or Account Management in tech, SaaS, or managed services Strong communicator with executive and technical stakeholders Track record with renewals and structured success plans Bonus: knowledge of cybersecurity including SIEM, EDR, and MSS This is your chance to shape Customer Success from day one. π π Apply now More β―
or Account Management in tech, SaaS, or managed services Strong communicator with executive and technical stakeholders Track record with renewals and structured success plans Bonus: knowledge of cybersecurity including SIEM, EDR, and MSS This is your chance to shape Customer Success from day one. π π Apply now More β―
or Account Management in tech, SaaS, or managed services Strong communicator with executive and technical stakeholders Track record with renewals and structured success plans Bonus: knowledge of cybersecurity including SIEM, EDR, and MSS This is your chance to shape Customer Success from day one. π π Apply now More β―
or Account Management in tech, SaaS, or managed services Strong communicator with executive and technical stakeholders Track record with renewals and structured success plans Bonus: knowledge of cybersecurity including SIEM, EDR, and MSS This is your chance to shape Customer Success from day one. π π Apply now More β―
london (city of london), south east england, united kingdom
Insignis Talent
or Account Management in tech, SaaS, or managed services Strong communicator with executive and technical stakeholders Track record with renewals and structured success plans Bonus: knowledge of cybersecurity including SIEM, EDR, and MSS This is your chance to shape Customer Success from day one. π π Apply now More β―
City of London, London, United Kingdom Hybrid / WFH Options
Insignis
tech, SaaS, or managed services Strong communicator, confident with executive and technical stakeholders Experience managing renewals and creating structured success plans Awareness of cybersecurity tools and services such as SIEM, EDR, and MSS More β―
Operations and ensuring the highest level of security for the customer. The Cyber Security Consultant leads detailed risk assessments, implements industry-standard frameworks (NIST, NCSC, NIS2), and actively manages SIEM/XDR tools such as IBM QRadar, Microsoft Sentinel, and Defender XDR. This role involves deeper client interaction, proactive risk management, and advanced threat detection consulting. Candidates must have demonstrated β¦ client relationships with regular strategic interactions. Lead comprehensive cybersecurity risk assessments aligned to industry standards. Conduct environment reviews, ensuring compliance with NIST frameworks and related standards. Oversee and implement SIEM/XDR deployments, custom rule development, and incident response processes. Provide guidance on best practices for SIEM/XDR and threat detection. Conduct security posture reviews and gap analysis. Prepare β¦ UK Good understanding of cybersecurity frameworks (NIST CSF, NCSC CAF, NIS2, NIST 800-30). Good understanding of risk assessment methodologies (NIST 800-30). Hands-on experience with SIEM/XDR solutions (QRadar, Sentinel, Defender XDR). Familiarity with cloud security principles across AWS, Azure, and GCP, particularly within managed services environments. Additional Skills: Proven experience within IT Support More β―
s network, systems, applications and new technology initiatives Implement and maintain operating run books, operating processes and procedures Help to develop and configure use cases, and alerting rules within SIEM technologies Mange the vulnerability management programme that includes vulnerability scanning, security testing, threat monitoring and data loss and leakage prevention Direct on-going threat intelligence activities Mentor and develop security β¦ analysts Skills: Prior experience working/managing a SOC Demonstrable experience and operational knowledge of SIEM, firewalls, intrusion detection and vulnerability management systems/solutions Detailed understanding of Security Monitoring, Threat Intelligence, Vulnerability managementand Incident Response Experience managing security incidents within a complex environment. Strong foundation in network securityand common attack methodologies Exposure to user behaviour analytical tools More β―
London, South East, England, United Kingdom Hybrid / WFH Options
Client Server Ltd
to Azure. You'll lead threat modelling and threat hunting activities to proactively discover potential compromises, work with external teams on penetration tests and red team engagements and manage SIEMand XDR tooling, establish processes and workflows to support incident response SOC. Location/WFH: You'll join colleagues in the Central London office for two days a week with β¦ have experience of securing web applications, Windows, Active Directory and M365 environments You have a good knowledge of cloud security, GCP or Azure preferred, AWS also considered You have SIEMand EDR/XDR systems including Splunk and CrowdStrike You have a good knowledge of networking principles You are degree educated in Computer Science or closely related discipline You're More β―
Cyber Security Analyst - SOC - SIEM - 12 month contract (inside IR35) - DV Clearance I am working with a public sector client who are looking for an experienced Cyber Security Analyst to support their front line cyber defence services. Due to the urgency and the nature of the role, candidates with active DV clearance are preferred. This role requires a high level β¦ pressure within a client-facing capacity. Key responsibilities: Provide front line cyber security monitoring and analysis within a Security Operations Centre (SOC) Perform threat detection and incident response using SIEM tools such as Splunk and Microsoft Defender Conduct in-depth investigations into security alerts, escalating where appropriate and providing remediation advice Carry out threat analysis to improve detection capability and β¦ matters Apply up-to-date knowledge of the cyber threat landscape and defence best practices Essential skills and experience: Proven experience in SOC environments, with a strong background in SIEM monitoring and incident response Hands-on experience with tools such as Splunk and Microsoft Defender Strong analytical and troubleshooting skills Excellent verbal and written communication skills, particularly in client-facing More β―
role for you. Key Responsibilities Lead security incident response and threat detection efforts, prioritising the protection of customer data and experience Build automated detection and remediation workflows using SOAR, SIEM, and scripting (Python, SQL) Apply deep cloud security knowledge (AWS, Azure) to secure ecommerce, mobile apps, APIs, and in-store systems Collaborate with Fraud and Customer Experience teams to mitigate β¦ response during critical events Key requirements: Proven Experience: 4+ years in Security Operations or Incident Response, ideally in ecommerce, retail, or fintech environments Technical Depth: Hands-on expertise with SIEM, SOAR, EDR, automation tools, Python, SQL, and cloud-native security tooling Cloud Security: Strong knowledge of AWS and Azure, especially services like WAF, Shield, IAM, and API Gateway Forensic Skills β¦ Exciting Purpose-Driven Impact: Your work directly protects customer data, accounts, and transactionsβmaking every wellness journey safer. Cutting-Edge Tools: Leverage a modern stack including AWS, Azure, SOAR, SIEM, EDR, and cloud-native security solutions. Cross-Team Collaboration: Partner with Fraud, Customer Experience, Engineering, and Digital to stop threats before they start. Automation-Led Security: Drive rapid detection andMore β―
by Tier 1 analysts and assess them using a variety of data sources. Apply threat intelligence, including indicators of compromise (IOCs) and TTPs, to analyse alerts and incidents. Utilise SIEM tools (particularly Crowdstrike SIEM) to monitor and assess host, network, and identity data. Tune and reduce false positives, improving SIEM efficiency and alerting accuracy. Lead incident investigations across Windows, macOS β¦ Skills/Must have: 5+ years' recent experience in a Tier 2 or Tier 3 SOC analyst role, ideally within a government or critical infrastructure organisation. Deep experience with SIEM tools such as Crowdstrike, Splunk, and Microsoft Defender. Proven track record designing and implementing SOC use cases and incident response plans. Strong capability in data correlation across disparate sources. Demonstrated More β―
Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
My client, a leading IT Security focused Managed Services Provider is looking to hire a new SIEM focused SOC Engineer for a 6 month project based in Birmingham. The primary function of the Senior SOC Engineer is to enhance our security operations capabilities. This role requires deep expertise in SIEM platforms, including Splunk, IBM QRadar, Microsoft Defender, Microsoft Sentinel, and β¦ Chronicle, with a strong focus on playbook development, analytical rule creation, and threat modelling. You will be instrumental in building and optimizing our detection and response strategies. Job Duties SIEM Engineering & Management Deploy, configure, and maintain SIEM platforms (Splunk, QRadar, Sentinel, Defender, Chronicle). Onboard and normalize log sources across cloud and on-prem environments. Develop and optimize analytical rules β¦ for threat detection, anomaly detection, and behavioural analysis. Skills Must be able to obtain SC Clearance or already hold SC clearance. SIEM Expertise: Hands-on experience with at least two of the following: Splunk IBM QRadar Microsoft Defender for Endpoint Microsoft Sentinel Google Chronicle Technical Skills: Strong knowledge of log formats, parsing, and normalization. Experience with KQL, SPL, AQL, or More β―
City of London, London, United Kingdom Hybrid / WFH Options
Langley James Limited
person IT Security team, reporting to the IT Security Officer, to implement and maintain robust security across their infrastructure. Key responsibilities include managing WAF/DDoS, security gateways, SIEM/SOAR/EDR, firewalls, MFA/SSO, MDM/MAM, vulnerability scans, and incident response. Key Responsibilities: Manage WAF/DDoS, web/email security gateways, SIEM/SOAR/ More β―
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Duel
ensuring patches and fixes are applied in a timely manner. Learn and implement security monitoring and automation solutions to detect and respond to threats. Help manage security tooling, including SIEM, IDS/IPS, and vulnerability scanning solutions. Work closely with engineers to support secure coding practices and help embed security considerations early in the development process. Assist in securing infrastructure β¦ frameworks Familiarity with compliance automation tools such as Secureframe, Drata, or Vanta Experience working with pen testing and bug bounties a plus Basic understanding of security tools such as SIEM, IDS/IPS, and vulnerability management solutions Experience or knowledge of cloud security (AWS, GCP, or Azure) Awareness of security best practices in application and infrastructure security Some exposure to More β―
. Experience with Kubernetes threat detection and anomaly detection. Experience with service mesh security concepts (e.g., Istio, Linkerd) and workload identity. Experience in detection engineering, logging pipeline development, or SIEM tuning in containerised environments. Experience in contributing to security-focused open-source projects or internal security platform tooling. About the job The UK Security Operations (SecOps) team in Google Public β¦ and over the weekend to ensure security incidents can be swiftly resolved. Responsibilities Deploy, configure, and manage cloud security platform tools and technologies, including SecurityInformationandEventManagement (SIEM), Intrusion Detection/Prevention Systems (IDS/IPS), and Cloud Workload Protection Platforms (CWPP). Develop and implement security monitoring and logging strategies. Investigate and analyse security incidents, including identifying More β―
guiding conversations from scoping through to delivery. Key experience: Background in managed security services, including SOC operations and threat detection Strong knowledge of cloud and on-prem security tooling (SIEM, EDR, IAM) Penetration testing Proven ability to translate technical concepts into clear business value Confident in customer-facing engagements and pre-sales delivery Experience contributing to bids, proposals, and RFI More β―
involve the following: * Endpoint monitoring and analysis. * Incident readiness and handling as part of the Computer Security Incident Response (CSIRT) team. * Monitor and administer SecurityInformationandEventManagement (SIEM). * Malware analysis and forensics research. * Understanding/differentiation of intrusion attempts and false positives. * Investigation tracking and threat resolution. * Vulnerability identification & mitigation/remediation. * Compose security alert notifications. * Advise More β―
Centre (ISOC); ability to detect, response and utilise related platform and applications to perform cyber security initiatives. Knowledge of concept, procedures and processes of SecurityInformationandEventManagement (SIEM); ability to utilise related applications to protect organisational networks from cyber risks. Knowledge of technologies and technology-based solutions dealing with informationsecurity issues; ability to apply these in protecting More β―
have to close our posts early. Don't miss out! Person Specification Knowledge and Experience Essential Extensive knowledge of concept, procedures and processes of SecurityInformationandEventManagement (SIEM); ability to utilize related applications to protect organizational networks from cyber risks. In-depth knowledge of modules, processes and technologies of InformationSecurity Operation Centre (ISOC); ability to detect, response More β―
in-stream analytics without reliance on expensive indexing or hot storage. We specialize in comprehensive monitoring of logs, metrics, trace andsecurity events with features such as APM, RUM, SIEM, Kubernetes monitoring and more, all enhancing operational efficiency and reducing observability spend by up to 70%. Coralogix sits at the cutting edge of observability, and our power in the More β―
Identify, review, prioritize, plan, coordinate, and follow-up on the remediation of vulnerabilities Configure, customize, tune, manage, troubleshoot, and maintain effective and efficient operation of security technologies, such as SIEM, endpoint security, secure web gateway, CASB, DLP, email security, intrusion detection/prevention systems, etc. This may also include scripting, automation, and orchestration across various platforms Define, document, and follow β¦ The candidate should have a good knowledge of: Endpoint security concepts, controls, and best practices for workstations (e.g. Windows and Mac) and server (e.g. Windows and Linux) operating systems SIEM technology to monitor, analyze, and respond to security events. To develop and implement security policies, managing SIEM systems, and investigating incidents. General IT networking concepts, protocols, standards and network securityMore β―
shaping the future of cyber defence for the UK's most critical national systems. Your Impact You will contribute to safeguarding vital national information systems by: Taking ownership of SIEM (Splunk) management to ensure high availability and performance Driving continual improvement in system configurations and overall security posture Leading integration of new log sources, ensuring alignment with Common Information Model β¦ CIM) data structures Managing upgrades to Splunk agents andSIEM platforms to maintain a secure, up-to-date environment Supporting analysts as a subject matter expert in unlocking the full capabilities of Splunk Collaborating with users to design custom use cases that deliver meaningful data insights Understanding and translating complex or conflicting customer requirements into effective solutions Expanding high-level More β―
management. Key Responsibilities: Develop, implement, and maintain a robust cybersecurity strategy and governance framework aligned with business and regulatory requirements. Oversee technical security controls including firewalls, IDS/IPS, SIEM, IAM, endpoint protection, and cloud security (Azure, AWS). Lead threat detection, incident response, and recovery, ensuring minimal business disruption. Manage patching processes, AI-driven email intelligence tools, and network β¦ threat detection, incident response, and vulnerability management. Strong knowledge of security frameworks (ISO 27001, NIST, CIS Controls) and regulatory compliance requirements (GDPR, NIS2). Hands-on expertise with firewalls, SIEM, IAM, IDS/IPS, and cloud security. Strong understanding of networking, infrastructure, and application security. Experience in OT security or within a data centre environment is advantageous. Why Join Us More β―
management. Key Responsibilities: Develop, implement, and maintain a robust cybersecurity strategy and governance framework aligned with business and regulatory requirements. Oversee technical security controls including firewalls, IDS/IPS, SIEM, IAM, endpoint protection, and cloud security (Azure, AWS). Lead threat detection, incident response, and recovery, ensuring minimal business disruption. Manage patching processes, AI-driven email intelligence tools, and network β¦ threat detection, incident response, and vulnerability management. Strong knowledge of security frameworks (ISO 27001, NIST, CIS Controls) and regulatory compliance requirements (GDPR, NIS2). Hands-on expertise with firewalls, SIEM, IAM, IDS/IPS, and cloud security. Strong understanding of networking, infrastructure, and application security. Experience in OT security or within a data centre environment is advantageous. Why Join Us More β―