Leadership and Coordination Requirements: 1. Experience of customer facing role like Presales, sales, or consultant. 2. Knowledge:- Knowledge in network orsecurity products such as Cisco, Palo Alto, Fortinet, Zscaler, CrowdStrike, CATO and other equivalent vendors/service providers. 3. Knowledge of new technologies of Enterprise IT solutions such as SD-WAN, SASE, EDR/MDR and IoT. (nice to More ❯
to reduce risk, detect and respond to threats, and prevent breaches at the source. Our team includes leaders who helped define the categories of endpoint and identity security at CrowdStrike, Okta, Cylance, and Carbon Black. Now, we're transforming how SaaS is secured-in the era of agentic AI. Today, Obsidian is trusted by global enterprises like Snowflake, T More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Marlin Selection
penetration testing. Ad-hoc IT security projects Experience Essential The successful candidate will have a good working knowledge and experience in managing the majority of the following technology stack CrowdStrike EDR Mimecast Mail Security Gateway Duo Okta Rapid7 IVM, Tenable IO or Nessus Rapid7 IDR or CrowdStrike Next Gen SIEM Palo Alto Firewalls and Panorama InTune and Conditional More ❯
driving network modernization initiatives, including transitions from legacy infrastructure to SD-WAN, SASE, and cloud-native security models Hands-on experience with endpoint protection and EDR platforms such as CrowdStrike, SentinelOne, Microsoft Defender, or Tanium Familiarity with DNS security tools and strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture … Solution Design & Architecture Design and validate secure architectures incorporating network segmentation/micro segmentation, DNS-layer protection, and endpoint telemetry. Develop integrated solutions leveraging tools like Fortinet, Palo Alto, CrowdStrike, Microsoft Defender, Zscaler, Infoblox, and others. Recommend strategies for containing lateral movement, hardening east-west traffic, and segmenting access based on identity and risk posture. Support RFPs, solution briefs More ❯
foundation in cybersecurity, with practical experience managing or supporting a range of tools and platforms in a corporate IT environment. Experience with some of the following: EDR platforms (e.g., CrowdStrike) Email or web security gateways (e.g., Mimecast) MFA/SSO (e.g., Duo, Okta) Vulnerability scanners (e.g., Rapid7, Tenable, Nessus) InTune and Conditional Access Exposure to: Imperva WAF KnowBe4 Certificate More ❯
analysts and assess them using a variety of data sources. Apply threat intelligence, including indicators of compromise (IOCs) and TTPs, to analyse alerts and incidents. Utilise SIEM tools (particularly Crowdstrike SIEM) to monitor and assess host, network, and identity data. Tune and reduce false positives, improving SIEM efficiency and alerting accuracy. Lead incident investigations across Windows, macOS, and Linux … 5+ years' recent experience in a Tier 2 or Tier 3 SOC analyst role, ideally within a government or critical infrastructure organisation. Deep experience with SIEM tools such as Crowdstrike, Splunk, and Microsoft Defender. Proven track record designing and implementing SOC use cases and incident response plans. Strong capability in data correlation across disparate sources. Demonstrated ability to develop More ❯
identified during penetration testing Handle ad-hoc IT security projects Experience - Essential The successful candidate will have a good working knowledge and experience in managing the following technology stack: CrowdStrike EDR Mimecast Mail Security Gateway Duo Okta Rapid7 IVM, Tenable IO, or Nessus Rapid7 IDR or CrowdStrike Next Gen SIEM Palo Alto Firewalls and Panorama InTune and Conditional More ❯