Moreton-In-Marsh, Oxfordshire, UK Hybrid / WFH Options
GCHQ
Senior Cyber Security Analyst Cheltenham £44,044 (includes £2,658 non-concessionary payment) Flexible working: We recognise the importance of a healthy work-life balance and offer full-time, part-time, and compressed hours. While hybrid working can be more More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
Bristol, Cambridge, Cardiff, Gatwick, Leeds, Manchester, Reading, St Albans Business Line Enabling Functions Date published 30-Apr-2025 18663 Connect to your Industry Deloitte Technology works at the forefront of technology development and processes to support and protect Deloitte around More ❯
Role Lead the design, deployment and tuning of enterprise-grade SIEM platforms (e.g. Splunk, Azure Sentinel etc.) Collaborate with stakeholders to define logging requirements, use cases, detection rules and dashboards Oversee integration of data sources from cloud, on-prem, endpoint, network and application layers Create and maintain detection rules, correlation … performance tuning and capacity planning Skills Expertise in SIEM design, deployment and optimisation Hands-on expertise with one or more major SIEM platforms (e.g. Splunk, Sentinel etc.) Deep understanding of log ingestion, parsing, normalisation and enrichment Strong grasp of MITRE ATT&CK framework, threat detection and alert logic Solid scripting More ❯
as well. We are seeking someone with profound SOC experience, particularly at SOC Level 2. Mastery of SIEM tools such as Microsoft Sentinel and Splunk is crucial, along with a deep understanding of network protocols and infrastructure, including TCP/IP, VPNs, and firewalls. Your expertise in incident response and … will lead incident response initiatives, refine detection mechanisms, and mentor junior analysts. Key responsibilities include: Analysing security incidents using advanced SIEM platforms (Microsoft Sentinel, Splunk) Leading incident response and fortifying detection and containment strategies Tuning and maintaining detection rules, leveraging frameworks like Mitre Att&ck Collaborating with colleagues to enhance More ❯
as well. We are seeking someone with profound SOC experience, particularly at SOC Level 2. Mastery of SIEM tools such as Microsoft Sentinel and Splunk is crucial, along with a deep understanding of network protocols and infrastructure, including TCP/IP, VPNs, and firewalls. Your expertise in incident response and … will lead incident response initiatives, refine detection mechanisms, and mentor junior analysts. Key responsibilities include: Analysing security incidents using advanced SIEM platforms (Microsoft Sentinel, Splunk) Leading incident response and fortifying detection and containment strategies Tuning and maintaining detection rules, leveraging frameworks like Mitre Att&ck Collaborating with colleagues to enhance More ❯
Skills and Experience: Proven experience in a Security Operations Centre (SOC) environment. Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk . Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ). Skilled in incident response and threat intelligence analysis . Familiarity … forefront -leading incident response, improving detection mechanisms, and mentoring junior analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms ( Microsoft Sentinel , Splunk ). Leading incident response and driving improvements in detection and containment strategies. Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck . More ❯
Proven experience in a Security Operations Centre (SOC) environment SOC Level 2 Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att … defence—leading incident response, improving detection mechanisms, and mentoring junior analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms ( Microsoft Sentinel , Splunk ) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with More ❯
Proven experience in a Security Operations Centre (SOC) environment SOC Level 2 Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att … defence—leading incident response, improving detection mechanisms, and mentoring junior analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms ( Microsoft Sentinel , Splunk ) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with More ❯
Gosport, Hampshire, South East, United Kingdom Hybrid / WFH Options
Walsh Employment
Skills and Experience: Proven experience in a Security Operations Centre (SOC) environment Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att … digital defenceleading incident response, improving detection mechanisms, and mentoring junior analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms ( Microsoft Sentinel , Splunk ) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with More ❯
Gosport, Hampshire, South East, United Kingdom Hybrid / WFH Options
Walsh Employment
Skills and Experience: Proven experience in a Security Operations Centre (SOC) environment Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att … digital defenceleading incident response, improving detection mechanisms, and mentoring junior analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms ( Microsoft Sentinel , Splunk ) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with More ❯
first approach and be able to lead from the front. This is a L2 role. From a technical perspective we are using Microsoft Sentinel, Splunk and MISP Threat sharing so any knowledge of these technologies would be a meaningful benefit. This role is based out of our office in Gosport. … response, and threat intelligence. It would be great if you had: Cyber Security certifications like CRT or OSCP. Hands-on experience with tools like Splunk or Microsoft Sentinel. If you are interested in this role but not sure if your skills and experience are exactly what were looking for, please More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
SOC environment - ideally MSSP. Experience in a technical security role are also considered. Experience with SIEM tools, such as MS Sentinel, Alien Vault or Splunk A cyber security qualifications, certification or degree e.g. CySA+, CompTIA SEC+, or similar experience. Microsoft SC-200 Certs are desirable. Excellent communication skills A strong … threat hunts, RCAs, creation of detection capabilities Monitor/hunt security alerts from security platforms (SIEM platforms, such as MS Sentinel, Alien Vault or Splunk Act on Second Line security alerts, incidents, requests, and events to ensure that threats, vulnerabilities, and breaches are managed for successful resolution. Document and manage More ❯
buckinghamshire, south east england, United Kingdom
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
SOC environment – ideally MSSP. Experience in a technical security role are also considered. Experience with SIEM tools, such as MS Sentinel, Alien Vault or Splunk A cyber security qualifications, certification or degree e.g. CySA+, CompTIA SEC+, or similar experience. Microsoft SC-200 Certs are desirable. Excellent communication skills A strong … threat hunts, RCAs, creation of detection capabilities Monitor/hunt security alerts from security platforms (SIEM platforms, such as MS Sentinel, Alien Vault or Splunk 4 days on - 4 days off - Days and Nights Act on Second Line security alerts, incidents, requests, and events to ensure that threats, vulnerabilities, and More ❯
SonarQube/Xcode Static Analyzer Hands on with Jenkins/PCF or similar tools for automated provisioning of build and test infrastructure. Troubleshooting with Splunk, API aids like Swagger/Postman and source control systems like Git Intermediate knowledge of Maven, Junit, Redis, Oracle database, SQL, Unix command, Shell scripting. … Material UI, Angular. Good knowledge of tools like Sonar, Data-dog/Dynatrace, GIT, SVN, Rally/Jira, CI (Jenkin/Bamboo)/CD, Splunk Strong communication skills -- both verbal and written – with strong relationship, collaborative skills, and organizational skills Proven experience in Agile methodology, SDLC & implementation of Projects, debugging More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
cusp of continued growth, so we are looking for you to lead from the front. From a technical perspective we are using Microsoft Sentinel, Splunk and MISP Threat sharing so any knowledge of these technologies would be a substantial benefit. This role is based out of our head office in … including incident reports, analysis findings, and recommended mitigation strategies. What youll bring: Experience in Security Operations Centre. Demonstrable experience of Managing Microsoft Sentinel and Splunk implementations. Knowledge and experience with Mitre Att&ck Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise … be great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and experience are exactly what were More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance