Leatherhead, Surrey, England, United Kingdom Hybrid / WFH Options
Sanderson
Firewall/Security Engineer (Palo Alto), Cyber Security, Firewalls, Network Engineer. Location: Surrey (Hybrid - Minimum 2 days on-site) Contract Type: Temporary, Day Rate (Engagement via Umbrella Company Only; all taxes & NI deducted at source). Industry: Global Enterprise Overview: Our client, a prestigious global company based in Surrey, is seeking an experienced Cyber Security and Network … Engineer with a strong background in Palo Alto firewalls . This is a key role that involves maintaining the integrity and security of the company's network infrastructure. Key Responsibilities: Network & SecurityMonitoring: Perform daily monitoring of network infrastructure and cyber security systems to prevent unplanned downtime, security breaches, or vulnerabilities. Network Management: Develop … and support the organization's network, including managing Layer 2/3 devices, LAN/WAN, B2B connections, remote access, load balancing, Wi-Fi, and network performance tools. IT Security Management: Manage IT security systems, including next-generation firewalls, IPS, SIEM tools, endpoint security, and other devices/services. Respond to and analyze security incidents, deploying More ❯
Enfield, Middlesex, England, United Kingdom Hybrid / WFH Options
Eden Brown Synergy
Cyber Security Analyst Eden Brown Synergy are working with a leading local authority based in London who are seeking an experienced Cyber Security Analyst to play a key role in strengthening their cyber security capabilities and ensuring the effective use of Microsoft's Sentinel security information and event management system. This opportunity offers a chance to … contribute to a progressive, security-focused team committed to protecting critical infrastructure and information assets. The role is offered on a hybrid working basis, with a requirement to attend the London office 2 days per week. Key Responsibilities: * Monitor and analyse various security systems to identify, mitigate, and respond to risks and potential threats. * Utilise Microsoft Sentinel and … related tools to analyse security data, detect anomalies, and respond effectively to incidents. * Oversee vulnerability assessments and penetration testing to ensure robust security measures are maintained. * Contribute to the development and execution of incident response plans, ensuring prompt action to contain and remediate security incidents. * Maintain accurate incident logs and reports to support post-incident analysis and More ❯
Security Engineer - SIEM - sought by investment bank based in London - Contract - Hybrid *Inside IR35 - umbrella* Key Responsibilities SIEM Management & Optimization: Design, implement, and maintain Microsoft Sentinel workspaces, connectors, analytics rules, and playbooks Develop advanced KQL queries for threat hunting and reporting Optimize SIEM performance, cost, and data retention policies Troubleshoot log ingestion and parsing issues Log Source Integration: Onboard … and custom log parsing Threat Detection & Use Case Development: Develop and refine detection rules based on threat intelligence and attack patterns Continuously improve detection efficacy and reduce false positives SecurityMonitoring & Incident Response: Monitor systems for anomalies and malicious activity Contribute to threat hunting and incident response playbooks Provide expert guidance on securing applications and infrastructure Security Advisory & Innovation: Support PoCs for new security tools Help define and measure control effectiveness Required Skills & Experience 3+ years in a Security Engineer, SOC Analyst, or similar role Hands-on experience with Microsoft Sentinel and KQL Strong knowledge of Active Directory, Windows/Linux systems, and cloud platforms (Azure, AWS, GCP) Proficiency in scripting (PowerShell, Python) Familiarity More ❯
Security Engineer - SIEM, KQL- sought by investment bank based in London. *Inside IR35 - 3 days a week on-site** Key Responsibilities SIEM Management & Optimization: Design, implement, and maintain Microsoft Sentinel workspaces, connectors, analytics rules, and playbooks Develop advanced KQL queries for threat hunting and reporting Optimize SIEM performance, cost, and data retention policies Troubleshoot log ingestion and parsing issues … and custom log parsing Threat Detection & Use Case Development: Develop and refine detection rules based on threat intelligence and attack patterns Continuously improve detection efficacy and reduce false positives SecurityMonitoring & Incident Response: Monitor systems for anomalies and malicious activity Contribute to threat hunting and incident response playbooks Provide expert guidance on securing applications and infrastructure Security Advisory & Innovation: Support PoCs for new security tools Help define and measure control effectiveness Required Skills & Experience Certifications: AZ-500, SC-200, SC-900, CompTIA Security+, CISSP, GCIA, GCIH, GCFA, CCSP Experience with SOAR playbooks, YARA rules, STIX, and YAML Participation in red/purple team exercises. 3+ years in a Security Engineer, SOC Analyst, or similar More ❯
Worcestershire, United Kingdom Hybrid / WFH Options
Experis
systems manager. Application of operating system and firmware patches, licences and upgrades on a regular basis. Provide technical IT support to members of the development environment system. Perform regular securitymonitoring to enforce the development environment security operating instructions and report any breaches accordingly. Conduct scheduled backup operations and verification to ensure business continuity. Create, administer and More ❯
Join a leading global investment bank as a Senior Cyber Security Analyst, where you'll play a critical role in safeguarding a world-class financial institution. What You'll Do: Responsible for end-to-end incident response operations, including triage, containment, root cause analysis, and post-incident reporting. Perform threat hunting and proactive detection using frameworks like MITRE ATT … playbooks, runbooks, and standard operating procedures to stay aligned with evolving threats and compliance requirements. Hands on with scripting/python to automate and improve the efficiency of the security function. Conduct in-depth technical security investigations and define appropriate mitigation strategies. What You'll Bring: Proven experience in security operations, with strong knowledge of networking, Windows … and Linux Hands-on with security automation; scripting in Python is a strong advantage. Solid understanding of incident response processes, threat intelligence, and security monitoring. Familiarity with frameworks such as MITRE ATT&CK, NIST, and OWASP. Exposure to secure coding practices and DevSecOps environments is a strong plus (not mandatory) Experience working in large enterprise environments and supporting More ❯