Cheltenham, Gloucestershire, United Kingdom Hybrid / WFH Options
Anson Mccade
threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection … incident response, and the cyber kill chain. Familiarity with frameworks including MITRE ATT&CK, NIST, and CIS. Strong communication, analytical, and presentation skills. Solid understanding of network traffic flows, vulnerabilitymanagement, and penetration testing principles. Knowledge of ITIL processes (Incident, Problem, Change Management). Ability to work independently and thrive in a 24/7 on-call More ❯
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
Anson Mccade
threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection … incident response, and the cyber kill chain. Familiarity with frameworks including MITRE ATT&CK, NIST, and CIS. Strong communication, analytical, and presentation skills. Solid understanding of network traffic flows, vulnerabilitymanagement, and penetration testing principles. Knowledge of ITIL processes (Incident, Problem, Change Management). Ability to work independently and thrive in a 24/7 on-call More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
implementation, and maintenance of IAM solutions, including integration with other systems and applications. Support the development and enforcement of IAM policies and procedures. Participate in access control and identity management activities. Supporting the monitoring and analysis of access management systems, including investigation and resolution of issues. Participating in IAM-related audits and compliance activities. Supporting the documentation of … looking for team members who are at the early stages of their career who also want to grow and learn more. We will provide further training in Cloud Security, VulnerabilityManagement, Agile Security methodology and more, so you gain hands-on experience in areas you are not yet experienced in in a safe environment with empathetic and supportive More ❯