Manchester, Lancashire, United Kingdom Hybrid / WFH Options
MI5
industry-leading technologies • Automation Tooling (Terraform/Ansible/Docker): Get hands-on experience with automation tools to streamline processes. • Monitoring and analysis (ELK, Splunk): Learn to monitor and analyse systems using powerful tools. • Storage (3PAR & Primera): Understand the intricacies of storage solutions and their management. We aim to develop More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
GCHQ Careers
Scripting languages (Python/PowerShell/Bash) Virtualisation (vSphere, Hyper-V) Networking (Cisco, Juniper, NSX) Automation tools (Terraform, Ansible, Docker) Monitoring and analysis (ELK, Splunk) Storage solutions (3PAR & Primera) We support your growth through exposure, technology use, and applications for specialist skill payments. External training and funded qualifications are encouraged More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
Working experience of Grafana Observability Suite (Loki, Mimir, Tempo). Administration and/or development experience of standard monitoring and automation tools such as Splunk, Datadog, Pagerduty, Rundeck. Familiarity with configuration management tools like Ansible, Puppet, or Chef. Certifications such as AWS Certified DevOps Engineer, Google Cloud Professional DevOps Engineer More ❯
Java, C++ CICD tools such as Azure DevOps, GitHub Actions, Gitlab, Jenkins, TeamCity Scripting languages such as PowerShell, bash Observability/Monitoring: Prometheus, Grafana, Splunk Containerisation tools such as Docker, K8S, OpenShift, EC, containers Hosting technologies such as IIS, nginx, Apache, App Service, LightSail Analytical and creative approach to problem More ❯
product, methodology and/or industry certifications. Experience in working in a regulated environment. Experience of; configuration management tools, Jenkins, host virtualisation, containerisation, ELK, Splunk, vulnerability scanners, proxies, WAFs, artefact management, serverless deployments, data streaming and transformation. Experience in secured AWS, or other, Cloud architectures and engineering solutions. What You More ❯
Cheltenham, Gloucestershire, United Kingdom Hybrid / WFH Options
MI5
ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You'll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur More ❯
ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur More ❯
Cheltenham, Gloucestershire, UK Hybrid / WFH Options
GCHQ
ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur More ❯
Hartpury, Gloucestershire, UK Hybrid / WFH Options
GCHQ
ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur More ❯
Tewkesbury, Gloucestershire, UK Hybrid / WFH Options
GCHQ
ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur More ❯
Cirencester, Gloucestershire, UK Hybrid / WFH Options
GCHQ
ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur More ❯
ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur More ❯
ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur More ❯
Childswickham, Worcestershire, UK Hybrid / WFH Options
GCHQ
ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur More ❯
ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur More ❯
ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur More ❯
ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur More ❯
ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur More ❯
ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur More ❯
Gloucester, Gloucestershire, UK Hybrid / WFH Options
GCHQ
ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur More ❯
ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur More ❯
ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur More ❯
ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You’ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur More ❯
ongoing investigations and set priorities. From there, you might analyse high-priority alerts, dig into logs, network traffic, or endpoint data using tools like Splunk, or develop new detection content to enhance our defences. You ll also draw on threat intelligence to proactively strengthen our security posture. When incidents occur More ❯