managing OT alerts and incidents. The ideal candidate will have a deep understanding of SecOps, IT, and OT environments, with responsibilities including incident management, threatdetection, and security improvement. Strong communication skills are essential for collaboration with cross-functional teams. Key Responsibilities Contextualise OT Specific Threats: Understand OT … Microsoft Sentinel, SOAR, EDR/XDR, and PAM; reduce alert fatigue and improve incident resolution times. Proactive Risk Remediation: Identify and evaluate risks; perform threat hunting; demonstrate risk reduction metrics. Incident Readiness & Response: Lead incident triage and response; reduce business impact; educate staff on incident procedures. Continuous Improvement: Drive More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Cohesity
to secure, protect, manage, and derive value from data across data centers, edge, and cloud, with a focus on cybersecurity threats, immutable backups, AI threatdetection, and rapid recovery. Recognized globally for innovation, product strength, and design simplicity, Cohesity is shaping the future of data security. Join us More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
Skye Business Solutions
log integration. Research, test and advise clients on audit configuration settings for log sources, to ensure that the right logs flow into Sentinel for threat detection. Deploy data connectors and troubleshoot data ingestion, including deployment of Function Apps, customisation and enhancement of Function App code where required, and development … Rule fine-tuning, and integration of applicable changes from upstream rule repositories into our repo. Collaborate with Analysts and client cybersecurity professionals to refine detection strategies, improve detection accuracy and reduce false positives. Analyse security logs from various sources including cloud platforms services, firewalls, intrusion detection systems … Solid experience working with security logs across multiple domains - identity and access, network, system, data, application, cloud - and multiple product types, e.g. firewalls, intrusion detection systems, VPN, web application firewalls, web and email filtering, identity directories and SSO, endpoint protection and EDR, and other security tools. Strong understanding of More ❯