understanding of Azure identity, network security, encryption, and data protection . Experience with security frameworks (SABSA, TOGAF) and enterprise architecture governance. Hands-on familiarity with security tooling such as SIEM, Defender for Cloud, Key Vault, Sentinel, etc. Strong stakeholder engagement and communication skills across business, risk, and technical domains. Experience working within consulting or global programmes is highly advantageous. Full More ❯
within SOC management, within Energy/Construction/Utilities Holds an Active Security Clearance (SC) Hands on leadership and team management skills. Proven experience with Enterprise Technologies (SOC/SIEM/XDR). Strong working knowledge of M365 security features. Familiarity with cloud platforms, in particular Azure and/or AWS. Ability to effectively communicate SOC value to stakeholders through More ❯
Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and stakeholders. Experience with integrating SailPoint solution with other security tools and technologies, including SIEMand PAM solutions is a plus. Experience working with Scrum/Agile Methodologies. Experience working on multi-cultural environment. Office presence according to policies is expected.Demonstrated ability to work independently More ❯
designing and delivering UKAEA's greenfield Identity and Access Management (IAM) and Privileged Access Management (PAM) solutions, while contributing to the development of the SecurityInformationandEventManagement (SIEM) andSecurity Operations Centre (SOC) capabilities. You will lead the IAM/PAM workstreams and provide specialist input into SIEM/SOC implementation, ensuring all solutions align with secure-by … PAM telemetry into SIEM tooling for enhanced visibility and detection. Provide technical oversight and assurance when engaging Managed Service Providers (MSPs) or third-party vendors. Support the development and implementation of SIEM/SOC capabilities, assisting in log source onboarding, alert tuning, and incident response improvements. Mentor and train junior team members, building internal capability in identity and access management. … SC-level national security clearance Desirable o At least a HND in InformationSecurity, Computer Science, or a related STEM field, or equivalent experience. Degree Preferred o Understanding of SIEM/SOC integration and the relationship between IAM telemetry andsecurity monitoring. o Familiarity with ITSM workflows and change control procedures. o Experience conducting security risk assessments for third-party More ❯
designing and delivering UKAEA's greenfield Identity and Access Management (IAM) and Privileged Access Management (PAM) solutions, while contributing to the development of the SecurityInformationandEventManagement (SIEM) andSecurity Operations Centre (SOC) capabilities. You will lead the IAM/PAM workstreams and provide specialist input into SIEM/SOC implementation, ensuring all solutions align with secure-by … PAM telemetry into SIEM tooling for enhanced visibility and detection. Provide technical oversight and assurance when engaging Managed Service Providers (MSPs) or third-party vendors. Support the development and implementation of SIEM/SOC capabilities, assisting in log source onboarding, alert tuning, and incident response improvements. Mentor and train junior team members, building internal capability in identity and access management. … SC-level national security clearance Desirable o At least a HND in InformationSecurity, Computer Science, or a related STEM field, or equivalent experience. Degree Preferred o Understanding of SIEM/SOC integration and the relationship between IAM telemetry andsecurity monitoring. o Familiarity with ITSM workflows and change control procedures. o Experience conducting security risk assessments for third-party More ❯
Sector. Key Requirements: Proven experience working within SOC management, within Energy/Construction/Utilities Hands on leadership and team management skills. Proven experience with Enterprise Technologies (SOC/SIEM/XDR). Strong working knowledge of M365 security features. Familiarity with cloud platforms, in particular Azure and/or AWS. Ability to effectively communicate SOC value to stakeholders through More ❯
Fi, internet, and unified communications. Administer and monitor systems including Windows Server, Azure, Entra ID, Intune, VMWare, VXRail, Rubrik, Commvault , and more. Conduct vulnerability analysis and manage patching using SIEM tools (eg, Rapid7). Collaborate with the security team to ensure proper infrastructure security controls are deployed and maintained. Lead technical troubleshooting and respond to incidents in line with change More ❯
will update you accordingly. Location: 10 South Colonnade, Canary Wharf, E14 4PU - On site negotiable as short term. Essential Criteria for the Role 2+ years in security platforms management (SIEM, SOAR).Expertise in enterprise-level monitoring and supporting large user bases (10,000+ users).Experience in creating/managing security playbooks and knowledge of public sector standards.Experience in Xsiam correlation More ❯
intelligence, cybersecurity operations, or penetration testing Proven ability to work collaboratively with Red/Blue teams andSecurity Operations Centres (SOC) Hands-on experience with TIPs (Threat Intelligence Platforms), SIEM tools, and threat data enrichment solutions Practical exposure to Breach & Attack Simulation (BAS) tools for threat scenario development Strong knowledge of adversary TTPs, MITRE ATT&CK, and modern threat modelling More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
inside IR35 - Due to the service of the role, it will now be based on an Umbrella solution. Essential skills/experience required: 2+ years in security platform management ( SIEM, SOAR ). Expertise in enterprise-level monitoring and supporting large user bases (10,000+ users). Experience in creating/managing security playbooks and knowledge of public sector standards. Experience … adjustments at any point during the recruitment process or if there is a better way for us to communicate, please do let us know. Cyber, Security, Cybersecurity, Infosecurity, InfoSec, SIEM, SecurityInformationEventManagement, SOAR, Security Orchestration Automation Response, XSIAM, Extended Security Intelligence Automation Management, Security Check, Sc Level, Sc Cleared, Sc Clearance, Security Cleared, Security Clearance, Security Vetting Clearance More ❯
of governance artefacts. You will also engage with engineering teams and managed service providers (MSPs) to ensure that OT security controls are effectively designed, implemented, and sustained. Experience with SIEM/SOC integration is valuable and considered desirable. Accountabilities: Lead the design and delivery of the OT Security Strategy, policies, and standards. Define governance processes for OT security, ensuring alignment … third-party security service providers. o Strong communication and documentation skills, particularly in policy/standards creation. o Eligible for SC-level national security clearance. Desirable o Familiarity with SIEM/SOC integration for OT environments. o Experience with OT asset discovery, monitoring, andsecurity tool deployment. o Exposure to regulatory compliance in critical infrastructure (e.g., NIS Directive, UK CAF More ❯
of governance artefacts. You will also engage with engineering teams and managed service providers (MSPs) to ensure that OT security controls are effectively designed, implemented, and sustained. Experience with SIEM/SOC integration is valuable and considered desirable. Accountabilities: Lead the design and delivery of the OT Security Strategy, policies, and standards. Define governance processes for OT security, ensuring alignment … third-party security service providers. o Strong communication and documentation skills, particularly in policy/standards creation. o Eligible for SC-level national security clearance. Desirable o Familiarity with SIEM/SOC integration for OT environments. o Experience with OT asset discovery, monitoring, andsecurity tool deployment. o Exposure to regulatory compliance in critical infrastructure (e.g., NIS Directive, UK CAF More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
NonStop Consulting Ltd
week in London office) Essential Experience: As an associate security analyst you will triage and investigate cyber security alerts and reports from users experience using security tools (e.g., EDR, SIEM) to support the investigation and response to cyberincidents Experience with SIEM tools (experience of Splunk preferred but experience of Microsoft Sentinel or anequivalent SIEM tool is acceptable) Experience in AWS More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
NonStop Consulting Ltd
We are currently recruiting for a Senior Security Engineer with experience in SIEM/SOAR that is eager to join UK GOV department - SC Cleared envionmen t for a short term contract until end of the year 2025 About the role: Work in the Monitoring and Integration Platform Team and deliver against the initial phase of the security monitoring project … onboarding several critical services that are proactively monitored by the in-house SOC (Security Operations Centre). Essential Experience: 2+ years in security platforms management (SIEM, SOAR). Enterprise-level monitoring and supporting large user bases (10,000+ users). Create/manage security playbooks and knowledge of public sector standards. Experience in Xsiam correlation/playbooks and Cortex XDR More ❯
assisting a client who operate in a regulated industry, financial services, who are currently embarking a programme of work focused on maturity/designing and implementing security posture utilising SIEM tools such as Google Chronicle & implementing UEBA/SOAR (Security Orchestration, Automation, and Response/User and Entity Behaviour Analytics) built on GCP/Google Cloud so Google SecOps/… Security Operations experience is highly desirable. Key Responsibilities; - Enable and validate UEBA alerting within Chronicle SIEM, based on log sources - Deliver a minimum viable UEBA capability with tested detection logic - Provide engineering support to accelerate onboarding of log sources required for UEBA enrichment and detection fidelity - Demonstrate the ability to work with Google Chronicle and SecOps APIs, specifically for the … Design and implement detection use cases aligned to MITRE ATT&CK framework - Enable SOAR integration by identifying high-fidelity detections and mapping Key Technical/IT Security Skills; - Chronicle SIEM - Google SecOps - UEBA Tooling - Windows Event Logs - BindPlane - MITRE ATT&CK - Strong SOC background - SOAR playbooks - GCP Finer Details; - Outside IR35 - Contract until End of December, possibly longer - Hybrid More ❯
assisting a client who operate in a regulated industry, financial services, who are currently embarking a programme of work focused on maturity/designing and implementing security posture utilising SIEM tools such as Google Chronicle & implementing UEBA/SOAR (Security Orchestration, Automation, and Response/User and Entity Behaviour Analytics) built on GCP/Google Cloud so Google SecOps/… Security Operations experience is highly desirable. Key Responsibilities; - Enable and validate UEBA alerting within Chronicle SIEM, based on log sources - Deliver a minimum viable UEBA capability with tested detection logic - Provide engineering support to accelerate onboarding of log sources required for UEBA enrichment and detection fidelity - Demonstrate the ability to work with Google Chronicle and SecOps APIs, specifically for the … Design and implement detection use cases aligned to MITRE ATT&CK framework - Enable SOAR integration by identifying high-fidelity detections and mapping Key Technical/IT Security Skills; - Chronicle SIEM - Google SecOps - UEBA Tooling - Windows Event Logs - BindPlane - MITRE ATT&CK - Strong SOC background - SOAR playbooks - GCP Finer Details; - Outside IR35 - Contract until End of December, possibly longer - Hybrid More ❯
growth, collaboration, and working on cutting-edge projects that truly matter. What You Will Do: - Monitor, investigate, and analyse insider-related alerts and activities across advanced security platforms, including SIEM, DLP, UEBA, and EDR. - Identify patterns, anomalies, and behaviours that could indicate insider threats such as data exfiltration, fraud, or misuse of privileges. - Conduct thorough behavioural risk assessments by combining … equivalent practical experience. - At least three years of experience in cybersecurity operations, insider threat programmes, SOC, or similar investigative roles. - Familiarity with insider risk tools and technologies such as SIEM, DLP, UEBA, and EDR. - Strong analytical and investigative skills, with the ability to communicate findings effectively to technical and non-technical stakeholders. - A high level of integrity and discretion when More ❯