Skills & Experience: Proven experience in networking and cybersecurity consulting. Strong knowledge of Microsoft 365 securityand compliance features. Hands-on experience with Azure networking andsecurity services. Familiarity with SIEM tools, especially Microsoft Sentinel. Understanding of identity and access management (IAM), MFA, and conditional access. Experience with PowerShell, KQL, and automation tools. Excellent communication and stakeholder management skills. Preferred Certifications More ❯
South West London, London, England, United Kingdom
Tenth Revolution Group
Skills & Experience: Proven experience in networking and cybersecurity consulting. Strong knowledge of Microsoft 365 securityand compliance features. Hands-on experience with Azure networking andsecurity services. Familiarity with SIEM tools, especially Microsoft Sentinel. Understanding of identity and access management (IAM), MFA, and conditional access. Experience with PowerShell, KQL, and automation tools. Excellent communication and stakeholder management skills. Preferred Certifications More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Adecco
security concepts and how to realise these in an ever-enhancing environment Hands on experience and knowledge of Microsoft Azure IaaS Microsoft Defender for Cloud Microsoft Azure RBAC LogRhythm SIEM technologies VMWare VSphere Nutanix HCI Ability to communicate technical concepts and analytical outputs to a diverse set of stakeholders. Creation of adaptable/horizon-based roadmaps for technology components. Previous More ❯
candidates will possess an active DV Security clearance and have a solid background in Cyber Security, with the following skills and experience: Proficiency in SecurityInformationandEventManagement (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Experience in SOC operations, incident response, and forensic More ❯
dealing with informationsecurity issues; ability to apply these in protecting informationsecurity across the organisation. Extensive knowledge of concept, procedures and processes of SecurityInformationandEventManagement (SIEM); ability to utilise related applications to protect organisational networks from cyber risks. Desirable Extensive knowledge of techniques, approaches and processes of digital threats; ability to detect, monitor, analyse and prevent More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Crone Corkill
an ad-hoc basis. What will you do as a Senior Security Engineer? Take over the full lifecycle of Splunk Enterprise Securitymanagement, followed by the ownership of the SIEM once implemented Onboard Splunk log sources, proactively support Splunk, liaise with stakeholders and improve efficiency Partner with the new MSSP as the business transitions – Covering SOC duties on an ad … the business/group from a security perspective Automate tasks and processes to make life easier What skills do you need as a Senior Security Engineer? Splunk Enterprise SecuritySIEM expertise (full lifecycle ideal) Microsoft Defender for EDR/XDR/MDR Nessus for vulnerability management Mimecast for email security SCCM/Intune for patch management L3/L4 Incident More ❯
SIEM Engineer Day Rate: £500pd IR35 Status: Outside Travel: Hybrid London Duration: 6 months This SIEM Engineer will have the previous following experience: Design, implement, and manage SIEM solutions using Splunk, including data onboarding, creating correlation rules, and developing dashboards and reports to improve security visibility. Develop and maintain detection use cases, alerts, and response playbooks based on threat intelligence More ❯
Key Responsibilities Design, develop and deploy detection logic across SIEM, EDR and cloud security platforms. Build detections aligned with frameworks such as MITRE ATT&CK and continuously tune for accuracy and performance. Conduct threat modelling and participate in purple team exercises to assess and improve detection effectiveness. Use Detection-as-Code principles to manage detection rules via version control, CI … tuning, enrichment and contextual awareness. Skills Expertise in detection engineering, threat hunting, or a related Cyber Security field. Proficiency in Sentinel, KQL, XDR and Splunk is required. Experience with SIEM platforms (e.g. Splunk, Sentinel, Elastic), EDR tools (e.g. CrowdStrike, SentinelOne), and/or cloud-native security services (e.g. AWS GuardDuty, GCP Chronicle). Ability to create and iterate on detection … content (e.g. SIEM rules, correlation searches and detection-as-code signatures) to proactively identify malicious behaviour and improve threat visibility and reduce false positives Familiarity with MITRE ATT&CK framework and threat detection lifecycle. More ❯