security policies, standards, and operational controls; support audits, incident response, vulnerability remediation, and ensure effective use of security tooling (e.g., Sentinel, Defender for Cloud, SIEM). Work closely with Operational Risk, DevOps, andInformationSecurity teams to embed best practices into Agile delivery pipelines, balance stakeholder priorities, and drive the More ❯
Key Responsibilities: Lead and manage the Security Operations Centre (SOC) Handle incident response (including drills, simulations, response actions) Oversee threat detection and monitoring (via SIEM tools) Drive vulnerability management Report security posture via dashboards and metrics Use Microsoft Sentinel, Defender, and KQL for threat detection and investigation Lead and develop More ❯
conducting vulnerability assessments, supporting audits, and helping to strengthen third-party security compliance. Key Responsibilities: Monitor security systems and investigate incidents Operate firewalls, EDR, SIEM tools, and encryption software Support vulnerability testing and risk analysis Assist with third-party vendor assessments and internal audits Contribute to the ongoing improvement of More ❯
GCP). Proficient in Python and familiar with IaC and GitOps methodologies. Deep understanding of Zero Trust principles, VPNs, IDS/IPS, NAC, andSIEM tools. Strong Linux background and a passion for open-source technology. Nice to Have: Experience building internal tools or automation to streamline IT operations. Ability More ❯
london (hammersmith), south east england, united kingdom
Intaso
GCP). Proficient in Python and familiar with IaC and GitOps methodologies. Deep understanding of Zero Trust principles, VPNs, IDS/IPS, NAC, andSIEM tools. Strong Linux background and a passion for open-source technology. Nice to Have: Experience building internal tools or automation to streamline IT operations. Ability More ❯
Develop and implement strategies to ensure network andsecurity infrastructure meets current and future needs. Monitor and respond to security incidents using tools like SIEMand Sophos MTR and Splunk. Maintain system security by configuring firewalls, VPNs, and intrusion detection systems, and ensuring timely patching. Manage vulnerability remediation based on More ❯
Develop and implement strategies to ensure network andsecurity infrastructure meets current and future needs. Monitor and respond to security incidents using tools like SIEMand Sophos MTR and Splunk. Maintain system security by configuring firewalls, VPNs, and intrusion detection systems, and ensuring timely patching. Manage vulnerability remediation based on More ❯
Develop and implement strategies to ensure network andsecurity infrastructure meets current and future needs. Monitor and respond to security incidents using tools like SIEMand Sophos MTR and Splunk. Maintain system security by configuring firewalls, VPNs, and intrusion detection systems, and ensuring timely patching. Manage vulnerability remediation based on More ❯
Develop and implement strategies to ensure network andsecurity infrastructure meets current and future needs. Monitor and respond to security incidents using tools like SIEMand Sophos MTR and Splunk. Maintain system security by configuring firewalls, VPNs, and intrusion detection systems, and ensuring timely patching. Manage vulnerability remediation based on More ❯
facing role, with strong communication and project management skills. Demonstrable experience of commercial acumen and financial management. Familiarity with security technologies such as firewalls, SIEM, endpoint protection and threat detection systems. Expertise in project management tools and methodologies (Agile, Waterfall). Strong understanding of cybersecurity best practices and risk management. More ❯
NIST, CIS Controls, and GDPR compliance Ability to conduct security assessments, risk analyses, and internal audits Familiarity with security tooling and governance platforms (e.g., SIEM, GRC platforms) Excellent communication skills with the ability to influence senior stakeholders A proactive mindset with the ability to work independently and as part of More ❯
on expensive indexing or hot storage. We specialize in comprehensive monitoring of logs, metrics, trace andsecurity events with features such as APM, RUM, SIEM, Kubernetes monitoring and more, all enhancing operational efficiency and reducing observability spend by up to 70%. Technical Account Managers in Coralogix are key in More ❯
For: Proven experience in Security Operations and Incident Response (5–10 years) Experience in or leading a CIRT or similar function Strong knowledge of SIEM/SOAR, EDR, forensic tools, and incident handling best practices Excellent communication and stakeholder engagement skills Understanding of key frameworks (e.g. MITRE ATT&CK, NIST More ❯
london, south east england, united kingdom Hybrid / WFH Options
Adeptis Group
For: Proven experience in Security Operations and Incident Response (5–10 years) Experience in or leading a CIRT or similar function Strong knowledge of SIEM/SOAR, EDR, forensic tools, and incident handling best practices Excellent communication and stakeholder engagement skills Understanding of key frameworks (e.g. MITRE ATT&CK, NIST More ❯
London, England, United Kingdom Hybrid / WFH Options
Pioneer Search
improvement across platforms and processes Technical Skills: Microsoft 365, Azure, Defender, Sentinel IAM: Azure AD, MFA, SSO, PAM Security frameworks: ISO 27001, NIST, CIS SIEM, endpoint protection, vulnerability management ITIL-based service managementand automation Leadership Skills Proven ability to lead IT operations and transformation projects Strong vendor and budget More ❯
You have knowledge of or are interested in CIAM (e.g. Auth0), threat modeling, vulnerability analysis (e.g. Google Secure Command Center), CSPM (e.g. scrut.io) andSIEM (e.g. Chronicle) systems You have a relevant Bachelor's degree (or higher) You have worked with Google cloud or AWS You have experience with evaluating More ❯
network protocols, ports, and services Understanding of encryption algorithms AES, RSA etc Knowledge of Public Key Infrastructure (PKI), SSL/TLS certificates Basics of SIEM Basics of OS Patching Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the More ❯
South Croydon, London, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
network protocols, ports, and services Understanding of encryption algorithms AES, RSA etc Knowledge of Public Key Infrastructure (PKI), SSL/TLS certificates Basics of SIEM Basics of OS Patching Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the More ❯
and act as liaison between Solution Architects and Engineering team. Evaluate and implement cloud-native and third-party security tools (e.g. CSPM, CWPP, IAM, SIEM). Conduct threat modeling, architecture reviews, andsecurity audits for cloud environments. Monitor for emerging threats and vulnerabilities in cloud platforms and recommend proactive controls. More ❯
london, south east england, united kingdom Hybrid / WFH Options
RiverSafe
and act as liaison between Solution Architects and Engineering team. Evaluate and implement cloud-native and third-party security tools (e.g. CSPM, CWPP, IAM, SIEM). Conduct threat modeling, architecture reviews, andsecurity audits for cloud environments. Monitor for emerging threats and vulnerabilities in cloud platforms and recommend proactive controls. More ❯
london, south east england, united kingdom Hybrid / WFH Options
ZKM Consulting
teams and helping customers get the most out of the platform’s capabilities. If you’ve got solid knowledge of the cyber ecosystem (think SIEM, EDR, SOAR, AD, firewalls, etc.) and a knack for digging into insider threat scenarios, read on. What you’ll be doing: Leading threat detection andMore ❯
implementing changes. Collaborate with compliance teams to ensure incident processes meet all regulatory requirements while remaining lean and adaptable. Utilize security technologies (e.g., SOAR, SIEM), communication platforms, and automation tools to accelerate response and train responders on their use. Develop automation and response capabilities to speed up investigation and response More ❯
manage multiple priorities and deliver results Deep knowledge of cyber threats, vulnerabilities, and incident response Experience with hybrid (on-prem/cloud) environments andSIEM tools Understanding of security standards (PCI DSS, NIST, ISO) and secure coding practices Proactive and analytical mindset with a drive for continuous improvement Package More ❯