London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
paying between £600 - £730/Day Inside IR35. C learance: DV Role Profile: Have experience with dealing with real world threats in the serious and organised crime or cyber threat incidents Have experience in analysing malware behaviour and an ability to identify associated infrastructure Have an excellent understanding of how cyber threat attackers build and use infrastructure to … undertake malicious activity CompTIA Cybersecurity Analyst (CySA+) or a similar certification GIAC Cyber ThreatIntelligence (GCTI) or a similar certification GIAC Reverse Engineering Malware (GREM) or a similar certification Certified Ethical Hacker (CEH) Offensive Security Certified Professional (OSCP) or a similar certification*HM will accept 2 of the above qualifications* Data analysis and visualisation Understanding of Cybersecurity Concepts … and ThreatIntelligence Internet infrastructure/security architecture If you are interested in the above role - Click the "Apply Now" button now for immediate review Cyber Security Analyst, Security Analyst, Security, OSCP, ETHICAL HACKER, Cyber Security Analyst, Cyber Security Analyst, DV CLEARANCE, DV CLEARED, CYBER ATTACK, Cyber Security Analyst As a member of the Disability Confident Scheme, Circle More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Randstad Technologies
Supporting and tuning Microsoft Sentinel and other SIEM platforms (KQL scripting) Managing escalated incidents from L1 analysts and leading full incident response lifecycle (MIM) Conducting in-depth data analysis , threat hunting, and forensic investigations Maintaining and enhancing SOC documentation, SOPs, and playbooks Collaborating with cross-functional teams and contributing to security strategy Ensuring security policies align with standards like … Looking for Someone With: Expert-level SIEM experience (Azure Sentinel highly preferred) Strong knowledge of Kusto Query Language (KQL) Demonstrated experience in cybersecurity incident response & breach handling Familiarity with threatintelligence, vulnerability management , and cloud security tools Proactive mindset with ability to work independently in high-pressure environments Active SC Clearance Ready to make an impact? Apply today More ❯
IR35 - 3 days a week on-site** Key Responsibilities SIEM Management & Optimization: Design, implement, and maintain Microsoft Sentinel workspaces, connectors, analytics rules, and playbooks Develop advanced KQL queries for threat hunting and reporting Optimize SIEM performance, cost, and data retention policies Troubleshoot log ingestion and parsing issues Log Source Integration: Onboard and configure critical log sources (AD, firewalls, servers … cloud infrastructure) Manage event collection and forwarding infrastructure Implement data filtering and custom log parsing Threat Detection & Use Case Development: Develop and refine detection rules based on threatintelligence and attack patterns Continuously improve detection efficacy and reduce false positives Security Monitoring & Incident Response: Monitor systems for anomalies and malicious activity Contribute to threat hunting and More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Crone Corkill
an ad-hoc basis until the move has been completed Maintain Nessus vulnerability management, update systems, run scans and provide reports Cover email security using Mimecast Enterprise Real world threat modelling and incident response (mainly L3/L4 when required) Make suggestions and influence various areas of the business/group from a security perspective Automate tasks and processes … ideal) Microsoft Defender for EDR/XDR/MDR Nessus for vulnerability management Mimecast for email security SCCM/Intune for patch management L3/L4 Incident Response experience ThreatIntelligence/modelling experience Automating tasks using PowerShell, Python etc What’s in it for you? In return you’ll be joining a well established organisation at an More ❯