vulnerability management best practices. Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel), vulnerability scanners (e.g., Nessus, Qualys), and other security platforms. Relevant certifications such as CISSP, CISM, CEH, GIAC, or GCIA are highly desirable. Excellent problem-solving, communication, and team leadership skills. Ability to work under pressure and manage multiple priorities effectively. Preferred Skills: Experience in regulated industries More ❯
priority, and impact, while making recommendations for efficient remediation. Experience in network security principles, firewalls, and access control mechanisms. Preferred Qualifications: - Industry certifications such as CompTIA Security+, CISSP, CISM, CEH, or GIAC are highly desirable. To apply, please submit your latest CV for review. More ❯
KQL queries, analytic rules, data connectors, workbooks, etc. Proficiency with LogRhythm SIEM : AI Engine rules, SmartResponse, log source integration. Certifications such as Microsoft SC-200 , LogRhythm Certified Professional , CEH , GCIA , or CISSP are a plus. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
CySA+) or a similar certification GIAC Cyber Threat Intelligence (GCTI) or a similar certification GIAC Reverse Engineering Malware (GREM) or a similar certification CertifiedEthicalHacker (CEH) Offensive Security Certified Professional (OSCP) or a similar certification*HM will accept 2 of the above qualifications* Data analysis and visualisation Understanding of Cybersecurity Concepts and Threat Intelligence Internet More ❯