AWS Azure VMWare vSphere Networking Salesforce Knowledge of the following tools will be beneficial: ManageEngine Sophos Firewalls and Endpoint Central Barracuda backup Rapid 7 SIEM Experience Requirements: 3+ years in a service desk and networking Education and Training: Network + certification Windows Server 2019 Skills and Aptitudes: Staff-facing Good More ❯
experience - minimum of 1-2 years. Desirable: CCNP Experience of using collaboration tools e.g. Atlassian Confluence & JIRA. Mobile Device Management (MDM) knowledge. Experience with SIEM tools e.g. Splunk. Experience with VMWare, Veeam Backup. Experience with Windows server platforms. Experience of using deployment automation tools such as Ansible, Git, CI/ More ❯
experience - minimum of 1-2 years. Desirable: CCNP Experience of using collaboration tools e.g. Atlassian Confluence & JIRA. Mobile Device Management (MDM) knowledge. Experience with SIEM tools e.g. Splunk. Experience with VMWare, Veeam Backup. Experience with Windows server platforms. Experience of using deployment automation tools such as Ansible, Git, CI/ More ❯
Infrastructure – Experience with Windows Server setup, Active Directory, VMWare (or similar), VEEAM (or equivalent) backups, and infrastructure monitoring. Additional Tools – Familiarity with vulnerability management, SIEM, PowerShell scripting, and Infrastructure as Code (Terraform/Ansible preferred). The Package: Base salary: up to £60,000 24 days annual leave Employee Assistance More ❯
and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset managementand tracking • Vulnerability Managementand Patching • SIEM principles, products and supporting logging infrastructure • Containerisation and virtual machine security • Delivering secure solutions against project expectations • Strong awareness of and commitment to industry best More ❯
Security Operations related roles Solid understanding of SOC best practices and relevant regulations Experience deploying, configuring, and managing security tools within SOC environments (e.g., SIEM, IDS/IPS, EDR, etc.). Excellent communication skills, verbally and written If this looks interesting to you, please apply or email Georgia on g.cummings More ❯
Security Operations related roles Solid understanding of SOC best practices and relevant regulations Experience deploying, configuring, and managing security tools within SOC environments (e.g., SIEM, IDS/IPS, EDR, etc.). Excellent communication skills, verbally and written If this looks interesting to you, please apply or email Georgia on g.cummings More ❯
address security flaws. Goals of the Job: Internal penetration testing Red Team Assessment Key Responsibilities: Manage Network Access Control, firewalls, IPS/IDS systems, SIEM, EDR, email filters, etc. Set up attack tools, methods, and processes against authorized OISSG client infrastructure and use them safely. Develop scripts, tools, or plans More ❯
like Firewall Management, IDS/IPS, Email protection amongst others. In this role you will: Focus on the analysis of Security Incident EventManagement (SIEM) data, which includes: Provide Deloitte firms with cybersecurity data. Assist Deloitte Global and Deloitte firms with data extraction for ISO and PCI audit requirements. Support … practices and metric reporting fundamentals. Experienced in manipulation of data sources and presentation in PowerBI. Desirable skills, qualifications, and experience: Qualified or experienced in SIEM solutions (ideally SPLUNK.) Microsoft related qualifications (Azure, Microsoft Windows, Microsoft SQL.) Qualified to ICS2 CC, CISM, CISSP or relevant Cybersecurity related qualification. Working knowledge of More ❯
implementing custom scripts to automate current detection and response workflows. Requirements: Experience of threat detection and response methodologies Excellent background with tools such as SIEM & SOAR Excellent understanding of cyber security principles Good background with SOAR platforms such as Splunk Phantom, Siemplify & IBM Resilient Telecommunications background Further job details available More ❯
across the SOC EDR-Centric Response – Work extensively with EDR tools (primary alert source) to detect and analyse modern threats Fine-Tuning & Reporting – Tune SIEMand SOAR systems for accuracy, and deliver clear, actionable incident reports Technical Threat Intelligence – Stay ahead of emerging attack vectors, especially those identified via EDR … severity incidents with analytical precision and attention to detail In-depth understanding of modern attack vectors , especially those surfaced via EDR platforms Proficiency with SIEM (e.g., Splunk, ArcSight), EDR (e.g., Defender, FireEye) , and supporting security tools Strong technical knowledge of TCP/IP, OSI model, Windows/Linux , and cloud More ❯
Security Operations Analyst SIEM Splunk - £55k Hybrid Swindon A Security Operations Analyst is required to join a leading Fintech business in their Swindon office. You will join the Security Operations team playing a key role in delivering services to their clients. With services hosted in our data centres and the … levels of service expected by their clients. The successful Security Operations Analyst will ideally demonstrate commercial experience in the following areas: Working knowledge of SIEM tools. Scripting capability, particularly using PowerShell, Bash, scripting, and querying in Microsoft Sentinel and Defender. Experience with securityand monitoring tools such as Zscaler, Microsoft More ❯
Security Operations Analyst – SIEM – Splunk - Swindon (Hybrid) - £55,000 per year A Security Operations Analyst is required to join a leading Fintech business in their Swindon office. You will join the Security Operations team delivering services to their clients. The business have services split across both data centres and the … to maintain the high levels of service expected from their clients. Key skills for the Security Operations Analyst are highlighted below: Working knowledge of SIEM tools. Scripting capability, particularly using PowerShell, Bash, scripting, and querying in Microsoft Sentinel and Defender. Experience with securityand monitoring tools such as Zscaler, Microsoft More ❯
applied in a timely manner. Learn and implement security monitoring and automation solutions to detect and respond to threats. Help manage security tooling, including SIEM, IDS/IPS, and vulnerability scanning solutions. Work closely with engineers to support secure coding practices and help embed security considerations early in the development … tools such as Secureframe, Drata, or Vanta. Experience working with pen testing and bug bounties a plus. Basic understanding of security tools such as SIEM, IDS/IPS, and vulnerability management solutions. Experience or knowledge of cloud security (AWS, GCP, or Azure). Awareness of security best practices in application More ❯
candidate will play a vital role in monitoring, analysing, and responding to security threats using tools such as Splunk, Flexera, and other industry-standard SIEM platforms. You'll investigate security incidents, coordinate with other IT andsecurity teams, and support continuous improvement of threat detection and response processes. Key Requirements … Previous experience in a SOC Analyst or similar cybersecurity role Strong expertise in Splunk or similar SIEM tools Familiarity with Flexera for vulnerability management Understanding of firewalls, network protocols, intrusion detection/prevention systems Relevant certifications (e.g., CISSP, CEH, Splunk) advantageous Must be eligible for Developed Vetting (DV) clearance, requiring More ❯
and engineering team. We have just launched our Security centre (SOC) service, which includes endpoint detection and response (EDR), SecurityInformationandEventManagement (SIEM) capability and 24x7 securityevent monitoring. The Security Services Team includes network, SIEMand SOC focused services, service development, transition and delivery. This is where More ❯
basis. The successful candidate will be working with a Telecoms end client across various projects. Key Responsibilities: Detect and respond to security incidents using SIEM tools. Analyse threats like malware, phishing, and network intrusions. Investigate and escalate security events. Strengthen security measures and report incidents. Stay updated on cybersecurity trends. … Key Requirements: Experience in SOC, cybersecurity, or related roles. Proficiency in SIEM, IDS/IPS, firewalls, and endpoint security. Understanding of network protocols and threat intelligence. Telecoms background (Essential). Strong analytical and communication skills. Further job details available upon application. More ❯
West London, Marylebone High Street, Greater London, United Kingdom Hybrid / WFH Options
Ashdown Group
business on ISO27001 and Cyber Essentials - Network and data security monitoring - Responding to tickets and working with teams on access, malware and vulnerability - Deploy SIEM - Support ongoing improvements to internal defence - Oversee policies and procedures - Support data protection initiatives - Security projects - Develop disaster recovery plans - Establish and improve vulnerability management … To be considered suitable you will need the following skills and experience: - Experience in either a Cyber Analyst or Cyber Engineer role - Knowledge on SIEMand EDR tools - Experience in network audits and penetration testing - Infrastructure support experience - Knowledge on security frameworks More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown
the design of a strategy to create a custom automated methodology for identifying potential security principles violations and providing increased early detection capabilities using SIEM & CSPM tools. About you In-depth knowledge of tools and technologies being used in cloud environments to provide security controls and assessments of the applications. … years experience working with AWS native security services (inc. Lambda, Kenisis Firehose) 1 year experience using SIEM platforms. Interview process This will be a two-stage interview process consisting of a 30-minute introductory conversation and a technical assessment. Working Schedule This role is permanent, full time, 37.5 hours per More ❯
bristol, south west england, united kingdom Hybrid / WFH Options
Hargreaves Lansdown
the design of a strategy to create a custom automated methodology for identifying potential security principles violations and providing increased early detection capabilities using SIEM & CSPM tools. About you In-depth knowledge of tools and technologies being used in cloud environments to provide security controls and assessments of the applications. … years experience working with AWS native security services (inc. Lambda, Kenisis Firehose) 1 year experience using SIEM platforms. Interview process This will be a two-stage interview process consisting of a 30-minute introductory conversation and a technical assessment. Working Schedule This role is permanent, full time, 37.5 hours per More ❯
bath, south west england, united kingdom Hybrid / WFH Options
Hargreaves Lansdown
the design of a strategy to create a custom automated methodology for identifying potential security principles violations and providing increased early detection capabilities using SIEM & CSPM tools. About you In-depth knowledge of tools and technologies being used in cloud environments to provide security controls and assessments of the applications. … years experience working with AWS native security services (inc. Lambda, Kenisis Firehose) 1 year experience using SIEM platforms. Interview process This will be a two-stage interview process consisting of a 30-minute introductory conversation and a technical assessment. Working Schedule This role is permanent, full time, 37.5 hours per More ❯
bradley stoke, south west england, united kingdom Hybrid / WFH Options
Hargreaves Lansdown
the design of a strategy to create a custom automated methodology for identifying potential security principles violations and providing increased early detection capabilities using SIEM & CSPM tools. About you In-depth knowledge of tools and technologies being used in cloud environments to provide security controls and assessments of the applications. … years experience working with AWS native security services (inc. Lambda, Kenisis Firehose) 1 year experience using SIEM platforms. Interview process This will be a two-stage interview process consisting of a 30-minute introductory conversation and a technical assessment. Working Schedule This role is permanent, full time, 37.5 hours per More ❯