slough, south east england, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
cyber incidents, offering reassurance and expert guidance Produce detailed incident reports with root cause analysis and actionable recommendations Perform forensic and log analysis using SIEM, EDR, SOAR, and other security tools Collaborate across teams to enhance response playbooks and internal processes Stay informed on emerging threats and tactics to strengthen More ❯
oxford district, south east england, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
cyber incidents, offering reassurance and expert guidance Produce detailed incident reports with root cause analysis and actionable recommendations Perform forensic and log analysis using SIEM, EDR, SOAR, and other security tools Collaborate across teams to enhance response playbooks and internal processes Stay informed on emerging threats and tactics to strengthen More ❯
milton keynes, south east england, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
cyber incidents, offering reassurance and expert guidance Produce detailed incident reports with root cause analysis and actionable recommendations Perform forensic and log analysis using SIEM, EDR, SOAR, and other security tools Collaborate across teams to enhance response playbooks and internal processes Stay informed on emerging threats and tactics to strengthen More ❯
Channel Account Executives as well as supporting our partners selling BlueVoyant services. Your understanding of cyber security operations environments, securityInformationandeventmanagement (SIEM), endpoint detection and response (EDR), and broad IT risk management products and services, coupled with your communication skills and eagerness to teach partners’ technical sellers … more of the following: Next-Generation Anti-virus, Endpoint Detection and Response (EDR), Security Orchestration, Automation, and Response (SOAR), SecurityInformationandEventManagement (SIEM, particularly Splunk and/or Splunk Cloud), firewalls, and other core security products. (e.g. Crowdstrike, Carbon Black, Splunk, and/or the Microsoft security technologies More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
Refreshing Recruitment Ltd
secure architectures for CI/CD and DevOps pipelines (ie Github, Gitlab, Azure DevOps, Jenkins). Understanding of End point Detection and Response (EDR), SIEM, MDM, & policy enforcement tools. Familiarity with NCSC Cloud Security Principles, and Government Security Classifications Experience with Zero Trust models and secure identity architectures Security Clearance. More ❯
value to Enterprise or Major-level accounts in the cybersecurity industry. Extensive platform selling experience in complex sales with multiple buying centers. Experience selling SIEM, EDR, or CNAPP (DevSecOps, CloudOps) solutions is highly preferred. Established trusted relationships with CIOs and CISOs with the ability to influence and drive strategic conversations More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
Totum Partners
informationsecurity role within a professional services environment. Hands on configuration across different security platforms, Cloud and on-prem. Technical skills - AD, EntraID, M365, SIEM logic, Configs with MSSP, scripting/coding and troubleshooting configurations. Strong communication skills are a must. The firm offer hybrid working - 2/3 WFH. More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
Provide
What you’ll be doing: Designing and implementing SOC process automation to eliminate manual overhead in alert triage, response, and reporting Integrating security tooling (SIEM, SOAR, firewalls, etc.) Creating automated playbooks to drive consistency and speed across IR workflows Collaborating with SOC analysts, engineers, and third-party vendors to identify More ❯
security reports and advisories to key stakeholders. Residual Risk Assessment: Deliver post-incident analysis, technical lessons learned, and reporting to assess residual risk. Advanced SIEM Tuning: Refine and tune SIEM tools to reduce false positives and detect more sophisticated threats, ensuring optimal alert configurations. Automating Response Actions: Develop and improve … in securityevent analysis and incident response. Deep knowledge of IPv4/IPv6, TCP networking protocols, and the OSI model. Expertise in security tools: SIEM (ArcSight, Sentinel, QRadar, Splunk), EDR (Microsoft Defender, FireEye), IDS/IPS, firewalls, proxies, web application firewalls, and anti-virus technologies. Strong knowledge of Linux andMore ❯
security reports and advisories to key stakeholders. Residual Risk Assessment: Deliver post-incident analysis, technical lessons learned, and reporting to assess residual risk. Advanced SIEM Tuning: Refine and tune SIEM tools to reduce false positives and detect more sophisticated threats, ensuring optimal alert configurations. Automating Response Actions: Develop and improve … in securityevent analysis and incident response. Deep knowledge of IPv4/IPv6, TCP networking protocols, and the OSI model. Expertise in security tools: SIEM (ArcSight, Sentinel, QRadar, Splunk), EDR (Microsoft Defender, FireEye), IDS/IPS, firewalls, proxies, web application firewalls, and anti-virus technologies. Strong knowledge of Linux andMore ❯
Proven ability to manage relationships with internal and external stakeholders Experience working in a client-facing role Familiarity with security technologies such as firewalls, SIEM, endpoint protection and threat detection systems. Expertise in project management tools and methodologies (Agile, Waterfall) Strong understanding of cybersecurity best practices and risk management Certification More ❯
TrueSight Identity protection and corporate tools including AAIP, MDI, and MCAS PUAM systems, especially CyberArk Security logging and monitoring, preferably with PRISM or similar SIEM solutions Solid understanding of security frameworks (e.g., NIST, ISO 27001) and compliance requirements. Proven experience in low-level design (LLD) documentation and system integration. Our More ❯
TrueSight Identity protection and corporate tools including AAIP, MDI, and MCAS PUAM systems, especially CyberArk Security logging and monitoring, preferably with PRISM or similar SIEM solutions Solid understanding of security frameworks (e.g., NIST, ISO 27001) and compliance requirements. Proven experience in low-level design (LLD) documentation and system integration. Our More ❯
implementing custom scripts to automate current detection and response workflows. Requirements: Experience of threat detection and response methodologies Excellent background with tools such as SIEM & SOAR Excellent understanding of cyber security principles Good background with SOAR platforms such as Splunk Phantom, Siemplify & IBM Resilient Telecommunications background Further job details available More ❯
implement custom scripts to automate current detection and response workflows. Requirements: Experience of threat detection and response methodologies. Excellent background with tools such as SIEM & SOAR. Excellent understanding of cyber security principles. Good background with SOAR platforms such as Splunk Phantom, Siemplify & IBM Resilient. Telecommunications background. Further job details available More ❯
scripting or programming languages. Practical knowledge and demonstrated experience in areas such as Data Loss Prevention (DLP), Data Privacy/Protection, DSPM/CSPM, SIEM, or vulnerability management is highly preferred. Proven success in a technical, customer-facing role within a software or SaaS company. Full spec available, please apply More ❯
scripting or programming languages. Practical knowledge and demonstrated experience in areas such as Data Loss Prevention (DLP), Data Privacy/Protection, DSPM/CSPM, SIEM, or vulnerability management is highly preferred. Proven success in a technical, customer-facing role within a software or SaaS company. Full spec available, please apply More ❯
oxford district, south east england, United Kingdom
Locke44
scripting or programming languages. Practical knowledge and demonstrated experience in areas such as Data Loss Prevention (DLP), Data Privacy/Protection, DSPM/CSPM, SIEM, or vulnerability management is highly preferred. Proven success in a technical, customer-facing role within a software or SaaS company. Full spec available, please apply More ❯
scripting or programming languages. Practical knowledge and demonstrated experience in areas such as Data Loss Prevention (DLP), Data Privacy/Protection, DSPM/CSPM, SIEM, or vulnerability management is highly preferred. Proven success in a technical, customer-facing role within a software or SaaS company. Full spec available, please apply More ❯
scripting or programming languages. Practical knowledge and demonstrated experience in areas such as Data Loss Prevention (DLP), Data Privacy/Protection, DSPM/CSPM, SIEM, or vulnerability management is highly preferred. Proven success in a technical, customer-facing role within a software or SaaS company. Full spec available, please apply More ❯
to understand technical capabilities to ensure solutions align with security challenges and business objectives. Technical Requirements: Hands-on experience with security technologies such as SIEM, EDR, SOAR, vulnerability, threat intelligence etc. Experience in pre-sales, solution consulting, or technical advisory roles Proactive mindset and strong customer engagement skills Please apply More ❯
to understand technical capabilities to ensure solutions align with security challenges and business objectives. Technical Requirements: Hands-on experience with security technologies such as SIEM, EDR, SOAR, vulnerability, threat intelligence etc. Experience in pre-sales, solution consulting, or technical advisory roles Proactive mindset and strong customer engagement skills Please apply More ❯
to understand technical capabilities to ensure solutions align with security challenges and business objectives. Technical Requirements: Hands-on experience with security technologies such as SIEM, EDR, SOAR, vulnerability, threat intelligence etc. Experience in pre-sales, solution consulting, or technical advisory roles Proactive mindset and strong customer engagement skills Please apply More ❯
oxford district, south east england, United Kingdom
ECS Resource Group
to understand technical capabilities to ensure solutions align with security challenges and business objectives. Technical Requirements: Hands-on experience with security technologies such as SIEM, EDR, SOAR, vulnerability, threat intelligence etc. Experience in pre-sales, solution consulting, or technical advisory roles Proactive mindset and strong customer engagement skills Please apply More ❯