Reading, England, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Limited
responsibilities: Incident Detection and Response: Lead investigations and remediation of complex security incidents, including malware infections, data breaches, and advanced persistent threats (APTs). Utilize advanced SIEM (SecurityInformationandEventManagement) tools, threat intelligence platforms, and other security technologies to analyze and correlate security alerts. Take ownership of Tier 3-level escalations from Tier 1 and Tier 2 analysts … of experience in cybersecurity, with incident response, digital forensics, or threat hunting. Strong experience in handling complex cyber incidents (e.g., APTs, ransomware, data breaches). Hands-on experience with SIEM platforms (e.g., Splunk, ArcSight, LogRhythm) and endpoint detection/response (EDR) tools. Technical Skills: Proficient in incident response tools and techniques, including network and system forensics, malware analysis, and memory More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Focus on SAP
complex cyber incidents, including APTs, malware outbreaks, and data breaches. Take charge of escalated alerts from Tier 1 and 2 analysts and guide them through advanced response protocols. Utilize SIEM, EDR, and threat intelligence platforms to perform deep-dive analysis and response. 🧠 Threat Hunting & Analysis Proactively identify emerging threats through behavioral analytics and threat intelligence. Analyze log data, network activity … a related field. 6–8+ years in cybersecurity with a focus on incident response and threat hunting. Proven experience investigating APTs, ransomware, and data exfiltration attempts. Deep knowledge of SIEM platforms (e.g., Splunk, LogRhythm, ArcSight) and EDR solutions. Hands-on experience in network/system forensics and malware analysis. Familiarity with operating systems (Windows, Linux) and cloud environments (e.g., AWS More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
In Technology Group Limited
Qualifications: Proven experience in a cyber security or informationsecurity engineering role. Strong knowledge of network and system security, encryption, and authentication protocols. Experience with security tools such as SIEM, vulnerability scanners, firewalls, antivirus, and endpoint protection platforms. Familiarity with cloud security (AWS, Azure, or GCP) and hybrid environments. Good understanding of regulatory frameworks and standards (ISO 27001, NIST, PCI More ❯
Policies and Standards and a proficient understanding of the Microsoft 365/Azure platforms/AWS Responsibilities: Monitor securityevent logs and alerts generated by various security technologies, including SIEM, IDS/IPS, firewalls, and endpoint protection systems. Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. Identify, analyze, and assess potential insider More ❯
and data breaches, ensuring swift, effective responses to minimize risk to the organization and its clients. Key Responsibilities: 1. Incident Detection and Response: o Utilize advanced SIEM (SecurityInformationandEventManagement) tools, threat intelligence platforms, and other security technologies to analyze and correlate security alerts. 2. Threat Hunting & Analysis: o Proactively search for threats across the environment using behavioural … PowerShell, etc.) to automate tasks or create custom detection methods. o Strong experience in handling complex cyber incidents (e.g., APTs, ransomware, data breaches). o Hands-on experience with SIEM platforms (e.g., Splunk, ArcSight, LogRhythm) and endpoint detection/response (EDR) tools. *Certifications (Preferred ): o Certified Information Systems Security Professional (CISSP) o Certified Incident Handler (GCIH, EC-Council) o Certified More ❯
and data breaches, ensuring swift, effective responses to minimize risk to the organization and its clients. Key Responsibilities: 1. Incident Detection and Response: o Utilize advanced SIEM (SecurityInformationandEventManagement) tools, threat intelligence platforms, and other security technologies to analyze and correlate security alerts. 2. Threat Hunting & Analysis: o Proactively search for threats across the environment using behavioural … PowerShell, etc.) to automate tasks or create custom detection methods. o Strong experience in handling complex cyber incidents (e.g., APTs, ransomware, data breaches). o Hands-on experience with SIEM platforms (e.g., Splunk, ArcSight, LogRhythm) and endpoint detection/response (EDR) tools. • Certifications (Preferred ): o Certified Information Systems Security Professional (CISSP) o Certified Incident Handler (GCIH, EC-Council) o Certified More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
and data breaches, ensuring swift, effective responses to minimize risk to the organization and its clients. Key Responsibilities: 1. Incident Detection and Response: o Utilize advanced SIEM (SecurityInformationandEventManagement) tools, threat intelligence platforms, and other security technologies to analyze and correlate security alerts. 2. Threat Hunting & Analysis: o Proactively search for threats across the environment using behavioural … PowerShell, etc.) to automate tasks or create custom detection methods. o Strong experience in handling complex cyber incidents (e.g., APTs, ransomware, data breaches). o Hands-on experience with SIEM platforms (e.g., Splunk, ArcSight, LogRhythm) and endpoint detection/response (EDR) tools. *Certifications (Preferred ): o Certified Information Systems Security Professional (CISSP) o Certified Incident Handler (GCIH, EC-Council) o Certified More ❯
technical teams. Qualifications Degree or equivalent industry certification. Professional certification in security/identity (e.g. CREST, GIAC). ITIL Foundation certification. Incident response certification preferred. Technical Knowledge Proficient in SIEM, EDR, threat detection, and vulnerability management. Solid understanding of network security (firewalls, segmentation, IDS/IPS). Experience with Windows, Mac, Linux environments andsecurity tooling. Familiarity with public cloud More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
IT andSecurity problems for non-technical audiences. • Strong understanding of OT infrastructure, networking, and end-user computing. • Proficiency in writing Kusto Query Language (KQL) for creating and tuning SIEM queries and alerts. • Experience in configuring and troubleshooting MFA, Privileged Access Management (PAM), andSecurityInformation & EventManagement (SIEM) systems, particularly Microsoft Sentinel. Desirable Experience: • Familiarity with managing network securityMore ❯
awareness and compliance. Skills & Qualifications: Minimum 3 years' experience in cybersecurity. Strong knowledge of security frameworks (NIST 800, ISO 27001) and GDPR regulations. Experience with network security infrastructure andSIEM tools (Splunk, SolarWinds). Proficiency in Windows/Linux system administration and virtualization technologies (VMware, Hyper-V). Previous experience within the finance or banking sector is highly advantageous. Certifications More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Morgan Hunt
expertise in securityand identity systems Qualifications Degree or relevant professional IT/security qualification Recognised certification from a security or identity vendor Knowledge Solid understanding of tools like SIEM, EDR, and threat detection methods Knowledge of vulnerability managementand threat intelligence Familiarity with network security (firewalls, segmentation, IDS/IPS, etc.) Understanding of operating systems (Windows, Mac, Linux) andMore ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
with complicated security-related concepts to technical and non-technical audiences. Proficient in the use of PowerBI or a similar dashboarding application. Knowledge of security systems (including working with SIEM data). SQL or database knowledge would be desirable. Relevant certifications such as CISSP, CISM, or CRISC (or equivalent) are preferred. Proven experience in managing and delivering technical projects andMore ❯
configurations, and recommend improvements to stay compliant Collaborate with key stakeholders including Compliance and Infrastructure teams Required Experience: Microsoft security suite experience – Microsoft certifications are highly valued Familiarity with SIEM tools – Microsoft Sentinel or similar Experience managing network securityand firewalls Exposure to PenTesting methodologies or practices (desirable) Experience with NAC solutions like Cisco ISE, ForeScout, or similar Strong grasp More ❯
configurations, and recommend improvements to stay compliant Collaborate with key stakeholders including Compliance and Infrastructure teams Required Experience: Microsoft security suite experience – Microsoft certifications are highly valued Familiarity with SIEM tools – Microsoft Sentinel or similar Experience managing network securityand firewalls Exposure to PenTesting methodologies or practices (desirable) Experience with NAC solutions like Cisco ISE , ForeScout , or similar Strong grasp More ❯
HQ network andinformationsecurity department to do the relative jobs, reports, support internal and external networks, including VPN setup, DNS management, AP management, firewall configuration, WAF (e.g. Akaimai),SIEM(e.g. IBM QRada),etc. (4) Familiar with IP network, familiar with Cisco and Juniper, etc. equipment’s maintenance and configuration. (5) Experience with the Linux system administration, preferred having ZSTACK … securitymanagement roles. Strong knowledge of IP network protocols, maintenance and configuration, firewall management, and data security practices. Experience with VOIP telephony systems, VPN technologies, DNS management, WAF administration, SIEM management. Familiarity with automated deployment tools, disaster recovery practices, and endpoint protection solutions. Excellent troubleshooting skills and the ability to resolve complex technical issues efficiently. Strong communication skills with the More ❯
High Wycombe, Buckinghamshire, UK Hybrid / WFH Options
Logiq
training, and exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC More ❯
training, and exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC More ❯
training, and exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC More ❯
training, and exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC More ❯
Milton Keynes, Buckinghamshire, UK Hybrid / WFH Options
Logiq
training, and exercising of SOC staff based on industry best practice. Experience in business growth and bid development is desirable. What We’re Looking for: Essential Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. Desirable Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC More ❯
effectively communicate information internally and to customers Facilitate root cause investigations and manage the implementation of corrective and preventative measures Qualifications Previous experience with Endpoint Security software is required SIEM experience, including - Deep understanding of how SIEMs works Experience in creating custom collections and data parsing Experience in creating complex correlation rules, reports and dashboard Experience in integration and implementation More ❯
of scripts in Python JavaScript or PowerShell is a plus Experience with security design and architecture, content development, workload automation and use-cases Experienced with technologies such as EDR, SIEM, SOAR, NGFW and their ecosystems Familiarity with cloud technologies, providers (such as GCP, AWS, Azure) Familiarity with attack surface management is a plus Experience in customer-facing roles (internal or More ❯
Overview We are seeking a contract XSIAM Engineer with deep expertise in Palo Alto Networks technologies, ideally coming from an XSOAR background, and possessing strong experience across XDR andSIEM environments. This is a key role within our security operations function, focused on enhancing detection, automation, and response capabilities. *For this role you must be eligible for SC Clearance* Key … SOC efficiency and visibility Design and manage security automation workflows, drawing from previous XSOAR experience Integrate and optimize XDR capabilities to support proactive threat detection Set up and maintain SIEM-style log ingestion, correlation rules, and enrichment pipelines Build custom dashboards and reporting tools for real-time security insights Troubleshoot complex issues related to XSIAM, XSOAR, and related integrations Ensure … Ideally experience implementing and managing XSIAM in real-world environments but will consider strong XSOAR Consultants who want to evolve into XSIAM. Strong understanding of Security Operations, XDR, andSIEM principles Proficient in scripting and automation (e.g., Python, PowerShell) Solid experience with log analysis, event correlation, and alert tuning Needs to be eligible for SC Clearance Desirable Qualifications Palo Alto More ❯
Overview We are seeking a contract XSIAM Engineer with deep expertise in Palo Alto Networks technologies, ideally coming from an XSOAR background, and possessing strong experience across XDR andSIEM environments. This is a key role within our security operations function, focused on enhancing detection, automation, and response capabilities. *For this role you must be eligible for SC Clearance* Key … SOC efficiency and visibility Design and manage security automation workflows, drawing from previous XSOAR experience Integrate and optimize XDR capabilities to support proactive threat detection Set up and maintain SIEM-style log ingestion, correlation rules, and enrichment pipelines Build custom dashboards and reporting tools for real-time security insights Troubleshoot complex issues related to XSIAM, XSOAR, and related integrations Ensure … Ideally experience implementing and managing XSIAM in real-world environments but will consider strong XSOAR Consultants who want to evolve into XSIAM. Strong understanding of Security Operations, XDR, andSIEM principles Proficient in scripting and automation (e.g., Python, PowerShell) Solid experience with log analysis, event correlation, and alert tuning Needs to be eligible for SC Clearance Desirable Qualifications Palo Alto More ❯
Overview We are seeking a contract XSIAM Engineer with deep expertise in Palo Alto Networks technologies, ideally coming from an XSOAR background, and possessing strong experience across XDR andSIEM environments. This is a key role within our security operations function, focused on enhancing detection, automation, and response capabilities. *For this role you must be eligible for SC Clearance* Key … SOC efficiency and visibility Design and manage security automation workflows, drawing from previous XSOAR experience Integrate and optimize XDR capabilities to support proactive threat detection Set up and maintain SIEM-style log ingestion, correlation rules, and enrichment pipelines Build custom dashboards and reporting tools for real-time security insights Troubleshoot complex issues related to XSIAM, XSOAR, and related integrations Ensure … Ideally experience implementing and managing XSIAM in real-world environments but will consider strong XSOAR Consultants who want to evolve into XSIAM. Strong understanding of Security Operations, XDR, andSIEM principles Proficient in scripting and automation (e.g., Python, PowerShell) Solid experience with log analysis, event correlation, and alert tuning Needs to be eligible for SC Clearance Desirable Qualifications Palo Alto More ❯