household Onsite perks including free parking, tea and coffee stations, and a subsidized café with free breakfast toast Responsibilities Security Monitoring & Incident Response: Use SIEM tools like Exabeam, LogRhythm, Splunk, or Arcsight to monitor security events, detect threats, and analyze data to address incidents swiftly. Vulnerability Management Tools: Conduct regular More ❯
and incident management. Possess a working knowledge of Cisco network switches, routers, firewalls and VPN, network security, administration of DLP, antivirusantimalware, IDS/IPS, SIEM, SMTP, Email security, AD, Group Policy, DNS, DHCP, and VLANs. Experience with identity access management solutions, such as SAMLOATH Experience with HIDS and NIDS The More ❯
a related field (Master's preferred). Extensive experience in cybersecurity leadership within a SOC or incident response function. Strong knowledge of security technologies, SIEM platforms (e.g., Chronicle, Splunk, QRadar), EDR tools, firewalls, and network security. Experience with security frameworks and regulations (NIST, ISO 27001, MITRE ATT&CK, CIS, etc. More ❯
protection tools, key and secrets management, data loss prevention, and protective marking and classification capabilities. Cyber Security Operations: Proficient in incident response, vulnerability management, SIEM, SOAR, threat modeling, threat hunting, intelligence, data analytics, and anti-phishing methodologies. Infrastructure and Endpoint Security: Experience with endpoint security control technologies (EDR, EPP, UEBA More ❯
proficient understanding of the Microsoft 365/Azure platforms/AWS Responsibilities: Monitor securityevent logs and alerts generated by various security technologies, including SIEM, IDS/IPS, firewalls, and endpoint protection systems. Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Identify More ❯
proficient understanding of the Microsoft 365/Azure platforms/AWS Responsibilities: Monitor securityevent logs and alerts generated by various security technologies, including SIEM, IDS/IPS, firewalls, and endpoint protection systems. Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Identify More ❯
RAN architectures andsecurity requirements. Strong knowledge of network security protocols, VPN, firewall management, and intrusion detection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks (e.g., GDPR, HIPAA, ISO 27001). In-depth understanding of routers, switches, firewalls More ❯
Burp Suite, Kali Linux, Metasploit, Wireshark, Nessus, or equivalent . Good knowledge of network security, firewalls, managed switches, and server configurations . Familiarity with SIEM tools, vulnerability scanning, and incident response . Strong analytical and problem-solving skills. Excellent communication and documentation abilities. Preferred Qualifications Relevant certifications such as OSCP More ❯
relevant to SaaS products, preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusion detection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools. You own relevant certifications (Security+, IAT II/III level or similar). You excel in risk assessments, vulnerability More ❯
of the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as More ❯
their needs are met and any issues are addressed, assisting the service delivery manager with technical issues. Triage and analysis of alerts from multiple SIEM’s and Platforms (Microsoft Sentinel, Microsoft Defender, SentinelOne and AppGuard) and intelligence monitoring capabilities, prior to escalation to the Shift Leader in accordance with the More ❯
in Information Security. Proficiency in security frameworks like NIST, implementing and auditing security measures. Knowledge of Cisco networking, firewalls, VPN, DLP, IDS/IPS, SIEM, and related technologies. Experience with identity access management solutions such as SAML, OAuth. Relevant security certifications (e.g., CISSP, CISM, CEH) are highly desirable. Ability to More ❯
firewalls, VPNs, and cloud-based networking solutions. Experience with IAM systems (e.g., Azure AD/Microsoft Entra) andsecurity tools (e.g., endpoint protection, DLP, SIEM). Hands-on expertise with troubleshooting hardware, software, and SaaS issues. Security Knowledge: Familiarity with security frameworks and standards such as SOC 2, ISO More ❯
systems, and cloud technologies. Strong understanding of security principles, practices, and frameworks (e.g., PCI, NIST, ISO 27001). Experience with security tools such as SIEM, IDS/IPS, endpoint protection, and penetration testing tools. Experience with public cloud security, specifically AWS, Azure, and Google Cloud Platform (GCP). You will More ❯
Minimum 3 years' experience in cybersecurity. Strong knowledge of security frameworks (NIST 800, ISO 27001) and GDPR regulations. Experience with network security infrastructure andSIEM tools (Splunk, SolarWinds). Proficiency in Windows/Linux system administration and virtualization technologies (VMware, Hyper-V). Previous experience within the finance or banking More ❯
Minimum 3 years' experience in cybersecurity. Strong knowledge of security frameworks (NIST 800, ISO 27001) and GDPR regulations. Experience with network security infrastructure andSIEM tools (Splunk, SolarWinds). Proficiency in Windows/Linux system administration and virtualization technologies (VMware, Hyper-V). Previous experience within the finance or banking More ❯
We're Looking For 10+ years in a cybersecurity engineering role, ideally in a complex, enterprise-scale environment Deep experience with security tools: Firewalls, SIEM, EDR/XDR, DLP, WAF, PAM, etc. Strong understanding of server/network/system security - Windows (), Linux, Azure, Active Directory, M365 Knowledge of secure More ❯
such as NIST, ISO 27001, or similar. Excellent communication skills, with the ability to clearly convey technical details to diverse audiences. Previous experience in SIEM/SOAR within large-scale, complex environments. Familiarity with other security tools and technologies. Desirable Skills: Relevant certifications (e.g., CISSP, CEH, Microsoft Certified: Security, Compliance More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
itecopeople
such as NIST, ISO 27001, or similar. Excellent communication skills, with the ability to clearly convey technical details to diverse audiences. Previous experience in SIEM/SOAR within large-scale, complex environments. Familiarity with other security tools and technologies. Desirable Skills: Relevant certifications (e.g., CISSP, CEH, Microsoft Certified: Security, Compliance More ❯
real impact. What you'll do • Lead the onboarding process of new data sources into the SIEM platform, ensuring proper data normalization and correlation. • Continuously improve SIEM performance, efficiency, and scalability. • Maintain detailed documentation of SIEM configurations, onboarding procedures, and incident response playbooks. • Collaborate with cross-functional teams to identify … requirements and integrate new security technologies into the SIEM. • Stay informed about emerging threats, vulnerabilities, andsecurity best practices, and incorporate this knowledge into SIEM operations. • Ensure that SIEM configurations and operations comply with relevant industry regulations and standards. Who you are • A bachelor's degree in computer science, Information … and managing SecurityInformationandEventManagement (SIEM) solutions, such as Splunk, ArcSight, Chronicle (Google Security Operations), ELK Stack. Familiarity with Cribl and regex • Experience integrating SIEM with various data sources, including firewalls, IDS/IPS, antivirus, and endpoints. • Proficiency in log management solutions, log parsing, and normalization techniques. • Demonstrated More ❯
at least 2 years in a managerial capacity. Strong knowledge of cybersecurity frameworks, standards, and best practices. Proficiency with security technologies and tools (e.g., SIEM, vulnerability scanners, encryption tools). Hands-on experience with incident response, penetration testing, and threat analysis. Familiarity with secure software development practices and DevSecOps principles. More ❯
at least 2 years in a managerial capacity. Strong knowledge of cybersecurity frameworks, standards, and best practices. Proficiency with security technologies and tools (e.g., SIEM, vulnerability scanners, encryption tools). Hands-on experience with incident response, penetration testing, and threat analysis. Familiarity with secure software development practices and DevSecOps principles. More ❯
security (AWS, Azure, GCP). Apply risk-based and threat-based approaches to evaluate and recommend appropriate and proportionate security technologies and solutions (e.g., SIEM, IAM, CASB, container security). Outline key security components, interfaces, and dependencies. Develop architectural diagrams and overviews. Document security design principles and provide rationale. Ensure More ❯
security incidents when they occur. Experience Required: Proven track record leading SOC teams and handling security incidents. Hands-on experience with deploying and using SIEM tools. Skilled in Azure Security solutions, including Defender for Endpoint, Defender for Identity, and Office 365. Proficient in writing Kusto queries for Microsoft Sentinel to More ❯