an experienced team. You'll be at the heart of their SecOps function, helping to shape and improve their cyber capabilities. What they are looking for : Someone comfortable with SIEM, EDR, and vulnerability management tooling (Rapid7, CrowdStrike, Qualys etc.) Scripting and automation Strong foundational IT and networking knowledge Familiarity with patching solutions and email security tools A proactive mindset andMore ❯
escalated cases. • Proven leadership capability with experience line managing analysts, conducting performance reviews, and overseeing HR-related duties. • Experience providing ticket quality assurance and training delivery. • Familiarity with leading SIEM, endpoint and XDR security platforms, in multi-tenant MSSP environments. • Willingness to obtain or hold relevant security certifications, such as SBT BTL2 and CREST CRIA. More ❯
requirements. Excellent communication and stakeholder management skills. Comfortable working in a fast-paced, iterative, and agile environment. Preferred Experience: Solid understanding of cyber security concepts such as threat detection, SIEM, anomaly detection, and incident response. Experience with tools for tracking ML models in production (e.g., MLflow). We encourage you to apply even if your experience is not a More ❯
on threat detection and incident response ️ Strong knowledge of threat intelligence sources, analysis techniques, and cybersecurity frameworks (e.g., MITRE ATT&CK) ️ Hands-on experience with security tools such as SIEM, IDS/IPS, EDR, and network traffic analysis platforms ️ Proficiency in scripting and automation for threat hunting and investigation (e.g., Python, PowerShell, Bash) ️ Certifications such as OSCP, GCIH, or CREST More ❯
in forming collaborative working relationships with customers and other internal stakeholders. Confidence in effectively communicating technical incidents or security threats to non-technical stakeholders. Previous experience of working with SIEMand log monitoring tools. SC-200, SC-900 or equivalent certification would be beneficial but not essential. To be considered for this role, you must be UK based and eligible More ❯
security assessment tools Management of security with regards to new systems acquisition. Deliver in person Cyber Security training programmes. Requirements: Networking experience Cyber Security Active Directory and Virtualisation experience. SIEM experience Email Security Vulnerability Management The Package: If successful our client is offering a salary between £40,000 - £42,000 per annum, favourable holiday allowance. How to Apply : If you More ❯
Security Services Strong background in IT network security concepts. Strong knowledge of data andinformation flows, information governance, network protocols. Knowledge of system hardening techniques. Knowledge and experience in SIEM technologies. Knowledge and experience in vulnerability and risk management processes. Knowledge and experience of applying cybersecurity controls within SAAS environments. Project Engagement Strong stakeholder management skills Knowledge and experience in More ❯
in vulnerability management or compliance monitoring Experience leading in a cybersecurity environment Experience in technical project management Experience in vulnerability scanning, penetration testing, network admission control, and/or SIEM Experience in design and implementation of security technologies Experience with IT controls monitoring for regulatory and compliance requirements Desirable Knowledge of or experience in coaching and mentoring practices and tools More ❯
cyber security strategy, risk management, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity managementand federation, firewalls, SIEM, vulnerability scanning, and cryptography. Experience overseeing incident response, vulnerability management, andsecurity service delivery, ideally within ITIL-aligned environments. Ability to translate complex security concepts into clear, actionable guidance for More ❯
cyber security strategy, risk management, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity managementand federation, firewalls, SIEM, vulnerability scanning, and cryptography. Experience overseeing incident response, vulnerability management, andsecurity service delivery, ideally within ITIL-aligned environments. Ability to translate complex security concepts into clear, actionable guidance for More ❯
swindon, wiltshire, south west england, united kingdom
Ncounter Technology Recruitment
cyber security strategy, risk management, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity managementand federation, firewalls, SIEM, vulnerability scanning, and cryptography. Experience overseeing incident response, vulnerability management, andsecurity service delivery, ideally within ITIL-aligned environments. Ability to translate complex security concepts into clear, actionable guidance for More ❯
architecture, and drive strategy in a fast-paced, forward-thinking environment. What youll need: 3+ years in complex IT or consultancy environments Knowledge of HMG SPF, ISO27001, identity management, SIEM, PKI, cryptography, and secure frameworks Experience in public sector programmes Bonus: PCiIAA, SABSA, TOGAF, or a masters/STEM degree If youre security-cleared (or eligible), ready to lead, andMore ❯
and drive strategy in a fast-paced, forward-thinking environment. What you’ll need: 3+ years in complex IT or consultancy environments Knowledge of HMG SPF, ISO27001, identity management, SIEM, PKI, cryptography, and secure frameworks Experience in public sector programmes Bonus: PCiIAA, SABSA, TOGAF, or a master’s/STEM degree If you’re security-cleared (or eligible), ready to More ❯
on experience in designing, implementing, and operationalizing security controls for various IT and enterprise systems. Exhibit proficiency in multiple security technologies, such as Next-Gen Firewalls, SASE, NAC, DLP, SIEM, PAM, EDR, NDR, etc. Possess strong knowledge of networking security concepts, including routing, segmentation, zones, NAT, etc. Communicate complex technical information effectively to both technical and non-technical audiences. Autonomously More ❯
security reviews and risk assessments, and partner with colleagues to respond to incidents and remediate system vulnerabilities. evaluate remediation Review, analyze and correlate security logs as well as improve SIEM solution. Strong knowledge in Security Cloud support for AWS, OCI, and Azure. Develop and maintain incident response playbooks and procedures. Candidate Profile Bachelor's degree in Computer Science, Cyber Security … years Experience working in a security operations center for a global enterprise. Experience using and administering endpoint, network, and cloud security tools to identify and protect against threats. (SIEM, EDR, NDR, SSO, PAM, IPS/IDS, CASB, firewalls). In-depth knowledge of cyber security risks and threats. Experience developing and implementing security operations center procedures and playbooks. Strong analytical More ❯
webinars. Skills & Must-Have Experience: Proven experience as a Cyber Security Pre-Sales Consultant (minimum 2 years). Strong understanding of cyber security solutions, including managed services, SOC/SIEM, vulnerability management, and compliance frameworks (ISO27001, NIST, Cyber Essentials, etc.). Excellent communication and presentation skills for both technical and non-technical audiences. Ability to build rapport and credibility with More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Jagex Ltd
principles Hands-on experience with data analysis, modeling, and correlation at scale Operating systems internals and forensics experience for macOS, Windows & Linux Domain experience managing and working with current SIEMand SOAR platforms Experience developing tools and automation using common DevOps toolsets and programming languages Understanding of malware functionality and persistence mechanisms Ability to analyze endpoint, network, and application logs More ❯
principles and NIST SP 800-61 r3 incident-handling guidance pragmatically, avoiding bureaucracy. - Hands-on leadership - coaches senior analysts, removes blockers in real time, and can work directly in SIEM, SOAR, EDR and cloud telemetry tools. - Action-oriented communicator - prefers calls and stand-ups over long email threads decisive yet collaborative. - Continuous-improvement mindset - captures every lesson and turns it More ❯
that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide, defending More ❯
or Threat Intelligence roles Must have at least 3+ years experience working within Insider Threat or similar Previous experience working with Insider Threat Detection tools like UEBA, DLP or SIEM Must have working knowledge of fundamentals of threat actors' TTPs and MITRE ATT&CK Framework More ❯
Cheltenham, Gloucestershire, United Kingdom Hybrid / WFH Options
Ripjar Ltd
of automating tasks using languages and tools such as Bash, Python, JavaScript, and GitHub Actions. Knowledge of how to effectively use security testing and monitoring tooling, e.g. SAST andSIEM products. Candidates with the following background will be of particular interest: Experience contributing to incident response across a complex microservice-based application Application Security best practice including identifying potential threats More ❯
in malware analysis or reverse engineering. Experience with scripting or programming (Python, PowerShell, Bash, etc.). Relevant SOC certifications (e.g., CREST, Blue Team Level 1). Exposure to additional SIEM tools such as QRadar. Shift Pattern: 2 Days, 2 Nights, 4 Off Benefits: 25 days annual leave (plus option to purchase more). Health cash plan, life assurance, and company More ❯
Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, andSIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery and ongoing support This is a great opportunity and salary is dependent upon experience. More ❯