science, Information Technology, Cybersecurity, or a related field. Advanced degrees or certifications (e.g., CISSP, CISM, CEH) are highly desirable. Technical Skills: Proficiency in security tools and technologies, such as SIEM, vulnerability scanners, and endpoint protection platforms. Knowledge of cloud security, network security, and secure software development practices. Familiarity with scripting and automation tools to streamline security processes. Working with data More ❯
Google Cloud, etc.). Knowledge of security standards such as ISO 27001, NIST, and SOC2. Experience with security tools such as vulnerability scanners, intrusion detection or prevention systems, andSIEM solutions. Experience with Vulnerability Management Excellent analytical and problem-solving skills. Strong communication and collaboration skills. Ability to work independently and as part of a team. In addition, the following More ❯
organization that values innovation, accountability, and building a safer digital future. What You'll Bring Strong working knowledge of security operations, including endpoint, email, and cloud security. Familiarity with SIEM platforms such as Microsoft Sentinel or Splunk. Experience working in or supporting a co-managed SOC environment. Solid understanding of security frameworks such as MITRE ATT&CK, NIST, or CIS. More ❯
security, including firewalls, WAF, anti-virus, and O365 compliance & security centre . Familiarity with NIST (CSF Framework 2.0), ISO 27001, PCI-DSS, and GDPR . Experience operating and managing SIEM solutions , vulnerability management tools, and secure configuration tooling. Ability to use PowerShell and Python scripting for security automation. Experience working in or with agile and/or SecOps oriented teams More ❯
for automating security tasks and analysis. Nice to have : 1-2 years of exposure to security operations or a relevant IT role. Experience with security tools such as EDR, SIEM, firewalls, and vulnerability scanning tools. Knowledge of cloud security concepts and practices. Solid understanding of Windows and Linux systems security. Exposure to penetration testing techniques, tools, and methodologies. Relevant securityMore ❯
similar role, with deep understanding of the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III More ❯
Broad knowledge of security domains: network security, endpoint protection, Secure development lifecycle, identity and access management, cloud security (AWS/Azure), incident response, and governance. Hands-on experience with SIEM, EDR, vulnerability management tools, and cloud-native security services. Familiarity with regulatory frameworks and industry standards (e.g., NIST, CIS, etc.). Strong analytical and problem-solving skills. Excellent communication andMore ❯
hardening best practices. Understanding of protocol analysis techniques. Experience with Azure Log Analytics, KQL, and Azure Alerts. Python, Shell, and PowerShell scripting. Experience with security tools and technologies (e.g., SIEM, IDS/IPS, NG Firewall capabilities, vulnerability scanners). Knowledge of Active Directory and Azure AD. Knowledge of application delivery and the infrastructures that enable it. Familiarity with SQL Server More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
OpenSourced Ltd
timelines, affected systems, response actions, and improvement recommendations. Produce clear, detailed reports for client delivery. Technical Requirements: Hands-on experience in incident response and investigation using tools such as SIEM, SOAR, and EDR. Proficiency in analysing logs across multiple platforms (Networking, Windows, Mac, Linux, Cloud). Solid understanding of evidence collection and handling procedures. Familiarity with the NIST More ❯
with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusion detection systems, andSIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience working on security operations, threat managementMore ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Reed Technology
with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusion detection systems, andSIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience working on security operations, threat managementMore ❯
with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusion detection systems, andSIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience working on security operations, threat managementMore ❯
with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusion detection systems, andSIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience working on security operations, threat managementMore ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Halian Technology Limited
with a strong background in cloud security (AWS, Azure, or GCP) Solid understanding of networking, identity & access management, and encryption technologies Hands-on experience with tools like Terraform, Kubernetes, SIEM platforms, andsecurity scanners Familiarity with DevSecOps practices and modern CI/CD pipelines Strong scripting or coding skills (e.g., Python, Bash, or PowerShell) Excellent problem-solving, communication, and stakeholder More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Smart DCC
and Microsoft Defender. Excellent communication and stakeholder management skills. Eligible to gain and maintain HMG Security Clearance at "Security Check" (SC) level. Hands-on experience using Elasticsearch and other SIEM technologies. Exposure to security automation and threat intelligence platforms. Previous experience in delivering training and conducting cyber exercises. About the DCC: At the DCC, we believe in making Britain more More ❯
security practices. Hands-on experience with firewalls, IDS/IPS, and VPN configurations. Experience with virtualization (VMware, Hyper-V, etc.). Familiarity with various security tool sets such as SIEM solutions, DLP, Endpoint Protection. Experience implementing disaster recovery and business continuity plans. Familiarity with compliance andsecurity frameworks (NIST, ISO 27001, etc). Knowledge of zero-trust architecture and secure More ❯
Skills & Experience: Proven experience in networking and cybersecurity consulting. Strong knowledge of Microsoft 365 securityand compliance features. Hands-on experience with Azure networking andsecurity services. Familiarity with SIEM tools, especially Microsoft Sentinel. Understanding of identity and access management (IAM), MFA, and conditional access. Experience with PowerShell, KQL, and automation tools. Excellent communication and stakeholder management skills. Preferred Certifications More ❯
South West London, London, England, United Kingdom
Tenth Revolution Group
Skills & Experience: Proven experience in networking and cybersecurity consulting. Strong knowledge of Microsoft 365 securityand compliance features. Hands-on experience with Azure networking andsecurity services. Familiarity with SIEM tools, especially Microsoft Sentinel. Understanding of identity and access management (IAM), MFA, and conditional access. Experience with PowerShell, KQL, and automation tools. Excellent communication and stakeholder management skills. Preferred Certifications More ❯
as ERP systems and reporting tools. Ensure systems meet security standards. Collaborate with finance and audit teams to support secure data flows and reporting. Cybersecurity operations Maintain endpoint protection, SIEM, firewalls, and intrusion detection systems. Conduct vulnerability assessments, patch management, and threat mitigation. Support incident response, forensic investigations, andsecurity audits. Enforce identity and access management (IAM) policies and multi More ❯
remediation. Knowledge of security frameworks, such as NIST, ISO 27001, or similar. Excellent communication skills, with the ability to clearly convey technical details to diverse audiences. Previous experience in SIEM/SOAR within large-scale, complex environments. Familiarity with other security tools and technologies. Desirable Skills: Relevant certifications (e.g., CISSP, CEH, Microsoft Certified: Security, Compliance, and Identity Fundamentals) a plus. More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
BT Group
Press Tab to Move to Skip to Content Link Select how often (in days) to receive an alert: SIEM Application Engineer Posting Date: 29 Jul 2025 Function: Cyber Security Unit: Networks Location: Snowhill, Birmingham, United Kingdom Salary: Competitive with Great Benefits The new Network SIEM is essential to BT's network security, meeting TSA requirements and improving our CAF level. … following offices: Birmingham, Manchester, Ipswich (Ipswich only applicable to existing BT employees) What you'll be doing SIEM Solution Development: Collaborate with security analysts and architects to design and implement SIEM solutions using Elasticsearch. Optimize SIEM rules, alerts, and dashboards for efficient threat detection. Collaborate effectively with others to drive forward key security objectives Presentation and documentation writing (to both … Experience in key cyber technologies such as SIEM technologies (Elastic preferred), vulnerability management, access managementand other commonly used Enterprise security controls. Ideally from both a development and operational perspective Advantageous: SIEM implementation and usage Experience of Elastic Stack (ELK) Knowledge of Offensive testing frameworks Knowledge of Linux, Windows and Network Administration Knowledge and experience of cloud services (public or More ❯
Expert Experience designing or implementing micro segmentation (e.g., Cisco Titration, Illumio, Guardicore) Background in regulated industries like financial services, healthcare, Resources or government Familiarity with DNS-based threat detection, SIEM/SOAR integration, and cloud security access brokers (CASB) Why Join Us at Accenture in This Role? Leadership in Next-Generation Cybersecurity : As a trusted security partner, Accenture leads the More ❯