would be the main focus of the role. Strong expertise with Microsoft Defender and Sentinel is needed. Key Skills & Experience from the Security Analyst: Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within More ❯
Milton Keynes, Loughton, Buckinghamshire, United Kingdom
VIQU IT
would be the main focus of the role. Strong expertise with Microsoft Defender and Sentinel is needed. Key Skills & Experience from the Security Analyst: Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within More ❯
engineer stepping into cyber security. What You'll Bring Strong experience with Microsoft 365 security, Defender, Intune, and Azure AD/Entra ID . Working knowledge of Azure Sentinel (SIEM) and KQL. Solid understanding of patch managementand endpoint security. Previous involvement in Cyber Essentials Plus or ISO27001 accreditation. Clear communication skills, able to engage technical and non-technical stakeholders. More ❯
Central London, London, United Kingdom Hybrid/Remote Options
Carrington Recruitment Solutions Limited
Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, andSIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery and ongoing support. This is a great opportunity and salary is dependent upon experience. More ❯
principles. Strong knowledge of frameworks such as NIST, ISO 27001, OWASP, and CIS. Experience designing and implementing secure, compliant PCI-DSS solutions. Solid grounding in tools and technologies like SIEM, IDS/IPS, DLP, endpoint protection, IAM, and encryption. Ability to communicate complex concepts clearly and influence at all levels. Certifications such as CISSP, CCSP, CISM, or TOGAF are a More ❯
and webinars. Skills & Must-Haves Proven experience as a Cyber Security Pre-Sales Consultant (minimum 2 years). Strong understanding of cyber security solutions, including managed services, SOC/SIEM, vulnerability management, and compliance frameworks (ISO27001, NIST, Cyber Essentials, etc.). Excellent communication and presentation skills for both technical and non-technical audiences. Ability to build rapport and credibility with More ❯
and availability. Support change and release management. Oversee the transition of new security projects into SOC operations. Required Skills & Experience Active DV Strong experience with SOC tools (IDPS, Firewalls, SIEM/Splunk, Email & Web protection). Hands-on experience with Cisco ASR, Palo Alto, and Fortinet firewalls. Windows & RedHat server experience, including CIS hardening. If you're ready to take More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid/Remote Options
Experian Ltd
and alerts associated with cyber threats, intrusions, and compromises alongside a team of global security analysts following documented SLOs and processes. Analyze events using security tooling and logging (e.g., SIEM, EDR) and assess potential risk/severity level of cyber threats; escalate higher-risk events to dedicated incident response andmanagement teams in the CFC according to established processes. Collaborate … Cloud Infrastructure (AWS, Azure, GCP), andSecurity Technologies (Anti-Virus, Intrusion Prevention, Web Application Firewalls) Interest in developing knowledge across common Incident Response andSecurity Monitoring applications such as SIEM (e.g., Qradar, Splunk), EDR (e.g., FireEye HX, CrowdStrike Falcon, Microsoft Defender), and SOAR (Palo Alto XSOAR, Google Secops/Chronicle) Desire to build technical skills and hands-on knowledge in … and reverse engineering In-depth knowledge of network and host security technologies and products (such as firewalls, network IDS, scanners) and improve these skills Security monitoring technologies, such as SIEM, IPS/IDS, UEBA, DLP, among others Scripting and automation Additional Information Benefits package includes: Flexible work environment, working hybrid or in the office if you prefer. Great compensation package More ❯
components to ensure visibility and completeness of data collection. Linux Proficiency: Administer and troubleshoot Linux-based systems, with command-line fluency and scripting ability (e.g. Bash, Python) to support SIEM operations, log parsing, and agent deployment. Detection Engineering & Threat Rules: Develop and tune custom detection rules using ESQL, EQL, and Lucene syntax to identify malicious activity. Use MITRE ATT&CK … assist SOC analysts in conducting triage and escalation. SOC Maturity & Policy Development: Contribute to the development of SOC processes and policies, including detection logic lifecycle, alert tuning procedures, andSIEM configuration governance. Play a key role in maturing the operational use of SIEM tooling and automation within the SOC environment. Defence Writing & JSP Familiarity: Prepare formal documentation in line with … Infrastructure environments. Familiarity with security frameworks such as MITRE ATT&CK, NIST CSF, or ISO 27001 including how to map TTP's to Rule coverage. Experience with SOAR or SIEM enrichment tools (e.g., TheHive, MISP, Cortex). Knowledge of additional log forwarding/processing tools (e.g. Elastic Agent, Fluentd). Exposure to vulnerability managementand threat intelligence platforms such as More ❯
Entra ID and enterprise identity security. * Experience implementing enterprise-level securityand compliance solutions. Preferred: * Microsoft certifications: SC-400, SC-200, SC-300, or SC-100. * PowerShell automation andSIEM/security analytics experience. Soft Skills: * Excellent communication and stakeholder management. * Strong problem-solving and ability to deliver under pressure. If you are interested please email your CV to for More ❯
Stoke-on-Trent, Staffordshire, England, United Kingdom
Hays Specialist Recruitment Limited
cybersecurity matters, advising senior leadership and collaborating across departments. What We're Looking For Security leadership experience in a complex organisation, ideally with team management responsibilities. Technical security background: SIEM, EDR and vulnerability management tools Strong background in vulnerability and risk management, including scanning, assessing, and mitigating risks. Hands-on experience securing Microsoft environments, covering cloud infrastructure, Active Directory/ More ❯
technical audiences. Proven experience leading client-facing security reviews . Desirable CISSP, CISM , or equivalent certifications. Experience auditing or delivering compliance frameworks. Familiarity with RMM/XDR/EDR , SIEM, and vulnerability scanning platforms. Background in mentoring or managing small teams. Exposure to incident response and tabletop exercises. Reasonable Adjustments: Respect and equality are core values to us. We are More ❯
Manchester, Lancashire, United Kingdom Hybrid/Remote Options
Nomios
likely have: Proven experience designing and implementing enterprise cyber security solutions. Hands on experience with vendors such as Fortinet, Palo Alto, Juniper, Check Point, or Netskope, and familiarity with SIEM, SOAR, and managed security services. Strong understanding of enterprise security architecture frameworks (e.g. SABSA, TOGAF, NIST, ISO 27001). A confident, engaging personality with the ability to build rapport andMore ❯
Basingstoke, Hampshire, United Kingdom Hybrid/Remote Options
Nomios
likely have: Proven experience designing and implementing enterprise cyber security solutions. Hands on experience with vendors such as Fortinet, Palo Alto, Juniper, Check Point, or Netskope, and familiarity with SIEM, SOAR, and managed security services. Strong understanding of enterprise security architecture frameworks (e.g. SABSA, TOGAF, NIST, ISO 27001). A confident, engaging personality with the ability to build rapport andMore ❯
Stevenage, Hertfordshire, South East, United Kingdom Hybrid/Remote Options
MBDA
sustainable mitigation strategies. Manage remediation and closure of security cases, ensuring timely implementation of corrective actions. Develop and maintain threat scenarios to validate detection and response across SOC, EDR, SIEM, and XDR platforms. Translate threat intelligence into testable hypotheses and simulation exercises in collaboration with Threat Intelligence teams. Utilise adversarial emulation tools (Caldera, Atomic Red Team, AttackIQ, SCYTHE, Cobalt Strike More ❯
Stevenage, Hertfordshire, England, United Kingdom Hybrid/Remote Options
MBDA
sustainable mitigation strategies. Manage remediation and closure of security cases, ensuring timely implementation of corrective actions. Develop and maintain threat scenarios to validate detection and response across SOC, EDR, SIEM, and XDR platforms. Translate threat intelligence into testable hypotheses and simulation exercises in collaboration with Threat Intelligence teams. Utilise adversarial emulation tools (Caldera, Atomic Red Team, AttackIQ, SCYTHE, Cobalt Strike More ❯
Proven track record in CyberArk upgrades and custom integrations. Excellent communication and stakeholder engagement skills. Desirable Experience in financial services or banking environments. Familiarity with Sentinel, Defender XDR, andSIEM integrations. CyberArk Defender & Sentry certifications. Please apply within for further details - Matt Holmes, Harvey Nash More ❯
and securing platforms such as Entra ID (Azure AD), Microsoft 365 E5, Azure IaaS/PaaS, Windows/Linux/Unix. o Strong knowledge of security tooling such as SIEM, endpoint detection (EDR/XDR), and vulnerability management platforms. o Hands-on experience with policy development, access control models (RBAC, ABAC), and logging standards. o Experience supporting assurance activities or … security vetting to SC level. Desirable o Experience working in a regulated or government environment, particularly within research, energy, or national infrastructure. o Knowledge of Incident Management, Vulnerability Assessments, SIEM & SOC Systems. o Knowledge of OT/ICS/SCADA security principles and industrial control environments. o Experience designing or reviewing secure software supply chain and CI/CD security. More ❯
SIEM Engineer Contract - Inside IR35 Duration: March 2026 Reading (Hybrid) Are you a seasoned SIEM (SecurityInformationandEvent Monitoring) professional looking to take your career to new heights? If so, this could be the perfect opportunity for you! The company is seeking a talented SIEM Engineer to join their dynamic team and play a pivotal role in maintaining and … enhancing their security monitoring platform. As the SIEM Engineer, you will be responsible for ensuring the optimal performance, scalability, and integration of the company's SIEM platform. This includes onboarding log sources, developing analytical rules, creating automation for triage and remediation, and integrating with other IT and Operational Technology platforms. You will collaborate with the wider Threat Detection and Response … team to ensure the SIEM platform meets their day-to-day needs and provide support during incidents as necessary. Key Responsibilities of the SIEM Engineer Develop and maintain the security monitoring platform, ensuring it meets the company's evolving security requirements. Participate in infrastructure projects to plan and implement solutions for security monitoring. Design, implement, and maintain detection rulesets to More ❯
draft, implement, and maintain informationsecurity policies, procedures, and guidelines. - Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards (e.g., ISO 27001). - SIEM & Vulnerability Management. - Monitor and respond to security incidents, conducting investigations and implementing corrective actions. - Collaborate with IT and other departments to ensure the security of network infrastructure and data. - Manage … problem-solving skills. - Strong communication and interpersonal skills. **Preferred Qualifications:** - Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX. - Familiarity with security tools and technologies such as SIEM, DLP, and endpoint protection. CISA/CISSP/CCSP MCSA-Microsoft Windows Server MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional;CCNA/CCNP Hays More ❯
draft, implement, and maintain informationsecurity policies, procedures, and guidelines.- Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards (e.g., ISO 27001).- SIEM & Vulnerability Management.- Monitor and respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage … problem-solving skills.- Strong communication and interpersonal skills.**Preferred Qualifications:**- Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX.- Familiarity with security tools and technologies such as SIEM, DLP, and endpoint protection. CISA/CISSP/CCSP MCSA-Microsoft Windows Server MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional;CCNA/CCNP Hays More ❯
CompTIA CySA+, Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerability management Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
Central London, London, United Kingdom Hybrid/Remote Options
Carrington Recruitment Solutions Limited
Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, andSIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery and ongoing support This is a great opportunity and salary is dependent upon experience. More ❯