experience Good knowledge of MS Defender for Cloud, Storage (SQL) and CSPM. Proficient with Data loss prevention tools experience, such as MS Purview Compliance Manager and Tessian Security monitoring, SIEM tooling such as Exabeam, QRadar, Splunk and Sentinel. Experience with Azure (security centre) and M365 cloud infrastructure and configuration and on-premises Active Directory Experience in Cloud email security gateway More ❯
science, Information Technology, Cybersecurity, or a related field. Advanced degrees or certifications (e.g., CISSP, CISM, CEH) are highly desirable. Technical Skills: Proficiency in security tools and technologies, such as SIEM, vulnerability scanners, and endpoint protection platforms. Knowledge of cloud security, network security, and secure software development practices. Familiarity with scripting and automation tools to streamline security processes. Working with data More ❯
scans and update relevant records. * Incident readiness and handling as part of the Computer Security Incident Response team (CSIRT). * Monitor and analyse security logs from various systems (including SIEM) and network devices to identify potential threats and vulnerabilities. Knowledge, skills & experience required: Essential * Bachelor's degree in computer science, Information Technology, Cyber Security, or a related field. * 5+ years More ❯
years' experience in a technical security role, ideally within complex or high-risk operational environments. Practical experience with cloud platforms (e.g. AWS, Azure), endpoint protection, IAM, vulnerability management, andSIEM/logging tools. Strong understanding of cyber threats, insider risk, security engineering principles and network security. Demonstrated experience managing the response to cyber incidents. Familiar with automating tasks with Python More ❯
Northampton, Northamptonshire, England, United Kingdom Hybrid / WFH Options
PLANET RECRUITMENT SERVICES LTD
Manager, Infrastructure Team, DevOps, and Compliance Teams to ensure the security of our infrastructure and data. Key Responsibilities: Monitor and analyse security alerts from various tools such as WAF, SIEM, IDS/IPS, firewalls, and endpoint protection platforms. Investigate and respond to security incidents, including containment, eradication, and recovery. Conduct vulnerability assessments and coordinate remediation efforts. Perform threat hunting andMore ❯
security, including firewalls, WAF, anti-virus, and O365 compliance & security centre . Familiarity with NIST (CSF Framework 2.0), ISO 27001, PCI-DSS, and GDPR . Experience operating and managing SIEM solutions , vulnerability management tools, and secure configuration tooling. Ability to use PowerShell and Python scripting for security automation. Experience working in or with agile and/or SecOps oriented teams More ❯
Linux, and Unix environments Encryption: Familiarity with encryption protocols and technologies Penetration Testing: Ability to assess and interpret penetration test results to guide remediation Security Tools: Hands-on with SIEM, SOAR, EDR, UTM, and honeypots. Cloud Security: Understanding of cloud platform security measures (AWS, Azure, etc.) Security Frameworks: Advanced knowledge of frameworks such as MITRE ATT&CK, NIST, etc. Consulting More ❯
similar role, with deep understanding of the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III More ❯
best practices across a number of the following areas/domains: Network and infrastructure (networking protocol knowledge is an advantage Endpoint (e.g. DLP, Endpoint Detection and Response, File Integrity, SIEM) Database technologies (SQL, Oracle) General cryptography practices (e.g. PKI) Cloud environments (Azure, AWS) Fundamental understanding of privacy and data protection laws and regulations and how they apply to technology environments More ❯
hardening best practices. Understanding of protocol analysis techniques. Experience with Azure Log Analytics, KQL, and Azure Alerts. Python, Shell, and PowerShell scripting. Experience with security tools and technologies (e.g., SIEM, IDS/IPS, NG Firewall capabilities, vulnerability scanners). Knowledge of Active Directory and Azure AD. Knowledge of application delivery and the infrastructures that enable it. Familiarity with SQL Server More ❯
security practices. Hands-on experience with firewalls, IDS/IPS, and VPN configurations. Experience with virtualization (VMware, Hyper-V, etc.). Familiarity with various security tool sets such as SIEM solutions, DLP, Endpoint Protection. Experience implementing disaster recovery and business continuity plans. Familiarity with compliance andsecurity frameworks (NIST, ISO 27001, etc). Knowledge of zero-trust architecture and secure More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
BT Group
Press Tab to Move to Skip to Content Link Select how often (in days) to receive an alert: SIEM Application Engineer Posting Date: 29 Jul 2025 Function: Cyber Security Unit: Networks Location: Snowhill, Birmingham, United Kingdom Salary: Competitive with Great Benefits The new Network SIEM is essential to BT's network security, meeting TSA requirements and improving our CAF level. … following offices: Birmingham, Manchester, Ipswich (Ipswich only applicable to existing BT employees) What you'll be doing SIEM Solution Development: Collaborate with security analysts and architects to design and implement SIEM solutions using Elasticsearch. Optimize SIEM rules, alerts, and dashboards for efficient threat detection. Collaborate effectively with others to drive forward key security objectives Presentation and documentation writing (to both … Experience in key cyber technologies such as SIEM technologies (Elastic preferred), vulnerability management, access managementand other commonly used Enterprise security controls. Ideally from both a development and operational perspective Advantageous: SIEM implementation and usage Experience of Elastic Stack (ELK) Knowledge of Offensive testing frameworks Knowledge of Linux, Windows and Network Administration Knowledge and experience of cloud services (public or More ❯
architecture or design responsibilities Working knowledge of key infrastructure domains (networks, operating systems, databases, cloud platforms) Familiarity with common security controls and technologies (e.g., firewalls, WAFs, endpoint protection, IAM, SIEM) Experience with public cloud security (AWS, Azure, GCP) and an understanding of security best practices in those environments Understanding of enterprise security standards and frameworks such as ISO 27001, NIST More ❯
We are data insight experts, empowering clients to own, manage and rule their data. One of our specialisations is incybersecurity consultancy offering end-to-end SIEM services, helping clients design, deploy, and optimise security monitoring and threat detection solutions. Our team provides comprehensive support across all stages of SIEM implementation, from initial strategy and solution design to deployment and ongoing … focus is on delivering tailored solutions that enhance security postures, maintain compliance, and provide actionable threat intelligence. What we're looking for We are seeking a client-focused Senior SIEM Consultant with a strong foundation in SIEM technologies, cybersecurity best practices, and threat detection strategies. In this role, you will work closely with clients to understand their security needs, provide … guidance on SIEM architecture, and design tailored solutions across platforms, including Splunk and other leading SIEM tools. You'll participate in hands-on configuration and optimisation as needed but with a primary focus on advising clients, developing design strategies, and ensuring their security objectives are met. This position is ideal for someone with experience in SIEM or SOC environments who More ❯
Degree in Computer Science, Cybersecurity, Information Systems, or a related field. 3-5 years of experience in informationsecurity, IT, or a related area. Familiarity with security tools (e.g., SIEM, endpoint protection, o365). Understanding of networking, operating systems, and application security principles. Strong analytical and problem-solving skills. Excellent written and verbal communication. Additional Preferred Qualifications Security certifications (e.g. More ❯
solid working knowledge of cloud security (AWS, Azure, GCP). Apply risk-based and threat-based approaches to evaluate and recommend appropriate and proportionate security technologies and solutions (e.g., SIEM, IAM, CASB, container security). Outline key security components, interfaces, and dependencies. Develop architectural diagrams and overviews. Document security design principles and provide rationale. Ensure designs align with business objectives More ❯
and best practices. Forensic investigation techniques. Prior experience deploying, configuring, managing, and/or operating security technologies is preferred, such as endpoint security (e.g. AV/EPP/EDR), SIEM, DLP, SWG, CASB, UEBA, IDS, IPS, firewalls, IAM/PIM/PAM, vulnerability management, MDM, etc. About us We're a diverse group of visionary innovators who provide trading andMore ❯
with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusion detection systems, andSIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience working on security operations, threat managementMore ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Reed Technology
with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusion detection systems, andSIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience working on security operations, threat managementMore ❯
with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusion detection systems, andSIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience working on security operations, threat managementMore ❯
with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusion detection systems, andSIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience working on security operations, threat managementMore ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Smart DCC
and Microsoft Defender. Excellent communication and stakeholder management skills. Eligible to gain and maintain HMG Security Clearance at "Security Check" (SC) level. Hands-on experience using Elasticsearch and other SIEM technologies. Exposure to security automation and threat intelligence platforms. Previous experience in delivering training and conducting cyber exercises. About the DCC: At the DCC, we believe in making Britain more More ❯
a comprehensive security plan. Test cyber-attacks regularly to address vulnerabilities. Monitor security trends, adapt strategies. Oversee incident monitoring, detection, response via SOC and MSSPs. Manage security tools like SIEMand endpoint protection. Lead incident response and post-incident analysis. Enforce policies for data privacy (GDPR & NIST). Conduct regular security audits. Manage vendor relationships and negotiate contracts. Report service More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
OpenSourced Ltd
timelines, affected systems, response actions, and improvement recommendations. Produce clear, detailed reports for client delivery. Technical Requirements: Hands-on experience in incident response and investigation using tools such as SIEM, SOAR, and EDR. Proficiency in analysing logs across multiple platforms (Networking, Windows, Mac, Linux, Cloud). Solid understanding of evidence collection and handling procedures. Familiarity with the NIST More ❯