experience Good knowledge of MS Defender for Cloud, Storage (SQL) and CSPM. Proficient with Data loss prevention tools experience, such as MS Purview Compliance Manager and Tessian Security monitoring, SIEM tooling such as Exabeam, QRadar, Splunk and Sentinel. Experience with Azure (security centre) and M365 cloud infrastructure and configuration and on-premises Active Directory Experience in Cloud email security gateway More ❯
Bracknell, Berkshire, United Kingdom Hybrid / WFH Options
John Lewis Partnership
within a security context In-depth working knowledge of security best practices and frameworks (e.g. Mitre ATT&CK, NIST). Even Better If You Have (Desirable Skills): Experience with SIEM tooling and detection development (Google SecOps/Chronicle proficiency is of specific benefit) Background in delivering and/or maintaining EDR tooling (specifically SentinelOne engineering experience is beneficial) Experience securing More ❯
security best practices for the team ALL ABOUT YOU Technical Skills DLP Tools & Platforms: Proficiency with DLP solutions, in particular Microsoft Purview Security Monitoring & Analysis: Experience integrating DLP with SIEM, EDR, and CASB tools to monitor data flows and detect suspicious behavior. Policy Creation & Tuning: Ability to create, tune, and enforce DLP policies for endpoints, network, email, and cloud environments. More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
with complicated security-related concepts to technical and non-technical audiences. Proficient in the use of PowerBI or a similar dashboarding application. Knowledge of security systems (including working with SIEM data). SQL or database knowledge would be desirable. Relevant certifications such as CISSP, CISM, or CRISC (or equivalent) are preferred. Proven experience in managing and delivering technical projects andMore ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
with complicated security-related concepts to technical and non-technical audiences. Proficient in the use of PowerBI or a similar dashboarding application. Knowledge of security systems (including working with SIEM data). SQL or database knowledge would be desirable. Relevant certifications such as CISSP, CISM, or CRISC (or equivalent) are preferred. Proven experience in managing and delivering technical projects andMore ❯
Portchester, Hampshire, United Kingdom Hybrid / WFH Options
Computappoint
regulations, cloud security, identity management, data protection, security governance, risk management, and remediation planning Technical expertise: SaaS, Cloud platforms, SDLC, Vulnerability Management, Networking, IDAM Security vetting eligibility, ITSM/SIEM platform proficiency, Microsoft Stack competency To be considered, please ensure you complete your application on the Computappoint website. Services offered by Computappoint Limited are those of an Employment Business andMore ❯
Portsmouth, Hampshire, England, United Kingdom Hybrid / WFH Options
Computappoint
regulations, cloud security, identity management, data protection, security governance, risk management, and remediation planning Technical expertise: SaaS, Cloud platforms, SDLC, Vulnerability Management, Networking, IDAM Security vetting eligibility, ITSM/SIEM platform proficiency, Microsoft Stack competency To be considered, please ensure you complete your application on the Computappoint website. Services offered by Computappoint Limited are those of an Employment Business andMore ❯
London, Portchester, Hampshire, United Kingdom Hybrid / WFH Options
Computappoint
regulations, cloud security, identity management, data protection, security governance, risk management, and remediation planning Technical expertise: SaaS, Cloud platforms, SDLC, Vulnerability Management, Networking, IDAM Security vetting eligibility, ITSM/SIEM platform proficiency, Microsoft Stack competency To be considered, please ensure you complete your application on the Computappoint website. Services offered by Computappoint Limited are those of an Employment Business andMore ❯
London, South East, England, United Kingdom Hybrid / WFH Options
AJ Bell
interest in technology Experience of InformationSecurity standards and frameworks Awareness and understanding of the InformationSecurity threat landscape Understanding of InformationSecurity solutions e.g. email/web gateways, SIEM, Endpoint protection etc. Knowledge/experience working with next gen security solutions Awareness of Cloud security solutions and standards is highly advantageous Experience working within recognised InformationSecurity frameworks andMore ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
In Technology Group
frameworks such as OWASP, SASE, and Zero Trust. What We're Looking For Essential: Right to work in the UK. Proven experience in cyber security engineering, including vulnerability management, SIEM, WAFs, and secure infrastructure design. Strong knowledge of TCP/IP, firewalls, routing, access controls, and threat-based security approaches. Excellent communication skills with the ability to create and maintain More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
In Technology Group
frameworks such as OWASP, SASE, and Zero Trust. What We're Looking For Essential: Right to work in the UK. Proven experience in cyber security engineering, including vulnerability management, SIEM, WAFs, and secure infrastructure design. Strong knowledge of TCP/IP, firewalls, routing, access controls, and threat-based security approaches. Excellent communication skills with the ability to create and maintain More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Precise Placements
a regulated or professional services environment. Proven leadership experience managing enterprise-level IT security teams and technologies. Deep understanding of cloud security (Microsoft stack preferred), firewalls, VPNs, ZTNA, andSIEM platforms. Knowledge of legal, regulatory, and risk management frameworks including ISO27001, GDPR, and NIST. Certifications such as CISSP, CISM or equivalent are desirable. Strong stakeholder engagement skills and the ability More ❯
and cyber risk remediation. Technical Skills & Qualifications Ability to communicate complex issues to non-technical audiences. Understanding of OT infrastructure and networking. Proficiency in Kusto Query Language (KQL) andSIEM systems, especially Microsoft Sentinel. Desirable Experience & Skills Knowledge of network security tools like NAC, Firewalls, IDS/IPS. Leadership experience; cybersecurity or related degree; certifications like Microsoft Security Operations Analyst More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
compliance requirements and frameworks (e.g., NIST CSF, ISO 27001, CSA CCM, PCI DSS). Expert-level knowledge of IAM, network security, encryption, API and application security, container security, andSIEM strategies. Proven leadership in DevSecOps practices and securing modern development pipelines. Certifications such as CISSP, CCSP, AWS Security Specialty, TOGAF, or equivalents are highly desirable. Esther Urtecho Senior Delivery Consultant More ❯
Staying ahead of the curve on emerging threats, tactics, and techniques To secure this SOC role: Proven experience in a Security Operations Centre (SOC) environment Hands-on knowledge of SIEM tools (Microsoft Sentinel, Splunk, etc.) Familiarity with MITRE ATT&CK and threat detection methodologies Strong analytical mindset with log, endpoint, and network analysis skills Understanding of network protocols (TCP/ More ❯
threats. You’ll play a crucial role in delivering technical excellence, leading customer engagements, and mentoring team members. Key Responsibilities: Design, implement, and manage enterprise-grade security solutions (firewalls, SIEM, IDS/IPS, endpoint protection, cloud security). Shape strategic security recommendations and collaborate on technical win plans. Maintain and update security policies, procedures, and incident response plans. Deliver security … Looking For: A degree in Cybersecurity, IT, or equivalent experience. 4+ years in a cybersecurity role, preferably within an MSP or fast-paced environment. Strong hands-on experience with SIEM, EDR, VPNs, firewalls, and cloud platforms (AWS, Azure, GCP). Expertise in Microsoft Sentinel, Cisco Splunk or Palo Alto QRadar, and KQL. Proven skills in threat detection, incident response, andMore ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
engineering. DV Clearance. Programming and scripting such as Python, Perl, Bash, PowerShell, C++. CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar. If you are interested in this role but not sure if your skills and experience are exactly what were looking More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
fortice
SIEM Engineer Location: Hybrid 60/40 - Bearwood Rd, Sindlesham, Wokingham RG41 5BN Duration: 26/12/2025 MUST BE PAYE THROUGH UMBRELLA We are heading up a recruitment drive for a global consultancy that require a SC Cleared Siem Engineer to join them on a major government project that's based in in Wokingham. Role Description: - SIEM Deployment … Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. - Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. - Incident Response - Work with security teams to analyze and mitigate security incidents. - Custom Rule Creation - Develop and fine-tune detection rules and alerts to identify malicious activities. - Security Reporting - Generate reports on security events, trends … and system performance. - Collaboration - Work with IT andsecurity teams to improve overall cybersecurity posture. Required Skills & Qualifications - Technical Expertise - Strong knowledge of SIEM platforms, network security, and cybersecurity frameworks. - Certifications - CISSP, CEH, GIAC, or vendor-specific SIEM certifications. - Programming & Scripting - Familiarity with Python, PowerShell, or other Scripting languages. - Analytical Thinking - Ability to analyze large datasets and identify security threats. More ❯
Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, andSIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery and ongoing support. This is a great opportunity and salary is dependent upon experience. More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Sophos Group
that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide, defending More ❯
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria Limited
protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and experience are exactly what were More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
London, South East, England, United Kingdom Hybrid / WFH Options
Harnham - Data & Analytics Recruitment
processes Deliver a gap analysis and propose a strategic roadmap Define operating models for SOC, red teaming, and internal security ownership Advise on cloud security (AWS/GCP), tooling (SIEM, SOAR, EDR), and DevSecOps practices Engage senior stakeholders to align security recommendations with business goals Required Skills & Experience Proven experience in senior security consultancy or architecture roles Strong understanding of More ❯
Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, andSIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery and ongoing support This is a great opportunity and salary is dependent upon experience. More ❯
Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, andSIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery and ongoing support This is a great opportunity and salary is dependent upon experience. More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
Security: Implement and monitor DNS security solutions to prevent cyber threats. Incident Response: Formulating and documenting a solid process utilising a 3rd party support partner Security Monitoring & Logging: Develop SIEM solutions, logging strategies, and real-time threat intelligence. Monitor, audit, and improve infrastructure security posture using automated tooling. Policy & Procedures: Define and enforce security policies, incident response strategies, and structured … with Terraform for IaC security automation. Knowledge of DevOps pipelines (CI/CD) andsecurity hardening. Deep understanding of PCI DSS compliance, security frameworks, and audit processes. Familiarity with SIEM solutions, security orchestration platforms, and log management. Strong experience with incident response planning, threat detection, and mitigation. Ability to define security policies, procedures, and structured action plans for compliance andMore ❯