level monitoring and supporting large user bases (10,000+ users). Experience in creating/managing security playbooks and knowledge of public sector standards. Experience More ❯
NAC solutions. Career growth - mentor others, lead projects, and become a go-to technical expert. What you’ll be doing: Taking ownership of CrowdStrike EDR , including policy configuration andSIEM tuning. Working with network teams on segmentation, NAC, and firewall controls . Leading on incident response , root cause analysis, and runbook development. Managing and optimising a wide suite of tools More ❯
for clients, as they work to address the challenges associated with today’s cyber threat landscape. Your Impact SOC Advisory 4+ years of consulting experience in SOC, security engineering, SIEM administration, and incident managementand demonstrated success with serving large, multinational organisations in designing and implementing an organisation’s security operations program, organisational structures, and capabilities Possess a deep technical … knowledge in Security Incident andEventManagement (SIEM) platforms, Security Orchestration and Response (SOAR) technologies, Endpoint Protection and Response/Next Gen Protection and Response (EDR/XDR) tools, Next GenFirewalls, Threat Intelligence and Hunting platforms Defensive Security Skills (desired) Experience in security operations design, engineering and/or analysis and investigations, ideally in complex environments, with securityevent correlations More ❯
designing and delivering UKAEA's greenfield Identity and Access Management (IAM) and Privileged Access Management (PAM) solutions, while contributing to the development of the SecurityInformationandEventManagement (SIEM) andSecurity Operations Centre (SOC) capabilities. You will lead the IAM/PAM workstreams and provide specialist input into SIEM/SOC implementation, ensuring all solutions align with secure-by … PAM telemetry into SIEM tooling for enhanced visibility and detection. Provide technical oversight and assurance when engaging Managed Service Providers (MSPs) or third-party vendors. Support the development and implementation of SIEM/SOC capabilities, assisting in log source onboarding, alert tuning, and incident response improvements. Mentor and train junior team members, building internal capability in identity and access management. … SC-level national security clearance Desirable o At least a HND in InformationSecurity, Computer Science, or a related STEM field, or equivalent experience. Degree Preferred o Understanding of SIEM/SOC integration and the relationship between IAM telemetry andsecurity monitoring. o Familiarity with ITSM workflows and change control procedures. o Experience conducting security risk assessments for third-party More ❯
designing and delivering UKAEA's greenfield Identity and Access Management (IAM) and Privileged Access Management (PAM) solutions, while contributing to the development of the SecurityInformationandEventManagement (SIEM) andSecurity Operations Centre (SOC) capabilities. You will lead the IAM/PAM workstreams and provide specialist input into SIEM/SOC implementation, ensuring all solutions align with secure-by … PAM telemetry into SIEM tooling for enhanced visibility and detection. Provide technical oversight and assurance when engaging Managed Service Providers (MSPs) or third-party vendors. Support the development and implementation of SIEM/SOC capabilities, assisting in log source onboarding, alert tuning, and incident response improvements. Mentor and train junior team members, building internal capability in identity and access management. … SC-level national security clearance Desirable o At least a HND in InformationSecurity, Computer Science, or a related STEM field, or equivalent experience. Degree Preferred o Understanding of SIEM/SOC integration and the relationship between IAM telemetry andsecurity monitoring. o Familiarity with ITSM workflows and change control procedures. o Experience conducting security risk assessments for third-party More ❯
would be the main focus of the role. Strong expertise with Microsoft Defender and Sentinel is needed. Key Skills & Experience from the Security Engineer Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Newto Training
CompTIA CySA+, Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerability management Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Newto Training
CompTIA CySA+, Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerability management Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Newto Training
CompTIA CySA+, Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerability management Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
while enabling the business to run smoothly. What you'll be doing: Implementing and maintaining security controls across network, cloud, endpoints, and core infrastructure Owning key technologies like firewalls, SIEM, EDR, VPN, NAC, and vulnerability scanners Driving vulnerability managementand hardening across the estate Supporting and responding to security incidents across infrastructure services Embedding security into infrastructure changes (firewall rules … Strong background in infrastructure or network security within a complex enterprise environment Solid knowledge of: Firewalls, VPN, IDS/IPS, network security controls Endpoint security (EDR, anti-malware, DLP) SIEM tools (e.g. Splunk, Sentinel) Vulnerability management (e.g. Qualys, Tenable) Cloud (Azure and/or AWS) Hands-on experience supporting or responding to security incidents Familiarity with frameworks such as ISO More ❯
of governance artefacts. You will also engage with engineering teams and managed service providers (MSPs) to ensure that OT security controls are effectively designed, implemented, and sustained. Experience with SIEM/SOC integration is valuable and considered desirable. Accountabilities: Lead the design and delivery of the OT Security Strategy, policies, and standards. Define governance processes for OT security, ensuring alignment … third-party security service providers. o Strong communication and documentation skills, particularly in policy/standards creation. o Eligible for SC-level national security clearance. Desirable o Familiarity with SIEM/SOC integration for OT environments. o Experience with OT asset discovery, monitoring, andsecurity tool deployment. o Exposure to regulatory compliance in critical infrastructure (e.g., NIS Directive, UK CAF More ❯
of governance artefacts. You will also engage with engineering teams and managed service providers (MSPs) to ensure that OT security controls are effectively designed, implemented, and sustained. Experience with SIEM/SOC integration is valuable and considered desirable. Accountabilities: Lead the design and delivery of the OT Security Strategy, policies, and standards. Define governance processes for OT security, ensuring alignment … third-party security service providers. o Strong communication and documentation skills, particularly in policy/standards creation. o Eligible for SC-level national security clearance. Desirable o Familiarity with SIEM/SOC integration for OT environments. o Experience with OT asset discovery, monitoring, andsecurity tool deployment. o Exposure to regulatory compliance in critical infrastructure (e.g., NIS Directive, UK CAF More ❯