Slough, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
and incident response. Key Responsibilities: Lead security assessments and provide expert guidance on risk mitigation Design and implement robust security controls across systems and networks Support incident response and threatdetection activities Collaborate with DevOps and infrastructure teams on secure design and delivery Advise clients on best practices aligned with industry standards and frameworks Requirements: Proven experience in More ❯
of cloud adoption. Technical Leadership & Delivery Support Act as a technical mentor for development teams, ensuring best practices in cloud solution implementation. Oversee cloud security controls, including access management, threatdetection, and incident response strategies. Troubleshoot and resolve complex cloud infrastructure and application architecture challenges. Your Profile Essential skills/knowledge/experience: Cloud Expertise: Extensive hands-on …/CD automation. Deep understanding of transitioning strategies from legacy to cloud-native applications. Security & Compliance - Strong understanding of cloud security controls, IAM, compliance frameworks (GDPR, SOC2, NIST), and threat mitigation strategies. Strategic Collaboration - Experience working with CIOs and IT leaders to define digital transformation roadmaps. TOGAF Certification Microsoft Azure Solutions Architect SABSA (Security Architecture) AWS Certified Solutions Architect More ❯
standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threatdetection and response. Collaborate with internal stakeholders and external agencies to maintain a strong security posture. Provide cybersecurity training and guidance to staff and students. Lead cybersecurity projects More ❯
Slough, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
unparalleled access to Microsoft’s security product roadmap, security previews, and frontline support. You'll work at the forefront of cyber defence, directly contributing to investigations involving nation-state threat actors (including IR, CH, and NK based campaigns) while refining your skills across enterprise-scale log ingestion and customised Sentinel integration engineering. This role offers opportunities to ingest complex … Role You'll own and optimise enterprise-wide log onboarding into Microsoft Sentinel – deploying standard and custom connectors, Function Apps, and parsers to build tailored SIEM solutions that enhance threatdetection and response. Log ingestion at scale across hybrid and multi-cloud environments Enhance custom Function Apps and ingestion pipelines Parse, normalise, and optimise log telemetry for precision … and cost efficiency Partner with IR teams on real attacks, tuning rules against live threat actor activity Collaborate with Microsoft teams to develop advanced detection capabilities Contribute to internal knowledge bases and engineering standards Requirements Experience building and integrating complex Microsoft Sentinel solutions at SMC and enterprise levels Understanding of security telemetry across identity, endpoint, cloud, and network More ❯
Slough, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
on your shift, while also delivering advanced security operations services to clients across a range of industries. As a Senior SOC Analyst , you will be central to incident response, threat hunting , and real-time defence management , guiding and mentoring two junior SOC analysts. The SOC team is deeply committed to leveraging the latest in automation and artificial intelligence, including … and investigating incidents, fostering a culture of collaboration and continuous learning. Client Relationship Management: Act as a point of contact, managing ongoing communications and ensuring technical needs are met ThreatDetection & Analysis: Triage and analyse alerts across multiple SIEM platforms (e.g., Microsoft Sentinel, custom ELK stacks). Log & Threat Intelligence Analysis: Perform detailed log analysis and threat intelligence research to uncover root causes and bolster security defences. Technical Reporting: Deliver clear, client-focused reports on incidents, alerts, and threat activity. Escalation Handling: Manage critical escalations with precision and provide comprehensive, well-documented resolutions. SOC Innovation: Work with leadership to enhance operational efficiency and integrate emerging technologies. Incident Management: Lead security incident investigations and responses, offering More ❯
lead in customer-facing engagements, translating complex security needs into effective solution architectures Design Zero Trust-aligned network and endpoint architectures, including segmentation, micro-segmentation, NAC, and DNS-layer threat protection Lead conversations around network modernization, helping clients evolve from legacy architectures to software-defined, cloud-integrated, and policy-driven network designs Deliver workshops, product demonstrations, and proof-of … endpoint protection and EDR platforms such as CrowdStrike, SentinelOne, Microsoft Defender, or Tanium Familiarity with DNS security tools and strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture, lateral movement prevention, and alignment to frameworks like MITRE ATT&CK and NIST CSF Excellent communication skills with the ability to influence … as the technical lead in pre-sales engagements focused on network and endpoint security. Conduct client discovery sessions, workshops, and assessments with an emphasis on segmentation strategies, visibility, and threat defence. Deliver compelling technical presentations and product demonstrations to both technical and business audiences. Design and validate secure architectures incorporating network segmentation/micro segmentation, DNS-layer protection, and More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
This position requires a deep understanding of SecOps concepts, technologies, and best practices, specifically across IT and OT environments. You will be tasked with ensuring robust incident management, proactive threatdetection, and continuous improvement of our security posture. Strong communication and collaboration skills are essential as you will work closely with cross-functional teams to mitigate risks and … investigate and resolve incidents. Proactive Risk Remediation: • Identify, analyse, and evaluate security risks, applying a risk-based approach to implement appropriate and proportionate controls. • Perform proactive activities such as threat hunting to uncover vulnerabilities and ensure continuous risk reduction. • Provide tangible metrics to demonstrate risk reduction and reduced technical debt. Incident Readiness & Response: • Lead the incident triage and response More ❯
Reading, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
access to Microsoft’s security product roadmap, security previews, and frontline support. You'll work at the front line of cyber defense, directly contributing to investigations involving nation-state threat actors (including IR, CH, and NK based campaigns) while refining your craft across enterprise-scale log ingestion and customized Sentinel integration engineering that will stretch your skills, give you … ll own and optimize enterprise-wide log onboarding into Microsoft Sentinel – deploying standard and custom connectors, Function Apps, and parsers to build tailored SIEM solutions that drive real-world threatdetection and response. Log ingestion at scale across numerous hybrid and multi-cloud environments Enhance custom Function Apps and ingestion pipelines Parse, normalize, and optimize log telemetry to … ensure precision and cost control Partner with IR teams on real attacks – tuning rules against live threat actor activity Sync closely with Microsoft teams to build cutting-edge detection capabilities Contribute to internal knowledge base and help shape engineering standards What's needed? Experience building and integrating complex Microsoft Sentinel at SMC and enterprise levels Understanding of security More ❯
Abingdon, England, United Kingdom Hybrid / WFH Options
e2e-assure
stay safe online and provide support and guidance when attacks happen. Deal with security alerts, investigating and analysing them and collaborating with colleagues and customers until they are closed. Threat hunting, threatdetection and assessing potential issues and incidents. Creating alerts and rules for detection of potential vulnerabilities, issues, and incidents. Tuning existing security alerts to … fix issues, reduce false positives and improve efficiency. Communicating with customers and reporting any relevant issues to them. Generating actionable and useful threat intelligence. Perform vulnerability scans, reviewing and validating the results and communicating these to stakeholders. Collaborating with customers to provide relevant training and review sessions, supporting them to achieve proactive and practical security. Candidate Attributes: Ability to More ❯
wide Job Description: Role Lead the design, deployment and tuning of enterprise-grade SIEM platforms (e.g. Splunk, Azure Sentinel etc.) Collaborate with stakeholders to define logging requirements, use cases, detection rules and dashboards Oversee integration of data sources from cloud, on-prem, endpoint, network and application layers Create and maintain detection rules, correlation logic and alerts tailored to … specific threat scenarios Provide technical leadership and mentorship to team members Work closely with SOC teams to align SIEM capabilities with business objectives Conduct SIEM health checks, performance tuning and capacity planning Skills Expertise in SIEM design, deployment and optimisation Hands-on expertise with one or more major SIEM platforms (e.g. Splunk, Sentinel etc.) Deep understanding of log ingestion … parsing, normalisation and enrichment Strong grasp of MITRE ATT&CK framework, threatdetection and alert logic Experience with cloud logging and monitoring (AWS CloudTrail, Azure Monitor, GCP etc.) Experience with threat modelling, cloud security or Identity and Access Management is desirable #J-18808-Ljbffr More ❯
technologies , ideally coming from an XSOAR background , and possessing strong experience across XDR and SIEM environments. This is a key role within our security operations function, focused on enhancing detection, automation, and response capabilities. *For this role you must be eligible for SC Clearance* Key Responsibilities Implement and configure Palo Alto Networks XSIAM to improve SOC efficiency and visibility … Design and manage security automation workflows , drawing from previous XSOAR experience Integrate and optimize XDR capabilities to support proactive threatdetection Set up and maintain SIEM-style log ingestion , correlation rules, and enrichment pipelines Build custom dashboards and reporting tools for real-time security insights Troubleshoot complex issues related to XSIAM , XSOAR, and related integrations Ensure seamless integration … Clearance Desirable Qualifications Palo Alto certifications (PCNSE, XSIAM/XSOAR certifications highly preferred) Experience with cloud security platforms (AWS, Azure, GCP) Previous work in a SOC environment Exposure to threat hunting methodologies and tools This is a fantastic opportunity to work on the biggest XSIAM project in the UK working with cutting edge technology. My client are happy to More ❯
technologies , ideally coming from an XSOAR background , and possessing strong experience across XDR and SIEM environments. This is a key role within our security operations function, focused on enhancing detection, automation, and response capabilities. *For this role you must be eligible for SC Clearance* Key Responsibilities Implement and configure Palo Alto Networks XSIAM to improve SOC efficiency and visibility … Design and manage security automation workflows , drawing from previous XSOAR experience Integrate and optimize XDR capabilities to support proactive threatdetection Set up and maintain SIEM-style log ingestion , correlation rules, and enrichment pipelines Build custom dashboards and reporting tools for real-time security insights Troubleshoot complex issues related to XSIAM , XSOAR, and related integrations Ensure seamless integration … Clearance Desirable Qualifications Palo Alto certifications (PCNSE, XSIAM/XSOAR certifications highly preferred) Experience with cloud security platforms (AWS, Azure, GCP) Previous work in a SOC environment Exposure to threat hunting methodologies and tools This is a fantastic opportunity to work on the biggest XSIAM project in the UK working with cutting edge technology. My client are happy to More ❯
Oxford, England, United Kingdom Hybrid / WFH Options
Sophos Group
bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. In addition to MDR and other services, Sophos’ complete portfolio includes industry-leading endpoint, network, email, and cloud security that … interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threatdetection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide … defending more than 600,000 organizations worldwide from phishing, ransomware, data theft, other every day and state-sponsored cybercrimes. The solutions are powered by historical and real-time threat intelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available at www.sophos.com. Role Summary: This More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Free-Work UK
architecture and infrastructure. Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identity and access management, encryption, and threat detection. Monitor and manage detection contracts to ensure timely identification and resolution of security incidents. Automate infrastructure provisioning, deployment, and management using Infrastructure as Code (IaC) tools. Perform … VPC, IAM, CloudFormation, and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identity and access management, encryption, and threat detection. Experience with detection contracts and monitoring tools to identify and respond to security incidents. Proficiency in scripting languages such as Python, Bash, or PowerShell. Familiarity with Infrastructure More ❯
Abingdon, Oxfordshire, United Kingdom Hybrid / WFH Options
Sophos Group
bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. In addition to MDR and other services, Sophos' complete portfolio includes industry-leading endpoint, network, email, and cloud security that … interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threatdetection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide … defending more than 600,000 organizations worldwide from phishing, ransomware, data theft, other every day and state-sponsored cybercrimes. The solutions are powered by historical and real-time threat intelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available at . Role Summary At More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Sophos Group
bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. In addition to MDR and other services, Sophos' complete portfolio includes industry-leading endpoint, network, email, and cloud security that … interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threatdetection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide … defending more than 600,000 organizations from phishing, ransomware, data theft, and other everyday and state-sponsored cybercrimes. The solutions are powered by historical and real-time threat intelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available at . Role Summary The Customer More ❯
investigate security alerts using tools such as Splunk, Microsoft Defender, and CrowdStrike, escalating incidents as needed and ensuring timely resolution. Leverage Microsoft Co-pilot and automation workflows to streamline threatdetection, incident triage, and response processes. Conduct in-depth log analysis and correlation across multiple data sources to identify potential security threats and reduce false positives. Support threat hunting and root cause analysis efforts, providing detailed documentation and recommendations based on findings. Collaborate with L1 analysts, engineering teams, and threat intelligence functions to enhance detection capabilities and improve overall SOC effectiveness. More ❯
Slough, England, United Kingdom Hybrid / WFH Options
RDK Consulting
in the offices near Slough. This is a blended role, combining aspects of several established cyber security role types and is hands-off technical. It will consist of: A threat intelligence aspect, limited to using open source, publicly available information. Strong investigative ability is a must. Partly a traditional Cyber Security Awareness role, ability to communicate technical information with … Work with colleagues in data protection, privacy and government relations areas to cross share information with the EMEA cyber security community Work with the EMEA SOC team to support threatdetection engineering activities Develop and maintain the information sharing platforms (Teams and SharePoint) Act as a member of the EMEA incident response team, under the direction of the More ❯
with traffic retermination, deep packet inspection, and encrypted traffic analysis. Awareness of automation tools and frameworks (e.g., Ansible, Terraform, Python scripting). A strong security mindset, with familiarity in threatdetection, data protection, and compliance. Excellent troubleshooting, documentation, and communication skills. Diversity: At Opticore IT we embrace diversity and are committed to equal opportunities. We actively recruit for More ❯
identify needs and implement suitable security measures. Configure, manage, and monitor security policies within Strata Cloud Manager. Utilize Strata’s IoT Security features for device segmentation, policy enforcement, and threat detection. Employ AI-powered capabilities in Strata for automated policy analysis and remediation. Secure industrial networks and devices effectively. Understand OT/IoT protocols and apply security best practices … vulnerabilities in plant automation systems. Design and implement IDMZ architectures to isolate and secure IoT/OT devices. Use firewalls and other security appliances for effective network segmentation and threat containment. Understand segmentation in OT/plant environments. Be knowledgeable about industrial automation, SCADA/HMI systems, and their security implications. Develop incident response procedures specific to OT environments. More ❯
from data - across the data center, edge, and cloud. Cohesity helps organizations defend against cybersecurity threats with comprehensive data security and management capabilities, including immutable backup snapshots, AI-based threatdetection, monitoring for malicious behavior, and rapid recovery at scale. We've been named a Leader by multiple analyst firms and have been globally recognized for Innovation, Product More ❯
from data — across the data center, edge, and cloud. Cohesity helps organizations defend against cybersecurity threats with comprehensive data security and management capabilities, including immutable backup snapshots, AI-based threatdetection, monitoring for malicious behavior, and rapid recovery at scale. We’ve been named a Leader by multiple analyst firms and have been globally recognized for Innovation, Product More ❯