Bristol, Avon, England, United Kingdom Hybrid / WFH Options
Sanderson
operating systems (Windows, Linux, macOS), and common enterprise applications. Expertise in analysing network traffic (e.g., packet analysis with Wireshark). Proficiency with security tools such as SIEM (e.g., Splunk, QRadar), EDR (e.g., CrowdStrike, SentinelOne) and threat intelligence platforms. Strong scripting skills in at least one language (e.g., Python, PowerShell). Solid understanding of the MITRE ATT&CK framework and More ❯
role). What You’ll Bring 3–5 years’ experience in a SOC environment (Tier 2-level maturity). Hands-on experience with SIEM platforms (Sentinel/Splunk/QRadar or similar). Strong understanding of incident response and threat investigation. Comfortable working autonomously in a developing function Relevant certifications (Security+, CEH, GCIA, CISSP or similar). Package Salary More ❯
role). What You’ll Bring 3–5 years’ experience in a SOC environment (Tier 2-level maturity). Hands-on experience with SIEM platforms (Sentinel/Splunk/QRadar or similar). Strong understanding of incident response and threat investigation. Comfortable working autonomously in a developing function Relevant certifications (Security+, CEH, GCIA, CISSP or similar). Package Salary More ❯
role). What You’ll Bring 3–5 years’ experience in a SOC environment (Tier 2-level maturity). Hands-on experience with SIEM platforms (Sentinel/Splunk/QRadar or similar). Strong understanding of incident response and threat investigation. Comfortable working autonomously in a developing function Relevant certifications (Security+, CEH, GCIA, CISSP or similar). Package Salary More ❯
. What You'll Bring 3-5 years' experience in a SOC environment (Tier 2-level maturity preferred). Hands-on experience with SIEM platforms (Sentinel/Splunk/QRadar or similar). Strong understanding of incident response and threat investigation. Comfortable working autonomously in a developing function Relevant certifications (Security+, CEH, GCIA, CISSP or similar). Package Salary More ❯