security, including firewalls, WAF, anti-virus, and O365 compliance & security centre . Familiarity with NIST (CSF Framework 2.0), ISO 27001, PCI-DSS, and GDPR . Experience operating and managing SIEM solutions , vulnerability management tools, and secure configuration tooling. Ability to use PowerShell and Python scripting for security automation. Experience working in or with agile and/or SecOps oriented teams More ❯
posture by managing security configurations across Microsoft Azure environments. 3. Security Automation & Incident Response Automate security workflows with Power Automate, Power Apps, and Microsoft Defender XDR. Deploy Microsoft Sentinel (SIEM) for threat detection, log analysis, and incident response. Establish incident response playbooks and conduct forensic investigations when needed. 4. Compliance & Risk Management Ensure adherence to ISO 27001, NIST, GDPR, and … Cloud Security, or IT Infrastructure Security. Skills Deep expertise in Microsoft 365 Security, Entra ID (Azure AD), Microsoft Intune, and Microsoft Defender Suite. Strong knowledge of IAM, MFA, PAM, SIEM (Microsoft Sentinel), andsecurity automation. Experience securing Microsoft Azure environments (Azure Security Center, Azure Policy, Conditional Access). Familiarity with hybrid and multi-cloud security best practices. Languages Strong written More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
Techwaka
for this role: 3+ years' experience in a senior cyber security role Strong knowledge of security frameworks (NIST, NCSC, CIS, MITRE ATT&CK) Hands-on experience with security tools: SIEM, IDS/IPS, firewalls, endpoint protection Expertise in Azure securityand securing cloud platforms A solid understanding of vulnerabilities, penetration testing, and compliance Experience with network security, encryption, TLS, SSL More ❯
Newcastle upon Tyne, United Kingdom Hybrid / WFH Options
NHS Business Services Authority
Collaborate with third-party suppliers and internal teams. Provide expert advice on security technologies and processes. Requirements : Proven team leadership experience.Strong knowledge of security technologies (firewalls, IDS/IPS, SIEM).Relevant qualifications (CISSP, CISM, etc.). Apply now to make a significant impact on NHS BSA's cyber security strategy! What do we offer ?o 27 days leave (increasing with … monitoring activities, ensuring compliance with InformationSecurity Standards ISO27001, NHS DSPT, NCSC CAF 4.Experience of managing security technologies including; firewalls, anti-malware, IDS/IPS, web filtering, email filtering, SIEM, patch management, MDM, DLP 5.Designing and recommending appropriate controls to enable the achievement of Cyber securityand wider business goals. Desirable 1.Evaluation of threat intelligence data from multiple sources to More ❯
training, and exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC More ❯
training, and exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC More ❯
training, and exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC More ❯
training, and exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC More ❯
training, and exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC More ❯
training, and exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC More ❯
training, and exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC More ❯
training, and exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC More ❯
Stockport, Greater Manchester, UK Hybrid / WFH Options
Logiq
training, and exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC More ❯
training, and exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC More ❯
Doncaster, South Yorkshire, UK Hybrid / WFH Options
Logiq
training, and exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC More ❯
training, and exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
KBC Technologies Group
encryption technologies. Adhere to enterprise governance & review processes to deliver project goals & deliverables. Follow enterprise ITSM & CMDB processes Monitor and analyze security alerts using SecurityInformationandEventManagement (SIEM) tools, and respond to security incidents in a timely and effective manner. Collaborate with cross-functional teams to develop and enforce identity and access management (IAM) policies and network access … principles. Zscaler Private Access & Internet Access Proficiency in configuring, managing, and troubleshooting firewalls. Cisco, Palo Alto etc,. Experience with intrusion detection/prevention systems, as well as with SIEM tools andsecurity incident response. Excellent problem-solving skills, analytical thinking, and the ability to communicate effectively with diverse stakeholders. CERTIFICATIONS: (any of below) Cisco Certified Network Professional/Expert More ❯
Greater Manchester, England, United Kingdom Hybrid / WFH Options
NearTech Search
technical challenges with risk managementand compliance responsibilities. Role Highlights Monitor, detect, and respond to security incidents and vulnerabilities Own and manage key elements of the security stack, including SIEMand DLP tools Lead audits, penetration testing, and remediation actions to uphold ISO27001 & SOC2 compliance Collaborate with product teams to embed security into the development lifecycle Produce detailed KPI-driven … security reports and dashboards for internal stakeholders Experience needed: 1+ year in a SOC or similar cybersecurity role Hands-on experience with SIEM, IDS/IPS, and vulnerability scanning tools Knowledge of AWS, Linux, Windows, IAM (e.g. Okta), and firewalls Understanding of ISO27001, SOC2, GDPR, and third-party risk management Strong communication skills and the ability to influence across teams More ❯
technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. Standout candidates will also Have adaptability and flexibility Have a probing and analytical approach More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
N Brown Group
to protect against them. Experience responding to incidents across corporate and customer-facing web applications, identifying potential threats and mitigating/escalating as required would be beneficial. Experience with SIEM Platforms (ideally Splunk), including working with logs and creating correlation searches and dashboards is a plus. Experience of working within PCI DSS, or other compliance frameworks. Software and Technology SIEMMore ❯
Bolton, Greater Manchester, United Kingdom Hybrid / WFH Options
Sanderson Government & Defence
bigger picture; investigating threats, guiding incident flow, analysing threat data, and playing a key role in improving detection and response processes. You’ll be working across platforms like: Elastic SIEM Microsoft Sentinel Defender for Endpoint CrowdStrike Falcon MISP (Malware Information Sharing Platform) As the team scales, this role offers both strategic involvement and technical depth. There’s also the option … mindset – focused on not just what happened, but why, how, and how to prevent it Comfortable being an escalation point for technical and analytical issues Working knowledge of key SIEMand EDR platforms (Elastic, Sentinel, CrowdStrike, etc.) Natural curiosity and willingness to get hands-on with data and investigations Broad exposure across cyber domains beyond pure SOC is highly valued More ❯
Leigh, Greater Manchester, United Kingdom Hybrid / WFH Options
Sanderson Government & Defence
bigger picture; investigating threats, guiding incident flow, analysing threat data, and playing a key role in improving detection and response processes. You’ll be working across platforms like: Elastic SIEM Microsoft Sentinel Defender for Endpoint CrowdStrike Falcon MISP (Malware Information Sharing Platform) As the team scales, this role offers both strategic involvement and technical depth. There’s also the option … mindset – focused on not just what happened, but why, how, and how to prevent it Comfortable being an escalation point for technical and analytical issues Working knowledge of key SIEMand EDR platforms (Elastic, Sentinel, CrowdStrike, etc.) Natural curiosity and willingness to get hands-on with data and investigations Broad exposure across cyber domains beyond pure SOC is highly valued More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Sanderson Government & Defence
bigger picture; investigating threats, guiding incident flow, analysing threat data, and playing a key role in improving detection and response processes. You’ll be working across platforms like: Elastic SIEM Microsoft Sentinel Defender for Endpoint CrowdStrike Falcon MISP (Malware Information Sharing Platform) As the team scales, this role offers both strategic involvement and technical depth. There’s also the option … mindset – focused on not just what happened, but why, how, and how to prevent it Comfortable being an escalation point for technical and analytical issues Working knowledge of key SIEMand EDR platforms (Elastic, Sentinel, CrowdStrike, etc.) Natural curiosity and willingness to get hands-on with data and investigations Broad exposure across cyber domains beyond pure SOC is highly valued More ❯
Bury, Greater Manchester, United Kingdom Hybrid / WFH Options
Sanderson Government & Defence
bigger picture; investigating threats, guiding incident flow, analysing threat data, and playing a key role in improving detection and response processes. You’ll be working across platforms like: Elastic SIEM Microsoft Sentinel Defender for Endpoint CrowdStrike Falcon MISP (Malware Information Sharing Platform) As the team scales, this role offers both strategic involvement and technical depth. There’s also the option … mindset – focused on not just what happened, but why, how, and how to prevent it Comfortable being an escalation point for technical and analytical issues Working knowledge of key SIEMand EDR platforms (Elastic, Sentinel, CrowdStrike, etc.) Natural curiosity and willingness to get hands-on with data and investigations Broad exposure across cyber domains beyond pure SOC is highly valued More ❯
Altrincham, Greater Manchester, United Kingdom Hybrid / WFH Options
Sanderson Government & Defence
bigger picture; investigating threats, guiding incident flow, analysing threat data, and playing a key role in improving detection and response processes. You’ll be working across platforms like: Elastic SIEM Microsoft Sentinel Defender for Endpoint CrowdStrike Falcon MISP (Malware Information Sharing Platform) As the team scales, this role offers both strategic involvement and technical depth. There’s also the option … mindset – focused on not just what happened, but why, how, and how to prevent it Comfortable being an escalation point for technical and analytical issues Working knowledge of key SIEMand EDR platforms (Elastic, Sentinel, CrowdStrike, etc.) Natural curiosity and willingness to get hands-on with data and investigations Broad exposure across cyber domains beyond pure SOC is highly valued More ❯