Northampton, Northamptonshire, England, United Kingdom Hybrid / WFH Options
PLANET RECRUITMENT SERVICES LTD
Manager, Infrastructure Team, DevOps, and Compliance Teams to ensure the security of our infrastructure and data. Key Responsibilities: Monitor and analyse security alerts from various tools such as WAF, SIEM, IDS/IPS, firewalls, and endpoint protection platforms. Investigate and respond to security incidents, including containment, eradication, and recovery. Conduct vulnerability assessments and coordinate remediation efforts. Perform threat hunting andMore ❯
San Antonio, Texas, United States Hybrid / WFH Options
BridgePhase, LLC
investigations into high-priority security incidents, including malware analysis and reverse engineering to determine intent and impact, and provide root cause analysis and remediation guidance to system teams. Leverage SIEM platforms and threat intelligence feeds to identify patterns, indicators of compromise (IOCs), and trends. Perform vulnerability scans, assist with patch tracking, and maintain POA&M documentation. Collaborate with cyber engineers … Preferred Experience and Qualifications: 3-5 years of experience in cybersecurity analysis or security operations, including defending AWS-hosted environments and Internet-facing web services. Hands-on experience with SIEM platforms, log analysis, and basic incident response techniques. Experience developing detection content such as alerts, dashboards, and correlation rules to support threat monitoring. Familiarity with malware analysis and reverse engineering More ❯
and modern frameworks (e.g., Django, Node.js , React). Expert-level scripting and automation skills (e.g., Python, Bash, PowerShell) for workflow automation, tooling, and log analysis. Proficient in log analysis, SIEM usage/configuration, threat hunting, and querying tools to support detection and response. Familiarity with static and dynamic analysis techniques and vulnerability mitigation. Strong understanding of modern cloud platforms-especially … OSCP, GCIH, GWAPT, or CISSP. Familiarity with security frameworks such as NIST CSF, MITRE ATT&CK, OWASP ASVS, or ISO 27001. Experience with commercial security tools such as EDR, SIEM, CSPM, CNAPP, vulnerability scanners, bug bounty platforms, WAFs, or compliance automation platforms. Prior experience driving security engineering for a SaaS-based company. Experience leveraging automation or AI/ML tools More ❯
Florissant, Missouri, United States Hybrid / WFH Options
Centene
knowledge of cybersecurity concepts and threat vectors. Proficiency in scripting (Python, PowerShell, etc.) for data analysis and automation. Experience with data normalization, correlation, andevent analysis. Deep understanding of SIEM technologies, data pipelines, andeventmanagement processes. Knowledge of SIEM platforms and their integration with UEBA solutions. Experience with machine learning models for threat detection and behavioral analytics. Hands-on More ❯
Columbia, Missouri, United States Hybrid / WFH Options
Centene
knowledge of cybersecurity concepts and threat vectors. Proficiency in scripting (Python, PowerShell, etc.) for data analysis and automation. Experience with data normalization, correlation, andevent analysis. Deep understanding of SIEM technologies, data pipelines, andeventmanagement processes. Knowledge of SIEM platforms and their integration with UEBA solutions. Experience with machine learning models for threat detection and behavioral analytics. Hands-on More ❯
Kansas City, Missouri, United States Hybrid / WFH Options
Centene
knowledge of cybersecurity concepts and threat vectors. Proficiency in scripting (Python, PowerShell, etc.) for data analysis and automation. Experience with data normalization, correlation, andevent analysis. Deep understanding of SIEM technologies, data pipelines, andeventmanagement processes. Knowledge of SIEM platforms and their integration with UEBA solutions. Experience with machine learning models for threat detection and behavioral analytics. Hands-on More ❯
Jefferson City, Missouri, United States Hybrid / WFH Options
Centene
knowledge of cybersecurity concepts and threat vectors. Proficiency in scripting (Python, PowerShell, etc.) for data analysis and automation. Experience with data normalization, correlation, andevent analysis. Deep understanding of SIEM technologies, data pipelines, andeventmanagement processes. Knowledge of SIEM platforms and their integration with UEBA solutions. Experience with machine learning models for threat detection and behavioral analytics. Hands-on More ❯
Saint Louis, Missouri, United States Hybrid / WFH Options
Centene
knowledge of cybersecurity concepts and threat vectors. Proficiency in scripting (Python, PowerShell, etc.) for data analysis and automation. Experience with data normalization, correlation, andevent analysis. Deep understanding of SIEM technologies, data pipelines, andeventmanagement processes. Knowledge of SIEM platforms and their integration with UEBA solutions. Experience with machine learning models for threat detection and behavioral analytics. Hands-on More ❯
St. Louis, Missouri, United States Hybrid / WFH Options
Centene
knowledge of cybersecurity concepts and threat vectors. Proficiency in scripting (Python, PowerShell, etc.) for data analysis and automation. Experience with data normalization, correlation, andevent analysis. Deep understanding of SIEM technologies, data pipelines, andeventmanagement processes. Knowledge of SIEM platforms and their integration with UEBA solutions. Experience with machine learning models for threat detection and behavioral analytics. Hands-on More ❯
security, including firewalls, WAF, anti-virus, and O365 compliance & security centre . Familiarity with NIST (CSF Framework 2.0), ISO 27001, PCI-DSS, and GDPR . Experience operating and managing SIEM solutions , vulnerability management tools, and secure configuration tooling. Ability to use PowerShell and Python scripting for security automation. Experience working in or with agile and/or SecOps oriented teams More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
Security: Implement and monitor DNS security solutions to prevent cyber threats. Incident Response: Formulating and documenting a solid process utilising a 3rd party support partner Security Monitoring & Logging: Develop SIEM solutions, logging strategies, and real-time threat intelligence. Monitor, audit, and improve infrastructure security posture using automated tooling. Policy & Procedures: Define and enforce security policies, incident response strategies, and structured … with Terraform for IaC security automation. Knowledge of DevOps pipelines (CI/CD) andsecurity hardening. Deep understanding of PCI DSS compliance, security frameworks, and audit processes. Familiarity with SIEM solutions, security orchestration platforms, and log management. Strong experience with incident response planning, threat detection, and mitigation. Ability to define security policies, procedures, and structured action plans for compliance andMore ❯
Falls Church, Virginia, United States Hybrid / WFH Options
Epsilon Inc
and procedures to protect organizational assets and data. Conduct regular vulnerability assessments and penetration tests to identify and remediate security weaknesses. Monitor and analyze security alerts and reports using SIEM tools to proactively detect threats and anomalies. Investigate security incidents, coordinate with relevant stakeholders, and document findings for continuous improvement. Collaborate with cross-functional teams to integrate security best practices … informationsecurity or a closely related field. DOD 8570 IAT Level II Certification may be required (GSEC, GICSP, CND, CySA+, Security+ CE, SSCP or CCNA-Security). Proficiency with SIEM platforms (e.g., Splunk, QRadar) and vulnerability scanning tools (e.g., Nessus). Practical knowledge of security frameworks such as NIST, ISO 27001, and SOC 2. Hands-on experience with common securityMore ❯
desirable. Minimum 5 years experience in Information Security. Proficiency in security frameworks like NIST, implementing and auditing security measures. Knowledge of Cisco networking, firewalls, VPN, DLP, IDS/IPS, SIEM, and related technologies. Experience with identity access management solutions such as SAML, OAuth. Relevant security certifications (e.g., CISSP, CISM, CEH) are highly desirable. Ability to analyze and recommend security improvements. More ❯
maintain secure architectures for infrastructure, cloud, applications, and identity services. Provide high-level technical support and troubleshooting for complex security incidents and system issues. Advise on security technologies including SIEM, EDR, firewalls, IAM, PAM, and cloud-native security tools. Collaborate closely with engineering and operations teams to embed security into system designs and processes. Evaluate and recommend new security tools … ISO/IEC 27001/27002 and MITRE ATT&CK. Hands-on experience with cloud security (AWS, Azure, or GCP), IAM/PAM, network and endpoint protection. Proficiency with SIEMand monitoring tools (e.g., Microsoft Sentinel, Elastic Stack, Splunk, QRadar), and understanding of incident response. Strong knowledge of cybersecurity principles including threat modeling, zero trust, and defense-in-depth. Understanding More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Aerospace Corporation
TIA, Security+, GCFA, GDAT Proven experience successfully deploying or administering cybersecurity policies and technologies for an enterprise environment In-depth, hands-on experience working with SecurityInformation & EventManagement (SIEM) platforms and defensive cybersecurity technologies such as intrusion and detection, malware prevention or data loss prevention systems Prior experience securing the enterprise by approving, implementing, or designing cybersecurity technologies at … working with Network & Cloud Security technologies to protect enterprise environments, such as: Firewalls, protective DNS, Data Loss Prevention (DLP), Intrusion detection/intrusion prevention systems, SecurityInformation & EventManagement (SIEM) platforms, log aggregation, anomaly detection, privileged access management, Endpoint Device Management Working knowledge of NIST SP 800-171 or NIST SP 800-53 Active Top Secret/SCI Security clearance More ❯
similar role, with deep understanding of the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III More ❯
Gosport, Hampshire, South East, United Kingdom Hybrid / WFH Options
Walsh Employment
national infrastructure through proactive monitoring, analysis, and improvement of cybersecurity postures. Essential Skills and Experience: Proven experience in a Security Operations Centre (SOC) environment Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with … SOC Analyst , you will be at the forefront of digital defenceleading incident response, improving detection mechanisms, and mentoring junior analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms ( Microsoft Sentinel , Splunk ) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with colleagues More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and provide requested documentation and evidence. Security Monitoring: Use tools such as Rapid7 InsightIDR or other SIEM solutions to assist with security monitoring and incident detection. Incident Response Support: Participate in incident response efforts, documenting security incidents and assisting in containment and recovery actions. Threat Identification: Contribute … audit and compliance frameworks, including ISO 27001, ISO 27701, ISO 42001, GDPR, DORA, Cyber Essentials, and Cyber Essentials Plus. Familiarity with CSOC tools such as Rapid7 InsightIDR or other SIEM solutions. Hands-on experience in internal and external audits, compliance assessments, and process improvement. Basic understanding of incident response frameworks and cybersecurity best practices. Exceptional analytical, organizational, and communication skills. More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
MAF Australia
dependent on experience) Responsibilities As a MAF Security Operations Specialist you will play a critical role in protecting our digital infrastructure. You'll lead the implementation andmanagement of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM … IT security roles with focus on infrastructure security Strong experience with Fortinet security products and solutions Advanced knowledge of Microsoft Active Directory and Entra ID administration Demonstrated experience with SIEM implementation andmanagement Strong background in network securityand infrastructure protection Experience with IDS/IPS systems andsecurity monitoring tools Proven incident response and threat hunting experience Programming/ More ❯
condition of employment. Responsibilities As a MAF Security Operations Specialist you will play a critical role in protecting our digital infrastructure. You'll lead the implementation andmanagement of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM … IT security roles with focus on infrastructure security Strong experience with Fortinet security products and solutions Advanced knowledge of Microsoft Active Directory and Entra ID administration Demonstrated experience with SIEM implementation andmanagement Strong background in network securityand infrastructure protection Experience with IDS/IPS systems andsecurity monitoring tools Proven incident response and threat hunting experience Programming/ More ❯
West Bend, Wisconsin, United States Hybrid / WFH Options
Delta Defense
controls including NIST CSF, CIS CSC, PCI-DSS, Cyber Defense Matrix, ISO 27001, and MITRE ATT&CK. Familiarity with a broad range of security tools and technologies including EDR, SIEM, SWG, CASB, DLP, & IDS/IPS. Preferred certifications: CCSP, CASP+, CISSP, Security+, CEH. Experience with modern network architectures and tooling to manage and support remote workforce including associates in the More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
IT andSecurity problems for non-technical audiences. • Strong understanding of OT infrastructure, networking, and end-user computing. • Proficiency in writing Kusto Query Language (KQL) for creating and tuning SIEM queries and alerts. • Experience in configuring and troubleshooting MFA, Privileged Access Management (PAM), andSecurityInformation & EventManagement (SIEM) systems, particularly Microsoft Sentinel. Desirable Experience: • Familiarity with managing network securityMore ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
Techwaka
for this role: 3+ years' experience in a senior cyber security role Strong knowledge of security frameworks (NIST, NCSC, CIS, MITRE ATT&CK) Hands-on experience with security tools: SIEM, IDS/IPS, firewalls, endpoint protection Expertise in Azure securityand securing cloud platforms A solid understanding of vulnerabilities, penetration testing, and compliance Experience with network security, encryption, TLS, SSL More ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
are met. Ensure the IAM service follows and complies with IT andInformationSecurity policies and regulatory standards. Help configure and keep current the integration of IAM technologies with SIEM, SOAR, Service Desk and other tools. Work closely with relevant vendors to ensure optimised use of the supplied technologies and professional services. Serve as an escalation point for issues of More ❯