Our client, a leading technology company, is currently seeking a Security Architect to support a project for BP on a contract basis. This role is ideal for individuals with substantial experience in information security, particularly within Azure environments. Key Responsibilities: Developing and implementing security architectures that align with client requirements Supporting infrastructure deployment and ensuring security best practices Overseeing networking arrangements and ensuring secure configurations Setting up and managing Azure Monitor to enhance securitymonitoring capabilities Collaborating with project stakeholders to identify and mitigate security risks Providing expert advice on security needs and solutions during project development Ensuring compliance with relevant security standards and regulations Documenting security policies, procedures … and guidelines Job Requirements: Significant experience in information security Strong expertise in Azure-based security practices Proficiency in infrastructure deployment and networking within cloud environments Experience with Azure Monitor and securitymonitoring tools Excellent problem-solving and analytical skills Strong communication and interpersonal abilities Ability to work collaboratively within a team environment Contract Details: Start date More ❯
SIEM Engineer Contract - Inside IR35 Duration: March 2026 Reading (Hybrid) Are you a seasoned SIEM (Security Information and Event Monitoring) professional looking to take your career to new heights? If so, this could be the perfect opportunity for you! The company is seeking a talented SIEM Engineer to join their dynamic team and play a pivotal role in … maintaining and enhancing their securitymonitoring platform. As the SIEM Engineer, you will be responsible for ensuring the optimal performance, scalability, and integration of the company's SIEM platform. This includes onboarding log sources, developing analytical rules, creating automation for triage and remediation, and integrating with other IT and Operational Technology platforms. You will collaborate with the wider … team to ensure the SIEM platform meets their day-to-day needs and provide support during incidents as necessary. Key Responsibilities of the SIEM Engineer Develop and maintain the securitymonitoring platform, ensuring it meets the company's evolving security requirements. Participate in infrastructure projects to plan and implement solutions for security monitoring. Design, implement, and More ❯
Security Analyst 3-month contract My Customer is looking for a proactive Security Analyst to join their team and take ownership of monitoring, triaging, and responding to security alerts across their Microsoft security ecosystem. Strong experience troubleshooting and responding to alerts would be the main focus of the role. Strong expertise with Microsoft Defender and … Sentinel is needed. Key Skills & Experience from the Security Analyst: Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in securitymonitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within Sentinel or similar). Understanding of threat detection, log analysis, and … automation within Microsoft s security ecosystem. Experience with Tenable is beneficial Knowledge of Microsoft Purview would be beneficial Key Responsibilities of the Security Analyst: Monitor, investigate, and respond to security alerts and incidents in Microsoft Sentinel and Microsoft Defender . Perform detailed security event analysis and correlation, escalating incidents where necessary. Develop and optimise SOAR (SecurityMore ❯
Milton Keynes, Loughton, Buckinghamshire, United Kingdom
VIQU IT
Security Analyst – 3-month contract My Customer is looking for a proactive Security Analyst to join their team and take ownership of monitoring, triaging, and responding to security alerts across their Microsoft security ecosystem. Strong experience troubleshooting and responding to alerts would be the main focus of the role. Strong expertise with Microsoft Defender and … Sentinel is needed. Key Skills & Experience from the Security Analyst: Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in securitymonitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within Sentinel or similar). Understanding of threat detection, log analysis, and … automation within Microsoft’s security ecosystem. Experience with Tenable is beneficial Knowledge of Microsoft Purview would be beneficial Key Responsibilities of the Security Analyst: Monitor, investigate, and respond to security alerts and incidents in Microsoft Sentinel and Microsoft Defender . Perform detailed security event analysis and correlation, escalating incidents where necessary. Develop and optimise SOAR (SecurityMore ❯
Role: Security Information & Event Monitoring (SIEM) Engineer – **Security Cleared** Location: Reading/Havant – UK Mode: Hybrid (2 days office) Language: English Mandatory - **Clearance: Must be Security Cleared (Active SC)** Job Summary: Looking for an experienced SIEM Engineer to maintain and enhance the SecurityMonitoring platform. Responsible for log onboarding, custom parsers, rule creation, automation … for triage and remediation, and integration with other security tools. Key Responsibilities: Develop and manage the SIEM platform ensuring scalability and performance. Plan and implement solutions for security monitoring. Design and maintain detection rules. Lead and mentor SIEM team. Work closely with Threat Detection & Response team to support incident handling. Required Skills: Proven hands-on experience in SIEM … engineering. Strong understanding of security logs across domains (identity, network, system, data, cloud). Proficient in PowerShell and Python. Good knowledge of SOAR platforms. Leadership and stakeholder management skills More ❯
Infrastructure Security Engineer- Spanish speaking We are currently recruiting for a Infrastructure Security Engineer on a 6 month initial contract. Hybrid basis (2-3 days) They are looking for a candidate to take responsibility for leading, guiding, supporting and delivering secure architectural design for the group cyber security maturity programme. They are also looking for a candidate … who is able to provide advice and recommendations for the programme. Key Skills Support the integration of new cyber security technologies that meets the next generation threats and can be adopted by the group globally You will be required to travel to the local sites, data centre or multiple offices location in order to complete your tasks for off … the network countries. Support global cyber security team to ensure open Continuous Security Improvement Programme (CSIP's) are managed effectively up to closure Information Security Management System (Infrastructure Security Operations). Azure cloud infrastructure and configuration. System Centre Configuration Manager, Operations Manager and Virtual Machine Manager. Microsoft Exchange online Azure and on-premises Active Directory Cyber More ❯
Job Title: SIEM Engineer (Security Cleared) Location: United Kingdom (Must hold active Security Clearance) Job Type: Contract/Permanent Overview: We are seeking an experienced Security Information & Event Monitoring (SIEM) Engineer with active Security Clearance to join our cybersecurity team. The ideal candidate will be responsible for maintaining, developing, and optimizing the SIEM platform — ensuring … plan, and track log integrations. Develop automation for alert triage and incident remediation through SOAR tools. Collaborate with Threat Detection & Response teams to ensure the SIEM platform aligns with securitymonitoring requirements. Participate in infrastructure projects and security tool integrations. Lead and mentor junior SIEM engineers, fostering a culture of continuous improvement. Key Skills & Experience: Active UK … Security Clearance – Essential . Proven hands-on experience as a SIEM Engineer . Strong understanding of security log management across multiple domains (identity, access, network, systems, cloud, and applications). Proficiency in Python and/or PowerShell for data analysis and automation. Experience with SOAR platforms and security automation workflows. Excellent problem-solving, stakeholder management, and collaboration More ❯
Candidate MUST BE SECURITY CLEARED As a Security Information & Event Monitoring (SIEM) Engineer, you are responsible for maintaining the SIEM platform. This includes onboarding log sources, creating custom parsers, developing analytic rules, creating automation for triage and remediation, and integrating with other Information Technology and Operational Technology SSE platforms at pace. You will: Develop the securitymonitoring platform, ensuring optimal performance, scalability, and integration with security tools. Participate in infrastructure projects to develop, plan, and implement solutions for security monitoring. Design, implement, and maintain detection rulesets. Scope, plan, and track log integrations. Guide, develop, and grow the SIEM Engineering team. Collaborate with the wider Threat Detection & Response team to ensure the SIEM … platform meets their day-to-day needs and support incidents as necessary. You have Proven hands-on SIEM Engineering background. Extensive experience working with security logs across multiple domains identity and access, network, system, data, application, cloud and multiple product types. Proficiency in data analysis and scripting languages (e.g., PowerShell, Python). Strong Security Orchestration, Automation and Response More ❯
Employment Type: Contract
Rate: From £350 to £400 per day Contract (InsideIR35)
Analyst (Operational Technology) Outside IR35 Duration: 6 9 months Location: Crawley, Hybrid 2 days per week on site Overview of project: The role of an Incident Response (CSIRT)/Security Operations Centre (SOC) Level 3 Analyst is to respond to high-severity cyber security incidents and/or escalated events and alerts then, using experience combined with industry … forensic analysis across multiple data sources and recommend containment and eradication actions. Crisis Testing: Take part in cyber-attack simulations to strengthen resilience. Reporting: Improve reporting dashboards and key security metrics. Tooling: Support and maintain security tools and platforms for threat prevention, detection and response. Audit: Support SOC2/NCSC CAF/ISO27001 audits and ensure compliance. Continuous … Improvement: Automate and enhance monitoring, detection and response based on evolving threats. Skills, experience and previous achievements required: Essential Extensive End to End Cyber Incident Leadership Experience Extensive SOC L3/CSIRT L3 Experience Extensive CNI/Defence/Business Critical Environment Experience Desirable Threat Hunting Experience Threat Hunting Strategy Mindset Runbook & Playbook Authoring Lessons Learned/Root Cause More ❯
Analyst (Operational Technology) Outside IR35 Duration: 6 – 9 months Location: Crawley, Hybrid 2 days per week on site Overview of project: The role of an Incident Response (CSIRT)/Security Operations Centre (SOC) Level 3 Analyst is to respond to high-severity cyber security incidents and/or escalated events and alerts then, using experience combined with industry … forensic analysis across multiple data sources and recommend containment and eradication actions. Crisis Testing: Take part in cyber-attack simulations to strengthen resilience. Reporting: Improve reporting dashboards and key security metrics. Tooling: Support and maintain security tools and platforms for threat prevention, detection and response. Audit: Support SOC2/NCSC CAF/ISO27001 audits and ensure compliance. Continuous … Improvement: Automate and enhance monitoring, detection and response based on evolving threats. Skills, experience and previous achievements required: Essential Extensive End to End Cyber Incident Leadership Experience Extensive SOC L3/CSIRT L3 Experience Extensive CNI/Defence/Business Critical Environment Experience Desirable Threat Hunting Experience Threat Hunting Strategy Mindset Runbook & Playbook Authoring Lessons Learned/Root Cause More ❯