in the managed IT or telecoms sector. Solid knowledge of network principles (TCP/IP, routing protocols like OSPF & BGP, VRRP). Understanding of security concepts: firewalls, UTM, IPSec, SIEM, etc. Hands-on experience with at least two of the following: Networks, Cloud, Unified Communications, Cyber Security. Strong communication skills - capable of translating complex jargon to any audience. Excellent problem More ❯
City of London, London, United Kingdom Hybrid / WFH Options
83zero Limited
in the managed IT or telecoms sector. Solid knowledge of network principles (TCP/IP, routing protocols like OSPF & BGP, VRRP). Understanding of security concepts: firewalls, UTM, IPSec, SIEM, etc. Hands-on experience with at least two of the following: Networks, Cloud, Unified Communications, Cyber Security. Strong communication skills - capable of translating complex jargon to any audience. Excellent problem More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
Role Title: SIEM Engineer Duration: contract to run until 26/12/2025 Location: Wokingham, Hybrid 2 days onsite Rate: £460 p/d Via Umbrella inside IR35 Clearance required: Active SC is essential Role purpose/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs … Generate reports on security events, trends, and system performance. Collaboration - Work with IT andsecurity teams to improve overall cybersecurity posture. Required Skills & Qualifications Technical Expertise - Strong knowledge of SIEM platforms, network security, and cybersecurity frameworks. Certifications - CISSP, CEH, GIAC, or vendor-specific SIEM certifications. Programming & Scripting - Familiarity with Python, PowerShell, or other scripting languages. Analytical Thinking - Ability to analyze More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Experis
Role Title: SIEM Engineer Duration: contract to run until 26/12/2025 Location: Wokingham, Hybrid 2 days onsite Rate: £460 p/d Via Umbrella inside IR35 Clearance required: Active SC is essential Role purpose/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs … Generate reports on security events, trends, and system performance. Collaboration - Work with IT andsecurity teams to improve overall cybersecurity posture. Required Skills & Qualifications Technical Expertise - Strong knowledge of SIEM platforms, network security, and cybersecurity frameworks. Certifications - CISSP, CEH, GIAC, or vendor-specific SIEM certifications. Programming & Scripting - Familiarity with Python, PowerShell, or other scripting languages. Analytical Thinking - Ability to analyze More ❯
Building on your current skills the scope of the training will be IBM Power SC for Power 9, 10 and 11, storage defender and Insights and use of a SIEM agent reporting. Key Skills Previous experience as an IBM System i/Power i/IBM i/i Series Operations Technical Consultant with excellence in Power I (IBMi ,System More ❯
Building on your current skills the scope of the training will be IBM Power SC for Power 9, 10 and 11, storage defender and Insights and use of a SIEM agent reporting. Key Skills Previous experience as an IBM System i/Power i/IBM i/i Series Operations Technical Consultant with excellence in Power I (IBMi ,System More ❯
in-stream analytics without reliance on expensive indexing or hot storage. We specialize in comprehensive monitoring of logs, metrics, traces, andsecurity events with features such as APM, RUM, SIEM, Kubernetes monitoring, and more, enhancing operational efficiency and reducing observability spending by up to 70%. We seek a Quality and Support Strategist professional who ensures that the Coralogix Alerting More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Nomios
solutioning for one or more of the following vendors: Fortinet, Palo Alto, Juniper, Cisco, Netskope, Zscaler, CrowdStrike. We would also love to receive applications from people with skills solutioning SIEM, SOAR, or Managed Security Services (experience in DDoS, WAF, IDAM, EDR, MDM or Vulnerability Management is a plus). We are also interested to hear from candidates with operational expertise More ❯
Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
La Fosse
security posture to meet baseline compliance and operational requirements Partner with engineering teams, customers, and government agencies to develop security policies, operational processes, technical designs, and ensure integration with SIEMand monitoring systems. Demonstrated proficiency in network/system security (firewalls, IDS/IPS, micro-segmentation), IAM (RBAC, ABAC, JWT), secure coding practices (OWASP, SANS), and hands-on experience with More ❯
of security components and associated platform components. Report Security Incidents. Minor issue resolution. Pre-requisites: Experience of 1-3 years in security technologies and incident response management Basic understanding SIEM, APT, threat intelligence. Further info: Competitive Basic/day rate London To apply: Please either register your CV and complete the information fields requested or send your CV to referencing More ❯
with external vendors. Ensure the timely, effective and efficient closure of logged incidents. Pre-requisites: Experience of 4-8 years in security technologies and incident response management Good understanding SIEM, APT, threat intelligence. Further info: Competitive Basic London To apply: Please either register your CV and complete the information fields requested or send your CV to referencing DJW5303 and your More ❯
with external vendors. Ensure the timely, effective and efficient closure of logged incidents. Pre-requisites: Experience of 4-8 years in security technologies and incident response management Good understanding SIEM, APT, threat intelligence. Further info: Competitive Basic/day rate London To apply: Please either register your CV and complete the information fields requested or send your CV to referencing More ❯
Salford, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
Inspire People
manager. Main responsibilities You will be: Leading large, cross-functional technical team in the design, development, and enablement of automated monitoring processes, advising on the latest SIEM (SecurityInformationandEventManagement) and network analysis tools, techniques, and procedures to detect malicious activity, while communicating directly with leadership on the progress and status of monitoring. Leading wider implementation of a More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Sophos Group
that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide, defending More ❯
for a SOC Architect to join our team. The successful candidate will lead the development and delivery of a high-level design for a SOC, including associated tooling (e.g., SIEM solution) to support a multi-vendor cloud-based back office implementation. Key Skills & Experience: Industry best practice for SOC service and solution design. Experience working with organisations with heightened threat More ❯
background in Managing IR Cases/Projects Strong knowledge of cyber security threats, attack vectors, IOC, remediation. Hands-on experience with a range of different forensic tools, ELK, EDR, SIEM, and log analysis, Open Source Toolkits Comfortable communicating with both technical and non-technical stakeholders during high-stress situations. You must have excellent communication skills. You must be adaptable, resilient More ❯
background in managing IR Cases/Projects Strong knowledge of cyber security threats, attack vectors, IOC, remediation. Hands-on experience with a range of different forensic tools, ELK, EDR, SIEM, and log analysis, Open Source Toolkits Comfortable communicating with both technical and non-technical stakeholders during high-stress situations. You must have excellent communication skills. You must be adaptable, resilient More ❯
background in managing IR Cases/Projects Strong knowledge of cyber security threats, attack vectors, IOC, remediation. Hands-on experience with a range of different forensic tools, ELK, EDR, SIEM, and log analysis, Open Source Toolkits Comfortable communicating with both technical and non-technical stakeholders during high-stress situations. You must have excellent communication skills. You must be adaptable, resilient More ❯
background in Managing IR Cases/Projects Strong knowledge of cyber security threats, attack vectors, IOC, remediation. Hands-on experience with a range of different forensic tools, ELK, EDR, SIEM, and log analysis, Open Source Toolkits Comfortable communicating with both technical and non-technical stakeholders during high-stress situations. You must have excellent communication skills. You must be adaptable, resilient More ❯
Leading and Managing IR Cases/Projects Strong knowledge of cyber security threats, attack vectors, IOC, remediation. Hands-on experience with a range of different forensic tools, ELK, EDR, SIEM, and log analysis, Open Source Toolkits Comfortable communicating with both technical and non-technical stakeholders during high-stress situations. You must have excellent communication skills. You must be adaptable, resilient More ❯
Leading and Managing IR Cases/Projects Strong knowledge of cyber security threats, attack vectors, IOC, remediation. Hands-on experience with a range of different forensic tools, ELK, EDR, SIEM, and log analysis, Open Source Toolkits Comfortable communicating with both technical and non-technical stakeholders during high-stress situations. You must have excellent communication skills. You must be adaptable, resilient More ❯
Leading and Managing IR Cases/Projects Strong knowledge of cyber security threats, attack vectors, IOC, remediation. Hands-on experience with a range of different forensic tools, ELK, EDR, SIEM, and log analysis, Open Source Toolkits Comfortable communicating with both technical and non-technical stakeholders during high-stress situations. You must have excellent communication skills. You must be adaptable, resilient More ❯
Leading and Managing IR Cases/Projects Strong knowledge of cyber security threats, attack vectors, IOC, remediation. Hands-on experience with a range of different forensic tools, ELK, EDR, SIEM, and log analysis, Open Source Toolkits Comfortable communicating with both technical and non-technical stakeholders during high-stress situations. You must have excellent communication skills. You must be adaptable, resilient More ❯
Leading and Managing IR Cases/Projects Strong knowledge of cyber security threats, attack vectors, IOC, remediation. Hands-on experience with a range of different forensic tools, ELK, EDR, SIEM, and log analysis, Open Source Toolkits Comfortable communicating with both technical and non-technical stakeholders during high-stress situations. You must have excellent communication skills. You must be adaptable, resilient More ❯
background in managing IR Cases/Projects Strong knowledge of cyber security threats, attack vectors, IOC, remediation. Hands-on experience with a range of different forensic tools, ELK, EDR, SIEM, and log analysis, Open Source Toolkits Comfortable communicating with both technical and non-technical stakeholders during high-stress situations. You must have excellent communication skills. You must be adaptable, resilient More ❯