Expert Experience designing or implementing micro segmentation (e.g., Cisco Titration, Illumio, Guardicore) Background in regulated industries like financial services, healthcare, Resources or government Familiarity with DNS-based threat detection, SIEM/SOAR integration, and cloud security access brokers (CASB) Why Join Us at Accenture in This Role? Leadership in Next-Generation Cybersecurity : As a trusted security partner, Accenture leads the More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
Techwaka
for this role: 3+ years' experience in a senior cyber security role Strong knowledge of security frameworks (NIST, NCSC, CIS, MITRE ATT&CK) Hands-on experience with security tools: SIEM, IDS/IPS, firewalls, endpoint protection Expertise in Azure securityand securing cloud platforms A solid understanding of vulnerabilities, penetration testing, and compliance Experience with network security, encryption, TLS, SSL More ❯
solid working knowledge of cloud security (AWS, Azure, GCP). Apply risk-based and threat-based approaches to evaluate and recommend appropriate and proportionate security technologies and solutions (e.g., SIEM, IAM, CASB, container security). Outline key security components, interfaces, and dependencies. Develop architectural diagrams and overviews. Document security design principles and provide rationale. Ensure designs align with business objectives More ❯
and best practices. Forensic investigation techniques. Prior experience deploying, configuring, managing, and/or operating security technologies is preferred, such as endpoint security (e.g. AV/EPP/EDR), SIEM, DLP, SWG, CASB, UEBA, IDS, IPS, firewalls, IAM/PIM/PAM, vulnerability management, MDM, etc. About us We're a diverse group of visionary innovators who provide trading andMore ❯
or insurance sectors. Technical Expertise: Strong knowledge of cloud (Azure, O365, Amazon) and server infrastructure, networks, firewalls, and endpoint systems. Security Tools & Technologies: Proficiency with security tools such as SIEM, IDS/IPS, vulnerability scanners, firewalls, endpoint protection, alert and remediation, and encryption technologies. Certifications: Relevant certifications such as CISSP, CISM, CCSP, CEH, or AWS/Azure security certifications are More ❯
aid in responding to incidents involving Windows, Linux, macOS, as well as cloud environment Have knowledge of cybersecurity tools and software like NGFW, EDR, IDS/IPS, EDR, DLP, SIEM, other log management platforms, etc. Be familiar with the MITRE ATT&CK Framework and/or Cyber Kill Chain Be passionate on exploring new technologies and having creative initiative to More ❯
PowerShell and automation. Consulting experience across IT and digital teams. Flexibility for occasional travel and out-of-hours support. Exposure to MxDR/SOC environments and advanced security protocols (SIEM, IDS/IPS, firewalls). Knowledge of GDPR, Cyber Essentials+, PCI-DSS, and other compliance standards. Strong grasp of data protection legislation (e.g., GDPR, Data Protection Act). Global Impact More ❯
Bath, Somerset, United Kingdom Hybrid / WFH Options
Mayden
GDPR, Data Protection Act 2018), industry standards, and regulatory requirements. Security monitoring operations: Support and oversee the day-to-day security monitoring operations, including log analysis, threat intelligence, andSIEM management. Leadership and mentoring: Provide strong leadership to the governance, risk and compliance team and mentor the professional growth and development of security staff. Threat intelligence: Stay up to date More ❯
Bath, Somerset, United Kingdom Hybrid / WFH Options
Mayden
GDPR, Data Protection Act 2018), industry standards, and regulatory requirements. Security monitoring operations: Support and oversee the day-to-day security monitoring operations, including log analysis, threat intelligence, andSIEM management. Leadership and mentoring: Provide strong leadership to the governance, risk and compliance team and mentor the professional growth and development of security staff. Threat intelligence: Stay up to date More ❯
enforcement across Microsoft 365, VPN, and cloud platforms. Deploy and manage IAM automation tools (e.g., IGA platforms) to streamline provisioning and access reviews. Security Engineering Integrate IAM controls with SIEMand SOAR platforms for real-time alerting and forensic investigations. Collaborate with Platform teams to ensure IAM remains embedded into CI/CD pipelines and cloud environments. Governance & Compliance Support More ❯
stakeholders and other engineering functions Lead and mentor junior resources across the global team Requirements Experience in Security Engineering, consisting of a minimum of 2+ years' recent experience in SIEM Engineering or similar engineering discipline Experience working in complex enterprises and global organizations. Insurance and financial services experience a plus. Deep understanding of standard security controls and frameworks in enterprise More ❯
cybersecurity operations, with at least 2 years in a leadership or management role. Strong knowledge of SOC operations, incident response, and vulnerability management best practices. Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel), vulnerability scanners (e.g., Nessus, Qualys), and other security platforms. Relevant certifications such as CISSP, CISM, CEH, GIAC, or GCIA are highly desirable. Excellent problem-solving More ❯
touch today! Responsibilities: Conducting regular security assessments and vulnerability testing. Developing and implementing security policies and procedures. Monitoring network traffic for unusual activity and potential threats using SOC/SIEM solutions. Responding to security breaches and carrying out forensic investigations. Ensuring compliance with industry standards and regulations, including ISO 27001 and GDPR. Delivering security training and awareness programs for both More ❯
Engineering Malware Analysis (Static and Dynamic) Threat Hunting and Threat Intelligence (MITRE ATT&CK) Penetration Testing Security Automation (SOAR) It would help if you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (Carbon Black, Microsoft Defender ATP, FireEye, CrowdStrike) Programming (Python, or other languages) What you More ❯
of enterprise security frameworks, secure system design, and risk management. Experience with cloud security, identity and access management, and secure integration patterns. Familiarity with cybersecurity tools and platforms including SIEM, endpoint protection, IAM, and vulnerability management. Excellent communication and stakeholder engagement skills. UK citizenship and eligibility for SC clearance (mandatory). Desirable Qualifications Professional certifications such as CISSP, CISM, CCSP More ❯
assessing, and communicating current and emerging security threats and vulnerabilities. Security Solution Design and Evaluation. Researching, evaluating, and recommending security technologies, tools (e.g., firewalls, VPNs, IDS/IPS, EDR, SIEM, SOAR), and solutions to mitigate identified threats and address security needs. Policy and Procedure Development: Defining, implementing, and maintaining corporate security policies, standards, and procedures to ensure compliance with industry More ❯
navigating AWS and GCP environments (Azure experience is a plus), especially in multi-region and data-rich setups Security-minded problem solver - You have hands-on experience with firewalls, SIEM tools, vulnerability scanners, and other security technologies that protect systems Risk assessment pro - You enjoy identifying vulnerabilities, evaluating threats, and making informed security decisions backed by solid data Technical communicator More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Commify
understanding of various branching/merging strategies Key Qualifications: Extensive experience in security operations roles, preferably in cloud and on-premise environments Proficiency in security monitoring tools (such as SIEM, IDS/IPS) and incident response processes Strong knowledge of security frameworks, standards, and best practices (e.g., NIST, ISO 27001, CIS) Experience with scripting and automation tools for enhancing securityMore ❯
Huntingdon, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
the engineering teams to ensure systems remain at the required security posture against baseline requirements Work with the Security Monitoring engineering team to ensure logs are forward to the SIEM capability Work with the customer and appropriate agencies to develop new policies, design processes, and procedures, and develop technical designs Assess system vulnerabilities, implement risk mitigation strategies, validate secure systems More ❯
detection and DevSecOps practices, ensuring security is embedded within operational workflows and cloud-native architectures. What you will do: Operate and optimise core cyber security tools and platforms, including SIEM, XDR, EDR, DLP, IAM, PAM, ZTNA and vulnerability management solutions Lead or support the detection and response lifecycle, including triage of alerts, investigation of incidents, root cause analysis, and coordination More ❯
detection and DevSecOps practices, ensuring security is embedded within operational workflows and cloud-native architectures. What you will do: Operate and optimise core cyber security tools and platforms, including SIEM, XDR, EDR, DLP, IAM, PAM, ZTNA and vulnerability management solutions Lead or support the detection and response lifecycle, including triage of alerts, investigation of incidents, root cause analysis, and coordination More ❯
Infrastructure/Information Systems). It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (SecurityInformationEventManagement), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. The MBDA SOC More ❯
practices. Proficient in scripting languages, such as PowerShell or Python, for automation and customization of CyberArk solutions. Experience with integrating CyberArk solutions with other security tools and technologies, including SIEM, IAM, and PAM solutions. Solid understanding of network protocols, authentication mechanisms, and encryption technologies. Excellent analytical and problem-solving skills, with the ability to identify and resolve complex technical issues More ❯