internal teams and external service providers. Collaboration Across Teams: Work across cybersecurity and IT teams to drive integrated security solutions. Security Tool Management: Manage and optimise SOC technologies like SIEM, EDR, and SOAR for effective threat detection. Training and Development: Implement training programs to enhance SOC analysts' technical skills and incident response. Vendor Management: Manage third-party vendors and MSSPs … to the SOC. Experience with technical analysis of enterprise systems including operating systems, networks, cloud, and complex architectures. Experience with a broad range of enterprise security technologies including EDR, SIEMand SOAR. Familiarity with at least one scripting language such as Python, PowerShell etc. Awareness of how AI can be applied in both offensive and defensive team operations, including its More ❯
diversity, and inclusion daily. Your skills and experience Experience as a security analyst in a SOC or similar environment. Currently hold SC clearance. Knowledge of data networks. Experience with SIEM tools andsecuritymanagement tools. Desirable qualifications include CompTIA S, CySA, AWS, MS, SANS, CISSP, etc. Your security clearance To be appointed, you must obtain Developed Vetting (DV) clearance, which More ❯
Derby, England, United Kingdom Hybrid / WFH Options
Node4
new capabilities and technologies for identification, prevention, detection and recovery of cyber incidents. What will you bring? At least 12 months experience in a SOC environment (or equivalent) using SIEM/EDR Close attention to detail Strong time-managementand organizational skills. Able to build and maintain strong relationships with clients, becoming a trusted advisor. Strong understanding of foundational IT … and networking concepts Confident writing SIEM queries and performing threat-hunting Excellent communication skills, both written and oral, to a range of audiences, including senior management. Responsibilities Compiling and presenting high quality monthly reports for our clients, combining data from multiple security platforms and providing expert insight and recommendations. Assisting Level 1 analysts with alert triage and escalation Creating and … improving report templates & components in-line with feedback from clients. Assisting with training and support for our junior analysts Proactively suggesting improvements for existing SIEM alarms and develop new use-cases based on threat intelligence and client threat models. Creating and improving SOC dashboards to give real time visibility for clients and stakeholders Onboarding new clients, including deploying technical resources More ❯
Derby, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
new capabilities and technologies for identification, prevention, detection and recovery of cyber incidents. What will you bring? At least 12 months experience in a SOC environment (or equivalent) using SIEM/EDR Close attention to detail Strong time-managementand organizational skills. Able to build and maintain strong relationships with clients, becoming a trusted advisor. Strong understanding of foundational IT … and networking concepts Confident writing SIEM queries and performing threat-hunting Excellent communication skills, both written and oral, to a range of audiences, including senior management. Responsibilities Compiling and presenting high quality monthly reports for our clients, combining data from multiple security platforms and providing expert insight and recommendations. Assisting Level 1 analysts with alert triage and escalation Creating and … improving report templates & components in-line with feedback from clients. Assisting with training and support for our junior analysts Proactively suggesting improvements for existing SIEM alarms and develop new use-cases based on threat intelligence and client threat models. Creating and improving SOC dashboards to give real time visibility for clients and stakeholders Onboarding new clients, including deploying technical resources More ❯
do attitude. A strong believer of security as an enabler to support business growth Position requires on call and overtime if there are very serious cyber attacks Knowledge of SIEM tooling, including experience in writing and developing advanced hunting queries. Experience Needed to Fulfil the Role Comprehensive experience of managing serious Cyber Incidents, as an Digital forensic incident responder. Experience More ❯
do attitude. A strong believer of security as an enabler to support business growth Position requires on call and overtime if there are very serious cyber attacks Knowledge of SIEM tooling, including experience in writing and developing advanced hunting queries. Experience Needed to Fulfil the Role Comprehensive experience of managing serious Cyber Incidents, as an Digital forensic incident responder. Experience More ❯
do attitude. A strong believer of security as an enabler to support business growth Position requires on call and overtime if there are very serious cyber attacks Knowledge of SIEM tooling, including experience in writing and developing advanced hunting queries. Experience Needed to Fulfil the Role Comprehensive experience of managing serious Cyber Incidents, as an Digital forensic incident responder. Experience More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Smart DCC
very closely and building strong relationships with our Service Providers. Run advanced and predictive analyses and perform assessments based on the Mitre ATT&CK framework. Correlation monitoring using multiple SIEM technologies to ensure that the SOC achieves its objective of being a threat-led organisation. Work independently and provide guidance and training to others on analysing data trends for use More ❯
Engineer by: Working with the Head of Engineering to develop the security strategy and ensure appropriate security governance is in place Operating and improving/implementing security infrastructure including SIEM, WAFs, Firewalls and EDR/AV Working with engineering teams to ensure best practices including secure development, security testing, vulnerability remediation and supply chain security Working with DevOps on our More ❯
Experience working as a security analyst in a SOC or equivalent security monitoring and response environment. Currently hold SC clearance. Knowledge of data networks . Knowledge and experience with SIEM tool sets andsecuritymanagement tools. Desirable security qualifications CompTIA S N CySA AWS MS SANS CISSP etc. Your security clearance To be successfully appointed to this role, it is More ❯
and such Scripting including the use of python, Powershell, bash or Javascript Securing networks, hosts, web applications and cloud native deployments Working with toolsets such as: vulnerability management, firewalls, SIEM, PAM, IDS/IPS, EDR/XDR, WAF Working with code security controls such as SAST/DAST/IAST/RASP You should also: Have some knowledge in securing More ❯
need? • At least 1 year of hands-on experience in a Tier 1 SOC role, preferably within a managed services environment • Practical knowledge of Microsoft Defender XDR and Sentinel SIEM tools • Familiarity with the Microsoft Defender suite, particularly Endpoint Detection and Response • Solid understanding of Microsoft 365 cloud technologies from a securityand threat landscape perspective • Hold current certifications in … you consent to your application being processed and submitted to the client for this vacancy only. KEY SKILLS – Cyber Security, SOC Analyst, Tier 1 Support, Microsoft Defender XDR, Sentinel, SIEM, Endpoint Detection, Microsoft 365, SC-200, SC-900, Incident Response, Threat Monitoring, IT Support More ❯
need? • At least 1 year of hands-on experience in a Tier 1 SOC role, preferably within a managed services environment • Practical knowledge of Microsoft Defender XDR and Sentinel SIEM tools • Familiarity with the Microsoft Defender suite, particularly Endpoint Detection and Response • Solid understanding of Microsoft 365 cloud technologies from a securityand threat landscape perspective • Hold current certifications in … you consent to your application being processed and submitted to the client for this vacancy only. KEY SKILLS – Cyber Security, SOC Analyst, Tier 1 Support, Microsoft Defender XDR, Sentinel, SIEM, Endpoint Detection, Microsoft 365, SC-200, SC-900, Incident Response, Threat Monitoring, IT Support More ❯
need? • At least 1 year of hands-on experience in a Tier 1 SOC role, preferably within a managed services environment • Practical knowledge of Microsoft Defender XDR and Sentinel SIEM tools • Familiarity with the Microsoft Defender suite, particularly Endpoint Detection and Response • Solid understanding of Microsoft 365 cloud technologies from a securityand threat landscape perspective • Hold current certifications in … you consent to your application being processed and submitted to the client for this vacancy only. KEY SKILLS – Cyber Security, SOC Analyst, Tier 1 Support, Microsoft Defender XDR, Sentinel, SIEM, Endpoint Detection, Microsoft 365, SC-200, SC-900, Incident Response, Threat Monitoring, IT Support More ❯
London, England, United Kingdom Hybrid / WFH Options
Client Server
work from home one day a week. About you: You have experience with Incident Response within a SOC environment You have experience of using tools such as Splunk, CrowdStrike, SIEM, SOAR, EDR, NDR You have a range of cyber security experience with a strong understanding of security concepts, principles and best practice You have AWS cloud security experience You're More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Eames Consulting Group Ltd
CCSA/CCSE, NSE4/5/7, PCNSE, JNCIS-SEC/JNCIP-SEC . Excellent communication skills with a client-focused mindset. Bonus Points Experience with SOAR or SIEM platforms. Scripting skills (Python, Bash) for automation. Cloud security certifications (AWS, Azure). ITIL or PMP certified. Eames Consulting is acting as an Employment Agency in relation to this vacancy. More ❯
Nottingham, England, United Kingdom Hybrid / WFH Options
Capital One
to develop and improve security measures. Mentor and train team members, fostering a collaborative environment. What we’re looking for Experience in cyber security investigations. Hands-on experience with SIEM tools like Elastic, Splunk, or similar. Proficiency in analyzing system, cloud, application, and network logs. Ability to analyze network traffic and perform PCAP analysis. Experience with logs from workstations or More ❯
London, England, United Kingdom Hybrid / WFH Options
Little Fish (UK) Ltd
Microsoft Security Operations Analyst certification. Experience: Demonstrated experience in responding to cyber security threats. Proficiency in the use of antivirus technologies. Experience with Endpoint Detection & Response solutions. Familiarity with SIEM platforms. Skills: Awareness of vulnerabilities andsecurity standards. Knowledge of HMG Security Standards and Processes. Ability to balance business needs with technical andsecurity standards. Attributes: Familiarity with ITIL practices. More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
Microsoft Security Operations Analyst certification. Experience: Demonstrated experience in responding to cyber security threats. Proficiency in the use of antivirus technologies. Experience with Endpoint Detection & Response solutions. Familiarity with SIEM platforms. Skills: Awareness of vulnerabilities andsecurity standards. Knowledge of HMG Security Standards and Processes. Ability to balance business needs with technical andsecurity standards. Attributes: Commercial awareness. Familiarity with More ❯
London, England, United Kingdom Hybrid / WFH Options
Akkodis
and incidents based on incident type and severity. Identify, create and implement improvements to procedures and processes, with the SOC Manager's approval. Identify opportunities for SOC and client SIEM platform configuration improvements, use case development, monitoring rule creation, tuning & optimisation Assist in architectural design to facilitate the onboarding of new information systems, including the assessment, parsing, onboarding of log … and use case and rule development. The Requirements Senior Cyber Securityandsecurity operations experience Experience in managing Microsoft Sentinel, including Lighthouse Experience of onboarding, tuning, reporting and configuring SIEM solutions Experience of threat intelligence Leadership and mentoring experience and skills Understanding of low-level concepts including operating systems and networking Commercial experience in Penetration Testing and/or SecurityMore ❯
Splunk Architect - Government - Remote - £800 per day inside IR35 - 9 Months A central Government organisation are looking for an experiencedSplunk Architect to join them andwork alongside the SIEM product owner to drive forward strategic and tactical improvements. The overall aim for this role is to suggest, implement or manage implementation of tactical and strategic improvements to the SIEMand associated … components. This would be working with a delivery manager, business analyst and operations teams where required. Person profile: SIEM Engineering and Architecture skills, specifically in Splunk SaaS Full end to end experience of delivery lifecycle experience for improvements to Splunk SaaS Experience of defining improvements within Cyber departments, particularly, SIEM improvements within Cyber Security Operations Centre (CSOC) functions that result … in an increase in SIEM Maturity Levels. Splunk SaaS experience and expertise as a lead architect and/or engineer A credible technology leader who can drive through technology and process change. Good communications, reporting and presentational skills. Desirable qualifications: Certified Information Systems Security Professional (CISSP) Ethical Hacking and Intrusion Prevention Implementing Microsoft Azure Infrastructure Solutions Developing Windows Azure andMore ❯
ensure vulnerability compliance. Preferred Qualifications: Professional certification such as GSEC, SSCP, Security+, CEH. Experience working from Incident Response Playbooks. Experience working with case management tools, SOAR, email security solutions, SIEM, and EDR technologies. Experience developing automation through scripting languages such as Python. At McDonald’s, we are committed to creating an inclusive culture that means people can be their best More ❯
is robust Who are you? You will have experience in vulnerability management, cybersecurity, or a related field Experience with tools such as MS Defender, Tenable, Qualys, Rapid7 Knowledge of SIEM, EDR, andsecurity orchestration tools (e.g., MS Sentinel/Defender, Splunk, Palo Alto XSOAR) Solid understanding of security frameworks like NIST, CIS, ISO 27001, and MITRE ATT&CK Strong leadership More ❯