/DevOps). Knowledge of security frameworks and regulatory compliance standards (NIST CSF, SOX ITGC, GDPR, MITRE ATT&CK, etc.) Experience with common industry SIEMand vulnerability management platforms. Experience maintaining the Microsoft Defender platform and other Microsoft security products. Ability to rank and prioritize vulnerabilities andsecurity recommendations appropriately More ❯
and incident management. Possess a working knowledge of Cisco network switches, routers, firewalls and VPN, network security, administration of DLP, antivirusantimalware, IDS/IPS, SIEM, SMTP, Email security, AD, Group Policy, DNS, DHCP, and VLANs. Experience with identity access management solutions, such as SAMLOATH Experience with HIDS and NIDS The More ❯
household Onsite perks including free parking, tea and coffee stations, and a subsidized café with free breakfast toast Responsibilities Security Monitoring & Incident Response: Use SIEM tools like Exabeam, LogRhythm, Splunk, or Arcsight to monitor security events, detect threats, and analyze data to address incidents swiftly. Vulnerability Management Tools: Conduct regular More ❯
a related field (Master's preferred). • Extensive experience in cybersecurity leadership within a SOC or incident response function. • Strong knowledge of security technologies, SIEM platforms (e.g., Chronicle, Splunk, QRadar), EDR tools, firewalls, and network security. • Experience with security frameworks and regulations (NIST, ISO 27001, MITRE ATT&CK, CIS, etc. More ❯
cloud environments (AWS, Azure, GCP) and understanding of cloud security risks. Awareness of Agile environments and practices. Familiarity with advanced cybersecurity technologies such as SIEM, IDS/IPS, and endpoint detection solutions. Key Skills The job holder is expected to possess the following skill set: Ability to extract clarity from More ❯
RAN architectures andsecurity requirements. Strong knowledge of network security protocols, VPN, firewall management, and intrusion detection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks (e.g., GDPR, HIPAA, ISO 27001). In-depth understanding of routers, switches, firewalls More ❯
relevant to SaaS products, preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusion detection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools. You own relevant certifications (Security+, IAT II/III level or similar). You excel in risk assessments, vulnerability More ❯
and response, and supporting the implementation of security controls and policies across cloud, on-premise, and hybrid environments. This role also involves working with SIEM solutions, automating security workflows, and contributing to the company's compliance with Cyber Essentials Plus and ISO 27001 standards. Key Responsibilities: Design, implement, and manage … and threat management. Leverage Infrastructure as Code (IaC) principles using Terraform to automate security policies and infrastructure deployment. Utilize SecurityInformationandEventManagement (SIEM) solutions (preferably Microsoft Sentinel SIEM ) to monitor, detect, and respond to security incidents. Create and maintain runbooks for security incident response, including automating workflows to … cloud infrastructure, managing security controls). SIEM Solutions: First-hand experience working with SIEM solutions , particularly Microsoft Sentinel SIEM . Experience in designing and managing SIEM rule sets, creating dashboards, and correlating data for threat detection. Familiarity with securityevent log analysis, alerts management, and incident response workflows. Cybersecurity Frameworks More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Halian
and response, and supporting the implementation of security controls and policies across cloud, on-premise, and hybrid environments. This role also involves working with SIEM solutions, automating security workflows, and contributing to the company's compliance with Cyber Essentials Plus and ISO 27001 standards. Key Responsibilities: Design, implement, and manage … and threat management. Leverage Infrastructure as Code (IaC) principles using Terraform to automate security policies and infrastructure deployment. Utilize SecurityInformationandEventManagement (SIEM) solutions (preferably Microsoft Sentinel SIEM ) to monitor, detect, and respond to security incidents. Create and maintain runbooks for security incident response, including automating workflows to … cloud infrastructure, managing security controls). SIEM Solutions: First-hand experience working with SIEM solutions , particularly Microsoft Sentinel SIEM . Experience in designing and managing SIEM rule sets, creating dashboards, and correlating data for threat detection. Familiarity with securityevent log analysis, alerts management, and incident response workflows. Cybersecurity Frameworks More ❯
systems, and cloud technologies. Strong understanding of security principles, practices, and frameworks (e.g., PCI, NIST, ISO 27001). Experience with security tools such as SIEM, IDS/IPS, endpoint protection, and penetration testing tools. Experience with public cloud security, specifically AWS, Azure, and Google Cloud Platform (GCP). You will More ❯
security, cloud security, and secure system architecture. Experience in penetration testing, vulnerability management, and cyber threat intelligence. Solid knowledge of security technologies such as SIEM, IDS/IPS, firewalls, and endpoint detection and response (EDR). Strong understanding of risk assessment methodologies andsecurity governance frameworks. Excellent stakeholder engagement andMore ❯
artifacts in support of incident investigations Experience with vulnerability scanning solutions In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. Sentinel, Nitro/McAfee Enterprise Security Manager, ArcSight, QRadar, LogLogic, Splunk) Understanding of mobile technology and OS (i.e. Android, iOS, Windows), Experienced in More ❯
artifacts in support of incident investigations Experience with vulnerability scanning solutions In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. Sentinel, Nitro/McAfee Enterprise Security Manager, ArcSight, QRadar, LogLogic, Splunk) Understanding of mobile technology and OS (i.e. Android, iOS, Windows), Experienced in More ❯
and hardening procedures for servers, databases, and network devices Working with existing and new security solutions such as End-Point Protection, Firewalls, Encryption, Proxy, SIEM Developing, improving & Enforcing security policies and procedures Responsible for reviewing security violation reports and investigates possible security exceptions Updating, maintaining and documenting security controls Participating More ❯
firewalls, VPNs, and cloud-based networking solutions. Experience with IAM systems (e.g., Azure AD/Microsoft Entra) andsecurity tools (e.g., endpoint protection, DLP, SIEM). Hands-on expertise with troubleshooting hardware, software, and SaaS issues. Security Knowledge: Familiarity with security frameworks and standards such as SOC 2, ISO More ❯
to ensure secure and efficient connectivity across the organization. Maintain and troubleshoot core security systems including firewalls, IDS/IPS, VPN gateways, vulnerability scanners, SIEM platforms, andsecurity monitoring tools. Diagnose and resolve system and network issues, working across teams to remediate security-related disruptions or performance problems. Research, evaluate More ❯
to ensure secure and efficient connectivity across the organization. Maintain and troubleshoot core security systems including firewalls, IDS/IPS, VPN gateways, vulnerability scanners, SIEM platforms, andsecurity monitoring tools. Diagnose and resolve system and network issues, working across teams to remediate security-related disruptions or performance problems. Research, evaluate More ❯
with 2+ years in a senior cybersecurity role. Hands-on experience with security tools such as firewalls, endpoint protection, VPNs, IDS/IPS, andSIEM platforms. Deep knowledge of network security, encryption, authentication, and secure configurations including CUI/CDI. Advanced understanding of IT infrastructure, including servers, storage, and virtualization. More ❯
Minimum 3 years' experience in cybersecurity. Strong knowledge of security frameworks (NIST 800, ISO 27001) and GDPR regulations. Experience with network security infrastructure andSIEM tools (Splunk, SolarWinds). Proficiency in Windows/Linux system administration and virtualization technologies (VMware, Hyper-V). Previous experience within the finance or banking More ❯
Minimum 3 years' experience in cybersecurity. Strong knowledge of security frameworks (NIST 800, ISO 27001) and GDPR regulations. Experience with network security infrastructure andSIEM tools (Splunk, SolarWinds). Proficiency in Windows/Linux system administration and virtualization technologies (VMware, Hyper-V). Previous experience within the finance or banking More ❯
from the principal analyst. Integrating and analysing threat intelligence sources necessary to evolve our protective controls accordingly. Ensure our Security Incident andEventManagement (SIEM) and log management capabilities are comprehensive enough to provide actionable alerts, limiting noise and false positives. Ensure preparedness for the most common threats and scenarios More ❯
equivalent experience Good knowledge covering several of the following examples (this list is not exhaustive): AD, Cryptography, End User Computing, IAM, PKI, Server hardening, SIEM, SOAR, virtualisation (VMware) Participate in pre-sales tasks and perform ongoing support of delivery collateral. Familiarity with MITRE ATT&CK Familiarity with ITIL Who we More ❯
security (AWS, Azure, GCP). Apply risk-based and threat-based approaches to evaluate and recommend appropriate and proportionate security technologies and solutions (e.g., SIEM, IAM, CASB, container security). Outline key security components, interfaces, and dependencies. Develop architectural diagrams and overviews. Document security design principles and provide rationale. Ensure More ❯