truly matter—this is the place for you. Examples of tasks that would be undertaken include: Monitor and analyse security events using SIEM tools (e.g., Splunk, QRadar) Investigate and respond to security incidents and alerts Perform vulnerability assessments … interview.
Person specification Essential Criteria Experience in analysing SecurityInformationandEventManagement (SIEM) SIEM reports and managing security incidents. Excellent analytical and problem-solving skills. Effective communication skills, with the ability to work well More ❯
household Onsite perks including free parking, tea and coffee stations, and a subsidized café with free breakfast toast Responsibilities Security Monitoring & Incident Response: Use SIEM tools like Exabeam, LogRhythm, Splunk, or Arcsight to monitor security events, detect threats, and analyze data to address incidents swiftly. Vulnerability Management Tools: Conduct regular More ❯
Incident readiness and handling as part of the Computer Security Incident Response team (CSIRT). Monitor and analyse security logs from various systems (including SIEM) and network devices to identify potential threats and vulnerabilities. Knowledge, Skills & Experience Required: Essential: Bachelor’s degree in computer science, Information Technology, Cyber Security, or More ❯
key and secrets management, data loss prevention, and protective marking and classification capabilities. Cyber Security Operations: Proficient in incident response, vulnerability management, SIEM, SOAR, threat modeling, threat hunting, intelligence, data analytics, and anti-phishing methodologies. Infrastructure and Endpoint Security: Experience with endpoint security control technologies (EDR More ❯
a related field (Master's preferred). Extensive experience in cybersecurity leadership within a SOC or incident response function. Strong knowledge of security technologies, SIEM platforms (e.g., Chronicle, Splunk, QRadar), EDR tools, firewalls, and network security. Experience with security frameworks and regulations (NIST, ISO 27001, MITRE ATT&CK, CIS, etc. More ❯
of security standards such as ISO 27001, NIST, and SOC2. Experience with security tools such as vulnerability scanners, intrusion detection or prevention systems, andSIEM solutions. Experience with Vulnerability Management Excellent analytical and problem-solving skills. Strong communication and collaboration skills. Ability to work independently and as part of a More ❯
cloud environments (AWS, Azure, GCP) and understanding of cloud security risks. Awareness of Agile environments and practices. Familiarity with advanced cybersecurity technologies such as SIEM, IDS/IPS, and endpoint detection solutions. Key Skills The job holder is expected to possess the following skill set: Ability to extract clarity from More ❯
protection tools, key and secrets management, data loss prevention, and protective marking and classification capabilities. Cyber Security Operations: Proficient in incident response, vulnerability management, SIEM, SOAR, threat modeling, threat hunting, intelligence, data analytics, and anti-phishing methodologies. Infrastructure and Endpoint Security: Experience with endpoint security control technologies (EDR, EPP, UEBA More ❯
protection tools, key and secrets management, data loss prevention, and protective marking and classification capabilities. Cyber Security Operations: Proficient in incident response, vulnerability management, SIEM, SOAR, threat modeling, threat hunting, intelligence, data analytics, and anti-phishing methodologies. Infrastructure and Endpoint Security: Experience with endpoint security control technologies (EDR, EPP, UEBA More ❯
protection tools, key and secrets management, data loss prevention, and protective marking and classification capabilities. Cyber Security Operations: Proficient in incident response, vulnerability management, SIEM, SOAR, threat modeling, threat hunting, intelligence, data analytics, and anti-phishing methodologies. Infrastructure and Endpoint Security: Experience with endpoint security control technologies (EDR, EPP, UEBA More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
protection tools, key and secrets management, data loss prevention, and protective marking and classification capabilities. Cyber Security Operations: Proficient in incident response, vulnerability management, SIEM, SOAR, threat modeling, threat hunting, intelligence, data analytics, and anti-phishing methodologies. Infrastructure and Endpoint Security: Experience with endpoint security control technologies (EDR, EPP, UEBA More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
In Technology Group
cyber security or informationsecurity engineering role. Strong knowledge of network and system security, encryption, and authentication protocols. Experience with security tools such as SIEM, vulnerability scanners, firewalls, antivirus, and endpoint protection platforms. Familiarity with cloud security (AWS, Azure, or GCP) and hybrid environments. Good understanding of regulatory frameworks andMore ❯
Bletchley, Buckinghamshire, United Kingdom Hybrid / WFH Options
In Technology Group
cyber security or informationsecurity engineering role. Strong knowledge of network and system security, encryption, and authentication protocols. Experience with security tools such as SIEM, vulnerability scanners, firewalls, antivirus, and endpoint protection platforms. Familiarity with cloud security (AWS, Azure, or GCP) and hybrid environments. Good understanding of regulatory frameworks andMore ❯
proficient understanding of the Microsoft 365/Azure platforms/AWS Responsibilities: Monitor securityevent logs and alerts generated by various security technologies, including SIEM, IDS/IPS, firewalls, and endpoint protection systems. Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Identify More ❯
RAN architectures andsecurity requirements. Strong knowledge of network security protocols, VPN, firewall management, and intrusion detection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks (e.g., GDPR, HIPAA, ISO 27001). In-depth understanding of routers, switches, firewalls More ❯
Burp Suite, Kali Linux, Metasploit, Wireshark, Nessus, or equivalent . Good knowledge of network security, firewalls, managed switches, and server configurations . Familiarity with SIEM tools, vulnerability scanning, and incident response . Strong analytical and problem-solving skills. Excellent communication and documentation abilities. Preferred Qualifications Relevant certifications such as OSCP More ❯
relevant to SaaS products, preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusion detection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools. You own relevant certifications (Security+, IAT II/III level or similar). You excel in risk assessments, vulnerability More ❯
Gloucester, England, United Kingdom Hybrid / WFH Options
FluidOne
their needs are met and any issues are addressed, assisting the service delivery manager with technical issues. Triage and analysis of alerts from multiple SIEM’s and Platforms (Microsoft Sentinel, Microsoft Defender, SentinelOne and AppGuard) and intelligence monitoring capabilities, prior to escalation to the Shift Leader in accordance with the More ❯
in Information Security. Proficiency in security frameworks like NIST, implementing and auditing security measures. Knowledge of Cisco networking, firewalls, VPN, DLP, IDS/IPS, SIEM, and related technologies. Experience with identity access management solutions such as SAML, OAuth. Relevant security certifications (e.g., CISSP, CISM, CEH) are highly desirable. Ability to More ❯
role. Experience & Expertise: Experience in a similar technical IT Security role involving a broad range of tech, including: Knowledge & understanding of security principles across: SIEM, Antivirus, DLP, Firewalls, Open Source Filtering tools, Cloud security (Azure), IdAM (PAM on-prem/cloud), EDR, Scanning/vulnerability tools. Familiarity with Windows Server More ❯
enterprise. Demonstrable specific M365 experience is essential (Sharepoint Online, Purview, InTune, Defender, Sentinel, Azure AD/Entra). Knowledge & understanding of security principles across: SIEM, Antivirus, DLP, Firewalls, Open Source Filtering tools, Cloud security (Azure), EDR, Scanning/vulnerability tools, IdAM (PAM). Experience working with a SOC is desirable. More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
All the top bananas UK
operation with four shift teams working in a standard rotation. They are responsible for utilising the SOC's Security Incident andEventManagement (SIEM) toolsets to detect and investigate potential Securityand Service Incidents occurring within the monitored networks. These roles require a minimum of SC clearance and be prepared More ❯
firewalls, VPNs, and cloud-based networking solutions. Experience with IAM systems (e.g., Azure AD/Microsoft Entra) andsecurity tools (e.g., endpoint protection, DLP, SIEM). Hands-on expertise with troubleshooting hardware, software, and SaaS issues. Security Knowledge: Familiarity with security frameworks and standards such as SOC 2, ISO More ❯
systems, and cloud technologies. Strong understanding of security principles, practices, and frameworks (e.g., PCI, NIST, ISO 27001). Experience with security tools such as SIEM, IDS/IPS, endpoint protection, and penetration testing tools. Experience with public cloud security, specifically AWS, Azure, and Google Cloud Platform (GCP). You will More ❯