P r eferred Skills: Experience managing global SOC operations. Familiarity with cloud security operations (AWS, Azure, GCP). Proficiency with automationandorchestration tools (SOAR platforms). Strong analytical mindset and the ability to make high-pressure decisions. If interested, please apply and a consultant will be in touch asap More ❯
Familiarity with compliance frameworks (ISO 27001, GDPR, SOC 2, NIST). Hands-on experience with EDR tools (CrowdStrike, Defender for Endpoint) and SIEM/SOAR platforms. Basic scripting for automationand reporting using PowerShell or Python. Working knowledge of network security protocols, VPNs, firewalls, and web filtering tools. Understanding of More ❯
one programming or scripting language (e.g., Python, Go, Bash) for securityautomation or analysis. Experience with container security monitoring (Docker, Kubernetes). Experience with SOAR platforms. Knowledge of digital forensics and incident response procedures. Understanding of malware analysis techniques. It would be great if you have one or more of More ❯
Monitoring Incident Response Detection Engineering Malware Analysis (Static and Dynamic) Threat Hunting and Threat Intelligence (MITRE ATT&CK) Cloud Security Penetration Testing SecurityAutomation (SOAR) It would help if you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management (Qualys, Nessus, Nexpose) Anti-Malware/ More ❯
have some of the following skills and experience: Experience in Cyber Threat Intelligence Experience in Threat Hunting Experience with the Microsoft Sentinel SIEM/SOAR platform Proficient in writing KQL Strong understanding of threat intelligence principles and practices. Strong understanding of security risk management Understanding of threat modelling Knowledge of More ❯
language. PREFERRED QUALIFICATIONS - 5+ years experience working in incident response, security operations, securityautomation tooling, hunting, or threat intelligence. - Familiarity with malware analysis, forensics, SOAR, SIEM platforms, or detection engineering and hunting. Demonstrable subject matter expertise in any of these domains a plus. - Proficiency across a variety of Operating Systems More ❯
Current experience working with a SOC environment Microsoft Sentinel: Development and tuning of custom analytic rules. Workbook creation and dashboarding. Automation using Playbooks andSOAR integration. Kusto Query Language (KQL): Writing complex, efficient queries for advanced threat hunting and detection. Correlating data across key tables (e.g., SignInLogs, SecurityEvent, OfficeActivity, DeviceEvents More ❯
Center, AzureSentinel). Experiencewith security features and configurations. Proven experience of migrating from Cyber Essentialsto the Cyber Assessment Framework (CAF). Proven experience implementing SOAR services. StrongKnowledge of Windows Server securityand Active Directory. Familiaritywith security frameworks and standards (e.g., NIST, ISO 27001). Experiencewith security tools and technologies (e.g. More ❯
london (city of london), south east england, United Kingdom
Hays
Center, AzureSentinel). Experiencewith security features and configurations. Proven experience of migrating from Cyber Essentialsto the Cyber Assessment Framework (CAF). Proven experience implementing SOAR services. StrongKnowledge of Windows Server securityand Active Directory. Familiaritywith security frameworks and standards (e.g., NIST, ISO 27001). Experiencewith security tools and technologies (e.g. More ❯
with commercial threat intelligence and/or vulnerability tooling and systems i.e., Recorded Future, Tenable, Panaseer or similar solutions, Threat Intelligence platforms, SIEM andSOAR environments, and the development or implementation of new security tooling and dashboards. Security knowledge and experience : Professional experience in cyber security, specifically threat intelligence, incident More ❯
with technology vendors to optimize security services for peak effectiveness Research and collaborate internally and externally on open-source solutions Automate response processes with SOARand related technologies Act in a purple team capacity to ensure effectiveness of security systems and controls Participate in cross-functional security functions to help More ❯
programming or scripting language PREFERRED QUALIFICATIONS - 3+ years experience working in securityresponse, securityautomation tooling, or threat intelligence - Familiarity with malware analysis, forensics, SOAR, SIEM platforms, and a variety of Operating Systems (MS Windows, Linux, MacOS) - Experience with Amazon Web Services - Meets/exceeds Amazon's leadership principles requirements More ❯
programming or scripting language PREFERRED QUALIFICATIONS 3+ years experience working in securityresponse, securityautomation tooling, or threat intelligence Familiarity with malware analysis, forensics, SOAR, SIEM platforms, and a variety of Operating Systems (MS Windows, Linux, MacOS) Experience with Amazon Web Services Meets/exceeds Amazon's leadership principles requirements More ❯
partners and customers. Familiarity with current security technologies including one or more of the following: Next-Generation Anti-virus, Endpoint Detection andResponse (EDR), SecurityOrchestration, Automation, andResponse (SOAR), Security Information and Event Management (SIEM, particularly Splunk and/or Splunk Cloud), firewalls, and other core security products. (e.g. More ❯
and technology developments. Research and evaluate emerging cybersecurity trends and threats. Monitor for attacks, intrusions, and unusual, unauthorized, or illegal activities. Experienced with SIEM, SOARand EDR technologies. Able to multi-task, along with strong problem-solving and analytical skills. Strong problem-solving and analytical skills to identify and mitigate More ❯
helping customers get the most out of the platform’s capabilities. If you’ve got solid knowledge of the cyber ecosystem (think SIEM, EDR, SOAR, AD, firewalls, etc.) and a knack for digging into insider threat scenarios, read on. What you’ll be doing: Leading threat detection andresponse projects More ❯
london, south east england, United Kingdom Hybrid / WFH Options
ZKM Consulting
helping customers get the most out of the platform’s capabilities. If you’ve got solid knowledge of the cyber ecosystem (think SIEM, EDR, SOAR, AD, firewalls, etc.) and a knack for digging into insider threat scenarios, read on. What you’ll be doing: Leading threat detection andresponse projects More ❯
within an MSP environment, with a strong understanding of managed security services. Technical Expertise: Hands-on experience with security technologies such as SIEM, EDR, SOAR, vulnerability and exposure management tooling, threat intelligence, and data security solutions. Pre-Sales & Consulting Experience: Proven experience in a pre-sales, solution consulting, or technical More ❯
of automation processes for security monitoring, alerting, and incident response. This includes developing and maintaining playbooks, workflows, and integrations with SOC tools (SIEM, EDR, SOAR). Incident Response & Threat Analysis: Coordinate and assist in the investigation of security incidents, focusing on both cloud and on-premises environments. Perform root cause … role, with a strong emphasis on automation, threat hunting, and cloud security (AWS, Azure). Technical Expertise: Strong understanding of SOC tools (SIEM, EDR, SOAR) andsecurityautomation frameworks. Proficiency in Python, SQL, and cloud infrastructure (AWS, Azure). Experience with cloud-native security services (e.g., WAF, IAM, Shield). More ❯
and document, spreadsheet, and presentation software. Experience with detection tuning and creation leveraging various security tools including SIEM, EDR, or NDR tools. Experience with SecurityOrchestrationand Automated Response (SOAR) platforms. Preferred qualifications: Experience with Search Processing Language (SPL), Kusto Query Language (KQL), YARA-L or similar SIEM query languages. … Security Operations Center (SOC) to maintain effective incident detection andresponse capabilities. You will be developing and supporting automation playbooks within a client's SecurityOrchestrationand Automated Response (SOAR) platform. You will work as a member of a technical team in a rapidly changing environment, administer a variety of … fidelity through metrics creation, tracking, responding to tuning requests, implementing incident-specific detection logic, etc. Support development of automations andorchestration playbooks in client SOAR platforms. Google is proud to be an equal opportunity and affirmative action employer. We are committed to building a workforce that is representative of the More ❯
OT monitoring solutions. Build OT-specific detection andresponse capabilities, including custom playbooks. Technology Implementation Oversee global deployment of SIEM (e.g., Splunk, Graylog, Wazuh), SOAR, EDR, and Threat Intel platforms. Vendor & Team Management Act as the primary contact for the outsourced SOC provider; manage SLAs and vendor performance. Build and … NIST, ISO, GDPR). Stay ahead of evolving cyber threats and trends. Ideal Candidate Strong Linux and open-source experience. Technical expertise with SIEM, SOAR, EDR, and OT protocols Familiar with SCADA/ICS environments and MITRE ATT&CK framework. Skilled in incident response, threat hunting, SLA management, and executive More ❯