experience in security operations or incident response. Bachelor's degree in Cybersecurity, Computer Science, or related field, or equivalent work experience. Extensive knowledge of SIEM, EDR, Web & Email Gateways, Cloud Security, and firewall technologies. Proficiency in scripting languages such as Python and PowerShell, with a strong understanding of TCP/ More ❯
Key Requirements: Technical Skills: Deep understanding of security frameworks (e.g., NIST, ISO 27001, CIS Controls, etc.). Practical experience with security tools such as SIEM, firewalls, IDS/IPS, endpoint protection, and vulnerability scanners. Proficiency in risk management practices and tools. Knowledge of cloud security, network security, and data protection More ❯
operation with four shift teams working in a standard rotation. They are responsible for utilising the SOC's Security Incident andEventManagement (SIEM) toolsets to detect and investigate potential Securityand Service Incidents occurring within the monitored networks. These roles require a minimum of SC clearance and be prepared More ❯
leeds, west yorkshire, yorkshire and the humber, United Kingdom
Anson McCade
of SOC analysts in a high-security environment. Oversee real-time security monitoring and incident response activities. Investigate, triage, and manage security incidents using SIEM, EDR, and NDR tools. Coordinate threat intelligence integration to enhance detection capabilities. Develop and refine SOC processes to improve efficiency and resilience. Requirements: 5+ years More ❯
cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (SecurityInformationandEventManagement) tools and log analysis Develop and enforce security policies, standards, and procedures Work with IT and development teams to implement secure system designs … experience in an informationsecurity or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Intec Select
cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (SecurityInformationandEventManagement) tools and log analysis Develop and enforce security policies, standards, and procedures Work with IT and development teams to implement secure system designs … experience in an informationsecurity or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge More ❯
data protection, and cyber law Strong troubleshooting abilities in systems, networking, and cloud environments Proven hands-on experience with tools like PAM, EDR, CASB, SIEM, DLP, email filtering , and vulnerability management Proficient in cloud services , especially in environments using virtual machines, identity management, web apps , and networking components (e.g., virtual More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
potential cyber risks, assess their impact and develop technical mitigation strategies. Working with Security Architecture to advise focused security solution design for SOC/SIEM solutions. Formulate security strategy, creatively applying a wide range of technical and/or management principles. What youll bring: ? Proficiency in Splunk is a key More ❯
Hunting and Threat Intelligence (MITRE ATT&CK) Cloud Security Penetration Testing Security Automation (SOAR) It would help if you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (Carbon Black, Microsoft Defender ATP, FireEye, CrowdStrike) Intrusion Detection More ❯
strategies What You'll Bring 5+ years in cybersecurity operations, with at least 2 years in a leadership role Strong hands-on knowledge of SIEM, EDR, SOAR, IDS/IPS, Firewalls, and cloud security Deep understanding of MITRE ATT&CK, NIST, ISO 27001, CIS frameworks Proven experience in incident response More ❯
experience of building out functions of a Cyber Defence Team e.g. insider risk, threat intelligence, breach attack simulation You have a strong knowledge of SIEMand deep Splunk experience You have a good understanding of various security infrastructure tools such as firewalls, intrusion prevention/detection systems, proxy servers, email More ❯
critical role supporting defence infrastructure through proactive monitoring, analysis and improvement of cybersecurity. Responsibilities: Experience in a security operations centre (SOC) environment Experience with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP, VPNs, firewalls) Skilled in incident response andMore ❯
GDPR, DPA 2018) . Familiarity with risk management frameworks like NIST CSF, CIS Controls, and ISO 27005 . Experience with cyber security tools (e.g., SIEM, Malware Protection, Firewalls and others) is a plus. Strong reporting and communication skills-ability to brief executives and regulators. Ability to design, implement, and enforce More ❯
nature. Key responsibilities Lead, develop, and mentor the Cybersecurity and Infrastructure teams. Manage strategies and roadmaps for cybersecurity capabilities like email security, DLP, SASE, SIEM, etc. Oversee infrastructure strategies, including LANs, WANs, cloud services, etc. Manage budgets ensuring value and alignment with strategies. Maintain relationships with technology service providers andMore ❯
or scripting language PREFERRED QUALIFICATIONS - 3+ years experience working in security response, security automation tooling, or threat intelligence - Familiarity with malware analysis, forensics, SOAR, SIEM platforms, and a variety of Operating Systems (MS Windows, Linux, MacOS) - Experience with Amazon Web Services - Meets/exceeds Amazon's leadership principles requirements for More ❯
or scripting language PREFERRED QUALIFICATIONS 3+ years experience working in security response, security automation tooling, or threat intelligence Familiarity with malware analysis, forensics, SOAR, SIEM platforms, and a variety of Operating Systems (MS Windows, Linux, MacOS) Experience with Amazon Web Services Meets/exceeds Amazon's leadership principles requirements for More ❯
depth technical knowledge of deploying, maintaining, and configuring a wide range of security technologies within a large and complex environment (anti-malware/EDR, SIEM solutions, vulnerability scanners, patch management, CASB, DLP, penetration testing tools, etc.) Knowledge of TCP/IP and related network protocols: knowledge of standard network protocols More ❯
Fleet, Hampshire, United Kingdom Hybrid / WFH Options
Stellar Select
helpdesk/IT Service role. Experience in informationsecurity or related field Experience with computer network penetration testing and techniques Understanding of firewalls, proxies, SIEM, antivirus and IDPS concepts Ability to identify and mitigate network vulnerabilities and explain how to avoid them Ability to train and share knowledge with others More ❯
members. Essential skills: Strong grasp of networking concepts, IP addressing, and traffic flow, with advanced knowledge of Windows and Linux systems. Proficient in using SIEM tools like ArcSight and Azure Sentinel; experienced with KQL and basic XDR platforms. Familiar with OSINT techniques for threat intelligence and incident investigation. Holds or More ❯
technologies, including firewalls (Palo Alto, CheckPoint), IDS/IPS, NDR, switch/router ACLs, NAC solutions, IPSec/TLS VPNs, WAFs, email security, andSIEM logging/alerting. Programming and Automation: Proficiency in a modern programming language (e.g., Python). Experience with IaC practices, GitOps workflows, and cloud automation best More ❯
improvements. Prepare comprehensive reports for clients. Technical skills: Demonstrated experience in responding to and investigating incidents whilst utilizing various monitoring, detection and investigation tooling – SIEM, SOAR, EDR etc. Proficiency in log analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding More ❯
of security frameworks (e.g., NIST, CIS, ISO 27001) and compliance standards (e.g., PCI-DSS, PSD2, GDPR). Hands-on experience with security technologies (e.g., SIEM, endpoint protection, cloud security tools). Exceptional leadership and communication skills, with the ability to engage and influence diverse stakeholders. Working at Allica Bank At More ❯