Chatham, England, United Kingdom Hybrid / WFH Options
Intec Select
cloud) is essential. Proven experience with implementing secure core foundational services in a cloud infrastructure for AD, SecDevOps, Networking Services, at an enterprise level is essential. Proven experience in SIEM & SOAR (securityinformationandeventmanagement (SIEM) andsecurity orchestration, automation, and response (SOAR). Experience with Rapid7 SIEM tooling is desirable. Proven experience with the core foundational security services More ❯
Wolverhampton, England, United Kingdom Hybrid / WFH Options
Intec Select
cloud) is essential. Proven experience with implementing secure core foundational services in a cloud infrastructure for AD, SecDevOps, Networking Services, at an enterprise level is essential. Proven experience in SIEM & SOAR (securityinformationandeventmanagement (SIEM) andsecurity orchestration, automation, and response (SOAR). Experience with Rapid7 SIEM tooling is desirable. Proven experience with the core foundational security services More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
BT Group
Press Tab to Move to Skip to Content Link Select how often (in days) to receive an alert: SIEM Application Engineer Function: Cyber Security Unit: Networks Location: Snowhill, Birmingham, United Kingdom Salary: Competitive with Great Benefits The new Network SIEM is essential to BT's network security, meeting TSA requirements and improving our CAF level. Your role as a SIEM … following offices: Birmingham, Manchester, Ipswich (Ipswich only applicable to existing BT employees) What you'll be doing SIEM Solution Development: Collaborate with security analysts and architects to design and implement SIEM solutions using Elasticsearch. Optimize SIEM rules, alerts, and dashboards for efficient threat detection. Collaborate effectively with others to drive forward key security objectives Presentation and documentation writing (to both … Experience in key cyber technologies such as SIEM technologies (Elastic preferred), vulnerability management, access managementand other commonly used Enterprise security controls. Ideally from both a development and operational perspective Advantageous: SIEM implementation and usage Experience of Elastic Stack (ELK) Knowledge of Offensive testing frameworks Knowledge of Linux, Windows and Network Administration Knowledge and experience of cloud services (public or More ❯
experience Windows Server and Linux Network (WAN, Wi-Fi) and Network Access Control (NAC) management Cloud email security gateway services Server hardware including CIS controls Security monitoring, orchestrator, andSIEM tools Next-gen application firewalls, anti-malware, cloud proxies, and CASB Please apply! Carbon60, Lorien & SRG – The Impellam Group STEM Portfolio are acting as an Employment Business in relation to More ❯
a programming or scripting language. PREFERRED QUALIFICATIONS - 5+ years experience working in incident response, security operations, security automation tooling, hunting, or threat intelligence. - Familiarity with malware analysis, forensics, SOAR, SIEM platforms, or detection engineering and hunting. Demonstrable subject matter expertise in any of these domains a plus. - Proficiency across a variety of Operating Systems (MS Windows, Linux, MacOS). - Experience More ❯
worldwide. Here in the Global InformationSecurity team, we work to protect the platforms that support investment solutions for over 20 million people. We are looking for an experienced SIEM Engineer , reporting to the Cyber Security Engineering Manager (SIEM). You will have a strong background in designing and developing monitoring solutions and will be familiar with onboarding data from … varied sources. You will have strong experience of different SIEM architectures and be adaptable in your approach. Your role in FNZ will be to manage and enhance the SIEM solutions for the FNZ Group, supporting the lifecycle of data onboarding, use cases and automating responses. Specific Role Responsibilities Support the creation and delivery of the roadmap and architecture for the … SIEM solutions in FNZ. Deploy, manage and enhance the SIEM technology in FNZ Managing the SIEM infrastructure Log onboarding Rules and Use case development Schema management Threat Intelligence integration Maintain up-to-date knowledge of emerging security threats and trends and build this into the SIEM strategy. Support the Incident Response team in FNZ to identify, manage and respond to More ❯
risk. Job Description Essential Responsibilities In This Role, You Will Specialize in network-centric analysis (NSM), host-centric analysis (live response, digital forensics), malware analysis, and log-centric analysis (SIEM) Perform daily response operations on a schedule that may involve non-traditional working hours Curate signatures, tune systems/tools, and develop scripts and correlation rules Analyse host and network More ❯
risk. Job Description Essential Responsibilities In this role, you will: Specialize in network-centric analysis (NSM), host-centric analysis (live response, digital forensics), malware analysis, and log-centric analysis (SIEM) Perform daily response operations on a schedule that may involve non-traditional working hours Curate signatures, tune systems/tools, and develop scripts and correlation rules Analyse host and network More ❯
risk. Job Description Essential Responsibilities In this role, you will: Specialize in network-centric analysis (NSM), host-centric analysis (live response, digital forensics), malware analysis, and log-centric analysis (SIEM) Perform daily response operations on a schedule that may involve non-traditional working hours Curate signatures, tune systems/tools, and develop scripts and correlation rules Analyse host and network More ❯
risk. Job Description Essential Responsibilities In this role, you will: Specialize in network-centric analysis (NSM), host-centric analysis (live response, digital forensics), malware analysis, and log-centric analysis (SIEM) Perform daily response operations on a schedule that may involve non-traditional working hours Curate signatures, tune systems/tools, and develop scripts and correlation rules Analyse host and network More ❯
Science, InformationSecurity, or a related field. At least 5 years of experience in a security engineering role. Strong knowledge of security technologies and concepts, such as Identity Management, SIEM, Encryption, Vulnerability Management, Secure Coding Standards etc. Familiarity with compliance standards and regulations, such as ISO27001, PCI-DSS, and GDPR. Experience with security assessments, penetration testing, and incident response. Excellent More ❯
and Deployment: ⦁ Lead the deployment and configuration of CyberArk components, including: ⦁ Core PAS (Privileged Access Security) ⦁ PSM (Privileged Session Manager) ⦁ Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). ⦁ Configure and manage safes, platforms, and policies within CyberArk. 3. Operational Management: ⦁ Monitor and maintain the CyberArk environment to ensure optimal performance and security. ⦁ Troubleshoot and resolve … of CyberArk components (EPV, CPM, PVWA, PSM, AAM, Conjur). ⦁ Strong understanding of privileged access management concepts and best practices. ⦁ Experience with integrating CyberArk with other security tools (e.g., SIEM, IAM, ITSM). ⦁ Proficiency in scripting languages (e.g., PowerShell, Python) for automation and customization. ⦁ Excellent problem-solving and troubleshooting skills. Preferred: ⦁ Experience with cloud platforms (e.g., AWS, Azure, GCP) andMore ❯
Stevenage, Hertfordshire, United Kingdom Hybrid / WFH Options
GlaxoSmithKline
e.g. GxP and that Tech continuity plans are in place for all critical areas. People Management: Collaborate with internal owners of security technologies such as antivirus, IDS/IPS, SIEM, endpoint detection & response, configuration management, privileged identity management, etc. Why you? Basic Qualifications: We are looking for professionals with these required skills to achieve our goals: Bachelor's Degree - Technical More ❯
Luton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Policies, TCP/IP, DNS, DHCP, and Exchange Server. Ability to multitask, prioritize, and manage demands effectively. Experience analyzing IT logs andevent sources (preferred). Monitoring and administering SIEM systems. Malware analysis and digital forensics research. Understanding intrusion attempts and false positives. Investigation tracking and threat resolution. Familiarity with data storage, backups, and restoration. Knowledge of security tools including More ❯
Master’s in Computer Science, Cybersecurity, or related field. 3+ years in security engineering or related roles. Strong knowledge of security principles, cryptography, network protocols. Experience with security tools (SIEM, IDS/IPS, vulnerability scanners). Familiarity with cloud platforms (AWS, Azure, GCP) andsecurity frameworks. Knowledge of secure coding practices and vulnerabilities (OWASP Top Ten). Preferred Skills: Experience More ❯
time. Develop and refine detection rules and correlation logic to enhance threat detection. Investigate security incidents thoroughly, perform forensic analyses, and coordinate incident responses. Maintain and optimize securityinformationandeventmanagement systems and other SOC tools. Collaborate with teams to improve threat intelligence, incident response procedures, andsecurity reporting. A Day in the Life As a Security Engineer in More ❯
St George's University Hospitals NHS Foundation Trust
System incidents Experience with PAM Solutions Desirable Experience of using various application, system, infrastructure, and network logs, to identify threats and issues, and in the utilisation and development of SIEM products Experience and knowledge of NHS systems and Cyber security tools, andInformationSecurity strategy Forensic investigation experience Disclosure and Barring Service Check This post is subject to the Rehabilitation More ❯
M&A security assessments and maintain compliance. Requirements: Experience in a Cyber Security leadership-level role Proven experience with the MS Security Stack including Defender (Endpoint, Identity, Cloud), Sentinel (SIEM), Entra ID Security Features, and Purview Knowledge of Azure Security controls, including Azure Firewall, Key Vault, Conditional Access, and Azure Network Security Familiarity with standards such as ISO 27001 Benefits More ❯
M&A security assessments and maintain compliance. Requirements: Experience in a Cyber Security leadership-level role Proven experience with the MS Security Stack including Defender (Endpoint, Identity, Cloud), Sentinel (SIEM), Entra ID Security Features, and Purview Knowledge of Azure Security controls, including Azure Firewall, Key Vault, Conditional Access, and Azure Network Security Familiarity with standards such as ISO 27001 Benefits More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
Nigel Frank
M&A security assessments and maintain compliance. Requirements: Experience in a Cyber Security leadership-level role Proven experience with the MS Security Stack including Defender (Endpoint, Identity, Cloud), Sentinel (SIEM), Entra ID Security Features, and Purview Knowledge of Azure Security controls, including Azure Firewall, Key Vault, Conditional Access, and Azure Network Security Familiarity with standards such as ISO 27001 Benefits More ❯
M&A security assessments and maintain compliance. Requirements: Experience in a Cyber Security leadership-level role. Proven experience with the MS Security Stack including Defender (Endpoint, Identity, Cloud), Sentinel (SIEM), Entra ID Security Features, and Purview. Knowledge of Azure Security controls, including Azure Firewall, Key Vault, Conditional Access, and Azure Network Security. Familiarity with standards such as ISO 27001. Benefits More ❯
M&A security assessments and maintain compliance. Requirements: * Experience in a Cyber Security leadership-level role * Proven experience with the MS Security Stack including Defender (Endpoint, Identity, Cloud), Sentinel (SIEM), Entra ID Security Features, and Purview * Knowledge of Azure Security controls, including Azure Firewall, Key Vault, Conditional Access, and Azure Network Security * Familiarity with standards such as ISO 27001 Benefits More ❯
M&A security assessments and maintain compliance. Requirements: * Experience in a Cyber Security leadership-level role * Proven experience with the MS Security Stack including Defender (Endpoint, Identity, Cloud), Sentinel (SIEM), Entra ID Security Features, and Purview * Knowledge of Azure Security controls, including Azure Firewall, Key Vault, Conditional Access, and Azure Network Security * Familiarity with standards such as ISO 27001 Benefits More ❯
experience as a Security Analyst or in a similar cybersecurity role ️ Strong knowledge of network security, firewalls, IDS/IPS, and endpoint security ️ Familiarity with security monitoring tools (e.g., SIEM, Splunk, Qualys) ️ Experience with vulnerability management, penetration testing, and incident response ️ Certifications such as CISSP, CISM, CompTIA Security+ or equivalent are highly desirable #J-18808-Ljbffr More ❯
technologies (e.g. Docker, Kubernetes) Experience with scripting languages (e.g. Python, Bash) Experience with a modern programming language (e.g. Go, TypeScript) Good knowledge of Security tooling, frameworks and approaches (e.g. SIEM, SOAR, IPS/IDS, NIST, Vulnerability Management) Capable of implementing SecOps/DevSecOps practices from scratch, implementing, maintaining, and scaling them out across teams and the company Familiarity with SecurityMore ❯