for clients, as they work to address the challenges associated with today’s cyber threat landscape. Your Impact SOC Advisory 4+ years of consulting experience in SOC, security engineering, SIEM administration, and incident managementand demonstrated success with serving large, multinational organisations in designing and implementing an organisation’s security operations program, organisational structures, and capabilities Possess a deep technical … knowledge in Security Incident andEventManagement (SIEM) platforms, Security Orchestration and Response (SOAR) technologies, Endpoint Protection and Response/Next Gen Protection and Response (EDR/XDR) tools, Next GenFirewalls, Threat Intelligence and Hunting platforms Defensive Security Skills (desired) Experience in security operations design, engineering and/or analysis and investigations, ideally in complex environments, with securityevent correlations More ❯
for clients, as they work to address the challenges associated with today’s cyber threat landscape. Your Impact SOC Advisory 4+ years of consulting experience in SOC, security engineering, SIEM administration, and incident managementand demonstrated success with serving large, multinational organisations in designing and implementing an organisation’s security operations program, organisational structures, and capabilities Possess a deep technical … knowledge in Security Incident andEventManagement (SIEM) platforms, Security Orchestration and Response (SOAR) technologies, Endpoint Protection and Response/Next Gen Protection and Response (EDR/XDR) tools, Next GenFirewalls, Threat Intelligence and Hunting platforms Defensive Security Skills (desired) Experience in security operations design, engineering and/or analysis and investigations, ideally in complex environments, with securityevent correlations More ❯
for clients, as they work to address the challenges associated with today’s cyber threat landscape. Your Impact SOC Advisory 4+ years of consulting experience in SOC, security engineering, SIEM administration, and incident managementand demonstrated success with serving large, multinational organisations in designing and implementing an organisation’s security operations program, organisational structures, and capabilities Possess a deep technical … knowledge in Security Incident andEventManagement (SIEM) platforms, Security Orchestration and Response (SOAR) technologies, Endpoint Protection and Response/Next Gen Protection and Response (EDR/XDR) tools, Next GenFirewalls, Threat Intelligence and Hunting platforms Defensive Security Skills (desired) Experience in security operations design, engineering and/or analysis and investigations, ideally in complex environments, with securityevent correlations More ❯
designing and delivering UKAEA's greenfield Identity and Access Management (IAM) and Privileged Access Management (PAM) solutions, while contributing to the development of the SecurityInformationandEventManagement (SIEM) andSecurity Operations Centre (SOC) capabilities. You will lead the IAM/PAM workstreams and provide specialist input into SIEM/SOC implementation, ensuring all solutions align with secure-by … PAM telemetry into SIEM tooling for enhanced visibility and detection. Provide technical oversight and assurance when engaging Managed Service Providers (MSPs) or third-party vendors. Support the development and implementation of SIEM/SOC capabilities, assisting in log source onboarding, alert tuning, and incident response improvements. Mentor and train junior team members, building internal capability in identity and access management. … SC-level national security clearance Desirable o At least a HND in InformationSecurity, Computer Science, or a related STEM field, or equivalent experience. Degree Preferred o Understanding of SIEM/SOC integration and the relationship between IAM telemetry andsecurity monitoring. o Familiarity with ITSM workflows and change control procedures. o Experience conducting security risk assessments for third-party More ❯
designing and delivering UKAEA's greenfield Identity and Access Management (IAM) and Privileged Access Management (PAM) solutions, while contributing to the development of the SecurityInformationandEventManagement (SIEM) andSecurity Operations Centre (SOC) capabilities. You will lead the IAM/PAM workstreams and provide specialist input into SIEM/SOC implementation, ensuring all solutions align with secure-by … PAM telemetry into SIEM tooling for enhanced visibility and detection. Provide technical oversight and assurance when engaging Managed Service Providers (MSPs) or third-party vendors. Support the development and implementation of SIEM/SOC capabilities, assisting in log source onboarding, alert tuning, and incident response improvements. Mentor and train junior team members, building internal capability in identity and access management. … SC-level national security clearance Desirable o At least a HND in InformationSecurity, Computer Science, or a related STEM field, or equivalent experience. Degree Preferred o Understanding of SIEM/SOC integration and the relationship between IAM telemetry andsecurity monitoring. o Familiarity with ITSM workflows and change control procedures. o Experience conducting security risk assessments for third-party More ❯
verbal communication, with a positive and “can do” approach to their work. Nice to Have: Working knowledge of hyperscale cloud andsecurity ecosystems (e.g., AWS/Azure/GCP; SIEM/EDR/IAM tooling) and cloud commercials (committed spend, RIs/Savings Plans, unit-based pricing) – willingness to learn the specifics is essential. CIPS or equivalent; experience with FinOps More ❯
Huntingdon, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
AS environments Technology skills/Experience Understanding of principles of network and boundary protection technologies (firewalls, mail gateways, load balancers, antivirus, IPS, IDS, Diodes) Understanding of Protective Monitoring systems (SIEM/SOC) and the principles of their deployment. Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc) Understanding of encryption and protocols and structures in support of deployment, e.g. More ❯
South West London, London, England, United Kingdom
Robert Half
legal teams to embed security best practices into all new projects, processes, and technology implementations. Manage the security technology stack and infrastructure, evaluating and implementing new security tools (e.g., SIEM, EDR, vulnerability scanners) to improve efficiency and capability. Manage the Cyber Security budget and all security-related vendor relationships and contracts. Your Profile The ideal candidate will have worked in More ❯
and attention to detail. Service Architecture: Experience in design, implementation and costing of managed security solutions, preferably in the area of Managed Detection and Response (MDR) and/or SIEM/SOAR/SOC. Network: The candidate has an extensive network in the cybersecurity industry. Willingness to travel: The role requires sporadic travel activities for partner as well as internal More ❯
energy, media & entertainment, or manufacturing. Hands-on technical expertise in building security capabilities in code, deploying infrastructure as code, and implementing enterprise security solutions (e.g. WAF, IPS, Anti-DDOS, SIEM) Amazon is an equal opportunity employer and does not discriminate on the basis of protected veteran status, disability, or other legally protected status. Our inclusive culture empowers Amazonians to deliver More ❯
SOC initiatives What we’re looking for Strong background in cyber security within a SOC environment Hands-on knowledge across network security, infrastructure, operating systems, and applications Experience with SIEM tools and/or packet capture technologies Clear understanding of the OSI model and key protocols (DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S) Strong communication More ❯
Sector. Key Requirements: Proven experience working within SOC management, within Energy/Construction/Utilities Hands on leadership and team management skills. Proven experience with Enterprise Technologies (SOC/SIEM/XDR). Strong working knowledge of M365 security features. Familiarity with cloud platforms, in particular Azure and/or AWS. Ability to effectively communicate SOC value to stakeholders through More ❯
Employment Type: Contract
Rate: £600.0 - £800.0 per day + up to £800 per day (Inside IR35)
Sector. Key Requirements: Proven experience working within SOC management, within Energy/Construction/Utilities Hands on leadership and team management skills. Proven experience with Enterprise Technologies (SOC/SIEM/XDR). Strong working knowledge of M365 security features. Familiarity with cloud platforms, in particular Azure and/or AWS. Ability to effectively communicate SOC value to stakeholders through More ❯
modelling, risk assessments, and vulnerability management GCP security tooling (Security Command Center, Cloud Armor, etc.) CI/CD pipeline security integration Infrastructure as Code (Terraform, Deployment Manager) Experience with SIEM tools (Splunk, Chronicle) Desirable: GCP Security Engineer certification, MOD experience, scripting (Python/Bash), container security (GKE, Kubernetes) Why Should a Candidate Apply This is a unique opportunity to work More ❯
Fi, internet, and unified communications. Administer and monitor systems including Windows Server, Azure, Entra ID, Intune, VMWare, VXRail, Rubrik, Commvault , and more. Conduct vulnerability analysis and manage patching using SIEM tools (eg, Rapid7). Collaborate with the security team to ensure proper infrastructure security controls are deployed and maintained. Lead technical troubleshooting and respond to incidents in line with change More ❯
requirements. Excellent communication and stakeholder management skills. Comfortable working in a fast-paced, iterative, and agile environment. Preferred Experience: Solid understanding of cyber security concepts such as threat detection, SIEM, anomaly detection, and incident response. Experience with tools for tracking ML models in production (e.g., MLflow). We encourage you to apply even if your experience is not a More ❯
cloud architectures (IAM, encryption, VPC). Lead risk assessments, gap analyses & threat modelling. Advise on compliance (GDPR, NCSC Principles, ISO 27001). Configure cloud-native security tools & integrate with SIEM (Splunk, Chronicle). Embed security in CI/CD pipelines with DevOps teams. Support incident response & recovery for cloud-native environments. What You Bring Strong cloud architecture background. Knowledge of More ❯
swindon, wiltshire, south west england, united kingdom
Ncounter LTD
cloud architectures (IAM, encryption, VPC). Lead risk assessments, gap analyses & threat modelling. Advise on compliance (GDPR, NCSC Principles, ISO 27001). Configure cloud-native security tools & integrate with SIEM (Splunk, Chronicle). Embed security in CI/CD pipelines with DevOps teams. Support incident response & recovery for cloud-native environments. What You Bring Strong cloud architecture background. Knowledge of More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Sopra Steria
protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and experience are exactly what we More ❯
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria
protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and experience are exactly what were More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
security, with strong technical expertise in areas such as infrastructure, cloud, or application security. Deep understanding of GRC frameworks, methodologies, and risk assessment techniques. Familiarity with key security technologies (SIEM, DLP, IAM, vulnerability scanners). Strong knowledge of regulatory and compliance standards. Demonstrated experience leading teams and managing cross-functional projects. Relevant experience in CISSP, CISM, CRISC, ISO 27001 Lead More ❯
implementing a robust and trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities andMore ❯
implementing a robust and trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities andMore ❯
Northampton, Northamptonshire, East Midlands, United Kingdom
VIQU IT Recruitment
would be the main focus of the role. Strong expertise with Microsoft Defender and Sentinel is needed. Key Skills & Experience from the Security Engineer Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within More ❯
would be the main focus of the role. Strong expertise with Microsoft Defender and Sentinel is needed. Key Skills & Experience from the Security Engineer Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within More ❯