such as Burp Suite, Kali Linux, Metasploit, Wireshark, Nessus, or equivalent. Good knowledge of network security, firewalls, managed switches, and server configurations. Familiarity with SIEM tools, vulnerability scanning, and incident response. Strong analytical and problem-solving skills. Excellent communication and documentation abilities. Preferred Qualifications Relevant certifications such as OSCP, CEH More ❯
birmingham, midlands, United Kingdom Hybrid / WFH Options
Intec Select
cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (SecurityInformationandEventManagement) tools and log analysis Develop and enforce security policies, standards, and procedures Work with IT and development teams to implement secure system designs … experience in an informationsecurity or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge More ❯
environments (e.g., Azure) and end-user devices. Hands-on expertise with security tools and technologies, such as Defender for Cloud, Defender for Endpoint, andSIEM solutions. Solid background in implementing and managing security policies via Microsoft Intune and Group Policy (GPO) to secure endpoints and applications. Proven ability to monitor More ❯
birmingham, midlands, united kingdom Hybrid / WFH Options
Guide Dogs Uk
experience working in cyber security, system engineering, or a similar role, with hands-on knowledge of security tools such as anti-malware, content filtering, SIEMand threat detection solutions. A strong understanding of Windows OS, Linux, and MacOS is essential, along with experience working with technology suppliers and outsourced services. More ❯
improvements. Prepare comprehensive reports for clients. Technical skills: Demonstrated experience in responding to and investigating incidents whilst utilizing various monitoring, detection and investigation tooling – SIEM, SOAR, EDR etc. Proficiency in log analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding More ❯
birmingham, midlands, United Kingdom Hybrid / WFH Options
Logiq
staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA More ❯
to transition into securityand gain hands-on experience with cutting-edge technology. Gain hands on experience: - Threat Detection & Response – Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar etc.) and act fast to counter potential threats. Incident Investigation – Analyse security incidents, conduct forensic investigations, and support remediation efforts. Vulnerability More ❯
relevant industry certifications (e.g. CySA+, Security+) and risk management knowledge (essential) Knowledge and experience working across a diverse range of cyber security tools, including SIEM technologies, EDR, NIDS etc. (essential) Self-motivated with a willingness to go the extra mile to achieve important goals (essential) Excellent verbal and written communication More ❯
birmingham, midlands, United Kingdom Hybrid / WFH Options
Synapri
will require active SC-Clearance and prior experience with a broad range of cybersecurity tools. Key Responsibilities: Working closely with the SOC to implement SIEM technology Automating security workflows to streamline incident response Utilising cloud environments across both Azure and AWS. Assisting with Incident Management Contributing to platform automation andMore ❯
You 3-5 years of experience in cyber security roles, with hands-on involvement in implementing frameworks like NIST, eCAF, or ISO27001 Experience in SIEM, Vulnerability Management, Threat Intelligence, and IAM tools Background in supporting enterprise-level security initiatives aligned with regulatory or certification standards If you're interested in More ❯
engineering. Experience with scripting or programming (Python, PowerShell, Bash, etc.). Relevant SOC certifications (e.g., CREST, Blue Team Level 1). Exposure to additional SIEM tools such as QRadar. Benefits: 25 days annual leave (plus option to purchase more). Health cash plan, life assurance, and company pension. Flexible benefits More ❯
birmingham, midlands, United Kingdom Hybrid / WFH Options
Lawrence Harvey
against basic and advanced threat actors. You will be responsible for the automation workflow design and use case development. You will work on the SIEM detection content development and false positive reduction. You will be in charge of robust and detailed incident response to threats, investigation, and triage of day More ❯
NETbuilder is a leading provider of digital solutions, software, consulting, and managed services. We work across multiple sectors, with specialist expertise in the financial, government and commercial markets. Since 1999, we have been providing end-to-end solutions across Digital More ❯
Security Operations related roles Solid understanding of SOC best practices and relevant regulations Experience deploying, configuring, and managing security tools within SOC environments (e.g., SIEM, IDS/IPS, EDR, etc.). Excellent communication skills, verbally and written If this looks interesting to you, please apply or email Georgia on g.cummings More ❯
birmingham, midlands, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
cyber incidents, offering reassurance and expert guidance Produce detailed incident reports with root cause analysis and actionable recommendations Perform forensic and log analysis using SIEM, EDR, SOAR, and other security tools Collaborate across teams to enhance response playbooks and internal processes Stay informed on emerging threats and tactics to strengthen More ❯
in modern virtualised infrastructure environments Strong expertise in networking & communications, including Cisco network infrastructure (CCNA/CCNP preferred) Background in cybersecurity operations & delivery (EDR, SIEM, firewalls, email security) Knowledge of Microsoft Cloud platforms (IaaS, PaaS, SaaS) and Azure. Microsoft Server OS support experience ) Proactive mindset, with the ability to monitor More ❯
presentation skills. Strong analytical skills. Expertise in TCP/IP network traffic andevent log analysis. Hands-on experience with Microsoft Sentinel or similar SIEM tools. Administrative skills across multiple operating systems (Windows, OS X, Linux). Proficiency in shell scripting, creating Snort rules, or other log-searching query languages. More ❯
birmingham, midlands, united kingdom Hybrid / WFH Options
Bela Recruitment
Bela Recruitmentis recruiting an ISO Compliance Specialistbased in Dungannon, Northern Ireland. The Company Ive worked with this company for over 10 years sourcing permanent staff across almost all departments. They are a great company to work for and have been More ❯
scripting or programming languages. Practical knowledge and demonstrated experience in areas such as Data Loss Prevention (DLP), Data Privacy/Protection, DSPM/CSPM, SIEM, or vulnerability management is highly preferred. Proven success in a technical, customer-facing role within a software or SaaS company. Full spec available, please apply More ❯
to understand technical capabilities to ensure solutions align with security challenges and business objectives. Technical Requirements: Hands-on experience with security technologies such as SIEM, EDR, SOAR, vulnerability, threat intelligence etc. Experience in pre-sales, solution consulting, or technical advisory roles Proactive mindset and strong customer engagement skills Please apply More ❯
scans and advise relevant teams for mitigation steps. Monitor security alerts and events to identify potential security incidents. Use securityinformationandeventmanagement (SIEM) tools to analyze log data for signs of suspicious activity. Keep up to date with the latest securityand privacy legislationand security enhancing technologies andMore ❯
global business risk/objectives. This role is focused on technical operations and support of various informationsecurity tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT Security in reviewing and … will be done monthly. Deploy new informationsecurity tools, services, processes, and procedures to support the informationsecurity roadmap. Support informationsecurity services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership More ❯
/Open API specs for vulnerabilities Advise on secure API design patterns Familiar with fallback controls such as WAF's, API gateways Experience using SIEM/logging tools to track API threats Familiarity with NIST, OWASP SAMM, or internal security frameworks Experience producing risk dashboards/reports for API's More ❯
birmingham, midlands, united kingdom Hybrid / WFH Options
asobbi
This role offers an opportunity to work with market-leading vendors across networking (Cisco), data infrastructure (NetApp, IBM, cloud), andsecurity solutions (NOC, SOC, SIEM) . While the focus is on new business development , there’s potential to inherit a small number of key accounts to support your success. What More ❯
Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (Secrets Management) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. 3. Operational Management: Monitor and maintain the CyberArk environment to ensure optimal performance … PVWA, PSM, AAM, Conjur). Strong understanding of privileged access management concepts and best practices. Experience with integrating CyberArk with other security tools (e.g., SIEM, IAM, ITSM). Proficiency in scripting languages (e.g., PowerShell, Python) for automation and customization. Excellent problem-solving and troubleshooting skills. Preferred: Experience with cloud platforms More ❯