Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Lloyds Banking Group
HAVE (DEPENDING ON THE TEAM) Lab 1: Cloud Enterprise and Computer Security Data & Analytics (KQL/SQL or BigQuery for GCP) Power Platform and PowerShell Lab 2: Security Operations SIEMmanagement Advanced logging DLP technical policy development Ability to build and train machine learning models to address business needs Power Platform and PowerShell WORKING WITH US We're proud to More ❯
escalated cases. • Proven leadership capability with experience line managing analysts, conducting performance reviews, and overseeing HR-related duties. • Experience providing ticket quality assurance and training delivery. • Familiarity with leading SIEM, endpoint and XDR security platforms, in multi-tenant MSSP environments. • Willingness to obtain or hold relevant security certifications, such as SBT BTL2 and CREST CRIA. More ❯
components including Networking, Identity Management, Cloud Services, Virtualization and OS Windows/Linux/Mac. Technical understanding of security tools and strategies. E.g., security frameworks, security operations, incident response, SIEM, XDR, EDR/EPP, IPS/IDS/NDR, etc. Ability to articulate and demonstrate the business application and value of the Arctic Wolf technology to all audiences, ranging from More ❯
requirements. Excellent communication and stakeholder management skills. Comfortable working in a fast-paced, iterative, and agile environment. Preferred Experience: Solid understanding of cyber security concepts such as threat detection, SIEM, anomaly detection, and incident response. Experience with tools for tracking ML models in production (e.g., MLflow). We encourage you to apply even if your experience is not a More ❯
Ability to lead and mentor teams on secure coding, threat modelling, and secure architecture patterns. Experience with monitoring, logging, andsecurity telemetry platforms (e.g., Prometheus, Loki, ELK, XDR/SIEM integrations). Please note candidates must hold or be willing to undergo SC clearance. More ❯
Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, andSIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery and ongoing support This is a great opportunity and salary is dependent upon experience. More ❯
Employment Type: Permanent
Salary: £75000 - £80000/annum Negotiable depending on experience
Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, andSIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery and ongoing support This is a great opportunity and salary is dependent upon experience. More ❯
directly with clients during live cyber incidents, offering reassurance and expert guidance Produce detailed incident reports with root cause analysis and actionable recommendations Perform forensic and log analysis using SIEM, EDR, SOAR, and other security tools Collaborate across teams to enhance response playbooks and internal processes Stay informed on emerging threats and tactics to strengthen response strategies Skills/Must More ❯
Ability to lead and mentor teams on secure coding, threat modelling, and secure architecture patterns. Experience with monitoring, logging, andsecurity telemetry platforms (e.g., Prometheus, Loki, ELK, XDR/SIEM integrations). Damia Group Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept our More ❯
engineering, customer success, or technical services. Proven expertise in security, automation, scripting (bash/python), and API integrations. Strong knowledge of security operations centers (SOC), cloud environments, EDR, andSIEM tools is highly desirable. Exceptional communication skills, with the ability to explain technical concepts to non-technical audiences. Strong analytical, problem-solving, and conceptual thinking abilities. Excellent interpersonal skills, with More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
Security: Implement and monitor DNS security solutions to prevent cyber threats. Incident Response: Formulating and documenting a solid process utilising a 3rd party support partner Security Monitoring & Logging: Develop SIEM solutions, logging strategies, and real-time threat intelligence. Monitor, audit, and improve infrastructure security posture using automated tooling. Policy & Procedures: Define and enforce security policies, incident response strategies, and structured … with Terraform for IaC security automation. Knowledge of DevOps pipelines (CI/CD) andsecurity hardening. Deep understanding of PCI DSS compliance, security frameworks, and audit processes. Familiarity with SIEM solutions, security orchestration platforms, and log management. Strong experience with incident response planning, threat detection, and mitigation. Ability to define security policies, procedures, and structured action plans for compliance andMore ❯
security assessment tools Management of security with regards to new systems acquisition. Deliver in person Cyber Security training programmes. Requirements: Networking experience Cyber Security Active Directory and Virtualisation experience. SIEM experience Email Security Vulnerability Management The Package: If successful our client is offering a salary between £40,000 - £42,000 per annum, favourable holiday allowance. How to Apply : If you More ❯
Security Services Strong background in IT network security concepts. Strong knowledge of data andinformation flows, information governance, network protocols. Knowledge of system hardening techniques. Knowledge and experience in SIEM technologies. Knowledge and experience in vulnerability and risk management processes. Knowledge and experience of applying cybersecurity controls within SAAS environments. Project Engagement Strong stakeholder management skills Knowledge and experience in More ❯
Processes: Secure by Design and RMADs/Risk Assessment Cloud security architecture documentation, s ecurity controls mapping and c ompliance checking automation MoD Cyber Operations: SOC tool evaluation support, SIEM use case development, Metrics and reporting frameworks, and Technology integration assessment. Cyber Vulnerability Investigations Identity & Access: IAM architecture reviews, p rivileged access solutions, authentication technology assessment, and Zero Trust implementation More ❯
architecture, and drive strategy in a fast-paced, forward-thinking environment. What youll need: 3+ years in complex IT or consultancy environments Knowledge of HMG SPF, ISO27001, identity management, SIEM, PKI, cryptography, and secure frameworks Experience in public sector programmes Bonus: PCiIAA, SABSA, TOGAF, or a masters/STEM degree If youre security-cleared (or eligible), ready to lead, andMore ❯
Qualys OSCP (Offensive Security Certified Professional) status Microsoft SC-200 and AZ-500 certifications Experience with Microsoft Defender suite (XDR, Endpoint, Cloud, Office 365) Good knowledge of Microsoft Sentinel SIEM Expertise with Azure Firewalls and Email Security Solutions (Mimecast, Egress) Experience with Endpoint Detection & Response (SentinelOne) and Vulnerability management tools (e.g. Tenable, Qualys) You will be part of a recognised More ❯
and drive strategy in a fast-paced, forward-thinking environment. What you’ll need: 3+ years in complex IT or consultancy environments Knowledge of HMG SPF, ISO27001, identity management, SIEM, PKI, cryptography, and secure frameworks Experience in public sector programmes Bonus: PCiIAA, SABSA, TOGAF, or a master’s/STEM degree If you’re security-cleared (or eligible), ready to More ❯
on experience in designing, implementing, and operationalizing security controls for various IT and enterprise systems. Exhibit proficiency in multiple security technologies, such as Next-Gen Firewalls, SASE, NAC, DLP, SIEM, PAM, EDR, NDR, etc. Possess strong knowledge of networking security concepts, including routing, segmentation, zones, NAT, etc. Communicate complex technical information effectively to both technical and non-technical audiences. Autonomously More ❯
security reviews and risk assessments, and partner with colleagues to respond to incidents and remediate system vulnerabilities. evaluate remediation Review, analyze and correlate security logs as well as improve SIEM solution. Strong knowledge in Security Cloud support for AWS, OCI, and Azure. Develop and maintain incident response playbooks and procedures. Candidate Profile Bachelor's degree in Computer Science, Cyber Security … years Experience working in a security operations center for a global enterprise. Experience using and administering endpoint, network, and cloud security tools to identify and protect against threats. (SIEM, EDR, NDR, SSO, PAM, IPS/IDS, CASB, firewalls). In-depth knowledge of cyber security risks and threats. Experience developing and implementing security operations center procedures and playbooks. Strong analytical More ❯
City of London, London, United Kingdom Hybrid / WFH Options
MS Talent Ltd
track record in selling to corporate and/or public sector clients. Strong expertise in Checkpoint technologies and Cybersecurity Managed Services. Experience selling a range of services such as SIEM, Managed Firewall, Vulnerability Management, and Threat Hunting. Excellent presentation, communication, and organisational skills. Proven ability to work collaboratively with pre-sales, technical, and support teams. Desirable Skills & Experience Familiarity with More ❯
trust by engaging across the business, evangelising Security across both tech and non-tech areas Who you are: Keen interest in security, with the want to develop. Experience in SIEM or SOAR Knowledge of the MITRE ATT&CK Framework or common attack and response methods Previous experience with incident response in a fast-paced environment Knowledge of Cloud environments AWS More ❯
automation, alert enrichment and detections Knowledge of adversary tactics, techniques, and procedures (TTPs) and MITRE ATT&CK principles Comfortable with macOS, Windows & Linux operating systems Domain experience working with SIEMand SOAR platforms Experience developing tools and automation using common DevOps toolsets and programming languages Understanding of malware functionality and persistence mechanisms Ability to analyse endpoint, network, and application logs More ❯
Cambridge, Cambridgeshire, East Anglia, United Kingdom
The Bridge (IT Recruitment) Limited
automation, alert enrichment and detections Knowledge of adversary tactics, techniques, and procedures (TTPs) and MITRE ATT&CK principles Comfortable with macOS, Windows & Linux operating systems Domain experience working with SIEMand SOAR platforms Experience developing tools and automation using common DevOps toolsets and programming languages Understanding of malware functionality and persistence mechanisms Ability to analyse endpoint, network, and application logs More ❯
Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, andSIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery and ongoing support This is a great opportunity and salary is dependent upon experience. More ❯