Our client, a leading technology company, is currently seeking a Security Architect to support a project for BP on a contract basis. This role is ideal for individuals with substantial experience in information security, particularly within Azure environments. Key Responsibilities: Developing and implementing security architectures that align with client requirements Supporting infrastructure deployment and ensuring security best practices Overseeing networking arrangements and ensuring secure configurations Setting up and managing Azure Monitor to enhance securitymonitoring capabilities Collaborating with project stakeholders to identify and mitigate security risks Providing expert advice on security needs and solutions during project development Ensuring compliance with relevant security standards and regulations Documenting security policies, procedures … and guidelines Job Requirements: Significant experience in information security Strong expertise in Azure-based security practices Proficiency in infrastructure deployment and networking within cloud environments Experience with Azure Monitor and securitymonitoring tools Excellent problem-solving and analytical skills Strong communication and interpersonal abilities Ability to work collaboratively within a team environment Contract Details: Start date More ❯
SIEM Engineer Contract - Inside IR35 Duration: March 2026 Reading (Hybrid) Are you a seasoned SIEM (Security Information and Event Monitoring) professional looking to take your career to new heights? If so, this could be the perfect opportunity for you! The company is seeking a talented SIEM Engineer to join their dynamic team and play a pivotal role in … maintaining and enhancing their securitymonitoring platform. As the SIEM Engineer, you will be responsible for ensuring the optimal performance, scalability, and integration of the company's SIEM platform. This includes onboarding log sources, developing analytical rules, creating automation for triage and remediation, and integrating with other IT and Operational Technology platforms. You will collaborate with the wider … team to ensure the SIEM platform meets their day-to-day needs and provide support during incidents as necessary. Key Responsibilities of the SIEM Engineer Develop and maintain the securitymonitoring platform, ensuring it meets the company's evolving security requirements. Participate in infrastructure projects to plan and implement solutions for security monitoring. Design, implement, and More ❯
Role Overview We are seeking a highly skilled Cloud Security Engineer with hands-on experience using Wiz and deep technical expertise across major cloud platforms including AWS, Azure, and GCP . This role is key in strengthening our cloud security posture, managing security incidents, and driving proactive improvements through advanced risk and control measures. You will collaborate … with cross-functional IT, DevOps, and Security teams to identify, assess, and mitigate security risks, leveraging automation and best practices to ensure secure cloud environments across our organization. Key Responsibilities Deploy, configure, and optimize Wiz for continuous cloud securitymonitoring and compliance management. Identify vulnerabilities, misconfigurations, and risks across AWS, Azure, and GCP environments, and drive … remediation efforts. Lead root cause analysis (RCA) for security incidents and coordinate escalations as needed. Partner with software engineering and infrastructure teams to integrate security best practices into CI/CD pipelines and software design. Monitor industry information technology trends to anticipate evolving threats and recommend security strategy enhancements. Participate in change and transformation initiatives to improve More ❯
Security Analyst 3-month contract My Customer is looking for a proactive Security Analyst to join their team and take ownership of monitoring, triaging, and responding to security alerts across their Microsoft security ecosystem. Strong experience troubleshooting and responding to alerts would be the main focus of the role. Strong expertise with Microsoft Defender and … Sentinel is needed. Key Skills & Experience from the Security Analyst: Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in securitymonitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within Sentinel or similar). Understanding of threat detection, log analysis, and … automation within Microsoft s security ecosystem. Experience with Tenable is beneficial Knowledge of Microsoft Purview would be beneficial Key Responsibilities of the Security Analyst: Monitor, investigate, and respond to security alerts and incidents in Microsoft Sentinel and Microsoft Defender . Perform detailed security event analysis and correlation, escalating incidents where necessary. Develop and optimise SOAR (SecurityMore ❯
Milton Keynes, Loughton, Buckinghamshire, United Kingdom
VIQU IT
Security Analyst – 3-month contract My Customer is looking for a proactive Security Analyst to join their team and take ownership of monitoring, triaging, and responding to security alerts across their Microsoft security ecosystem. Strong experience troubleshooting and responding to alerts would be the main focus of the role. Strong expertise with Microsoft Defender and … Sentinel is needed. Key Skills & Experience from the Security Analyst: Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in securitymonitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within Sentinel or similar). Understanding of threat detection, log analysis, and … automation within Microsoft’s security ecosystem. Experience with Tenable is beneficial Knowledge of Microsoft Purview would be beneficial Key Responsibilities of the Security Analyst: Monitor, investigate, and respond to security alerts and incidents in Microsoft Sentinel and Microsoft Defender . Perform detailed security event analysis and correlation, escalating incidents where necessary. Develop and optimise SOAR (SecurityMore ❯
Role: Security Information & Event Monitoring (SIEM) Engineer – **Security Cleared** Location: Reading/Havant – UK Mode: Hybrid (2 days office) Language: English Mandatory - **Clearance: Must be Security Cleared (Active SC)** Job Summary: Looking for an experienced SIEM Engineer to maintain and enhance the SecurityMonitoring platform. Responsible for log onboarding, custom parsers, rule creation, automation … for triage and remediation, and integration with other security tools. Key Responsibilities: Develop and manage the SIEM platform ensuring scalability and performance. Plan and implement solutions for security monitoring. Design and maintain detection rules. Lead and mentor SIEM team. Work closely with Threat Detection & Response team to support incident handling. Required Skills: Proven hands-on experience in SIEM … engineering. Strong understanding of security logs across domains (identity, network, system, data, cloud). Proficient in PowerShell and Python. Good knowledge of SOAR platforms. Leadership and stakeholder management skills More ❯
Infrastructure Security Engineer- Spanish speaking We are currently recruiting for a Infrastructure Security Engineer on a 6 month initial contract. Hybrid basis (2-3 days) They are looking for a candidate to take responsibility for leading, guiding, supporting and delivering secure architectural design for the group cyber security maturity programme. They are also looking for a candidate … who is able to provide advice and recommendations for the programme. Key Skills Support the integration of new cyber security technologies that meets the next generation threats and can be adopted by the group globally You will be required to travel to the local sites, data centre or multiple offices location in order to complete your tasks for off … the network countries. Support global cyber security team to ensure open Continuous Security Improvement Programme (CSIP's) are managed effectively up to closure Information Security Management System (Infrastructure Security Operations). Azure cloud infrastructure and configuration. System Centre Configuration Manager, Operations Manager and Virtual Machine Manager. Microsoft Exchange online Azure and on-premises Active Directory Cyber More ❯
Job Title: SIEM Engineer (Security Cleared) Location: United Kingdom (Must hold active Security Clearance) Job Type: Contract/Permanent Overview: We are seeking an experienced Security Information & Event Monitoring (SIEM) Engineer with active Security Clearance to join our cybersecurity team. The ideal candidate will be responsible for maintaining, developing, and optimizing the SIEM platform — ensuring … plan, and track log integrations. Develop automation for alert triage and incident remediation through SOAR tools. Collaborate with Threat Detection & Response teams to ensure the SIEM platform aligns with securitymonitoring requirements. Participate in infrastructure projects and security tool integrations. Lead and mentor junior SIEM engineers, fostering a culture of continuous improvement. Key Skills & Experience: Active UK … Security Clearance – Essential . Proven hands-on experience as a SIEM Engineer . Strong understanding of security log management across multiple domains (identity, access, network, systems, cloud, and applications). Proficiency in Python and/or PowerShell for data analysis and automation. Experience with SOAR platforms and security automation workflows. Excellent problem-solving, stakeholder management, and collaboration More ❯
Candidate MUST BE SECURITY CLEARED As a Security Information & Event Monitoring (SIEM) Engineer, you are responsible for maintaining the SIEM platform. This includes onboarding log sources, creating custom parsers, developing analytic rules, creating automation for triage and remediation, and integrating with other Information Technology and Operational Technology SSE platforms at pace. You will: Develop the securitymonitoring platform, ensuring optimal performance, scalability, and integration with security tools. Participate in infrastructure projects to develop, plan, and implement solutions for security monitoring. Design, implement, and maintain detection rulesets. Scope, plan, and track log integrations. Guide, develop, and grow the SIEM Engineering team. Collaborate with the wider Threat Detection & Response team to ensure the SIEM … platform meets their day-to-day needs and support incidents as necessary. You have Proven hands-on SIEM Engineering background. Extensive experience working with security logs across multiple domains identity and access, network, system, data, application, cloud and multiple product types. Proficiency in data analysis and scripting languages (e.g., PowerShell, Python). Strong Security Orchestration, Automation and Response More ❯
Employment Type: Contract
Rate: From £350 to £400 per day Contract (InsideIR35)
Analyst (Operational Technology) Outside IR35 Duration: 6 9 months Location: Crawley, Hybrid 2 days per week on site Overview of project: The role of an Incident Response (CSIRT)/Security Operations Centre (SOC) Level 3 Analyst is to respond to high-severity cyber security incidents and/or escalated events and alerts then, using experience combined with industry … forensic analysis across multiple data sources and recommend containment and eradication actions. Crisis Testing: Take part in cyber-attack simulations to strengthen resilience. Reporting: Improve reporting dashboards and key security metrics. Tooling: Support and maintain security tools and platforms for threat prevention, detection and response. Audit: Support SOC2/NCSC CAF/ISO27001 audits and ensure compliance. Continuous … Improvement: Automate and enhance monitoring, detection and response based on evolving threats. Skills, experience and previous achievements required: Essential Extensive End to End Cyber Incident Leadership Experience Extensive SOC L3/CSIRT L3 Experience Extensive CNI/Defence/Business Critical Environment Experience Desirable Threat Hunting Experience Threat Hunting Strategy Mindset Runbook & Playbook Authoring Lessons Learned/Root Cause More ❯
Analyst (Operational Technology) Outside IR35 Duration: 6 – 9 months Location: Crawley, Hybrid 2 days per week on site Overview of project: The role of an Incident Response (CSIRT)/Security Operations Centre (SOC) Level 3 Analyst is to respond to high-severity cyber security incidents and/or escalated events and alerts then, using experience combined with industry … forensic analysis across multiple data sources and recommend containment and eradication actions. Crisis Testing: Take part in cyber-attack simulations to strengthen resilience. Reporting: Improve reporting dashboards and key security metrics. Tooling: Support and maintain security tools and platforms for threat prevention, detection and response. Audit: Support SOC2/NCSC CAF/ISO27001 audits and ensure compliance. Continuous … Improvement: Automate and enhance monitoring, detection and response based on evolving threats. Skills, experience and previous achievements required: Essential Extensive End to End Cyber Incident Leadership Experience Extensive SOC L3/CSIRT L3 Experience Extensive CNI/Defence/Business Critical Environment Experience Desirable Threat Hunting Experience Threat Hunting Strategy Mindset Runbook & Playbook Authoring Lessons Learned/Root Cause More ❯
Warwick, Warwickshire, West Midlands, United Kingdom Hybrid/Remote Options
Sanderson Government and Defence
Security (SIEM) Architect Location: Warwick, Hybrid IR Status: TBC Rate: £600 - £800 Length : 6-12 months, TBC Clearance: Must have active SC clearance. An exciting opportunity has emerged with an organisaiton supplying complex architectural, technical and delivery solutions across the UK Secure Government and Public Sectors. They are looking to bring in a specialist security archietct, with demonstrable … provided the initial scope. Architecture & Design Define and implement SIEM architecture using Elastic Stack (Elasticsearch, Logstash, Kibana, Beats). Design log ingestion pipelines, data models, and correlation rules for security monitoring. Develop observability frameworks integrating logs, metrics, and traces. Implementation & Engineering Deploy and configure ElasticSearch clusters, Kibana dashboards, and Logstash pipelines. Integrate SIEM with cloud-native observability tools (AWS … CloudWatch, Azure Monitor, GCP Operations Suite). Automate log collection and enrichment using Beats, OpenTelemetry, and scripting. Security Use Cases & Threat Detection Build and maintain SIEM use cases, alerts, and dashboards for threat detection. Map detection rules to frameworks like MITRE ATT&CK, STRIDE, and NIST CSF. Collaborate with SOC teams to refine incident response workflows. Governance & Compliance Align More ❯