Qualifications We're looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like Carbon Black, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and container technologies (e.g., Docker) Threat Hunting More ❯
Qualifications We're looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like Carbon Black, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and container technologies (e.g., Docker) Threat Hunting More ❯
Qualifications We're looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like Carbon Black, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and container technologies (e.g., Docker) Threat Hunting More ❯
Automation, and Response (SOAR), Security Information and Event Management (SIEM, particularly Splunk and/or Splunk Cloud), firewalls, and other core security products. (e.g. Crowdstrike, Carbon Black, Splunk, and/or the Microsoft security technologies) A solid working knowledge of Windows Azure Active Directory, Windows OS, Mac OS, Virtualization More ❯
Automation, and Response (SOAR), Security Information and Event Management (SIEM, particularly Splunk and/or Splunk Cloud), firewalls, and other core security products. (e.g. Crowdstrike, Carbon Black, Splunk, and/or the Microsoft security technologies) A solid working knowledge of Windows Azure Active Directory, Windows OS, Mac OS, Virtualization More ❯
Automation, and Response (SOAR), Security Information and Event Management (SIEM, particularly Splunk and/or Splunk Cloud), firewalls, and other core security products. (e.g. Crowdstrike, Carbon Black, Splunk, and/or the Microsoft security technologies) A solid working knowledge of Windows Azure Active Directory, Windows OS, Mac OS, Virtualization More ❯
security, cloud security (AWS/Azure/GCP), encryption, IAM, endpoint protection, and SIEM solutions . Hands-on experience with tools such as Splunk, CrowdStrike, Qualys, Nessus, Palo Alto, Fortinet, or similar . Solid understanding of security frameworks and standards: NIST, CIS Controls, ISO 27001 , and compliance mandates relevant More ❯
security, cloud security (AWS/Azure/GCP), encryption, IAM, endpoint protection, and SIEM solutions . Hands-on experience with tools such as Splunk, CrowdStrike, Qualys, Nessus, Palo Alto, Fortinet, or similar . Solid understanding of security frameworks and standards: NIST, CIS Controls, ISO 27001 , and compliance mandates relevant More ❯
security, cloud security (AWS/Azure/GCP), encryption, IAM, endpoint protection, and SIEM solutions . Hands-on experience with tools such as Splunk, CrowdStrike, Qualys, Nessus, Palo Alto, Fortinet, or similar . Solid understanding of security frameworks and standards: NIST, CIS Controls, ISO 27001 , and compliance mandates relevant More ❯
security, cloud security (AWS/Azure/GCP), encryption, IAM, endpoint protection, and SIEM solutions . Hands-on experience with tools such as Splunk, CrowdStrike, Qualys, Nessus, Palo Alto, Fortinet, or similar . Solid understanding of security frameworks and standards: NIST, CIS Controls, ISO 27001 , and compliance mandates relevant More ❯
in cyber operations, with exposure to incident response, vulnerability management, and security reporting Hands-on knowledge of tools such as: Microsoft Defender, Azure, Purview CrowdStrike Firewalls (e.g., Palo Alto, FortiGate) KnowBe4 You'll be responsible for the triage of SOC alerts and incidents, working with 3rd parties. Managing vulnerabilities More ❯
in cyber operations, with exposure to incident response, vulnerability management, and security reporting Hands-on knowledge of tools such as: Microsoft Defender, Azure, Purview CrowdStrike Firewalls (e.g., Palo Alto, FortiGate) KnowBe4 You'll be responsible for the triage of SOC alerts and incidents, working with 3rd parties. Managing vulnerabilities More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
resilient and secure environments. Cloud Security Operations : Securely manage Azure, M365 & AWS security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and enforce robust IAM policies … Management: Expertise in managing vulnerabilities across diverse assets and implementing application security in cloud environments. Security tooling: experience in any of the following; (Wiz, CrowdStrike, Proofpoint, BitSight, Akamai, CATO) Experience with security engineering, incident response, threat hunting, or digital forensics. Preferred Qualifications: Relevant cybersecurity certifications such as CISSP, CISM More ❯
security technologies Strong communication and prioritization skills Experience with Microsoft, VMware, Cloud, WAN/LAN, and PC hardware Knowledge of firewall, AV, patching, EDR (CrowdStrike preferred) Familiar with IT operations and security impact on business Working towards or certified in SC-200, CCFA, AZ-500, CEH, CISA, or Security+ More ❯
Exeter, Devon, South West, United Kingdom Hybrid / WFH Options
Pro Education - Plymouth
highly desirable). Solid understanding of TCP/IP, DNS, DHCP, SSL, 2FA, and AD. Familiarity with VMware/ESXi, SCCM/MECM, Veeam, CrowdStrike, and Cortex XDR is a plus. Excellent troubleshooting, communication, and time-management skills. Proactive, collaborative mindset with a flexible and methodical approach. Please note More ❯
environment Experience working with industry-leading security operations tools (e.g., CyberXM, Rapid7, Qualys, Tenable, Prisma, Snyk, Veracode, Wiz, Orca, Tanium, Splunk, QRadar. Carbon Black, CrowdStrike, ProofPoint, Cisco, etc) Required Certifications: ServiceNow Certified Implementation Specialist certification in one or more of the following: Risk and Compliance Third-party Risk Management More ❯
environment Experience working with industry-leading security operations tools (e.g., CyberXM, Rapid7, Qualys, Tenable, Prisma, Snyk, Veracode, Wiz, Orca, Tanium, Splunk, QRadar. Carbon Black, CrowdStrike, ProofPoint, Cisco, etc) Required Certifications: ServiceNow Certified Implementation Specialist certification in one or more of the following: Risk and Compliance Third-party Risk Management More ❯
environment Experience working with industry-leading security operations tools (e.g., CyberXM, Rapid7, Qualys, Tenable, Prisma, Snyk, Veracode, Wiz, Orca, Tanium, Splunk, QRadar. Carbon Black, CrowdStrike, ProofPoint, Cisco, etc) Required Certifications: ServiceNow Certified Implementation Specialist certification in one or more of the following: Risk and Compliance Third-party Risk Management More ❯
Exeter, Devon, United Kingdom Hybrid / WFH Options
TieTalent
IP, DNS, DHCP, Active Directory, SSL, 2FA. Knowledge of Windows Server, SCCM/MECM, virtual networks (ESXi, VMware), and backup/security tools (Veaam, CrowdStrike, Cortex XDR) is advantageous. Experience with IP telephony and MS Office 365 suite is beneficial. Strong troubleshooting, communication, and user support skills. Flexibility for More ❯
advantageous. Knowledge of and experience in virtual network technologies, specifically ESXi and VMware configuration and administration is preferred. Knowledge of and experience in Veaam, CrowdStrike and Cortex XDR configuration and administration would be advantageous. Knowledge of IP telephony systems would be advantageous. Experience of Office 365, Teams, OneDrive, SharePoint More ❯