a comprehensive security plan. Test cyber-attacks regularly to address vulnerabilities. Monitor security trends, adapt strategies. Oversee incident monitoring, detection, response via SOC and MSSPs. Manage security tools like SIEMand endpoint protection. Lead incident response and post-incident analysis. Enforce policies for data privacy (GDPR & NIST). Conduct regular security audits. Manage vendor relationships and negotiate contracts. Report service More ❯
a comprehensive security plan. Test cyber-attacks regularly to address vulnerabilities. Monitor security trends, adapt strategies. Oversee incident monitoring, detection, response via SOC and MSSPs. Manage security tools like SIEMand endpoint protection. Lead incident response and post-incident analysis. Enforce policies for data privacy (GDPR & NIST). Conduct regular security audits. Manage vendor relationships and negotiate contracts. Report service More ❯
Proven ability in designing cyber security systems and governance. Familiar with tools and frameworks (e.g. NCSC, NIST, MITRE, GDPR, PCI DSS). Deep understanding of security controls (e.g. firewalls, SIEM, SOC, DLP). Proficient in leading and coordinating incident response. Effective at managing multiple priorities under pressure. Excellent communicator, able to engage stakeholders at all levels. Skilled in tailoring technical More ❯
such as SABSA, TOGAF etc. Previous experience with embedding security principles. Familiar with network security techniques and technologies such as Remote Access, VPN, Firewalls, NAC, DLP, IDS/IPS, SIEMand Wireless security. Knowledge of informationsecurity principles and best practices. Experience in managing informationsecurity risk. Familiar with informationsecurity frameworks such as NIST, SANS Top 20 CSC, OWASP More ❯
such as SABSA, TOGAF etc. Previous experience with embedding security principles. Familiar with network security techniques and technologies such as Remote Access, VPN, Firewalls, NAC, DLP, IDS/IPS, SIEMand Wireless security. Knowledge of informationsecurity principles and best practices. Experience in managing informationsecurity risk. Familiar with informationsecurity frameworks such as NIST, SANS Top 20 CSC, OWASP More ❯
Chesterfield, Derbyshire, England, United Kingdom Hybrid / WFH Options
LANGLAND CONSULTANTS LTD
Infrastructure Engineer/Analyst ( Hybrid/Chesterfield) - 12 Month FTC. VMWare, AD, Exchange, Windows Server, Azure, O365, Siem tooling, PowerShell, Networking, Meraki, Firewalls Infrastructure Engineer/Analyst: Do you have a background in supporting business or technical applications? Do you have a broad technical skill set but looking to be re-trained in new technologies and looking for a new More ❯
New Works, Telford, Shropshire, England, United Kingdom Hybrid / WFH Options
SR2
use cases aligned with threat intelligence and business risk. Build and extend SOC engineering services to support improved threat identification and investigation. Test, tune, and optimise new and existing SIEM/SOAR analytics and detection rules. Automate security processes and response tasks to improve incident triage and resolution efficiency. Support the integration and orchestration of disparate security tools within the More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
Microsoft Security Operations Analyst certification. Experience: Demonstrated experience in responding to cyber security threats. Proficiency in the use of antivirus technologies. Experience with Endpoint Detection & Response solutions. Familiarity with SIEM platforms. Skills: Awareness of vulnerabilities andsecurity standards. Knowledge of HMG Security Standards and Processes. Ability to balance business needs with technical andsecurity standards. Attributes: Commercial awareness. Familiarity with More ❯
security assessment tools Management of security with regards to new systems acquisition. Deliver in person Cyber Security training programmes. Requirements: Networking experience Cyber Security Active Directory and Virtualisation experience. SIEM experience Email Security Vulnerability Management The Package: If successful our client is offering a salary between £40,000 - £42,000 per annum, favourable holiday allowance. How to Apply : If you More ❯
Security Services Strong background in IT network security concepts. Strong knowledge of data andinformation flows, information governance, network protocols. Knowledge of system hardening techniques. Knowledge and experience in SIEM technologies. Knowledge and experience in vulnerability and risk management processes. Knowledge and experience of applying cybersecurity controls within SAAS environments. Project Engagement Strong stakeholder management skills Knowledge and experience in More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
DCS Recruitment Limited
respond to security incidents. Lead and participate in incident management , ensuring swift identification, investigation, and resolution of security threats using modern toolsets. Who You Are: Experienced with Azure Sentinel , SIEM, and other security monitoring/incident management tools. Adept at i ncident management, risk assessment, and operational security for enterprise systems. Passionate about automation, innovation, and continuous improvement in security. More ❯
Immingham, Lincolnshire, North East, United Kingdom
Rullion Limited
controls across OT environments. Contribute to the assessment of OT network architecture , protocols, and change management processes. Lead incident response and remediation for cyber events detected by our OT SIEM systems. Actively support vulnerability managementand ensure threat exposure is minimised. Provide hands-on leadership in data and asset management , including backup and removable media deployments. Apply and track securityMore ❯
background in managing IR Cases/Projects Strong knowledge of cyber security threats, attack vectors, IOC, remediation. Hands-on experience with a range of different forensic tools, ELK, EDR, SIEM, and log analysis, Open Source Toolkits Comfortable communicating with both technical and non-technical stakeholders during high-stress situations. You must have excellent communication skills. You must be adaptable, resilient More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
My client, a leading IT Security focused Managed Services Provider is looking to hire a new SIEM focused SOC Engineer for a 6 month project based in Birmingham. The primary function of the Senior SOC Engineer is to enhance our security operations capabilities. This role requires deep expertise in SIEM platforms, including Splunk, IBM QRadar, Microsoft Defender, Microsoft Sentinel, and … Chronicle, with a strong focus on playbook development, analytical rule creation, and threat modelling. You will be instrumental in building and optimizing our detection and response strategies. Job Duties SIEM Engineering & Management Deploy, configure, and maintain SIEM platforms (Splunk, QRadar, Sentinel, Defender, Chronicle). Onboard and normalize log sources across cloud and on-prem environments. Develop and optimize analytical rules … for threat detection, anomaly detection, and behavioural analysis. Skills Must be able to obtain SC Clearance or already hold SC clearance. SIEM Expertise: Hands-on experience with at least two of the following: Splunk IBM QRadar Microsoft Defender for Endpoint Microsoft Sentinel Google Chronicle Technical Skills: Strong knowledge of log formats, parsing, and normalization. Experience with KQL, SPL, AQL, or More ❯
to be better, be more and ultimately, be more fulfilled. SOC Consultant Hybrid-3 days onsite Requirement: 10+ years of experience in Cyber security Designing & implementation on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize security monitoring and incident response. Log Source Integration … the OT landscape. Incident Response Automation Design and implement playbooks using Logic Apps to automate incident response workflows for common OT security events. Execution of the use cases on SIEM, SOAR & Threat Intelligence Build custom workbooks and dashboards to visualize OT security posture, threat trends, and SOC performance metrics. More ❯
to be better, be more and ultimately, be more fulfilled. SOC Consultant Hybrid-3 days onsite Requirement: 10+ years of experience in Cyber security Designing & implementation on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize security monitoring and incident response. Log Source Integration … the OT landscape. Incident Response Automation Design and implement playbooks using Logic Apps to automate incident response workflows for common OT security events. Execution of the use cases on SIEM, SOAR & Threat Intelligence Build custom workbooks and dashboards to visualize OT security posture, threat trends, and SOC performance metrics. More ❯
to be better, be more and ultimately, be more fulfilled. SOC Consultant Hybrid-3 days onsite Requirement: 10+ years of experience in Cyber security Designing & implementation on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize security monitoring and incident response. Log Source Integration … the OT landscape. Incident Response Automation Design and implement playbooks using Logic Apps to automate incident response workflows for common OT security events. Execution of the use cases on SIEM, SOAR & Threat Intelligence Build custom workbooks and dashboards to visualize OT security posture, threat trends, and SOC performance metrics. More ❯
to be better, be more and ultimately, be more fulfilled. SOC Consultant Hybrid-3 days onsite Requirement: 10+ years of experience in Cyber security Designing & implementation on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize security monitoring and incident response. Log Source Integration … the OT landscape. Incident Response Automation Design and implement playbooks using Logic Apps to automate incident response workflows for common OT security events. Execution of the use cases on SIEM, SOAR & Threat Intelligence Build custom workbooks and dashboards to visualize OT security posture, threat trends, and SOC performance metrics. More ❯
Cybersecurity frameworks for ICS/OT environments NIST SP 800-82 and c, OT Network Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), InformationEventManagement (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerability assessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to … detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform across global sites. Implementation support & reporting for ICS security with help of tools like SIEMMore ❯
Cybersecurity frameworks for ICS/OT environments NIST SP 800-82 and c, OT Network Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), InformationEventManagement (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerability assessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to … detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform across global sites. Implementation support & reporting for ICS security with help of tools like SIEMMore ❯
Cybersecurity frameworks for ICS/OT environments NIST SP 800-82 and c, OT Network Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), InformationEventManagement (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerability assessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to … detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform across global sites. Implementation support & reporting for ICS security with help of tools like SIEMMore ❯