requirements for critical assets. Analyse and extend Dynatrace coverage across complex applications. Configure, optimise, and automate monitoring within the Dynatrace toolset. Provide AI-driven insights (via Davis AI) for anomalydetection, root cause analysis, and proactive recommendations. Support operational resilience by embedding observability standards and best practices. Engage in workshops with third-party suppliers to review and … improve observability standards. TECH STACK/REQUIREMENTS Strong expertise in Dynatrace (SaaS & On-Premises) including: Application Performance Monitoring AnomalyDetection Profiles Alerting Rules & Profiles Synthetic & Log Monitoring Real User Monitoring (RUM) DQL & Grail for advanced data analytics API integrations with complex systems Experience working in resilience/observability engineering. Strong communication skills and ability to work in More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
Defender, Microsoft Sentinel, and Google Chronicle, with a strong focus on playbook development, analytical rule creation, and threat modelling. You will be instrumental in building and optimizing our detection and response strategies. Job Duties SIEM Engineering & Management Deploy, configure, and maintain … SIEM platforms (Splunk, QRadar, Sentinel, Defender, Chronicle). Onboard and normalize log sources across cloud and on-prem environments. Develop and optimize analytical rules for threat detection, anomalydetection, and behavioural analysis. Skills Must be able to obtain SC Clearance or already hold SC clearance. SIEM Expertise: Hands-on experience with at least two of More ❯
London, Old Bailey, United Kingdom Hybrid / WFH Options
Morson Talent
within the SOC, responsible for handling escalations from Tier 1 and Tier 2 analysts and managing the most complex security incidents. You will lead deep-dive investigations, improve detection and response processes, and play a key role in stakeholder engagement. Key responsibilities include: Analysing advanced security incidents, determining root cause and attack paths. Leading incident response activities across … will bring: Significant experience in SOC operations and cyber incident response. Strong knowledge of adversary TTPs and frameworks such as MITRE ATT&CK. Hands-on skills in log analysis, anomalydetection, and incident remediation. Experience working in traditional IT and cloud (Azure and/or AWS) environments. Strong communication skills with the ability to translate technical threats More ❯
key business services. Utilize Splunk ES for security event monitoring and correlation searches. Automate tasks and integrate systems using Python, Shell, or Perl scripting. Perform root cause analysis and anomalydetection by analyzing complex log data. Requirements: 10+ years experience in observability, with deep expertise in Splunk, especially ITSI. Proficiency in Scripting (Shell/PowerShell/Python More ❯
suppliers to review observability standards. What You'll Need: * The ability to demonstrate your extensive experience in designing and configuring the following within Dynatrace: o Application performance monitoring o Anomalydetection profiles o Alerting rules and alert profiles o Synthetic monitoring o Log monitoring o Real User Monitoring (RUM) to capture and analyse end-user experience across More ❯
party software suppliers to review observability standards.What You'll Need:* The ability to demonstrate your extensive experience in designing and configuring the following within Dynatrace:o Application performance monitoringo Anomalydetection profileso Alerting rules and alert profileso Synthetic monitoringo Log monitoringo Real User Monitoring (RUM) to capture and analyse end-user experience across web and mobile applications.o More ❯