London, England, United Kingdom Hybrid / WFH Options
Onyx-Conseil
including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity analysts to detect, mitigate, and analyze threats. Works closely with other … administration of DLP, antivirusantimalware, IDS/IPS, SIEM, SMTP, Email security, AD, Group Policy, DNS, DHCP, and VLANs. • Experience with identity access management solutions, such as SAMLOATH • Experience with HIDS and NIDS • The ideal candidate possesses relevant information security or cybersecurity certifications. • Requires the ability to analyze and recommend changes to the security landscape where necessary to meet the information … Participates in change management meetings and provides expert input to ensure security is maintained. • Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusiondetection and prevention, eDiscovery, and content filtering. • Ability to manage and continuously improve upon vulnerability management program. • Ability to propose solutions for closing identified vulnerabilities More ❯
Zero trust principles (e.g. limiting access to confidential information, limiting remote access to applications, differentiating between corporate and personal devices, trusted endpoints). • Knowledge of endpoint security solutions (e.g. HIDS, anti-malware, file integrity, DLP). • AWS and cloud platforms (e.g. SaaS, IaaS, PaaS). • System administration, supporting multiple platforms and applications. • Skilled in conducting vulnerability scans … and identifying vulnerabilities in systems. • Good awareness of the current Threat Landscape. • Good understanding of modern malware: execution methods, persistence, detection, delivery mechanisms and entry points. • Experience delivering presentations and supporting messaging to leadership teams. • At a minimum, intermediate level of expertise in IT risk management or a related discipline – for example, security, privacy, business continuity management More ❯
London, England, United Kingdom Hybrid / WFH Options
Sumsub
and implement robust infrastructure security measures utilizing modern security solutions such as SIEM platforms, host-basedintrusiondetection systems (HIDS), endpoint detection and response (EDR), AWS Security Hub, vulnerability scanning tools, and intrusiondetection systems (IDS) Proactively research, evaluate, and integrate … security tools/technologies to strengthen infrastructure defences, ensuring alignment with industry best practices and evolving threat landscapes Develop, analyze, and fine-tune SIEM alert configurations to maximize detection accuracy, reduce false positives, and streamline incident response workflows Design, implement, and maintain security automation workflows utilizing Ansible for configuration management, Terraform for infrastructure-as-code, and GitLab More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
N Brown Group
for implementing, managing and enhancing the technology underpinning N Browns cyber security services. Youll have a good understanding of a range of security tools like web application firewalls, intrusiondetection technologies, vulnerability scanners and SIEMs; and the technical knowledge to integrate them to enhance our protection and build automated responses. Youll need a good … correlation searches and dashboards is a plus. Experience of working within PCI DSS, or other compliance frameworks. Software and Technology SIEM (ideally Splunk) & IaaS (AWS, Azure, GCP) Endpoint Detection and Response (EDR) tools such as MS Defender APT. Network and HostIntrusionDetection/Prevention tools Web Application More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
N Brown Group
responsible for implementing, managing and enhancing the technology underpinning N Browns cyber security services. Youll have a good understanding of a range of tools like web application firewalls, intrusiondetection technologies, vulnerability scanners and SIEMs; and the technical knowledge to integrate them to enhance our protection. Youll also need a good understanding of the … you do as a Cyber Security Engineer at N Brown? To identify opportunities to improve efficiency in processes through automation Onboarding and integrating AWS native tools to enable detection and response to incidents, vulnerabilities, misconfigurations, etc in our AWS environments. Developing self-service tools for N Brown's engineering teams To work with other operational departments to … working within PCI DSS, or other compliance frameworks. Software and Technology Coding languages (Python, Teraform) Build pipeline tools (Gitlab, Jenkins) IaaS (AWS, Azure, GCP) & SIEM (ideally Splunk) Endpoint Detection and Response (EDR) tools such as MS Defender APT. Network and HostIntrusionDetection/Prevention tools Web Application More ❯
security posture as well as keeping our application safe from external threats. Our ideal Security Engineer will be able to manage IT-related security issues, such as firewall management, HIDS/HIPS configuration, log monitoring, and audit compliance (SOC II). You will ensure that our software application is both manually and automatically pentested for security vulnerabilities (including Red Team … software infrastructure Assist front-line company representatives with security questions Manage firewall rules and internal pentesting Manage SOC II controls and external pentesting Manage priorities through backlog management system (Jira) Come to work, do great things, then go home! What You Need to Get the Job Done 3+ years experience performing penetration testing (against web applications) Experience More ❯
Great Malvern, England, United Kingdom Hybrid / WFH Options
TieTalent
given day, you might investigate high-priority alerts, analyse logs, or network traffic and endpoint activity using tools like Splunk. Whether you're monitoring security alarms, creating new detection content, using threat intelligence to strengthen our defences, or responding to breaches, each day will begin with a team meeting to review ongoing investigations and plan. Continuous improvement … based on severity and impact. About You You’ll bring a background in cyber security analysis and a passion for IT. Ideally, you’ll have experience with hostintrusiondetection analysis, but don’t worry if that’s an area you’re still developing in - plenty of training will be … months’ experience of working as a Cyber Security/Security Operations Centre Analyst Evidence of experience working in at least one of the following fields: malware analysis, intrusiondetection and incident response Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria will be assessed at CV More ❯
Evesham, England, United Kingdom Hybrid / WFH Options
TieTalent
given day, you might investigate high-priority alerts, analyse logs, or network traffic and endpoint activity using tools like Splunk. Whether you're monitoring security alarms, creating new detection content, using threat intelligence to strengthen our defences, or responding to breaches, each day will begin with a team meeting to review ongoing investigations and plan. Continuous improvement … based on severity and impact. About You You’ll bring a background in cyber security analysis and a passion for IT. Ideally, you’ll have experience with hostintrusiondetection analysis, but don’t worry if that’s an area you’re still developing in - plenty of training will be … months’ experience of working as a Cyber Security/Security Operations Centre Analyst Evidence of experience working in at least one of the following fields: malware analysis, intrusiondetection and incident response Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria will be assessed at CV More ❯
exceed expectations. As a Cybersecurity Engineer you'll oversee incident response, vulnerability management, and cyber threat hunting. You'll execute security solutions applying cutting-edge technologies like firewalls, intrusiondetection and prevention systems, antivirus software, and vulnerability scanners. You will be instrumental in not only addressing threats but also proactively recommending system … e.g. TrendMicro, SeninelOne, CrowdStrike) Ability to achieve SC & NPPV3 Clearances. Preferred Skills and Experience IDS/IPS technologies (e.g. Cisco IDS/Cisco FirePOWER/Cisco FireSIGHT/Symantec HIDS/Carbon Black). o Network analysis tools (e.g. Wireshark, NetworkMiner). Coding and Scripting experience (Bash, SQL, regex, Python). Degree Level qualification(s) in: Computer Science, Computer Security More ❯
Coleford, England, United Kingdom Hybrid / WFH Options
TieTalent
given day, you might investigate high-priority alerts, analyse logs, or network traffic and endpoint activity using tools like Splunk. Whether you're monitoring security alarms, creating new detection content, using threat intelligence to strengthen our defences, or responding to breaches, each day will begin with a team meeting to review ongoing investigations and plan. Continuous improvement … based on severity and impact. About You You’ll bring a background in cyber security analysis and a passion for IT. Ideally, you’ll have experience with hostintrusiondetection analysis, but don’t worry if that’s an area you’re still developing in - plenty of training will be … months’ experience of working as a Cyber Security/Security Operations Centre Analyst Evidence of experience working in at least one of the following fields: malware analysis, intrusiondetection and incident response Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria will be assessed at CV More ❯
Stroud, England, United Kingdom Hybrid / WFH Options
TieTalent
given day, you might investigate high-priority alerts, analyse logs, or network traffic and endpoint activity using tools like Splunk. Whether you're monitoring security alarms, creating new detection content, using threat intelligence to strengthen our defences, or responding to breaches, each day will begin with a team meeting to review ongoing investigations and plan. Continuous improvement … based on severity and impact. About You You’ll bring a background in cyber security analysis and a passion for IT. Ideally, you’ll have experience with hostintrusiondetection analysis, but don’t worry if that’s an area you’re still developing in - plenty of training will be … months’ experience of working as a Cyber Security/Security Operations Centre Analyst Evidence of experience working in at least one of the following fields: malware analysis, intrusiondetection and incident response Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria will be assessed at CV More ❯
Cinderford, England, United Kingdom Hybrid / WFH Options
TieTalent
given day, you might investigate high-priority alerts, analyse logs, or network traffic and endpoint activity using tools like Splunk. Whether you're monitoring security alarms, creating new detection content, using threat intelligence to strengthen our defences, or responding to breaches, each day will begin with a team meeting to review ongoing investigations and plan. Continuous improvement … based on severity and impact. About You You’ll bring a background in cyber security analysis and a passion for IT. Ideally, you’ll have experience with hostintrusiondetection analysis, but don’t worry if that’s an area you’re still developing in - plenty of training will be … months’ experience of working as a Cyber Security/Security Operations Centre Analyst Evidence of experience working in at least one of the following fields: malware analysis, intrusiondetection and incident response Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria will be assessed at CV More ❯
Bredon, England, United Kingdom Hybrid / WFH Options
TieTalent
you’ll be key to protecting our organisation against a range of cyber threats. Your responsibilities include investigating alerts, analysing logs and network traffic, monitoring security alarms, creating detection content, using threat intelligence, responding to breaches, and leading process improvements. You will mentor junior analysts and explore Digital Forensics and security incidents. About You You should have … a background in cyber security analysis and a passion for IT. Experience with hostintrusiondetection, and a solid understanding of Windows and Linux OS are preferred. At least 6 months experience as a Cyber Security or SOC Analyst is required. You should be comfortable working independently and with teams, and More ❯
Killamarsh, England, United Kingdom Hybrid / WFH Options
TieTalent
attacks, and phishing. Daily tasks may involve investigating high-priority alerts, analyzing logs, network traffic, and endpoint activity using tools like Splunk. You will monitor security alarms, create detection content, utilize threat intelligence, and respond to breaches. Each day starts with a team meeting to review ongoing investigations and plan next steps. You will lead efforts to … have a background in cyber security analysis and a passion for IT, with at least 6 months of experience as a Cyber Security or SOC Analyst. Experience with hostintrusiondetection, Windows and Linux OS, and effective communication skills are essential. Leadership experience or delegation responsibilities are advantageous. Training and Development … a Disability Confident Leader, committed to fair recruitment and support. Additional Information Minimum criteria include 6 months of SOC or security analysis experience, and experience in malware analysis, intrusiondetection, or incident response. The role requires UK residency, British citizenship or dual nationality, and the highest security clearance (DV). Considerations for applicants include More ❯