investigations into security incidents and breaches. Perform root cause analysis and provide actionable recommendations. Conduct static and dynamic malware analysis; reverse engineer to identify IOCs. Monitor, tune, and optimise SIEM tools - particularly IBM QRadar , Splunk, and Microsoft Sentinel. Develop and refine SOC use cases, runbooks, and playbooks. Integrate emerging threat intelligence into monitoring and detection workflows. Liaise with clients, Service More ❯
Qualys or similar platforms). Understanding of Email Security platforms (e.g., Darktrace) andSecurity Awareness & Training platforms. Knowledge of security frameworks (ISO 27001, NIST, GDPR, etc.). Familiarity with SIEM, security system administration, and incident response. Understanding of SOC operations and monitoring. No formal qualifications required, although a security or IT-related certification (e.g., CompTIA Security+, CISSP, CISM) are desirable. More ❯
Birmingham, West Midlands, England, United Kingdom
Robert Walters
Automated security monitoring Lead third-party risk management & vendor security programmes Experience of DevSecOps practises and SDLC Design/Implement security frameworks - ISO 27001, NIST Hands-on experience of SIEM, DLP, IAM, Endpoint Technology The permanent opportunity for a InformationSecurity Manager, will pay a salary up to £85,000 with bonus, based out of the central Birmingham offices - one More ❯
components to ensure visibility and completeness of data collection. Linux Proficiency: Administer and troubleshoot Linux-based systems, with command-line fluency and scripting ability (e.g. Bash, Python) to support SIEM operations, log parsing, and agent deployment. Detection Engineering & Threat Rules: Develop and tune custom detection rules using ESQL, EQL, and Lucene syntax to identify malicious activity. Use MITRE ATT&CK … assist SOC analysts in conducting triage and escalation. SOC Maturity & Policy Development: Contribute to the development of SOC processes and policies, including detection logic lifecycle, alert tuning procedures, andSIEM configuration governance. Play a key role in maturing the operational use of SIEM tooling and automation within the SOC environment. Defence Writing & JSP Familiarity: Prepare formal documentation in line with … Infrastructure environments. Familiarity with security frameworks such as MITRE ATT&CK, NIST CSF, or ISO 27001 including how to map TTP's to Rule coverage. Experience with SOAR or SIEM enrichment tools (e.g., TheHive, MISP, Cortex). Knowledge of additional log forwarding/processing tools (e.g. Elastic Agent, Fluentd). Exposure to vulnerability managementand threat intelligence platforms such as More ❯
Stoke-on-Trent, Staffordshire, England, United Kingdom
Hays Specialist Recruitment Limited
cybersecurity matters, advising senior leadership and collaborating across departments. What We're Looking For Security leadership experience in a complex organisation, ideally with team management responsibilities. Technical security background: SIEM, EDR and vulnerability management tools Strong background in vulnerability and risk management, including scanning, assessing, and mitigating risks. Hands-on experience securing Microsoft environments, covering cloud infrastructure, Active Directory/ More ❯
Warwick, Warwickshire, West Midlands, United Kingdom
Telent Technology Services Ltd
to the team's success. Key Requirements: Vendor certification of the following would be beneficial: VMware, MS Windows System Support, Cisco knowledge - LAN/WAN, Juniper, IP Trade. McAfee SIEMSecurity - SecurityInformation Events Management knowledge IT/ICT further education What we offer: A career at Telent can span many sectors, roles, technologies and clients giving you the opportunity More ❯
to the team's success. Key Requirements: Vendor certification of the following would be beneficial: VMware, MS Windows System Support, Cisco knowledge LAN/WAN, Juniper, IP Trade. McAfee SIEMSecurity - SecurityInformation Events Management knowledge IT/ICT further education What we offer: A career at Telent can span many sectors, roles, technologies and clients giving you the opportunity More ❯
to the team's success. Key Requirements: Vendor certification of the following would be beneficial: VMware, MS Windows System Support, Cisco knowledge LAN/WAN, Juniper, IP Trade. McAfee SIEMSecurity - SecurityInformation Events Management knowledge IT/ICT further education What we offer: A career at Telent can span many sectors, roles, technologies and clients giving you the opportunity More ❯
Birmingham, West Midlands, United Kingdom Hybrid/Remote Options
Oscar Associates (UK) Limited
solutions Contributing to and maintaining CI/CD pipelines Driving ISO 27000 implementation and supporting ongoing compliance initiatives Introducing and managing cybersecurity tools such as vulnerability scanners, endpoint protection, SIEM, and cloud security monitoring solutions Requirements: Extensive experience in a DevOps team lead role using AWS, (IAM, S3, EKS). Experience with IaC such as Terraform.. Cloud formation/CDK More ❯
include: Assisting in monitoring network traffic andsecurity alerts to identify potential threats. Supporting investigations into security incidents, gathering evidence and documenting findings. Using SecurityInformationandEventManagement (SIEM) tools to detect and analyse suspicious activities. Collaborating with the cyber security team to respond to incidents and implement mitigation strategies. Helping maintain and update incident response documentation and procedures. More ❯
Hereford, Herefordshire, West Midlands, United Kingdom Hybrid/Remote Options
Leidos Innovations UK Limited
Management: Plan and execute major database upgrades and periodic patching to maintain system stability. Database Logging & Monitoring: Configure and manage database logs for integration into a SIEM (Securityinformationandeventmanagement) solution for monitoring andsecurity compliance. High Availability & Failover Management: Monitor, maintain and orchestrate manual failover and failback procedures to maintain uptime. Automation & Scripting: Develop scripts using SQL More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid/Remote Options
Context Recruitment Limited
is operational and hands-on, maintaining and enhancing existing tools and controls, monitoring vulnerabilities and ensuring systems are patched and secure. Responsibilities: * Managing and optimising security tools and platforms (SIEM, XDR, IDAM policies etc.) * Monitoring vulnerabilities, investigating incidents and implementing corrective actions * Supporting patching compliance and vulnerability remediation * Ensuring security best practices are applied across networks, applications and systems * Participating … network engineering * Some exposure to, or a growing focus on, cybersecurity and vulnerability management * Understanding of network devices, configurations andsecurity principles * Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) * Confidence to identify issues, suggest improvements and work collaboratively across teams * A genuine passion for cyber security * Certifications such as CISSP, SC More ❯
Consultant, Configure & ensure availability of required logs into Sentinel (such as EDR, Qualys, Firewalls etc), crowd strike and dark trace. Sentinel platform admin Execution of the use cases on SIEM, SOAR & Threat Intelligence. Well versed in Design & Architecture, Cribl (Newly added by client) Deploy down selected(Nozomi) OT Security/IDS platform in the lab infra. Handle OEM communication Test … Consultant, Configure & ensure availability of required logs into Sentinel (such as EDR, Qualys, Firewalls etc), crowd strike and dark trace. Sentinel platform admin Execution of the use cases on SIEM, SOAR & Threat Intelligence. Well versed in Design & Architecture, Cribl (Newly added by client) Deploy down selected(Nozomi) OT Security/IDS platform in the lab infra. Handle OEM communication Test More ❯