Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
N Brown Group
managing and enhancing the technology underpinning N Brown’s cyber security services.You’ll have a good understanding of a range of tools like web application firewalls, intrusion detection technologies, vulnerability scanners and SIEM’s; and the technical knowledge to integrate them to enhance our protection. You’ll also need a good understanding of the native tooling available in our … Azure, GCP) & SIEM (ideally Splunk) Endpoint Detection and Response (EDR) tools such as MS Defender APT. Network and Host Intrusion Detection/Prevention tools Web Application Firewalls (ideally Akamai) Vulnerabilityscanning tools (ideally Rapid7) What’s in it for you? Hybrid working (2-3 days in the office at a minimum) + 24 days holiday (+ 8 bank More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
keep our clients safe. Your Day-to-Day Alert Assessment: Monitor SIEM dashboards (e.g. Splunk, QRadar) and flag suspicious activity. Incident Triage: Conduct initial investigations and escalate confirmed threats. Vulnerability Testing: Assist with vulnerability scans and log reviews. Tool Support: Help configure security tools (firewalls, EDR agents) under guidance. Reporting: Document findings clearly and prepare basic incident summaries. … Basic understanding of networking (TCP/IP, firewalls) and security principles (threat detection, risk management). Familiarity with at least one security tool or willingness to learn (SIEM, EDR, vulnerability scanners). Strong analytical mindset and attention to detail. Good communicator with a proactive, "can-do" attitude. What You’ll Get Salary: £30,000-£35,000 per annum. Flexibility More ❯
Employment Type: Full-Time
Salary: £30,000 - £35,000 per annum, Negotiable, OTE
Stockport, Lancashire, United Kingdom Hybrid / WFH Options
zyncgroup.io
responsible for: Contributing to the setup and ongoing enhancement of the Security Operations Center (SOC). Investigating security incidents and implementing effective countermeasures. Utilizing SOC tools such as SIEM, vulnerability scanners, and incident response solutions. Performing threat hunting by analyzing and assessing security events on central platforms. Documenting incidents thoroughly in ticketing and SIEM systems, and generating detailed reports. … Monitoring systems for attacks or unusual behavior and taking appropriate action. Running automated vulnerability scans, interpreting results, and reporting findings to clients. This role is hybrid in Schleswig-Holstein. Essential qualifications: At least one year of professional experience working in a SOC or similar role (working student experience is acceptable). Experience working with EDR/XDR. Strong knowledge More ❯