in Cyber Security Or Computer Science, or Networks OR certifications such as CompTIA Security+, ISACA OR equivalent experience Strong hands-on experience with SIEM platforms (Elastic Security mandatory; Sentinel or Splunk desirable) and EDR tools (e.g. Elastic XDR, Microsoft Defender, CrowdStrike, SentinelOne) Proficiency in detection rule development using query languages (e.g. ESQL, KQL, Lucene), and practical understanding of … MITRE ATT&CK, threat actor tactics, and experience in incident detection, triage, and analysis within a SOC or similar environment Desirable Criteria Exposure to cloud security monitoring (AWS, Azure, GCP), SOAR platforms, and automation playbook creation Experience with threat intelligence integration, rule writing (YARA, Sigma, Snort/Suricata), and container/Kubernetes security Familiarity with offensive security methodologies More ❯
GRC). Requirements In-depth understanding of the incident response lifecycle — preparation, detection, containment, eradication, recovery, and lessons learned. Hands-on experience with SIEM tools such as Splunk, Sentinel, or QRadar — including log analysis and data correlation. Strong familiarity with EDR platforms like CrowdStrike, SentinelOne, or Carbon Black. Working knowledge of network security , including protocols, firewalls, IDS/… IPS, and traffic analysis. Experience with cloud security principles in AWS, Azure, or GCP. Ability to interpret and apply threat intelligence to improve controls and detection coverage. Experience with MacOS preferred Strong communication skills — capable of articulating complex technical issues to both technical and non-technical stakeholders. Proven track record of managing vendor relationships and holding third-party More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Cititec
GRC). Requirements In-depth understanding of the incident response lifecycle — preparation, detection, containment, eradication, recovery, and lessons learned. Hands-on experience with SIEM tools such as Splunk, Sentinel, or QRadar — including log analysis and data correlation. Strong familiarity with EDR platforms like CrowdStrike, SentinelOne, or Carbon Black. Working knowledge of network security , including protocols, firewalls, IDS/… IPS, and traffic analysis. Experience with cloud security principles in AWS, Azure, or GCP. Ability to interpret and apply threat intelligence to improve controls and detection coverage. Experience with MacOS preferred Strong communication skills — capable of articulating complex technical issues to both technical and non-technical stakeholders. Proven track record of managing vendor relationships and holding third-party More ❯
client is looking for is: Proven experience working in cybersecurity engineering, operations, or monitoring environments. Strong understanding of SIEM tools, logging standards, and protective monitoring frameworks (e.g., Splunk, Sentinel, ELK). Experience developing and implementing security onboarding or service transition processes. Working knowledge of security controls, incident response, and threat detection methodologies. Ability to write and maintain technical … skills are: Experience within UK Government or critical national infrastructure (CNI) cyber environments. Familiarity with Government Security Classifications and Protective Monitoring (SOC) capabilities. Knowledge of cloud security architectures (Azure, AWS) and secure onboarding of cloud services. Relevant certifications such as CISSP, CISM, CEH, GIAC, CompTIA Security+, or Splunk Certified Engineer. If you hold an active DV (Developed Vetting More ❯
expert guidance across IT projects and infrastructure. Operational Oversight: Define and deploy control baselines, templates, and standards. Tooling & Effectiveness: Manage and monitor security operations tools such as Defender, Sentinel, Tenable, and CASB. Incident Response: Lead triage, coordinate crisis responses, and oversee post-incident reviews. Documentation & Governance: Maintain hardening guides, architecture diagrams, and lead working groups. Cross-Regional Alignment … in Information Security. Certifications such as Security+, CEH, CySA+, or Cloud Security Engineer. Extensive experience in cybersecurity, especially incident response and technical operations. Strong understanding of AWS and Azure cloud platforms. Familiarity with frameworks like NIST, ISO, COBIT, and OWASP. Proven success in leading and delivering security projects. Experience with PowerShell and automation. Consulting experience across IT and More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
British Veterinary Association
expert guidance across IT projects and infrastructure. Operational Oversight: Define and deploy control baselines, templates, and standards. Tooling & Effectiveness: Manage and monitor security operations tools such as Defender, Sentinel, Tenable, and CASB. Incident Response: Lead triage, coordinate crisis responses, and oversee post-incident reviews. Documentation & Governance: Maintain hardening guides, architecture diagrams, and lead working groups. Cross-Regional Alignment … in Information Security. Certifications such as Security+, CEH, CySA+, or Cloud Security Engineer. Extensive experience in cybersecurity, especially incident response and technical operations. Strong understanding of AWS and Azure cloud platforms. Familiarity with frameworks like NIST, ISO, COBIT, and OWASP. Proven success in leading and delivering security projects. Experience with PowerShell and automation. Consulting experience across IT and More ❯
Swindon, Wiltshire, South West, United Kingdom Hybrid / WFH Options
VIQU IT Recruitment
Cloud Infrastructure Engineer (Azure) – 6-Month Contract – Hybrid (Swindon) VIQU have partnered with a leading consultancy providing IT services and transformation expertise into a global organisation located in the South West. We're seeking a hands-on Cloud Infrastructure Engineer (Azure) to support a number of ongoing transformation and automation projects within a modern, Azure … and cloud solutions. This engagement will be delivered in partnership with our consulting partner, who manage service delivery for the end client. Key Responsibilities: The Cloud Infrastructure Engineer (Azure) will deliver cloud and infrastructure change across a large-scale, global Azure environment. Support transformation and automation projects, including data centre decommissioning and network modernisation. Configure, maintain … and optimise Azure resources, networking, and security. Contribute to the design and implementation of solutions, with sign-off from Cloud Architects. Provide 3rd line technical support and troubleshooting for complex infrastructure issues. Work collaboratively with internal teams and technology partners to deliver service improvements. Key Skills & Experience: Proven experience as a Cloud Infrastructure Engineer in a MicrosoftAzureMore ❯
City of London, London, United Kingdom Hybrid / WFH Options
Method-Resourcing
Security Engineer (M365/Azure/Sentinel - 12 Month FTC | £70,000 | Fully Remote | UK-Based Candidates with full Right to Work only A unique opportunity to shape security during a live merger . You'll join a lean team where your expertise directly drives compliance, stability, and scalability for future acquisitions. The role blends technical … security engineering with change leadership : Build and harden M365 & Azure security (incl. Sentinel). Manage patching, malware protection, and vulnerabilities. Document and control security changes to avoid disruption. Coach and mentor an aspiring security engineer from the service desk. Support Cyber Essentials Plus certification and ongoing compliance. The business is preparing for future growth and eventual … ll be part of a strategically critical chapter, not just day-to-day BAU. Who we're looking for: You'll be someone with deep Microsoft 365 and Azure security experience, who thrives in complex environments, and who knows how to balance technical rigour with empathetic user support. M&A or compliance project experience is a bonus. Remote More ❯
Leicester, England, United Kingdom Hybrid / WFH Options
Mattioli Woods
for new projects conduct threat modelling, security risk assessments, and business impact analyses develop and enforce security standards, policies, and baselines across multiple platforms guide secure cloud deployments, Azure AD configurations, identity management, and access control embed security best practices into development and project delivery processes collaborate with IT, development, and project teams to ensure a consistent and … partner with auditors, vendors, and external security service providers What we’re looking for 5+ years’ experience in information security engineering or a similar role expertise in MicrosoftAzure security services, SIEM tools (MS Sentinel), and cloud security architectures knowledge of security frameworks such as ISO 27001, NIST, or CIS Controls strong understanding of network, system More ❯
loughborough, midlands, united kingdom Hybrid / WFH Options
Mattioli Woods
for new projects conduct threat modelling, security risk assessments, and business impact analyses develop and enforce security standards, policies, and baselines across multiple platforms guide secure cloud deployments, Azure AD configurations, identity management, and access control embed security best practices into development and project delivery processes collaborate with IT, development, and project teams to ensure a consistent and … partner with auditors, vendors, and external security service providers What we’re looking for 5+ years’ experience in information security engineering or a similar role expertise in MicrosoftAzure security services, SIEM tools (MS Sentinel), and cloud security architectures knowledge of security frameworks such as ISO 27001, NIST, or CIS Controls strong understanding of network, system More ❯
coventry, midlands, united kingdom Hybrid / WFH Options
Mattioli Woods
for new projects conduct threat modelling, security risk assessments, and business impact analyses develop and enforce security standards, policies, and baselines across multiple platforms guide secure cloud deployments, Azure AD configurations, identity management, and access control embed security best practices into development and project delivery processes collaborate with IT, development, and project teams to ensure a consistent and … partner with auditors, vendors, and external security service providers What we’re looking for 5+ years’ experience in information security engineering or a similar role expertise in MicrosoftAzure security services, SIEM tools (MS Sentinel), and cloud security architectures knowledge of security frameworks such as ISO 27001, NIST, or CIS Controls strong understanding of network, system More ❯
help shape something rather than simply follow a process, this is the right environment for you. Core Responsibilities: Security Monitoring & Incident Response Monitor security alerts generated by MicrosoftSentinel, Microsoft Defender, Datadog and Elastic. Assess severity and impact of alerts, triage and investigate incidents independently. Execute containment and remediation actions using defined runbooks and playbooks. Correlate data across … RCA and after-action reviews for internal and client use. Maintain accurate incident records in JIRA Service Management. Detection Engineering Develop and implement new detection rules in MicrosoftSentinel aligned to the MITRE ATT&CK framework. Draft and optimise KQL queries for detection and threat hunting. Refine existing detection logic based on false positive analysis and threat evolution. … University educated with a degree in computer science, information security or equivalent At least one year of experience in a SOC environment monitoring and responding to incidents MicrosoftSentinel and Defender hands-on expertise SC-200 certification or willingness to achieve it Within commuting distance (~1 hour) of Canary Wharf, London Technical Skills Strong KQL skills for threat More ❯
help shape something rather than simply follow a process, this is the right environment for you. Core Responsibilities: Security Monitoring & Incident Response Monitor security alerts generated by MicrosoftSentinel, Microsoft Defender, Datadog and Elastic. Assess severity and impact of alerts, triage and investigate incidents independently. Execute containment and remediation actions using defined runbooks and playbooks. Correlate data across … RCA and after-action reviews for internal and client use. Maintain accurate incident records in JIRA Service Management. Detection Engineering Develop and implement new detection rules in MicrosoftSentinel aligned to the MITRE ATT&CK framework. Draft and optimise KQL queries for detection and threat hunting. Refine existing detection logic based on false positive analysis and threat evolution. … University educated with a degree in computer science, information security or equivalent At least one year of experience in a SOC environment monitoring and responding to incidents MicrosoftSentinel and Defender hands-on expertise SC-200 certification or willingness to achieve it Within commuting distance (~1 hour) of Canary Wharf, London Technical Skills Strong KQL skills for threat More ❯
help shape something rather than simply follow a process, this is the right environment for you. Core Responsibilities: Security Monitoring & Incident Response Monitor security alerts generated by MicrosoftSentinel, Microsoft Defender, Datadog and Elastic. Assess severity and impact of alerts, triage and investigate incidents independently. Execute containment and remediation actions using defined runbooks and playbooks. Correlate data across … RCA and after-action reviews for internal and client use. Maintain accurate incident records in JIRA Service Management. Detection Engineering Develop and implement new detection rules in MicrosoftSentinel aligned to the MITRE ATT&CK framework. Draft and optimise KQL queries for detection and threat hunting. Refine existing detection logic based on false positive analysis and threat evolution. … University educated with a degree in computer science, information security or equivalent At least one year of experience in a SOC environment monitoring and responding to incidents MicrosoftSentinel and Defender hands-on expertise SC-200 certification or willingness to achieve it Within commuting distance (~1 hour) of Canary Wharf, London Technical Skills Strong KQL skills for threat More ❯
london (city of london), south east england, united kingdom
CyPro
help shape something rather than simply follow a process, this is the right environment for you. Core Responsibilities: Security Monitoring & Incident Response Monitor security alerts generated by MicrosoftSentinel, Microsoft Defender, Datadog and Elastic. Assess severity and impact of alerts, triage and investigate incidents independently. Execute containment and remediation actions using defined runbooks and playbooks. Correlate data across … RCA and after-action reviews for internal and client use. Maintain accurate incident records in JIRA Service Management. Detection Engineering Develop and implement new detection rules in MicrosoftSentinel aligned to the MITRE ATT&CK framework. Draft and optimise KQL queries for detection and threat hunting. Refine existing detection logic based on false positive analysis and threat evolution. … University educated with a degree in computer science, information security or equivalent At least one year of experience in a SOC environment monitoring and responding to incidents MicrosoftSentinel and Defender hands-on expertise SC-200 certification or willingness to achieve it Within commuting distance (~1 hour) of Canary Wharf, London Technical Skills Strong KQL skills for threat More ❯
help shape something rather than simply follow a process, this is the right environment for you. Core Responsibilities: Security Monitoring & Incident Response Monitor security alerts generated by MicrosoftSentinel, Microsoft Defender, Datadog and Elastic. Assess severity and impact of alerts, triage and investigate incidents independently. Execute containment and remediation actions using defined runbooks and playbooks. Correlate data across … RCA and after-action reviews for internal and client use. Maintain accurate incident records in JIRA Service Management. Detection Engineering Develop and implement new detection rules in MicrosoftSentinel aligned to the MITRE ATT&CK framework. Draft and optimise KQL queries for detection and threat hunting. Refine existing detection logic based on false positive analysis and threat evolution. … University educated with a degree in computer science, information security or equivalent At least one year of experience in a SOC environment monitoring and responding to incidents MicrosoftSentinel and Defender hands-on expertise SC-200 certification or willingness to achieve it Within commuting distance (~1 hour) of Canary Wharf, London Technical Skills Strong KQL skills for threat More ❯
Operations Centre (SOC) ensuring effective integration. Baseline and conduct regular reviews with an incoming 3rd party managed SOC and the security tools in the Cloud environment (Defender and Sentinel) Oversee security architecture, vulnerability management, incident response, and threat intelligence Lead security risk assessments and manage remediation plans for identified gaps Ensure compliance with financial regulations (e.g. GDPR, PCI … with external auditors, regulators, and security vendors Mentor, hire, and retain high-performing information security talent Experience/Skills Required Managing security for cloud-first environments specifically MicrosoftAzure Implementing Security Operations Centres (SOC) and automated security monitoring Collaborate with the third-party risk management and vendor security programmes Experience with DevSecOps practices and secure software development lifecycle … track record of designing and implementing security frameworks (ISO 27001, NIST) Hands-on experience with SIEM, DLP, IAM, and endpoint security technologies, specifically Microsoft Defender XDR, Purview and Sentinel Excellent risk assessment and incident management skills Outstanding communication skills with the ability to influence stakeholders at all levels Strategic mindset with the capability to balance security controls and More ❯
City of London, London, United Kingdom Hybrid / WFH Options
MFK Recruitment
SOPs). Senior 3rd Line IT Engineer - Key Responsibilities Act as the primary escalation point for complex 2nd/3rd line incidents and service requests across infrastructure, networking, Azure, Microsoft 365, and cybersecurity. Manage and maintain client systems and centralized services, including Mimecast, Avanan, SentinelOne, MDR/XDR, Fortinet, DR/BC, Huntress, Autotask, and Datto RMM. Provide … in cybersecurity, resilience, and performance. Key Skills & Experience Proven experience in a 3rd Line/Senior Engineer role within an MSP environment Strong knowledge of Microsoft technologies, including Azure, 365, SharePoint, and Intune Excellent understanding of networking, firewalls, VPNs, and Windows Server environments Experience with RMM tools, security platforms, and endpoint management Familiarity with tools and platforms such … across teams Experience with Cyber Essentials, Cyber Essentials Plus, and other frameworks such as NIST, ISO27001 Commitment to producing clear documentation and knowledge sharing Desirable Certifications Microsoft Certified: Azure Administrator/Solutions Expert CompTIA Security+, CISSP, or similar cybersecurity qualification ITIL Foundation Vendor-specific certifications (Fortinet, SentinelOne, Datto, etc.) Why Join the Company Join a technically strong, supportive More ❯
SOPs). Senior 3rd Line IT Engineer - Key Responsibilities Act as the primary escalation point for complex 2nd/3rd line incidents and service requests across infrastructure, networking, Azure, Microsoft 365, and cybersecurity. Manage and maintain client systems and centralized services, including Mimecast, Avanan, SentinelOne, MDR/XDR, Fortinet, DR/BC, Huntress, Autotask, and Datto RMM. Provide … in cybersecurity, resilience, and performance. Key Skills & Experience Proven experience in a 3rd Line/Senior Engineer role within an MSP environment Strong knowledge of Microsoft technologies, including Azure, 365, SharePoint, and Intune Excellent understanding of networking, firewalls, VPNs, and Windows Server environments Experience with RMM tools, security platforms, and endpoint management Familiarity with tools and platforms such … across teams Experience with Cyber Essentials, Cyber Essentials Plus, and other frameworks such as NIST, ISO27001 Commitment to producing clear documentation and knowledge sharing Desirable Certifications Microsoft Certified: Azure Administrator/Solutions Expert CompTIA Security+, CISSP, or similar cybersecurity qualification ITIL Foundation Vendor-specific certifications (Fortinet, SentinelOne, Datto, etc.) Why Join the Company Join a technically strong, supportive More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
MFK Recruitment
SOPs). Senior 3rd Line IT Engineer - Key Responsibilities Act as the primary escalation point for complex 2nd/3rd line incidents and service requests across infrastructure, networking, Azure, Microsoft 365, and cybersecurity. Manage and maintain client systems and centralized services, including Mimecast, Avanan, SentinelOne, MDR/XDR, Fortinet, DR/BC, Huntress, Autotask, and Datto RMM. Provide … in cybersecurity, resilience, and performance. Key Skills & Experience Proven experience in a 3rd Line/Senior Engineer role within an MSP environment Strong knowledge of Microsoft technologies, including Azure, 365, SharePoint, and Intune Excellent understanding of networking, firewalls, VPNs, and Windows Server environments Experience with RMM tools, security platforms, and endpoint management Familiarity with tools and platforms such … across teams Experience with Cyber Essentials, Cyber Essentials Plus, and other frameworks such as NIST, ISO27001 Commitment to producing clear documentation and knowledge sharing Desirable Certifications Microsoft Certified: Azure Administrator/Solutions Expert CompTIA Security+, CISSP, or similar cybersecurity qualification ITIL Foundation Vendor-specific certifications (Fortinet, SentinelOne, Datto, etc.) Why Join the Company Join a technically strong, supportive More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
MFK Recruitment
SOPs). Senior 3rd Line IT Engineer - Key Responsibilities Act as the primary escalation point for complex 2nd/3rd line incidents and service requests across infrastructure, networking, Azure, Microsoft 365, and cybersecurity. Manage and maintain client systems and centralized services, including Mimecast, Avanan, SentinelOne, MDR/XDR, Fortinet, DR/BC, Huntress, Autotask, and Datto RMM. Provide … in cybersecurity, resilience, and performance. Key Skills & Experience Proven experience in a 3rd Line/Senior Engineer role within an MSP environment Strong knowledge of Microsoft technologies, including Azure, 365, SharePoint, and Intune Excellent understanding of networking, firewalls, VPNs, and Windows Server environments Experience with RMM tools, security platforms, and endpoint management Familiarity with tools and platforms such … across teams Experience with Cyber Essentials, Cyber Essentials Plus, and other frameworks such as NIST, ISO27001 Commitment to producing clear documentation and knowledge sharing Desirable Certifications Microsoft Certified: Azure Administrator/Solutions Expert CompTIA Security+, CISSP, or similar cybersecurity qualification ITIL Foundation Vendor-specific certifications (Fortinet, SentinelOne, Datto, etc.) Why Join the Company Join a technically strong, supportive More ❯
slough, south east england, united kingdom Hybrid / WFH Options
MFK Recruitment
SOPs). Senior 3rd Line IT Engineer - Key Responsibilities Act as the primary escalation point for complex 2nd/3rd line incidents and service requests across infrastructure, networking, Azure, Microsoft 365, and cybersecurity. Manage and maintain client systems and centralized services, including Mimecast, Avanan, SentinelOne, MDR/XDR, Fortinet, DR/BC, Huntress, Autotask, and Datto RMM. Provide … in cybersecurity, resilience, and performance. Key Skills & Experience Proven experience in a 3rd Line/Senior Engineer role within an MSP environment Strong knowledge of Microsoft technologies, including Azure, 365, SharePoint, and Intune Excellent understanding of networking, firewalls, VPNs, and Windows Server environments Experience with RMM tools, security platforms, and endpoint management Familiarity with tools and platforms such … across teams Experience with Cyber Essentials, Cyber Essentials Plus, and other frameworks such as NIST, ISO27001 Commitment to producing clear documentation and knowledge sharing Desirable Certifications Microsoft Certified: Azure Administrator/Solutions Expert CompTIA Security+, CISSP, or similar cybersecurity qualification ITIL Foundation Vendor-specific certifications (Fortinet, SentinelOne, Datto, etc.) Why Join the Company Join a technically strong, supportive More ❯
IAM/PAM architecture and standards aligned to ISO 27001 & NIST. Skills & Experience Proven IAM/PAM implementation experience (e.g. Entra ID, CyberArk, BeyondTrust). Hands-on with Azure AD/Entra ID , Conditional Access & Identity Protection. Understanding of OAuth2.0, SAML, OpenID Connect . Familiarity with ISO 27001, NIST CSF, CAF & GDPR . Experience leading or overseeing MSPs. … Current SC clearance . Desirable: Knowledge of MicrosoftSentinel, Splunk, or Elastic SIEM . Experience in SOC build or cyber transformation projects. Degree/HND in a relevant STEM field. More ❯
oxford district, south east england, united kingdom Hybrid / WFH Options
TRIA
IAM/PAM architecture and standards aligned to ISO 27001 & NIST. Skills & Experience Proven IAM/PAM implementation experience (e.g. Entra ID, CyberArk, BeyondTrust). Hands-on with Azure AD/Entra ID , Conditional Access & Identity Protection. Understanding of OAuth2.0, SAML, OpenID Connect . Familiarity with ISO 27001, NIST CSF, CAF & GDPR . Experience leading or overseeing MSPs. … Current SC clearance . Desirable: Knowledge of MicrosoftSentinel, Splunk, or Elastic SIEM . Experience in SOC build or cyber transformation projects. Degree/HND in a relevant STEM field. More ❯
Birchanger, Hertfordshire, United Kingdom Hybrid / WFH Options
Solus Accident Repair Centres
with internal teams and third-party suppliers to maximise resources Qualifications Desired qualifications and experience: Minimum 2 years' experience in incident detection, response, and forensics Strong understanding of Azure, Zero Trust Estates, DLP, IDS/IPS, Web-Proxy, and Security Audits Analytical mindset with excellent problem-solving skills Excellent communication and stakeholder engagement skills Self-motivated with a … passion for learning and innovation Sentinel/SIEM certifications Microsoft Security/Identity certifications ISC2 CC or SSCP DevOps/DevSecOps exposure or certifications Who are Solus? Solus, who are owned by Aviva, are one of the UK leaders in vehicle repairs, returning cars to the road in just 11 days on average and a 4.6/ More ❯