compliance (GRC). Requirements In-depth understanding of the incident response lifecycle — preparation, detection, containment, eradication, recovery, and lessons learned. Hands-on experience with SIEM tools such as Splunk, Sentinel, or QRadar — including log analysis and data correlation. Strong familiarity with EDR platforms like CrowdStrike, SentinelOne, or Carbon Black. Working knowledge of network security , including protocols, firewalls, IDS/IPS More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Cititec
compliance (GRC). Requirements In-depth understanding of the incident response lifecycle — preparation, detection, containment, eradication, recovery, and lessons learned. Hands-on experience with SIEM tools such as Splunk, Sentinel, or QRadar — including log analysis and data correlation. Strong familiarity with EDR platforms like CrowdStrike, SentinelOne, or Carbon Black. Working knowledge of network security , including protocols, firewalls, IDS/IPS More ❯
compliance (GRC). Requirements In-depth understanding of the incident response lifecycle - preparation, detection, containment, eradication, recovery, and lessons learned. Hands-on experience with SIEM tools such as Splunk, Sentinel, or QRadar - including log analysis and data correlation. Strong familiarity with EDR platforms like CrowdStrike, SentinelOne, or Carbon Black. Working knowledge of network security , including protocols, firewalls, IDS/IPS More ❯
will be responsible for providing Protective Monitoring Services across a range of Secure Customers. They will be responsible for the day to day monitoring using various SIEM Tools (Qradar, Sentinel & LogRhythm). Some of the responsibilities that come along with this role include the following: Security Analytics Incident investigation, triage and escalation Threat monitoring and response Trend reporting Rule tuning More ❯
london, south east england, united kingdom Hybrid / WFH Options
Cititec
compliance (GRC). Requirements In-depth understanding of the incident response lifecycle — preparation, detection, containment, eradication, recovery, and lessons learned. Hands-on experience with SIEM tools such as Splunk, Sentinel, or QRadar — including log analysis and data correlation. Strong familiarity with EDR platforms like CrowdStrike, SentinelOne, or Carbon Black. Working knowledge of network security , including protocols, firewalls, IDS/IPS More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Cititec
compliance (GRC). Requirements In-depth understanding of the incident response lifecycle — preparation, detection, containment, eradication, recovery, and lessons learned. Hands-on experience with SIEM tools such as Splunk, Sentinel, or QRadar — including log analysis and data correlation. Strong familiarity with EDR platforms like CrowdStrike, SentinelOne, or Carbon Black. Working knowledge of network security , including protocols, firewalls, IDS/IPS More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Cititec
compliance (GRC). Requirements In-depth understanding of the incident response lifecycle — preparation, detection, containment, eradication, recovery, and lessons learned. Hands-on experience with SIEM tools such as Splunk, Sentinel, or QRadar — including log analysis and data correlation. Strong familiarity with EDR platforms like CrowdStrike, SentinelOne, or Carbon Black. Working knowledge of network security , including protocols, firewalls, IDS/IPS More ❯
bring Essential: - Proven experience (3+ years) in cloud security or related infrastructure security role. - Proficiency in cloud platforms such as Azure or AWS. Microsoft Azure (preferred), Defender for Cloud, Sentinel, Key Vault, and Azure Policy. - Strong knowledge of infrastructure-as-code (IaC) and Configuration-as-Code (CaC) tools and methodologies - Good understanding of Cloud services such as virtual networks, storage More ❯
a SOC function within capital markets, FinTech, or smaller financial services environments. Strong technical experience with CrowdStrike and Elastic SIEM . Skilled across the Microsoft 365 Security Stack (Defender, Sentinel, Entra). Hands-on capability in incident response, threat hunting, and digital forensics . Demonstrated experience managing outsourced SOC providers and maintaining performance SLAs. Strong communication and stakeholder management with More ❯
a SOC function within capital markets, FinTech, or smaller financial services environments. Strong technical experience with CrowdStrike and Elastic SIEM . Skilled across the Microsoft 365 Security Stack (Defender, Sentinel, Entra). Hands-on capability in incident response, threat hunting, and digital forensics . Demonstrated experience managing outsourced SOC providers and maintaining performance SLAs. Strong communication and stakeholder management with More ❯
a SOC function within capital markets, FinTech, or smaller financial services environments. Strong technical experience with CrowdStrike and Elastic SIEM . Skilled across the Microsoft 365 Security Stack (Defender, Sentinel, Entra). Hands-on capability in incident response, threat hunting, and digital forensics . Demonstrated experience managing outsourced SOC providers and maintaining performance SLAs. Strong communication and stakeholder management with More ❯
a SOC function within capital markets, FinTech, or smaller financial services environments. Strong technical experience with CrowdStrike and Elastic SIEM . Skilled across the Microsoft 365 Security Stack (Defender, Sentinel, Entra). Hands-on capability in incident response, threat hunting, and digital forensics . Demonstrated experience managing outsourced SOC providers and maintaining performance SLAs. Strong communication and stakeholder management with More ❯
london (city of london), south east england, united kingdom
Robert Half
a SOC function within capital markets, FinTech, or smaller financial services environments. Strong technical experience with CrowdStrike and Elastic SIEM . Skilled across the Microsoft 365 Security Stack (Defender, Sentinel, Entra). Hands-on capability in incident response, threat hunting, and digital forensics . Demonstrated experience managing outsourced SOC providers and maintaining performance SLAs. Strong communication and stakeholder management with More ❯
a SOC function within capital markets, FinTech, or smaller financial services environments. Strong technical experience with CrowdStrike and Elastic SIEM . Skilled across the Microsoft 365 Security Stack (Defender, Sentinel, Entra). Hands-on capability in incident response, threat hunting, and digital forensics . Demonstrated experience managing outsourced SOC providers and maintaining performance SLAs. Strong communication and stakeholder management with More ❯
london (city of london), south east england, united kingdom
Robert Half
a SOC function within capital markets, FinTech, or smaller financial services environments. Strong technical experience with CrowdStrike and Elastic SIEM . Skilled across the Microsoft 365 Security Stack (Defender, Sentinel, Entra). Hands-on capability in incident response, threat hunting, and digital forensics . Demonstrated experience managing outsourced SOC providers and maintaining performance SLAs. Strong communication and stakeholder management with More ❯
A track record of testing plans, learning and improving based on measurable results Nice to have Experience with ISO 22301 or operational resilience frameworks Familiarity with Microsoft Graph, Intune, Sentinel or Defender suite Knowledge of business impact analysis and risk registers Experience with backup platforms such as Veeam and cloud resilience patterns Success in your first year Documented and approved More ❯
Leicester, England, United Kingdom Hybrid / WFH Options
Mattioli Woods
external security service providers What we’re looking for 5+ years’ experience in information security engineering or a similar role expertise in Microsoft Azure security services, SIEM tools (MS Sentinel), and cloud security architectures knowledge of security frameworks such as ISO 27001, NIST, or CIS Controls strong understanding of network, system, and application security, cryptography, and identity management proven ability More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
systems and processes Experience of security products, e.g., firewalls, web filtering, anti-virus etc. Some knowledge of specialized security tools would be highly desirable (e.g. Palo Alto, Tenable, Defender, Sentinel tools). would be very beneficial A security professional qualification such as CISSP, CISM, CCSP, CISA, ISO27001 Lead Implementor/Auditor, CEH or equivalent Cloud Computing experience from multiple vendors More ❯
response Support forensic readiness and insider risk initiatives Develop and enforce security policies and awareness programs Lead incident response and produce investigation reports Utilise and enhance Microsoft Security Stack (Sentinel, Defender, Purview) Drive Zero Trust implementation Conduct security audits and generate KPI/compliance reports Mentor junior analysts and support their growth What are we looking for? Industry certifications such More ❯
A track record of testing plans, learning and improving based on measurable results Nice to have Experience with ISO 22301 or operational resilience frameworks Familiarity with Microsoft Graph, Intune, Sentinel or Defender suite Knowledge of business impact analysis and risk registers Experience with backup platforms such as Veeam and cloud resilience patterns Success in your first year Documented and approved More ❯
loughborough, midlands, united kingdom Hybrid / WFH Options
Mattioli Woods
external security service providers What we’re looking for 5+ years’ experience in information security engineering or a similar role expertise in Microsoft Azure security services, SIEM tools (MS Sentinel), and cloud security architectures knowledge of security frameworks such as ISO 27001, NIST, or CIS Controls strong understanding of network, system, and application security, cryptography, and identity management proven ability More ❯
coventry, midlands, united kingdom Hybrid / WFH Options
Mattioli Woods
external security service providers What we’re looking for 5+ years’ experience in information security engineering or a similar role expertise in Microsoft Azure security services, SIEM tools (MS Sentinel), and cloud security architectures knowledge of security frameworks such as ISO 27001, NIST, or CIS Controls strong understanding of network, system, and application security, cryptography, and identity management proven ability More ❯
documentation, analysis, and reporting. Technical knowledge of cybersecurity concepts and practices. (Desirable) Familiarity with SIEM, vulnerability assessment, incident detection, and system hardening. (Desirable) Exposure to tools such as Microsoft Sentinel, Darktrace, Carbon Black, or Qualys. General IT knowledge, with an understanding of IT operations and risks. Awareness of regulatory environments, ideally with some exposure to financial services or another highly More ❯
documentation, analysis, and reporting. Technical knowledge of cybersecurity concepts and practices. (Desirable) Familiarity with SIEM, vulnerability assessment, incident detection, and system hardening. (Desirable) Exposure to tools such as Microsoft Sentinel, Darktrace, Carbon Black, or Qualys. General IT knowledge, with an understanding of IT operations and risks. Awareness of regulatory environments, ideally with some exposure to financial services or another highly More ❯
documentation, analysis, and reporting. Technical knowledge of cybersecurity concepts and practices. (Desirable) Familiarity with SIEM, vulnerability assessment, incident detection, and system hardening. (Desirable) Exposure to tools such as Microsoft Sentinel, Darktrace, Carbon Black, or Qualys. General IT knowledge, with an understanding of IT operations and risks. Awareness of regulatory environments, ideally with some exposure to financial services or another highly More ❯