NAC solutions. Career growth - mentor others, lead projects, and become a go-to technical expert. What you’ll be doing: Taking ownership of CrowdStrike EDR , including policy configuration andSIEM tuning. Working with network teams on segmentation, NAC, and firewall controls . Leading on incident response , root cause analysis, and runbook development. Managing and optimising a wide suite of tools More ❯
NAC solutions. Career growth - mentor others, lead projects, and become a go-to technical expert. What you’ll be doing: Taking ownership of CrowdStrike EDR , including policy configuration andSIEM tuning. Working with network teams on segmentation, NAC, and firewall controls . Leading on incident response , root cause analysis, and runbook development. Managing and optimising a wide suite of tools More ❯
within SOC management, within Energy/Construction/Utilities Holds an Active Security Clearance (SC) Hands on leadership and team management skills. Proven experience with Enterprise Technologies (SOC/SIEM/XDR). Strong working knowledge of M365 security features. Familiarity with cloud platforms, in particular Azure and/or AWS. Ability to effectively communicate SOC value to stakeholders through More ❯
Employment Type: Contract
Rate: £600 - £800/day up to £800 per day (Inside IR35)
within SOC management, within Energy/Construction/Utilities Holds an Active Security Clearance (SC) Hands on leadership and team management skills. Proven experience with Enterprise Technologies (SOC/SIEM/XDR). Strong working knowledge of M365 security features. Familiarity with cloud platforms, in particular Azure and/or AWS. Ability to effectively communicate SOC value to stakeholders through More ❯
related field. Strong analytical and problem-solving skills with keen attention to detail. Basic understanding of networking, operating systems, andinformationsecurity principles. Familiarity with security tools (e.g., firewalls, SIEM systems, antivirus software) is a plus. Ability to work collaboratively and communicate technical concepts clearly. What We Offer: Structured training and professional certifications support. Mentorship from experienced cybersecurity professionals. A More ❯
Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and stakeholders. Experience with integrating SailPoint solution with other security tools and technologies, including SIEMand PAM solutions is a plus. Experience working with Scrum/Agile Methodologies. Experience working on multi-cultural environment. Office presence according to policies is expected.Demonstrated ability to work independently More ❯
Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and stakeholders. Experience with integrating SailPoint solution with other security tools and technologies, including SIEMand PAM solutions is a plus. Experience working with Scrum/Agile Methodologies. Experience working on multi-cultural environment. Office presence according to policies is expected. Demonstrated ability to work More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Precise Placements
escalated incidents and mentor junior engineers. Implement and maintain container platforms (Docker, Kubernetes) and automation frameworks (Terraform, Ansible, CI/CD). Apply advanced security practices including zero-trust, SIEM integration and EDR. Prepare and maintain technical documentation, policies, and procedures. Support enterprise backup, disaster recovery and business continuity capabilities. Contribute to change management, incident management, and occasional out-of More ❯
Power Automate and CI/CD pipelines. Knowledge of disaster recovery and business continuity planning. Experience with storage solutions and playbook maintenance. Experience with Microsoft Defender, Sentinel or equivalent SIEM tools, RBAC, PIM, and awareness of ISO 27001/Cyber Essentials. Familiarity with IAM, PAM, XDR, and GRC tools. Proficient in Microsoft 365, Azure, Entra, SharePoint, Exchange, Purview, Intune, Teams More ❯
position will be responsible for developing the strategy for the Detection Engineering program and establishing metrics to demonstrate continuous improvement. The ideal candidate will possess expert-level knowledge in SIEM implementation and log ingestion, SOAR, Incident Response, and Threat Intelligence that will be data-driven with strong verbal, written communication, and leadership skills. Cybersecurity Detection Engineering: Define detection engineering strategy … roadmap, and objectives to achieve. Design and implement advanced threat detection techniques using tools such as SIEM, EDR, NDR, and SOAR platforms. Develop innovative custom detection rules and automated remediation, playbooks, and alerts tailored to the organization's threat landscape for enterprise and customer security. Leverage industry standard MITRE frameworks to identify detection coverage and close gaps. Monitor, optimize, and … the most efficient and effective manner. Performs attack simulation testing to validate efficacy of use cases and purple teaming exercises collaborating with the Vulnerability Mgmt team. Manages and maintains SIEM/Data Lake data managementand log ingestion infrastructure in collaboration with Cyber Defense Engineering. Evaluate, validate, tune, and sunset where necessary detection capabilities Maintains operational guidelines, diagrams, and documentation More ❯
for clients, as they work to address the challenges associated with today’s cyber threat landscape. Your Impact SOC Advisory 4+ years of consulting experience in SOC, security engineering, SIEM administration, and incident managementand demonstrated success with serving large, multinational organisations in designing and implementing an organisation’s security operations program, organisational structures, and capabilities Possess a deep technical … knowledge in Security Incident andEventManagement (SIEM) platforms, Security Orchestration and Response (SOAR) technologies, Endpoint Protection and Response/Next Gen Protection and Response (EDR/XDR) tools, Next GenFirewalls, Threat Intelligence and Hunting platforms Defensive Security Skills (desired) Experience in security operations design, engineering and/or analysis and investigations, ideally in complex environments, with securityevent correlations More ❯
for clients, as they work to address the challenges associated with today’s cyber threat landscape. Your Impact SOC Advisory 4+ years of consulting experience in SOC, security engineering, SIEM administration, and incident managementand demonstrated success with serving large, multinational organisations in designing and implementing an organisation’s security operations program, organisational structures, and capabilities Possess a deep technical … knowledge in Security Incident andEventManagement (SIEM) platforms, Security Orchestration and Response (SOAR) technologies, Endpoint Protection and Response/Next Gen Protection and Response (EDR/XDR) tools, Next GenFirewalls, Threat Intelligence and Hunting platforms Defensive Security Skills (desired) Experience in security operations design, engineering and/or analysis and investigations, ideally in complex environments, with securityevent correlations More ❯
verbal communication, with a positive and “can do” approach to their work. Nice to Have: Working knowledge of hyperscale cloud andsecurity ecosystems (e.g., AWS/Azure/GCP; SIEM/EDR/IAM tooling) and cloud commercials (committed spend, RIs/Savings Plans, unit-based pricing) – willingness to learn the specifics is essential. CIPS or equivalent; experience with FinOps More ❯
South West London, London, England, United Kingdom
Robert Half
legal teams to embed security best practices into all new projects, processes, and technology implementations. Manage the security technology stack and infrastructure, evaluating and implementing new security tools (e.g., SIEM, EDR, vulnerability scanners) to improve efficiency and capability. Manage the Cyber Security budget and all security-related vendor relationships and contracts. Your Profile The ideal candidate will have worked in More ❯
energy, media & entertainment, or manufacturing. Hands-on technical expertise in building security capabilities in code, deploying infrastructure as code, and implementing enterprise security solutions (e.g. WAF, IPS, Anti-DDOS, SIEM) Amazon is an equal opportunity employer and does not discriminate on the basis of protected veteran status, disability, or other legally protected status. Our inclusive culture empowers Amazonians to deliver More ❯
Sector. Key Requirements: Proven experience working within SOC management, within Energy/Construction/Utilities Hands on leadership and team management skills. Proven experience with Enterprise Technologies (SOC/SIEM/XDR). Strong working knowledge of M365 security features. Familiarity with cloud platforms, in particular Azure and/or AWS. Ability to effectively communicate SOC value to stakeholders through More ❯
Employment Type: Contract
Rate: £600.0 - £800.0 per day + up to £800 per day (Inside IR35)
Sector. Key Requirements: Proven experience working within SOC management, within Energy/Construction/Utilities Hands on leadership and team management skills. Proven experience with Enterprise Technologies (SOC/SIEM/XDR). Strong working knowledge of M365 security features. Familiarity with cloud platforms, in particular Azure and/or AWS. Ability to effectively communicate SOC value to stakeholders through More ❯
Fi, internet, and unified communications. Administer and monitor systems including Windows Server, Azure, Entra ID, Intune, VMWare, VXRail, Rubrik, Commvault , and more. Conduct vulnerability analysis and manage patching using SIEM tools (eg, Rapid7). Collaborate with the security team to ensure proper infrastructure security controls are deployed and maintained. Lead technical troubleshooting and respond to incidents in line with change More ❯
requirements. Excellent communication and stakeholder management skills. Comfortable working in a fast-paced, iterative, and agile environment. Preferred Experience: Solid understanding of cyber security concepts such as threat detection, SIEM, anomaly detection, and incident response. Experience with tools for tracking ML models in production (e.g., MLflow). We encourage you to apply even if your experience is not a More ❯
implementing a robust and trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities andMore ❯