Derby, Derbyshire, United Kingdom Hybrid / WFH Options
risual Limited
the applicant to work 12-hour shifts (7am/7pm) on a 4-on-4-off pattern. What will you bring? Experience in a SOC analyst role Experience using SIEM (ideally Microsoft Sentinel) Experience using EDR (ideally Microsoft Defender) Excellent written and verbal communication skills Experience configuring and deploying Microsoft technologies such as Microsoft Defender and Azure Experience using andMore ❯
compliance, including preparing for and undergoing assessments. Familiarity with informationsecurity frameworks (e.g., NIST, CIS). Proficiency in risk management methodologies. Knowledge of common security technologies (e.g., firewalls, EDR, SIEM, vulnerability scanners). Exceptional analytical, problem-solving, and decision-making abilities. Excellent communication (written and verbal), interpersonal, and presentation skills. Ability to operate autonomously and manage multiple priorities in a More ❯
reports and returns to ensure any issues are remediated with Systems Engineers. Provide recommendations on identified risks regarding further potential treatment/mitigation options. Essential Skills: Experience in operating SIEM tools and vulnerability management software and being able to interpret and prioritise alerts, incidents and threat intelligence. You will also hold DV Clearance and be a sole UK National. Desirable More ❯
Bedford, Bedfordshire, England, United Kingdom Hybrid / WFH Options
Reed Talent Solutions
Compliance, vulnerability managementand patching. Entra ID managementand improvements. Understanding of a broad range of security tools using Microsoft security tooling where possible, including but not limited to SIEM, Email Security, DLP. Delivering new cybersecurity toolsets and capability as required Investigating cybersecurity incidents and undertaking reporting/remedial action as required. Maintaining risk, issue and change registers for cybersecurity More ❯
Proven experience leading and managing technical teams. Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO/IEC 27001, IAM). Proficiency with cybersecurity tools and platforms (e.g., SIEM, SOAR, SAS, Sandboxes, EDR solutions and cloud technologies). Working of knowledge of access control principles, cloud technologies (CNAPP, CSPM), data retention, and encryption methodologies. Excellent problem-solving, investigative mindset More ❯
Yeovil, Somerset, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
with peers and customers, even under pressure. Proven cyber security experience in protective monitoring and incident response (e.g., GIAC GMON, GCIA, GCIH, or equivalent). Hands-on experience with SIEM tools (LogRhythm, Splunk) and IDS (Snort). Solid background in network and host security. Expertise in threat intelligence and threat hunting. Experience mentoring and coaching others. Current DV clearance. SecurityMore ❯
protocols, and cyber security principles Skilled in using vulnerability assessment and penetration testing tools (e.g. Nessus, Burp Suite) Familiarity with security frameworks (ISM, PSPF, ISO 27001) and tools like SIEM, IDS/IPS, and threat intelligence platforms Excellent problem-solving, communication, and collaboration skills, with strong attention to detail and a proactive mindset We welcome applications from candidates with entry More ❯
Proven experience leading and managing technical teams. Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO/IEC 27001, IAM). Proficiency with cybersecurity tools and platforms (e.g., SIEM, SOAR, SAS, Sandboxes, EDR solutions and cloud technologies). Working of knowledge of access control principles, cloud technologies (CNAPP, CSPM), data retention, and encryption methodologies. Excellent problem-solving, investigative mindset More ❯
management. Experience with network security technologies, including firewalls (Palo Alto, CheckPoint), IDS/IPS, NDR, switch/router ACLs, NAC solutions, IPSec/TLS VPNs, WAFs, email security, andSIEM logging/alerting. Programming and Automation: Proficiency in a modern programming language (e.g., Python). Experience with IaC practices, GitOps workflows, and cloud automation best practices. Proven ability to integrate More ❯
security best practices for the team ALL ABOUT YOU Technical Skills DLP Tools & Platforms: Proficiency with DLP solutions, in particular Microsoft Purview Security Monitoring & Analysis: Experience integrating DLP with SIEM, EDR, and CASB tools to monitor data flows and detect suspicious behavior. Policy Creation & Tuning: Ability to create, tune, and enforce DLP policies for endpoints, network, email, and cloud environments. More ❯
security best practices for the team ALL ABOUT YOU Technical Skills DLP Tools & Platforms: Proficiency with DLP solutions, in particular Microsoft Purview Security Monitoring & Analysis: Experience integrating DLP with SIEM, EDR, and CASB tools to monitor data flows and detect suspicious behavior. Policy Creation & Tuning: Ability to create, tune, and enforce DLP policies for endpoints, network, email, and cloud environments. More ❯
a SOC or managed security environment. Strong knowledge of network security (firewalls, IDS/IPS, VPNs). Proficiency in incident response, threat analysis, and vulnerability management. Experience working with SIEM tools for monitoring andevent analysis. Understanding of malware analysis, forensic investigations, and endpoint security. Strong analytical and problem-solving skills. Excellent communication skills, with the ability to explain technical More ❯
analysis, including strong OSINT skills What makes you uncommon? Understanding of cybersecurity and IT disciplines including networking, operating systems, authentication protocols, security incident response , and enterprise technical security solutions (SIEM, IDS/IPS, firewall solutions, offensive security tools ) Basic knowledge of Linux/Unix operating systems Certifications such as Network+, Security+, CySA + Experience with scripting or programming, including malware More ❯
anti-ransomware, and encryption technologies. Proven experience in securing, auditing infrastructure components and configurations on virtualization platforms, Windows, and Linux. Working experience with network infrastructure components such as IPS, SIEM, WAFS, load balancers, proxies, and firewall management systems. Burpsuite and DevSecOps Solid understanding of incident managementand forensics for security-related issues. Excellent documentation and communication skills, with the ability More ❯
risk. Job Description Essential Responsibilities In this role, you will: Specialize in network-centric analysis (NSM), host-centric analysis (live response, digital forensics), malware analysis, and log-centric analysis (SIEM) Perform daily response operations on a schedule that may involve non-traditional working hours Curate signatures, tune systems/tools, and develop scripts and correlation rules Analyse host and network More ❯
risk. Job Description Essential Responsibilities In this role, you will: Specialize in network-centric analysis (NSM), host-centric analysis (live response, digital forensics), malware analysis, and log-centric analysis (SIEM) Perform daily response operations on a schedule that may involve non-traditional working hours Curate signatures, tune systems/tools, and develop scripts and correlation rules Analyse host and network More ❯
concepts for clients Confident producing clear documentation and reporting Desirable Skills: Certifications: Security+, SC-200, CEH, ISO 27001 Lead Implementer, PCIP Penetration testing or red teaming exposure Experience with SIEM/SOAR platforms (e.g., Microsoft Sentinel) Familiarity with MSP toolsets (Autotask, IT Glue, Rewst) or automation experience Personal Attributes: Friendly and professional Excited about tech and thrives on developing understanding More ❯
of network protocols (TCP/IP) andsecurity practices (IPSec, SSL-VPN, NAT, GRE). Hands-on experience with cloud infrastructure operations and troubleshooting customer tech stacks. Familiarity with SIEM tools, vulnerability management, malware analysis, and firewall configurations. Ability to communicate complex technical solutions to a wide range of audiences, both technical and non-technical. Skilled in Python, JSON, YAML More ❯
similar role, with deep understanding of the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III More ❯
infrastructure roles with exposure to vulnerability managementand incident response. Working knowledge of common attack vectors such as phishing, ransomware, and lateral movement. Familiarity with security tools such as SIEM, vulnerability scanners, endpoint protection, and patch management. Understanding of frameworks and standards such as NIST CSF, CIS Controls, Cyber Essentials, or ISO 27001. Strong communication skills and ability to work More ❯
regulated or high-trust industries). Hands-on expertise in cloud security (preferably AWS), including securing hybrid and multi-region architectures. Practical knowledge of security tooling: IDS/IPS, SIEM, vulnerability scanners, encryption, SAST/DAST tools, OWASP ZAP, etc. Strong understanding of network security protocols and best practices. Scripting and automation experience (e.g. Python). Proven experience with incident More ❯
on industry standards while continuously evaluating and enhancing our security infrastructure Collaborate with IT, DevOps and SecOps teams to architect, configure and implement security monitoring and defense tools (is. SIEM, IDS/IPS, ASM, WAF) to safeguard against security breaches, cyber threats and unauthorized access Report on and assist with all security events and incidents. Oversee Security testing, including penetration More ❯
on industry standards while continuously evaluating and enhancing our security infrastructure Collaborate with IT, DevOps and SecOps teams to architect, configure and implement security monitoring and defense tools (is. SIEM, IDS/IPS, ASM, WAF) to safeguard against security breaches, cyber threats and unauthorized access Report on and assist with all security events and incidents. Oversee Security testing, including penetration More ❯