remediation. Knowledge of security frameworks, such as NIST, ISO 27001, or similar. Excellent communication skills, with the ability to clearly convey technical details to diverse audiences. Previous experience in SIEM/SOAR within large-scale, complex environments. Familiarity with other security tools and technologies. Desirable Skills: Relevant certifications (e.g., CISSP, CEH, Microsoft Certified: Security, Compliance, and Identity Fundamentals) a plus. More ❯
looking to expand their influence in a dynamic environment while fostering a secure digital future. Key Skills Proficiency in security frameworks (ISO 27001, NIST, etc.) Experience with security tools (SIEM, firewalls, intrusion detection systems) Strong knowledge of network security protocols and best practices Familiarity with cloud security (AWS, Azure, or GCP) Understanding of compliance regulations (GDPR, PCI-DSS) Experience 3+ More ❯
practices and emerging technologies Support the development and implementation of secure-by-design principles across projects Security platform engineering and projects Experience/Competences Essential Experience implementing vulnerability management, SIEM, PAM, IDS/IPS, EDR, DLP, CNAPP and AV platforms Intermediate level knowledge of incident response processes for OS and network level events Comfortable with Windows and Linux operating systems More ❯
of network protocols (TCP/IP) andsecurity practices (IPSec, SSL-VPN, NAT, GRE). Hands-on experience with cloud infrastructure operations and troubleshooting customer tech stacks. Familiarity with SIEM tools, vulnerability management, malware analysis, and firewall configurations. Ability to communicate complex technical solutions to a wide range of audiences, both technical and non-technical. Skilled in Python, JSON, YAML More ❯
of network protocols (TCP/IP) andsecurity practices (IPSec, SSL-VPN, NAT, GRE). Hands-on experience with cloud infrastructure operations and troubleshooting customer tech stacks. Familiarity with SIEM tools, vulnerability management, malware analysis, and firewall configurations. Ability to communicate complex technical solutions to a wide range of audiences, both technical and non-technical. Skilled in Python, JSON, YAML More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Copello
systems. The Role The Principal Security Analyst will support busy pods on more complex issues, lead and coordinate threat hunting activities, perform and lead vulnerability assessment activities and perform SIEM-based event analysis, incident triage and coordinate incident response activities. Furthermore, the Principal Security Analyst will actively collaborate with other analysts and enhance the teams effectiveness through ownership of relevant More ❯
regulated or high-trust industries). Hands-on expertise in cloud security (preferably AWS), including securing hybrid and multi-region architectures. Practical knowledge of security tooling: IDS/IPS, SIEM, vulnerability scanners, encryption, SAST/DAST tools, OWASP ZAP, etc. Strong understanding of network security protocols and best practices. Scripting and automation experience (e.g. Python). Proven experience with incident More ❯
in a similar role within a banking or financial services environment . Strong knowledge of network security, cloud security (AWS/Azure/GCP), encryption, IAM, endpoint protection, andSIEM solutions . Hands-on experience with tools such as Splunk, CrowdStrike, Qualys, Nessus, Palo Alto, Fortinet, or similar . Solid understanding of security frameworks and standards: NIST, CIS Controls, ISO More ❯
effectively communicate information internally and to customers Facilitate root cause investigations and manage the implementation of corrective and preventative measures Qualifications Previous experience with Endpoint Security software is required SIEM experience, including - Deep understanding of how SIEMs works Experience in creating custom collections and data parsing Experience in creating complex correlation rules, reports and dashboard Experience in integration and implementation More ❯
to resolve complex issues Essential Skills & Experience: Strong background in Security Engineering or SecOps (non-cloud) Windows infrastructure experience Proficient in Microsoft Defender - implementation, tuning, and usage Experience with SIEM tools and incident response Security certifications such as CISSP, Security+, or Ethical Hacking Confident communicator with sharp analytical thinking This is a permanent role and will be based in the More ❯
of scripts in Python JavaScript or PowerShell is a plus Experience with security design and architecture, content development, workload automation and use-cases Experienced with technologies such as EDR, SIEM, SOAR, NGFW and their ecosystems Familiarity with cloud technologies, providers (such as GCP, AWS, Azure) Familiarity with attack surface management is a plus Experience in customer-facing roles (internal or More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Iceberg
CK, and Kill Chain methodologies. About You: Proven experience in Cyber Security, with a focus on incident response, security monitoring, and threat intelligence. Strong knowledge of security technologies, including SIEM tools, network security, IAM solutions, and DLP tools. Hands-on experience with incident investigation tools and network protocol analysis (e.g., Wireshark). Familiarity with cloud security assessments and industry benchmarks More ❯
CK, and Kill Chain methodologies. About You: Proven experience in Cyber Security, with a focus on incident response, security monitoring, and threat intelligence. Strong knowledge of security technologies, including SIEM tools, network security, IAM solutions, and DLP tools. Hands-on experience with incident investigation tools and network protocol analysis (e.g., Wireshark). Familiarity with cloud security assessments and industry benchmarks More ❯
london, south east england, united kingdom Hybrid / WFH Options
Iceberg
CK, and Kill Chain methodologies. About You: Proven experience in Cyber Security, with a focus on incident response, security monitoring, and threat intelligence. Strong knowledge of security technologies, including SIEM tools, network security, IAM solutions, and DLP tools. Hands-on experience with incident investigation tools and network protocol analysis (e.g., Wireshark). Familiarity with cloud security assessments and industry benchmarks More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Iceberg
CK, and Kill Chain methodologies. About You: Proven experience in Cyber Security, with a focus on incident response, security monitoring, and threat intelligence. Strong knowledge of security technologies, including SIEM tools, network security, IAM solutions, and DLP tools. Hands-on experience with incident investigation tools and network protocol analysis (e.g., Wireshark). Familiarity with cloud security assessments and industry benchmarks More ❯
vulnerabilities. What We're Looking For Strong knowledge of audit & compliance frameworks (ISO 27001, Cyber Essentials, GDPR, DORA). Experience with CSOC tools such as Rapid7 InsightIDR or other SIEM solutions. Hands-on experience with internal/external audits and compliance assessments. Relevant security/audit certifications (CISA, CISM, CISSP, ISO 27001 Lead Auditor, Cyber Essentials Assessor, or equivalent). More ❯
at least 3 years in a leadership or managerial role. Strong knowledge of ISO 27001, ISAE 3402, and related frameworks. Experience with security technologies such as XDR, MDR, EDR, SIEM, NAC, IDS/IPS, and SASE. Proven background in incident response, risk management, and ISMS operation. Essential Skills Demonstrated leadership and team management experience. Strong analytical and problem-solving skills. More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
degree in Cybersecurity, Information Technology, Computer Science, or a related field. •Basic knowledge of cybersecurity principles, including threat detection, risk management, and incident response. •Familiarity with security tools like SIEM systems, firewalls, or endpoint protection is a plus. •Strong analytical and problem-solving skills. •Excellent communication skills with the ability to explain technical concepts to non-technical audiences. •A proactive More ❯
implementing a robust and trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities andMore ❯
implementing a robust and trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities andMore ❯
implementing a robust and trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities andMore ❯
london (city of london), south east england, united kingdom
InterQuest Group
implementing a robust and trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities andMore ❯
implementing a robust and trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities andMore ❯
knowledge transfer to customer teams and junior consultants. Maintain up-to-date knowledge of security trends, technologies, and regulatory compliance frameworks. Support broader security initiatives such as integration with SIEM, EDR, and cloud-native controls. Requirements: Minimum7 yearsof experience in network or cybersecurity engineering, with a focus onenterprise firewall deployments. Strong expertise inPalo Alto/Fortinet FortiGatetechnologies. Proficient in usingTufinto More ❯
preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM solutions Understanding of common frameworks, such as ITIL or LEAN is preferred Good exposure of user environment management, including desktops/laptops, profile More ❯