Hemel Hempstead, Hertfordshire, South East, United Kingdom
Hamilton Barnes Associates Limited
and log management. Experience analysing log data and network security events. Desirable Skills: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst certification. Familiarity with additional SIEM tools such as QRadar. DV Clearance Eligibility Benefits: 25 days annual leave, with the option to purchase more Health cash plan Life assurance Pension scheme Generous flexible benefits fund Salary More ❯
Staying ahead of the curve on emerging threats, tactics, and techniques To secure this SOC role: Proven experience in a Security Operations Centre (SOC) environment Hands-on knowledge of SIEM tools (Microsoft Sentinel, Splunk, etc.) Familiarity with MITRE ATT&CK and threat detection methodologies Strong analytical mindset with log, endpoint, and network analysis skills Understanding of network protocols (TCP/ More ❯
cause analysis and liaise with the customer and the Service Delivery Manager as well and ensuring the actions of the SOC Analysts follow best practice. Security Monitoring: & Investigation: Monitoring SIEM tools to assure high a level of security operations delivery function Oversee and enhance security monitoring systems to detect and analyse potential security incidents. Conduct real-time analysis of security … vulnerabilities, integrating threat intelligence into security monitoring processes. Contribute to the development of threat intelligence feeds to enhance proactive threat detection. Proactively hunt for threats within enterprise environments using SIEMand EDR solutions. Fine-tune SIEM detection rules, correlation alerts, and log sources to reduce false positives. Analyse threat intelligence feeds, map findings to MITRE ATT&CK framework, and provide … mechanisms. Conduct adversary simulation exercises to test and improve detection capabilities. Generate detailed reports on emerging threats, attack trends, andsecurity posture improvements. Monitored and analysed security logs from SIEM platforms to identify suspicious activity. Security Tool Management: Manage and optimise SIEM tools, ensuring they are properly configured and updated to maximize effectiveness. Own the development and implementation of SOC More ❯
and liaise with the custiomer and the Service Delivery Manager as well and ensuring the actions of the SOC Analysts follow best practice. Job Duties Security Monitoring: & Investigation: Monitoring SIEM tools to assure high a level of security operations delivery function Oversee and enhance security monitoring systems to detect and analyse potential security incidents. Conduct real-time analysis of security … vulnerabilities, integrating threat intelligence into security monitoring processes. Contribute to the development of threat intelligence feeds to enhance proactive threat detection. Proactively hunt for threats within enterprise environments using SIEMand EDR solutions. Fine-tune SIEM detection rules, correlation alerts, and log sources to reduce false positives. Analyse threat intelligence feeds, map findings to MITRE ATT&CK framework, and provide … mechanisms. Conduct adversary simulation exercises to test and improve detection capabilities. Generate detailed reports on emerging threats, attack trends, andsecurity posture improvements. Monitored and analysed security logs from SIEM platforms to identify suspicious activity. Security Tool Management: Manage and optimise SIEM tools, ensuring they are properly configured and updated to maximize effectiveness. Own the development and implementation of SOC More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Reed Technology
including line management or team leadership . In-depth knowledge of ISO27001, GDPR, FCA SYSC, PCI DSS and other regulatory/compliance frameworks. Hands-on experience with security technologies: SIEM, IAM, vulnerability assessment, endpoint protection, cloud services (AWS, SaaS, IaaS) . Strong communication skills and stakeholder management abilities. Experience in incident response and enterprise risk reporting. Professional certifications such as More ❯
functions to help drive continual program improvements WHAT YOU'LL BRING: 5+ years of experience working within a security operations environment At least year of experience in writing detections, SIEM rules, or EDR Significant experience with standard incident response processes Expertise in a broad range of information technologies, such as public cloud infrastructure (AWS,GCP), authentication systems, vulnerability management solutions More ❯
vulnerabilities. What We're Looking For Strong knowledge of audit & compliance frameworks (ISO 27001, Cyber Essentials, GDPR, DORA). Experience with CSOC tools such as Rapid7 InsightIDR or other SIEM solutions. Hands-on experience with internal/external audits and compliance assessments. Relevant security/audit certifications (CISA, CISM, CISSP, ISO 27001 Lead Auditor, Cyber Essentials Assessor, or equivalent). More ❯
such as AD, Azure AD, access policies, authentication/authorization, strong authentication, and privileged access management. - Experience with open standards such as SAML, OAuth or Open ID. - Experience with SIEM content development, security monitoring, incident detection, incident response and forensics. - Experience in Threat hunting & IR experience in Windows and/or Linux environments, cloud/hybrid environments. Senior Cyber SecurityMore ❯
such as SABSA, TOGAF etc. Previous experience with embedding security principles. Familiar with network security techniques and technologies such as Remote Access, VPN, Firewalls, NAC, DLP, IDS/IPS, SIEMand Wireless security. Knowledge of informationsecurity principles and best practices. Experience in managing informationsecurity risk. Familiar with informationsecurity frameworks such as NIST, SANS Top 20 CSC, OWASP More ❯
such as SABSA, TOGAF etc. Previous experience with embedding security principles. Familiar with network security techniques and technologies such as Remote Access, VPN, Firewalls, NAC, DLP, IDS/IPS, SIEMand Wireless security. Knowledge of informationsecurity principles and best practices. Experience in managing informationsecurity risk. Familiar with informationsecurity frameworks such as NIST, SANS Top 20 CSC, OWASP More ❯
infrastructure roles with exposure to vulnerability managementand incident response. Working knowledge of common attack vectors such as phishing, ransomware, and lateral movement. Familiarity with security tools such as SIEM, vulnerability scanners, endpoint protection, and patch management. Understanding of frameworks and standards such as NIST CSF, CIS Controls, Cyber Essentials, or ISO 27001. Strong communication skills and ability to work More ❯
on industry standards while continuously evaluating and enhancing our security infrastructure Collaborate with IT, DevOps and SecOps teams to architect, configure and implement security monitoring and defense tools (is. SIEM, IDS/IPS, ASM, WAF) to safeguard against security breaches, cyber threats and unauthorized access Report on and assist with all security events and incidents. Oversee Security testing, including penetration More ❯
on industry standards while continuously evaluating and enhancing our security infrastructure Collaborate with IT, DevOps and SecOps teams to architect, configure and implement security monitoring and defense tools (is. SIEM, IDS/IPS, ASM, WAF) to safeguard against security breaches, cyber threats and unauthorized access Report on and assist with all security events and incidents. Oversee Security testing, including penetration More ❯
Your profile Must haves More than 10 years experience in an IT security role. Expert on IT Security architecture, strategy and frameworks (like NIST, CIS, OWASP). Experience with SIEM, IDS/IPS, firewalls and endpoint protection. Nice to haves Extensive experience in designing, implementation, maintenance and review of security controls (in areas of Identity and Access Management, Network SecurityMore ❯
of the current threat landscape. Analyze threat intelligence with an aim to mitigate emerging risks. Qualifications: Hands on experience and understanding of fundamental security concepts, SOAR, EDR, NDR andSIEM technologies. Hands on experience with one or more Cloud Service Providers (AWS, Azure, GCP, etc). Demonstrate the ability to multitask, adapt and thrive within a fast-paced environment. Have More ❯
DevOps practices, and CI/CD pipelines. Familiarity with infrastructure monitoring, logging, and alerting tools. Knowledge of regulatory compliance frameworks (e.g. ISO 27001, NIST). Knowledge of InformationSecurity, SIEM, Cyber Defence centre tooling. About working for us Our ambition is to be the leading UK business for diversity, equity and inclusion supporting our customers, colleagues and communities, and we More ❯
Chesterfield, Derbyshire, England, United Kingdom Hybrid / WFH Options
LANGLAND CONSULTANTS LTD
Infrastructure Engineer/Analyst ( Hybrid/Chesterfield) - 12 Month FTC. VMWare, AD, Exchange, Windows Server, Azure, O365, Siem tooling, PowerShell, Networking, Meraki, Firewalls Infrastructure Engineer/Analyst: Do you have a background in supporting business or technical applications? Do you have a broad technical skill set but looking to be re-trained in new technologies and looking for a new More ❯
DevOps practices, and CI/CD pipelines. Familiarity with infrastructure monitoring, logging, and alerting tools. Knowledge of regulatory compliance frameworks (e.g. ISO 27001, NIST). Knowledge of InformationSecurity, SIEM, Cyber Defence centre tooling. About working for us Our ambition is to be the leading UK business for diversity, equity and inclusion supporting our customers, colleagues and communities, and we More ❯
For: ️ Proven experience as a Cybersecurity Engineer or in a similar cybersecurity role ️ Strong knowledge of network protocols, encryption techniques, andsecurity technologies (e.g., firewalls, IDS/IPS, VPNs, SIEM) ️ Experience with cloud securityand hybrid environments (AWS, Azure, GCP) ️ Hands-on experience with security incident response and vulnerability management tools ️ Certifications such as CISSP, CEH, CompTIA Security+, or Cisco More ❯
Proven experience as a Cybersecurity Specialist or in a similar role within IT security ️ Strong knowledge of cybersecurity principles, threat intelligence, andsecurity controls ️ Experience with security tools (e.g., SIEM, firewalls, EDR, VPN, DLP) and vulnerability management ️ Solid understanding of regulatory frameworks and industry standards (e.g., GDPR, NIST, ISO 27001) ️ Certifications such as CISSP, CISM, CompTIA Security+, or CEH are More ❯
with complicated security-related concepts to technical and non-technical audiences. Proficient in the use of PowerBI or a similar dashboarding application. Knowledge of security systems (including working with SIEM data). SQL or database knowledge would be desirable. Relevant certifications such as CISSP, CISM, or CRISC or equivalent are preferred. Proven experience in managing and delivering technical projects andMore ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
with complicated security-related concepts to technical and non-technical audiences. Proficient in the use of PowerBI or a similar dashboarding application. Knowledge of security systems (including working with SIEM data). SQL or database knowledge would be desirable. Relevant certifications such as CISSP, CISM, or CRISC or equivalent are preferred. Proven experience in managing and delivering technical projects andMore ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
with complicated security-related concepts to technical and non-technical audiences. Proficient in the use of PowerBI or a similar dashboarding application. Knowledge of security systems (including working with SIEM data). SQL or database knowledge would be desirable. Relevant certifications such as CISSP, CISM, or CRISC or equivalent are preferred. Proven experience in managing and delivering technical projects andMore ❯