Northampton, Northamptonshire, East Midlands, United Kingdom
VIQU IT Recruitment
would be the main focus of the role. Strong expertise with Microsoft Defender and Sentinel is needed. Key Skills & Experience from the Security Engineer Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within More ❯
would be the main focus of the role. Strong expertise with Microsoft Defender and Sentinel is needed. Key Skills & Experience from the Security Engineer Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within More ❯
Northampton, Northamptonshire, East Midlands, United Kingdom
VIQU IT Recruitment
would be the main focus of the role. Strong expertise with Microsoft Defender and Sentinel is needed. Key Skills & Experience from the SOC Analyst Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within More ❯
Northampton, Northamptonshire, England, United Kingdom
Howdens Joinery
Cloud Monitoring DevOps (git Repository/Deployment pipeline) Shared Services (Kubernetes, API Management) CDN (Akamai) High Availability (Zones and Regions, Service Recovery) Understanding of Security technologies and log management (SIEM) Understand and be able to code in at least one scripting language such as (Powershell, Javascript) Excellent communicator, able to influence decision makers and work successfully in cross-functional teams More ❯
Northampton, West Northamptonshire, Northamptonshire, United Kingdom
Howdens Joinery
Cloud Monitoring - DevOps (git Repository/Deployment pipeline) - Shared Services (Kubernetes, API Management) - CDN (Akamai) - High Availability (Zones and Regions, Service Recovery) - Understanding of Security technologies and log management (SIEM) - Understand and be able to code in at least one scripting language such as (Powershell, Javascript) - Excellent communicator, able to influence decision makers and work successfully in cross-functional teams More ❯
security controls across OT environments. Contribute to the assessment of OT network architecture, protocols, and change management processes. Lead incident response and remediation for cyber events detected by OT SIEM systems. Actively support vulnerability managementand ensure threat exposure is minimised. Provide hands-on leadership in data and asset management, including backup and removable media deployments. Apply and track securityMore ❯
Employment Type: Permanent
Salary: £57000 - £60000/annum Pension,Medical,Incentive Plan,25 Ho
Immingham, Lincolnshire, North East, United Kingdom
Rullion Limited
security controls across OT environments. Contribute to the assessment of OT network architecture, protocols, and change management processes. Lead incident response and remediation for cyber events detected by OT SIEM systems. Actively support vulnerability managementand ensure threat exposure is minimised. Provide hands-on leadership in data and asset management, including backup and removable media deployments. Apply and track securityMore ❯
Develop SOC policies, technical standards, and procedure documentation aligned to industry best practice. Log Management: Work with MSSPs and service owners to ensure log sources are onboarded into the SIEM solution. Create use cases to correlate suspicious activities across endpoints, networks, applications, and both on-premises and cloud environments. Incident Response: Improve playbooks and processes, lead escalated security incidents, oversee … platform by producing workflows to automate responses to common attack types and enhance operational playbooks. Digital Forensics: Use forensic tools and techniques to analyse data sources such as logs, SIEM data, applications, and network traffic patterns, and recommend appropriate response actions to ensure threats are contained and eradicated. Cyber Crisis Testing: Participate in cyber-attack simulations and scenario exercises to … a degree in Computer Science, Cybersecurity, IT, or a related subject. Ideally hold recognised security qualifications such as CISSP, AZ-500, GIAC/GCIA/GCIH, CASP+, CEH, or SIEM certifications. Strong knowledge of log correlation, analysis, forensics, and chain of custody requirements. Familiarity with regulatory frameworks (NCSC CAF, ISO/IEC 27001/27002, GDPR, CIS, NIST). Practical More ❯
Develop SOC policies, technical standards, and procedure documentation aligned to industry best practice. Log Management: Work with MSSPs and service owners to ensure log sources are onboarded into the SIEM solution. Create use cases to correlate suspicious activities across endpoints, networks, applications, and both on-premises and cloud environments. Incident Response: Improve playbooks and processes, lead escalated security incidents, oversee … platform by producing workflows to automate responses to common attack types and enhance operational playbooks. Digital Forensics: Use forensic tools and techniques to analyse data sources such as logs, SIEM data, applications, and network traffic patterns, and recommend appropriate response actions to ensure threats are contained and eradicated. Cyber Crisis Testing: Participate in cyber-attack simulations and scenario exercises to … a degree in Computer Science, Cybersecurity, IT, or a related subject. Ideally hold recognised security qualifications such as CISSP, AZ-500, GIAC/GCIA/GCIH, CASP+, CEH, or SIEM certifications. Strong knowledge of log correlation, analysis, forensics, and chain of custody requirements. Familiarity with regulatory frameworks (NCSC CAF, ISO/IEC 27001/27002, GDPR, CIS, NIST). Practical More ❯