London, South East, England, United Kingdom Hybrid / WFH Options
Randstad Technologies
Location: United Kingdom 100% Remote? Duration: 6 Months Clearance: Active SC Clearance is required Are you a hands-on Security Engineer with deep expertise in SIEM , Azure Sentinel , and incidentresponse Join a dynamic cyber security team to support a critical national infrastructure (CNI) project involving the deployment of Windows Hello for a major UK utility company. What … You'll Be Doing: Supporting and tuning Microsoft Sentinel and other SIEM platforms (KQL scripting) Managing escalated incidents from L1 analysts and leading full incidentresponse lifecycle (MIM) Conducting in-depth data analysis , threat hunting, and forensic investigations Maintaining and enhancing SOC documentation, SOPs, and playbooks Collaborating with cross-functional teams and contributing to security strategy Ensuring security … MITRE ATT&CK We're Looking for Someone With: Expert-level SIEM experience (Azure Sentinel highly preferred) Strong knowledge of Kusto Query Language (KQL) Demonstrated experience in cybersecurity incidentresponse & breach handling Familiarity with threat intelligence, vulnerability management , and cloud security tools Proactive mindset with ability to work independently in high-pressure environments Active SC Clearance Ready to More ❯
Guildford, Surrey, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
our systems. Key Responsibilities SIEM Management: Monitor and optimize Security Information and Event Management (SIEM) tools like Splunk. Firewall & Proxy Audits: Review configurations and coordinate changes with infrastructure teams. IncidentResponse: Act as part of the Cyber Security IncidentResponse Team (CSIRT) to address threats. Compliance: Ensure alignment with ISO 27001, and other security standards. Risk More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Adecco
Threat Modeling & Risk Assessment: Strong knowledge of security risk management. Cloud & Container Security: Expertise in AWS, Azure, GCP, Docker, and Kubernetes. Security Governance: Experience developing and enforcing security standards. IncidentResponse Leadership: Skilled in leading incidentresponse and root cause analysis. Training & Mentorship: Ability to upskill teams on DevSecOps best practices. Please apply with your updated More ❯
log parsing Threat Detection & Use Case Development: Develop and refine detection rules based on threat intelligence and attack patterns Continuously improve detection efficacy and reduce false positives Security Monitoring & IncidentResponse: Monitor systems for anomalies and malicious activity Contribute to threat hunting and incidentresponse playbooks Provide expert guidance on securing applications and infrastructure Security Advisory More ❯
Center, VPC Service Controls, Azure Security Center, Azure AD, and Microsoft Defender for Cloud. Conduct security assessments, vulnerability scans, and penetration testing. Monitor cloud environments for threats and lead incidentresponse efforts. Integrate security into the CI/CD pipeline and ensure secure configurations. Develop and enforce cloud security policies aligned with regulatory and internal frameworks. Provide guidance … Qualifications 6+ years of experience in cloud or information security. Proven experience securing Google Cloud Platform (GCP) environments. Strong understanding of cloud security principles and native controls. Experience with incidentresponse and threat modelling. Relevant certifications such as: Google Professional Cloud Security Engineer Azure Security Engineer Associate (AZ-500) Certified Cloud Security Professional (CCSP) Key Attributes Strong verbal More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Crone Corkill
basis until the move has been completed Maintain Nessus vulnerability management, update systems, run scans and provide reports Cover email security using Mimecast Enterprise Real world threat modelling and incidentresponse (mainly L3/L4 when required) Make suggestions and influence various areas of the business/group from a security perspective Automate tasks and processes to make … expertise (full lifecycle ideal) Microsoft Defender for EDR/XDR/MDR Nessus for vulnerability management Mimecast for email security SCCM/Intune for patch management L3/L4 IncidentResponse experience Threat Intelligence/modelling experience Automating tasks using PowerShell, Python etc What’s in it for you? In return you’ll be joining a well established More ❯
Defender for Cloud). Conduct regular security assessments, vulnerability scanning, and penetration testing of cloud infrastructure and applications. Monitor cloud environments for security threats, anomalies, and incidents, and lead incidentresponse efforts. Collaborate with development, operations, and compliance teams to integrate security best practices into the CI/CD pipeline and ensure secure configurations. Develop and enforce security … of GCP security services and best practices. Solid understanding of cloud security principles, including shared responsibility model, cloud native security controls, and infrastructure as code security. Experience with security incidentresponse and threat modelling. Google Professional Cloud Security Engineer Azure Security Engineer Associate (AZ-500) Certified Cloud Security Professional (CCSP) This is very much a hands-on role More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Experis
/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. IncidentResponse - Work with security teams to analyze and mitigate security incidents. Custom Rule Creation - Develop and fine-tune detection rules and alerts to identify malicious activities. Security Reporting More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Opus Recruitment Solutions Ltd
practices (e.g., Azure Security Center, Defender for Cloud, Azure Policy). Provide expert guidance on Azure-native security tools including Azure AD, Key Vault, Sentinel, and Microsoft Defender. Lead incidentresponse planning and support investigations related to Azure environments. Stay up to date with evolving Azure security capabilities, threats, and regulatory requirements. Essential Skills & Experience Proven experience as More ❯
and Cloud Apps Bring Azure Policy and Resource Manager knowledge/experience into the team Define and implement security baselines and compliance policies for M365 workloads Lead investigations and incidentresponse leveraging Microsoft security tools Collaborate with cyber security, infrastructure and architecture teams to ensure alignment with overall cloud strategy Required Skills & Experience: Proven expertise in Microsoft More ❯
into actionable engineering guidelines and reusable controls. Ensure AI systems avoid prohibited practices and meet obligations around: Transparency and user awareness Data minimisation and lawful processing Continuous monitoring and incidentresponse Cross-Functional Collaboration & Governance Partner with legal, compliance, and architecture teams to align AI development with enterprise risk and governance frameworks. Contribute to internal working groups on More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Pontoon
MLOps workflows. - Monitor AI systems using Azure Monitor and Application Insights. Policy Implementation & Regulatory Alignment: - Translate regulatory requirements into actionable engineering guidelines. - Ensure compliance with transparency, data minimization, and incidentresponse obligations. Cross-Functional Collaboration & Governance: - Partner with legal, compliance, and architecture teams to align AI development with governance frameworks. - Educate stakeholders on emerging AI risks and mitigation More ❯
assessments, and vulnerability management.* Provide expert guidance on cloud security (AWS, Azure, GCP) and container security (Docker, Kubernetes).* Develop and enforce security policies, standards, and best practices.* Lead incidentresponse and root cause analysis for security-related issues.* Mentor and train teams on DevSecOps principles and tools. Candidates will ideally show evidence of the above in their More ❯
of Scrum SW delivery team. Responsibilities: * Maintain in house private build environment for build and deploy SW for the Business Function, delivering self service capability. Automate deployment, monitoring, and incidentresponse processes using GCP-native tools and technologies.* Develop capabilities which allow Platform Engineering teams to operate with a DevOps ethos.* Collaborate with development teams to optimize application More ❯
proactive performance tuning. Participate in network automation efforts using Python, Ansible, or equivalent tools. Document network topologies, device configurations, and change procedures. Provide L2/L3 on-call support, incidentresponse, and root cause analysis. Skills & Experience Required 5+ years in networking, preferably in a hyperscaler or HPC environment Proficient with L2/L3 protocols, automation tools, and More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
LANCESOFT LTD
and cause crash sources. System generalists profiles. These engineers would be part of an existing team; duties include providing a 1st line diagnostic and resolution of problems with clear incident response. What does a strong candidate look like? Meets Common Job Requirements below and, in addition • Experience with C# • Experience with Unity C# • Experience with tools such as Phabricator More ❯