Applications before moving into a Cyber position, and have strong experience of working in a Bank or Financial Services setting. You will have excellent exposure to Cyber Security frameworks, SIEMand Virtualization tools. Mandarin language skills are preferred but not mandatory. In return, you will get a highly competitive annual salary and exceptional wider benefits package as well as the More ❯
Applications before moving into a Cyber position, and have strong experience of working in a Bank or Financial Services setting. You will have excellent exposure to Cyber Security frameworks, SIEMand Virtualization tools. Mandarin language skills are preferred but not mandatory.In return, you will get a highly competitive annual salary and exceptional wider benefits package as well as the opportunity More ❯
of security components and associated platform components. Report Security Incidents. Minor issue resolution. Pre-requisites: Experience of 1-3 years in security technologies and incident response management Basic understanding SIEM, APT, threat intelligence. Further info: Competitive Basic/day rate London To apply: Please either register your CV and complete the information fields requested or send your CV to referencing More ❯
with external vendors. Ensure the timely, effective and efficient closure of logged incidents. Pre-requisites: Experience of 4-8 years in security technologies and incident response management Good understanding SIEM, APT, threat intelligence. Further info: Competitive Basic London To apply: Please either register your CV and complete the information fields requested or send your CV to referencing DJW5303 and your More ❯
with external vendors. Ensure the timely, effective and efficient closure of logged incidents. Pre-requisites: Experience of 4-8 years in security technologies and incident response management Good understanding SIEM, APT, threat intelligence. Further info: Competitive Basic/day rate London To apply: Please either register your CV and complete the information fields requested or send your CV to referencing More ❯
level BGP , inter-AS, and policy/routing configurations. Apply Linux expertise across PaaS, IaaS, SaaS, and CaaS environments. Work with supporting services such as DNS, ADC, AAA, firewalls, SIEM, protocol inspection , and network visibility tools. Align architecture with 3GPP mobile standards (Rel. 15+), IMS, RAN , and CUPS/WWC models. Contribute to securityand compliance requirements, including alignment with More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
QBE Management Services (UK) Limited
TTPs), with expertise in the MITRE ATT&CK Framework. Hands-on technical knowledge in cyber detection engineering, security tools, and infrastructure. Skilled in Detection-as-Code and experienced with SIEM query languages. Confident communicator with experience working alongside global technical teams and senior stakeholders. Proactive, collaborative, and driven by curiosity and continuous improvement. Why QBE? At My Best At QBE More ❯
improve developer productivity and experience across the SDLC Cost optimise infra through rightsizing and creating ephemeral, on-demand environments Proactively monitor for securityand reliability using Observability tooling including SIEM, APM, tracing, infrastructure metrics, logs and dashboards Durably engineer away toil Skills, Knowledge & Expertise You will be a great fit here if you: Are passionate about DevOps and, SecurityandMore ❯
Working closely with the SOC Manager across daily activities of the Security Operations Center (SOC) to ensure Service Level Objectives are achieved. Continuously monitoring security alerts and incidents using SIEM tools and other security technologies. Creating detection use cases in the SIEM, analysing securityevent data for proactive threat hunting, and conducting research on the latest threats and vulnerabilities to … CISM, GCIA, GCIH, GCFE, GCFA, GREM, Splunk Power User and/or similar certifications is preferred. Verifiable experience in Security Operations and Incident Response. Experience in performing analysis with SIEM technologies such as Splunk and/or Google Chronicle. Experience in performing proactive and reactive threat hunting using MITRE ATT&CK or similar frameworks. In-depth understanding and working knowledge More ❯
Working closely with the SOC Manager across daily activities of the Security Operations Center (SOC) to ensure Service Level Objectives are achieved. Continuously monitoring security alerts and incidents using SIEM tools and other security technologies. Creating detection use cases in the SIEM, analysing securityevent data for proactive threat hunting, and conducting research on the latest threats and vulnerabilities to … CISM, GCIA, GCIH, GCFE, GCFA, GREM, Splunk Power User and/or similar certifications is preferred. Verifiable experience in Security Operations and Incident Response. Experience in performing analysis with SIEM technologies such as Splunk and/or Google Chronicle. Experience in performing proactive and reactive threat hunting using MITRE ATT&CK or similar frameworks. In-depth understanding and working knowledge More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Randstad Technologies
Engineer (SC Cleared) - Contract Location: United Kingdom 100% Remote? Duration: 6 Months Clearance: Active SC Clearance is required Are you a hands-on Security Engineer with deep expertise in SIEM , Azure Sentinel , and incident response Join a dynamic cyber security team to support a critical national infrastructure (CNI) project involving the deployment of Windows Hello for a major UK utility … company. What You'll Be Doing: Supporting and tuning Microsoft Sentinel and other SIEM platforms (KQL scripting) Managing escalated incidents from L1 analysts and leading full incident response lifecycle (MIM) Conducting in-depth data analysis , threat hunting, and forensic investigations Maintaining and enhancing SOC documentation, SOPs, and playbooks Collaborating with cross-functional teams and contributing to security strategy Ensuring security … policies align with standards like NIST, ISO 27001, MITRE ATT&CK We're Looking for Someone With: Expert-level SIEM experience (Azure Sentinel highly preferred) Strong knowledge of Kusto Query Language (KQL) Demonstrated experience in cybersecurity incident response & breach handling Familiarity with threat intelligence, vulnerability management , and cloud security tools Proactive mindset with ability to work independently in high-pressure More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
Role Title: SIEM Engineer Duration: contract to run until 31/03/2025 Location: Wokingham, Hybrid 2 days onsite Rate: Clearance required: Active SC is essential Role purpose/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. Incident Response … Generate reports on security events, trends, and system performance. Collaboration - Work with IT andsecurity teams to improve overall cybersecurity posture. Required Skills & Qualifications Technical Expertise - Strong knowledge of SIEM platforms, network security, and cybersecurity frameworks. Certifications - CISSP, CEH, GIAC, or vendor-specific SIEM certifications. Programming & Scripting - Familiarity with Python, PowerShell, or other scripting languages. Analytical Thinking - Ability to analyze More ❯
Support and Infrastructure/Information Systems). Responsibilities cover analysis, monitoring, reporting, alerting, and investigation activities using a variety of security platforms, including AI/ML and behavioural analytics, SIEM (SecurityInformationEventManagement), Network Packet Capture, Anti-Malicious Code, and Threat Detection technologies across the UK Network Perimeter. The SOC Analyst reports to the SOC Manager and conducts a … operating procedures (SOPs), and runbooks to support operational readiness. Strong working knowledge of detection engineering, including tuning detection logic and reducing false positives to enhance alert fidelity. Proficiency in SIEM rule tuning and the creation of custom detection use cases aligned with threat models and operational requirements. Hands-on experience with security automation and orchestration, including scripting in Python, PowerShell More ❯
Employment Type: Contract
Rate: £45.00 - £85.00/hour In IR35 (PAYE & Umbrella) available
hands-on' shift-based roles, working as part of a 24/7 operation working in a standard rotation shift pattern. They are responsible for utilising the SOC's SIEMand SOAR toolsets to detect and investigate potential Securityand Service Incidents occurring within the monitored networks. Main Duties Monitor, triage, analyse and investigate alerts, log data and network traffic … skills. Strong analytical skills Must have expertise on TCP/IP network traffic andevent log analysis. Must have knowledge and hands-on experience of Microsoft Sentinel (or any SIEM tool). Must have administrative skills in several operating systems, such as Windows, OS X, and Linux Must be proficient in basic shell scripting, creating Snort rules, or other log More ❯
Wokingham, Berkshire, South East, United Kingdom Hybrid / WFH Options
Experis
Role Title: SIEM Engineer Duration: contract to run until 26/12/2025 Location: Wokingham, Hybrid 2 days onsite Rate: £460 p/d Via Umbrella inside IR35 Clearance required: Active SC is essential Role purpose/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs … Generate reports on security events, trends, and system performance. Collaboration - Work with IT andsecurity teams to improve overall cybersecurity posture. Required Skills & Qualifications Technical Expertise - Strong knowledge of SIEM platforms, network security, and cybersecurity frameworks. Certifications - CISSP, CEH, GIAC, or vendor-specific SIEM certifications. Programming & Scripting - Familiarity with Python, PowerShell, or other scripting languages. Analytical Thinking - Ability to analyze More ❯
Loughton, Essex, England, United Kingdom Hybrid / WFH Options
Profile 29
Security: Implement and monitor DNS security solutions to prevent cyber threats. Incident Response: Formulating and documenting a solid process utilising a 3rd party support partner Security Monitoring & Logging: Develop SIEM solutions, logging strategies, and real-time threat intelligence. Monitor, audit, and improve infrastructure security posture using automated tooling. Policy & Procedures: Define and enforce security policies, incident response strategies, and structured … with Terraform for IaC security automation. Knowledge of DevOps pipelines (CI/CD) andsecurity hardening. Deep understanding of PCI DSS compliance, security frameworks, and audit processes. Familiarity with SIEM solutions, security orchestration platforms, and log management. Strong experience with incident response planning, threat detection, and mitigation. Ability to define security policies, procedures, and structured action plans for compliance andMore ❯
Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, andSIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO 27001, NIST, GDPR, SOC2, FCA). Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. … Azure AD, MFA, Conditional Access, Single Sign-On (SSO), and Privileged Access Management (PAM). Threat Management & Incident Response: Ability to detect, respond to, and mitigate cyber threats using SIEM, endpoint security, and vulnerability management tools. Networking & Infrastructure Security: Understanding of firewalls, VPNs, SD-WAN, DNS security, endpoint protection, and cloud security controls. IT Service Management & Automation: Experience implementing ITIL More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Nomios
solutioning for one or more of the following vendors: Fortinet, Palo Alto, Juniper, Cisco, Netskope, Zscaler, CrowdStrike. We would also love to receive applications from people with skills solutioning SIEM, SOAR, or Managed Security Services (experience in DDoS, WAF, IDAM, EDR, MDM or Vulnerability Management is a plus). We are also interested to hear from candidates with operational expertise More ❯
in-stream analytics without reliance on expensive indexing or hot storage. We specialize in comprehensive monitoring of logs, metrics, traces, andsecurity events with features such as APM, RUM, SIEM, Kubernetes monitoring, and more, enhancing operational efficiency and reducing observability spending by up to 70%. We seek a Junior Product Quality and Support Strategist professional who ensures that the More ❯
in-stream analytics without reliance on expensive indexing or hot storage. We specialize in comprehensive monitoring of logs, metrics, traces, andsecurity events with features such as APM, RUM, SIEM, Kubernetes monitoring, and more, enhancing operational efficiency and reducing observability spending by up to 70%. About the Role: We are looking for a Growth Product Manager to drive the More ❯
be considered Experience supporting bids, tenders, or large change requests Familiarity with secure infrastructure solutions and protocols Strong understanding of routing, switching, and network management technologies Exposure to Fortinet, SIEM solutions, or secure network tooling is advantageous Certifications (e.g. CCNA/CCNP, JNCIS/JNCIP) are desirable but not essential What's on Offer Salary up to More ❯
involve the following: Endpoint monitoring and analysis. Incident readiness and handling as part of the Computer Security Incident Response (CSIRT) team. Monitor and administer SecurityInformationandEventManagement (SIEM). Malware analysis and forensics research. Understanding/differentiation of intrusion attempts and false positives. Investigation tracking and threat resolution. Vulnerability identification & mitigation/remediation. Compose security alert notifications. Help More ❯
Previous experience working on bids and large, complex change requests. Solid understanding of various network and routing protocols. Experience working on secure infrastructure solutions. Experience with Network Management or SIEM designs, tooling, or support is advantageous. Previous experience with Juniper, Cisco, and Fortinet products is advantageous. This role requires you to be eligible and willing to undergo a high level More ❯
/or large and complex change requests. Solid understanding of a variety of network and routing protocols. Experience of working on secure infrastructure solutions. Experience with Network Management or SIEM designs, tooling or support is advantageous. Previous experience with Juniper, Cisco and Fortinet products is advantageous. This role will require you to be eligible and willing to undergo a high More ❯
Bracknell, Berkshire, United Kingdom Hybrid / WFH Options
CBSbutler Holdings Limited trading as CBSbutler
/or large and complex change requests. Solid understanding of a variety of network and routing protocols. Experience of working on secure infrastructure solutions. Experience with Network Management or SIEM designs, tooling or support is advantageous. This role will require you to be eligible and willing to undergo a high level of UK Security clearance. More ❯
Employment Type: Permanent
Salary: £62000 - £65000/annum £6K Car + 10% DV Allowance