Microsoft Purview. • Proven expertise in Microsoft Sentinel and Office 365 E5 security products. • Strong understanding of Azure services, including Azure AD, Defender for Cloud, and Logic Apps. • Experience with SIEM/SOAR platforms, KQL, and automation workflows. • Familiarity with compliance frameworks: ISO 27001, NIST, PCI-DSS, GDPR. • Excellent communication and stakeholder engagement skills. • Certifications such as SC-100, AZ More ❯
Essentials+ certification. Administrative requirements of PAM tool. (CyberArk) Experience Experience administrating PAM solutions, such as CyberArk - MANDATORY Working understanding of security operations, threat detection, and incident response. Experience using SIEMandsecurity tooling for triage and log analysis. Experience tracking and managing vulnerabilities using industry frameworks. Familiarity with enterprise systems including Microsoft 365 and Azure AD. Experience working in a More ❯
for apprentice security analysts, providing coaching, mentoring, and line management. What We’re Looking For 2-3 years’ experience investigating and responding to cyber incidents. Hands-on use of SIEM tools (Splunk preferred, Microsoft Sentinel or equivalent acceptable). Experience with EDR solutions to support incident investigation. Understanding of threat actor tools, techniques, and procedures (TTPs). Strong analytical andMore ❯
responsibilities: Design and own the architecture for ServiceNow SecOps modules - including Security Incident Response, Vulnerability Response, Threat Intelligence, and Configuration Compliance. Lead integration of ServiceNow with key cybersecurity tools: SIEM, SOAR, EDR, CMDB, threat intelligence platforms, and OT/ICS systems. Collaborate across cybersecurity, IT, engineering, and energy operations to define secure workflows and automation for vulnerability and incident response. More ❯
oversight, you will also act as technical lead on several high-impact initiatives, including but not limited to: Global EDR consolidation (Microsoft Defender) MFA rollout Implementation of a new SIEM platform Key Responsibilities Lead the delivery of cyber security projects such as endpoint protection, vulnerability management, identity & access management, and network security. Develop and manage project plans, milestones, risks, andMore ❯
Sector. Key Requirements: Proven experience working within SOC management, within Energy/Construction/Utilities Hands on leadership and team management skills. Proven experience with Enterprise Technologies (SOC/SIEM/XDR). Strong working knowledge of M365 security features. Familiarity with cloud platforms, in particular Azure and/or AWS. Ability to effectively communicate SOC value to stakeholders through More ❯
Employment Type: Contract
Rate: £600.0 - £800.0 per day + up to £800 per day (Inside IR35)
Sector. Key Requirements: Proven experience working within SOC management, within Energy/Construction/Utilities Hands on leadership and team management skills. Proven experience with Enterprise Technologies (SOC/SIEM/XDR). Strong working knowledge of M365 security features. Familiarity with cloud platforms, in particular Azure and/or AWS. Ability to effectively communicate SOC value to stakeholders through More ❯
intelligence, cybersecurity operations, or penetration testing Proven ability to work collaboratively with Red/Blue teams andSecurity Operations Centres (SOC) Hands-on experience with TIPs (Threat Intelligence Platforms), SIEM tools, and threat data enrichment solutions Practical exposure to Breach & Attack Simulation (BAS) tools for threat scenario development Strong knowledge of adversary TTPs, MITRE ATT&CK, and modern threat modelling More ❯
Proven track record in CyberArk upgrades and custom integrations. Excellent communication and stakeholder engagement skills. Desirable Experience in financial services or banking environments. Familiarity with Sentinel, Defender XDR, andSIEM integrations. CyberArk Defender & Sentry certifications. Please apply within for further details - Matt Holmes, Harvey Nash More ❯
Proven track record in CyberArk upgrades and custom integrations. Excellent communication and stakeholder engagement skills. Desirable Experience in financial services or banking environments. Familiarity with Sentinel, Defender XDR, andSIEM integrations. CyberArk Defender & Sentry certifications. Please apply within for further details - Matt Holmes, Harvey Nash More ❯
deploy Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) solutions to secure internet-bound and internal application traffic. Integrate Zscaler Services : Work with enterprise infrastructure like identity providers, SIEM platforms, firewalls, and endpoint security tools to implement a zero-trust framework. Manage Zscaler Configurations : Maintain configurations, including policy setup, app connectors, authentication profiles, and access control to ensure secure More ❯
have a proven background in Cyber Security, with the following skills and experience: Experience in SOC operations, incident response, and forensic analysis. Proficiency in SecurityInformationandEventManagement (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Ability to perform triage of security events to More ❯
clearance and have a solid background in Cyber Security working within a high-threat government environment, with the following skills and experience: Proficiency in SecurityInformationandEventManagement (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Experience in SOC operations, incident response, and forensic More ❯
and have a solid background in Cyber Security Engineering working within a high-threat government environment, with the following skills and experience: Proficiency in SecurityInformationandEventManagement (SIEM), including tools such as Splunk, Defender, Sentinel, ELK, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Experience in Protective Monitoring & SOC operation More ❯
assisting a client who operate in a regulated industry, financial services, who are currently embarking a programme of work focused on maturity/designing and implementing security posture utilising SIEM tools such as Google Chronicle & implementing UEBA/SOAR (Security Orchestration, Automation, and Response/User and Entity Behaviour Analytics) built on GCP/Google Cloud so Google SecOps/… Security Operations experience is highly desirable. Key Responsibilities; - Enable and validate UEBA alerting within Chronicle SIEM, based on log sources - Deliver a minimum viable UEBA capability with tested detection logic - Provide engineering support to accelerate onboarding of log sources required for UEBA enrichment and detection fidelity - Demonstrate the ability to work with Google Chronicle and SecOps APIs, specifically for the … Design and implement detection use cases aligned to MITRE ATT&CK framework - Enable SOAR integration by identifying high-fidelity detections and mapping Key Technical/IT Security Skills; - Chronicle SIEM - Google SecOps - UEBA Tooling - Windows Event Logs - BindPlane - MITRE ATT&CK - Strong SOC background - SOAR playbooks - GCP Finer Details; - Outside IR35 - Contract until End of December, possibly longer - Hybrid More ❯