Remote Security Monitoring Jobs in Slough

2 of 2 Remote Security Monitoring Jobs in Slough

GCP Security Architect - Hybrid

slough, south east england, United Kingdom
Hybrid / WFH Options
RiverSafe
Role: Design and implement secure cloud architectures and strategies on GCP. Evaluate and recommend security tools, services and configurations to strengthen cloud security posture. Ensure compliance with security standards and frameworks such as ISO 27001, NIST, CIS, GDPR and others. Lead threat modeling, risk assessments, and security … reviews for GCP infrastructure and applications. Define and enforce Identity and Access Management (IAM) policies, including roles, permissions and service accounts. Implement and maintain security monitoring, logging, and alerting tools (e.g., Cloud Logging, Cloud Monitoring, SCC). Collaborate with DevOps, engineering, and compliance teams to embed security into the CI/CD pipelines. Skills: Extensive experience in cloud security architecture, with at least 3 years on Google Cloud Platform. Deep understanding of GCP services such as VPC, IAM, Cloud Armor, KMS, SCC, GKE and others. Strong knowledge of security protocols, authentication, authorisation, encryption and More ❯
Posted:

SIEM Automation Engineer

slough, south east england, United Kingdom
Hybrid / WFH Options
Context Recruitment
SIEM Automation Engineer – Leading Microsoft MSSP An opportunity to work with one of the top 1% Microsoft MSSPs globally, where cutting-edge security solutions meet expert cyber defense. With a 16-person SOC team, this role offers the chance to automate, optimize, and strengthen security operations at scale. … A key position within a world-class MSSP, leveraging Microsoft Sentinel, Defender for Endpoint, and KQL to enhance threat detection, response, and security automation. Responsibilities include developing automated security workflows, streamlining investigations, and advancing proactive defense strategies. Key Responsibilities: Design and implement automation workflows within Microsoft Sentinel for … enhanced security operations. Monitor and respond to security incidents and alerts, ensuring the protection of our clients’ data and infrastructure. Conduct in-depth threat hunting and forensic investigations using KQL. Optimize security processes with Defender for Endpoint to detect, contain, and remediate threats. Collaborate with security More ❯
Posted: