truly matter—this is the place for you. Examples of tasks that would be undertaken include: Monitor and analyse security events using SIEM tools (e.g., Splunk, QRadar) Investigate and respond to security incidents and alerts Perform vulnerability assessments … interview.
Person specification Essential Criteria Experience in analysing SecurityInformationandEventManagement (SIEM) SIEM reports and managing security incidents. Excellent analytical and problem-solving skills. Effective communication skills, with the ability to work well More ❯
key and secrets management, data loss prevention, and protective marking and classification capabilities. Cyber Security Operations: Proficient in incident response, vulnerability management, SIEM, SOAR, threat modeling, threat hunting, intelligence, data analytics, and anti-phishing methodologies. Infrastructure and Endpoint Security: Experience with endpoint security control technologies (EDR More ❯
Gloucester, Gloucestershire, UK Hybrid / WFH Options
FluidOne
their needs are met and any issues are addressed, assisting the service delivery manager with technical issues. Triage and analysis of alerts from multiple SIEM’s and Platforms (Microsoft Sentinel, Microsoft Defender, SentinelOne and AppGuard) and intelligence monitoring capabilities, prior to escalation to the Shift Leader in accordance with the More ❯
Gloucester, England, United Kingdom Hybrid / WFH Options
FluidOne
their needs are met and any issues are addressed, assisting the service delivery manager with technical issues. Triage and analysis of alerts from multiple SIEM’s and Platforms (Microsoft Sentinel, Microsoft Defender, SentinelOne and AppGuard) and intelligence monitoring capabilities, prior to escalation to the Shift Leader in accordance with the More ❯
equivalent experience Good knowledge covering several of the following examples (this list is not exhaustive): AD, Cryptography, End User Computing, IAM, PKI, Server hardening, SIEM, SOAR, virtualisation (VMware) Participate in pre-sales tasks and perform ongoing support of delivery collateral. Familiarity with MITRE ATT&CK Familiarity with ITIL Who we More ❯
Bath, Somerset, United Kingdom Hybrid / WFH Options
Bmt Defence Services LTD
IEC 62443, etc). An understanding of cloud-native infrastructure (e.g. microservices, containerisation, Kubernetes, serverless computing). An understanding and/or experience with SIEM, SOAR and EDR. Knowledge and/or understanding of data and analytics in terms of cybersecurity implications. Missing skills? Let us be the judge! BMT More ❯
Exeter, Devon, South West, United Kingdom Hybrid / WFH Options
Bowerford Associates
SCCM/MECM skills would be advantageous. Knowledge of informationsecurity standards such as ISO 17799/27002/27001/PCI DSS/SIEM/FERPA/HIPAA etc. Knowledge of and experience in virtual network technologies, specifically ESXi and VMware configuration and administration is preferred. Knowledge of andMore ❯
manage and maintain security tools and sensors, and configure, manage and maintain an array of cyber security tools and technologies, including anti-virus products, SIEM, EDR and CASB monitor and analyse security events, conduct assessments and recommend or take actions as required, including recommending and implementing countermeasures or mitigating controls More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
Solid background in network, application, and data security Practical experience with a wide range of security tools and technologies, including firewalls, IDS/IPS, SIEM, endpoint protection, and native cloud solutions Strong analytical and problem-solving abilities, with a talent for diagnosing and resolving complex security challenges Excellent communication andMore ❯
Automation in security contexts. Cloud and on-premise infrastructure maintenance. Demonstrates Knowledge Of: Data collection and correlation from on-premise and cloud infrastructure into SIEM platforms. Expertise in a range of security products, including Vulnerability scanning, firewalls, networks, URL Filtering, EDR platforms, DLP, Auditing, and controls. Holds These Qualifications: A More ❯
Act as a point of contact, managing ongoing communications and ensuring technical needs are met Threat Detection & Analysis: Triage and analyse alerts across multiple SIEM platforms (e.g., Microsoft Sentinel, custom ELK stacks). Log & Threat Intelligence Analysis: Perform detailed log analysis and threat intelligence research to uncover root causes andMore ❯
Act as a point of contact, managing ongoing communications and ensuring technical needs are met Threat Detection & Analysis: Triage and analyse alerts across multiple SIEM platforms (e.g., Microsoft Sentinel, custom ELK stacks). Log & Threat Intelligence Analysis: Perform detailed log analysis and threat intelligence research to uncover root causes andMore ❯
Greater Bristol Area, United Kingdom Hybrid / WFH Options
55 Exec Search
Act as a point of contact, managing ongoing communications and ensuring technical needs are met Threat Detection & Analysis: Triage and analyse alerts across multiple SIEM platforms (e.g., Microsoft Sentinel, custom ELK stacks). Log & Threat Intelligence Analysis: Perform detailed log analysis and threat intelligence research to uncover root causes andMore ❯
Plymouth, Devon, United Kingdom Hybrid / WFH Options
Thales Group
needs. Your responsibilities include: Advising on high-level security architecture and contributing to design processes, including risk assessments Consulting on security component architectures (e.g., SIEM, IAM, gateways) Evaluating architectures against policies and standards (NIST, ISO, JSP) Justifying architectural decisions Coordinating across multidisciplinary teams Presenting solutions to stakeholders and technical teams More ❯
experience - minimum of 1-2 years. Desirable: CCNP Experience of using collaboration tools e.g. Atlassian Confluence & JIRA. Mobile Device Management (MDM) knowledge. Experience with SIEM tools e.g. Splunk. Experience with VMWare, Veeam Backup. Experience with Windows server platforms. Experience of using deployment automation tools such as Ansible, Git, CI/ More ❯
and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset managementand tracking • Vulnerability Managementand Patching • SIEM principles, products and supporting logging infrastructure • Containerisation and virtual machine security • Delivering secure solutions against project expectations • Strong awareness of and commitment to industry best More ❯
address security flaws. Goals of the Job: Internal penetration testing Red Team Assessment Key Responsibilities: Manage Network Access Control, firewalls, IPS/IDS systems, SIEM, EDR, email filters, etc. Set up attack tools, methods, and processes against authorized OISSG client infrastructure and use them safely. Develop scripts, tools, or plans More ❯
Infrastructure – Experience with Windows Server setup, Active Directory, VMWare (or similar), VEEAM (or equivalent) backups, and infrastructure monitoring. Additional Tools – Familiarity with vulnerability management, SIEM, PowerShell scripting, and Infrastructure as Code (Terraform/Ansible preferred). The Package: Base salary: up to £60,000 24 days annual leave Employee Assistance More ❯
Infrastructure – Experience with Windows Server setup, Active Directory, VMWare (or similar), VEEAM (or equivalent) backups, and infrastructure monitoring. Additional Tools – Familiarity with vulnerability management, SIEM, PowerShell scripting, and Infrastructure as Code (Terraform/Ansible preferred). The Package: Base salary: up to £60,000 24 days annual leave Employee Assistance More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
like Firewall Management, IDS/IPS, Email protection amongst others. In this role you will: Focus on the analysis of Security Incident EventManagement (SIEM) data, which includes: Provide Deloitte firms with cybersecurity data. Assist Deloitte Global and Deloitte firms with data extraction for ISO and PCI audit requirements. Support … practices and metric reporting fundamentals. Experienced in manipulation of data sources and presentation in PowerBI. Desirable skills, qualifications, and experience: Qualified or experienced in SIEM solutions (ideally SPLUNK.) Microsoft related qualifications (Azure, Microsoft Windows, Microsoft SQL.) Qualified to ICS2 CC, CISM, CISSP or relevant Cybersecurity related qualification. Working knowledge of More ❯
candidate will play a vital role in monitoring, analysing, and responding to security threats using tools such as Splunk, Flexera, and other industry-standard SIEM platforms. You'll investigate security incidents, coordinate with other IT andsecurity teams, and support continuous improvement of threat detection and response processes. Key Requirements … Previous experience in a SOC Analyst or similar cybersecurity role Strong expertise in Splunk or similar SIEM tools Familiarity with Flexera for vulnerability management Understanding of firewalls, network protocols, intrusion detection/prevention systems Relevant certifications (e.g., CISSP, CEH, Splunk) advantageous Must be eligible for Developed Vetting (DV) clearance, requiring More ❯
Security Operations Analyst SIEM Splunk - £55k Hybrid Swindon A Security Operations Analyst is required to join a leading Fintech business in their Swindon office. You will join the Security Operations team playing a key role in delivering services to their clients. With services hosted in our data centres and the … levels of service expected by their clients. The successful Security Operations Analyst will ideally demonstrate commercial experience in the following areas: Working knowledge of SIEM tools. Scripting capability, particularly using PowerShell, Bash, scripting, and querying in Microsoft Sentinel and Defender. Experience with securityand monitoring tools such as Zscaler, Microsoft More ❯