and liaise with the custiomer and the Service Delivery Manager as well and ensuring the actions of the SOC Analysts follow best practice. Job Duties Security Monitoring: & Investigation: Monitoring SIEM tools to assure high a level of security operations delivery function Oversee and enhance security monitoring systems to detect and analyse potential security incidents. Conduct real-time analysis of security … vulnerabilities, integrating threat intelligence into security monitoring processes. Contribute to the development of threat intelligence feeds to enhance proactive threat detection. Proactively hunt for threats within enterprise environments using SIEMand EDR solutions. Fine-tune SIEM detection rules, correlation alerts, and log sources to reduce false positives. Analyse threat intelligence feeds, map findings to MITRE ATT&CK framework, and provide … mechanisms. Conduct adversary simulation exercises to test and improve detection capabilities. Generate detailed reports on emerging threats, attack trends, andsecurity posture improvements. Monitored and analysed security logs from SIEM platforms to identify suspicious activity. Security Tool Management: Manage and optimise SIEM tools, ensuring they are properly configured and updated to maximize effectiveness. Own the development and implementation of SOC More ❯
hands-on' shift-based roles, working as part of a 24/7 operation working in a standard rotation shift pattern. They are responsible for utilising the SOC's SIEMand SOAR toolsets to detect and investigate potential Securityand Service Incidents occurring within the monitored networks. Main Duties Monitor, triage, analyse and investigate alerts, log data and network traffic … skills. Strong analytical skills Must have expertise on TCP/IP network traffic andevent log analysis. Must have knowledge and hands-on experience of Microsoft Sentinel (or any SIEM tool). Must have administrative skills in several operating systems, such as Windows, OS X, and Linux Must be proficient in basic shell scripting, creating Snort rules, or other log More ❯
communication skills. Excellent interpersonal and presentation skills. Strong analytical skills. Expertise in TCP/IP network traffic andevent log analysis. Hands-on experience with Microsoft Sentinel or similar SIEM tools. Administrative skills across multiple operating systems (Windows, OS X, Linux). Proficiency in shell scripting, creating Snort rules, or other log-searching query languages. Confidence in handling common securityMore ❯
should be classified as an incident. They will coordinate with the customer's IT andSecurity teams for resolution of the security incident. Main Duties Security Monitoring & Investigation: Monitor SIEM tools to ensure high levels of security operations delivery. Oversee and enhance security monitoring systems to detect and analyze potential security incidents. Conduct real-time analysis of security events and … Intelligence: Stay updated on cybersecurity threats and vulnerabilities, integrating threat intelligence into monitoring processes. Contribute to threat intelligence feeds to enhance proactive detection. Security Tool Management: Manage and optimize SIEM tools, ensuring proper configuration and updates. Develop and implement SOC use cases. Evaluate new security technologies and recommend enhancements. Collaboration: Work with cross-functional teams including IT, legal, andmanagement … bring: What you will bring; Must be able to obtain or already hold SC Clearance. Good understanding of Incident Response approaches. Hands-on experience with Microsoft Sentinel or similar SIEM tools. Strong verbal and written English communication skills. Interpersonal and presentation skills. Analytical skills. Understanding of network traffic and activities. Knowledge of Vulnerability Scanning, Management, and Ethical Hacking (Penetration Testing More ❯
Press Tab to Move to Skip to Content Link Search by Location Select how often (in days) to receive an alert: Select how often (in days) to receive an alert: Wipro Limited (NYSE: WIT, BSE: 507685, NSE: WIPRO) is a More ❯
Wolverhampton, Bushbury, West Midlands (County), United Kingdom Hybrid / WFH Options
Tilt Recruitment
Ideal Candidate Profile: Expert in Azure cloud security services (Defender for Cloud, Azure Sentinel, Key Vault, APIM) Strong advocate of Zero Trust models and secure development practices Experienced in SIEM & SOAR, ideally with tools like Rapid7 Excellent communicator with the ability to influence at all levels Passionate about cloud innovation and continuous security improvement Microsoft Azure Security Engineer Associate or More ❯
Staffordshire, United Kingdom Hybrid / WFH Options
Gleeson Recruitment Group
occasionally lend a hand across IT when needed - so a generalist IT background is helpful too. The environment is Microsoft-focused (Azure, M365, Defender), with Exabeam as the primary SIEM, and you'll play a key part in their journey toward Cyber Essentials Plus certification. The Role Investigate, respond to, and resolve security incidents Shape and improve SIEM monitoring and … in IT Security Engineering or a related technical field Proven hands-on experience with: Microsoft 365 & Azure Security (Defender, Entra ID, Conditional Access) Networking fundamentals (Cisco Meraki, VPNs, segmentation) SIEM (ideally Exabeam) Endpoint securityand EDR/XDR Background in general IT or infrastructure support Excellent communication skills, patient and clear with non-IT users Proactive and self-starting mindset More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Crimson
understanding of network protocols, routing, and switching. * Ability to work in a dynamic and fast-paced environment. * Excellent communication and collaboration skills. * Experience with securityinformationandeventmanagement (SIEM) tools is a plus. Interested?! Send your up-to-date CV to Emma Siwicki at Crimson for review Not interested?! Do you know anyone that might be? Refer a friend More ❯
flows between cloud services and on-prem systems to prevent unauthorized access or data leakage. • Integrate cloud-native security tools ( AWS Macie) for data discovery and classification. Security Monitoring & SIEM: • Integrate with SIEM platforms e.g., Splunk for real-time monitoring and threat detection. • Integrate logs and telemetry from Pega CRM, telephony/contact center platforms, and cloud data services. • Define More ❯
to the team's success. Key Requirements: Vendor certification of the following would be beneficial: VMware, MS Windows System Support, Cisco knowledge – LAN/WAN, Juniper, IP Trade. McAfee SIEMSecurity - SecurityInformation Events Management knowledge IT/ICT further education What we offer: A career at Telent can span many sectors, roles, technologies and clients giving you the opportunity More ❯
Desirable Skills Experience with Azure DevOps and pipelines. Comfortable presenting technical solutions to stakeholders. Exposure to Scaled Agile Framework (SAFe) . Familiarity with or open to learning the ArcSight SIEM toolset (ESM, SmartConnectors, Logger, ArcMC). Tech Stack : Operating Systems : Windows, Linux Tools : VMware, PowerShell, VBScript, Python, Azure DevOps, ArcSight More ❯