need? • At least 1 year of hands-on experience in a Tier 1 SOC role, preferably within a managed services environment • Practical knowledge of Microsoft Defender XDR and Sentinel SIEM tools • Familiarity with the Microsoft Defender suite, particularly Endpoint Detection and Response • Solid understanding of Microsoft 365 cloud technologies from a securityand threat landscape perspective • Hold current certifications in … you consent to your application being processed and submitted to the client for this vacancy only. KEY SKILLS – Cyber Security, SOC Analyst, Tier 1 Support, Microsoft Defender XDR, Sentinel, SIEM, Endpoint Detection, Microsoft 365, SC-200, SC-900, Incident Response, Threat Monitoring, IT Support More ❯
need? • At least 1 year of hands-on experience in a Tier 1 SOC role, preferably within a managed services environment • Practical knowledge of Microsoft Defender XDR and Sentinel SIEM tools • Familiarity with the Microsoft Defender suite, particularly Endpoint Detection and Response • Solid understanding of Microsoft 365 cloud technologies from a securityand threat landscape perspective • Hold current certifications in … you consent to your application being processed and submitted to the client for this vacancy only. KEY SKILLS – Cyber Security, SOC Analyst, Tier 1 Support, Microsoft Defender XDR, Sentinel, SIEM, Endpoint Detection, Microsoft 365, SC-200, SC-900, Incident Response, Threat Monitoring, IT Support More ❯
London, England, United Kingdom Hybrid / WFH Options
Client Server
work from home one day a week. About you: You have experience with Incident Response within a SOC environment You have experience of using tools such as Splunk, CrowdStrike, SIEM, SOAR, EDR, NDR You have a range of cyber security experience with a strong understanding of security concepts, principles and best practice You have AWS cloud security experience You're More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Eames Consulting Group Ltd
CCSA/CCSE, NSE4/5/7, PCNSE, JNCIS-SEC/JNCIP-SEC . Excellent communication skills with a client-focused mindset. Bonus Points Experience with SOAR or SIEM platforms. Scripting skills (Python, Bash) for automation. Cloud security certifications (AWS, Azure). ITIL or PMP certified. Eames Consulting is acting as an Employment Agency in relation to this vacancy. More ❯
Nottingham, England, United Kingdom Hybrid / WFH Options
Capital One
to develop and improve security measures. Mentor and train team members, fostering a collaborative environment. What we’re looking for Experience in cyber security investigations. Hands-on experience with SIEM tools like Elastic, Splunk, or similar. Proficiency in analyzing system, cloud, application, and network logs. Ability to analyze network traffic and perform PCAP analysis. Experience with logs from workstations or More ❯
London, England, United Kingdom Hybrid / WFH Options
Little Fish (UK) Ltd
Microsoft Security Operations Analyst certification. Experience: Demonstrated experience in responding to cyber security threats. Proficiency in the use of antivirus technologies. Experience with Endpoint Detection & Response solutions. Familiarity with SIEM platforms. Skills: Awareness of vulnerabilities andsecurity standards. Knowledge of HMG Security Standards and Processes. Ability to balance business needs with technical andsecurity standards. Attributes: Familiarity with ITIL practices. More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
Microsoft Security Operations Analyst certification. Experience: Demonstrated experience in responding to cyber security threats. Proficiency in the use of antivirus technologies. Experience with Endpoint Detection & Response solutions. Familiarity with SIEM platforms. Skills: Awareness of vulnerabilities andsecurity standards. Knowledge of HMG Security Standards and Processes. Ability to balance business needs with technical andsecurity standards. Attributes: Commercial awareness. Familiarity with More ❯
London, England, United Kingdom Hybrid / WFH Options
Akkodis
and incidents based on incident type and severity. Identify, create and implement improvements to procedures and processes, with the SOC Manager's approval. Identify opportunities for SOC and client SIEM platform configuration improvements, use case development, monitoring rule creation, tuning & optimisation Assist in architectural design to facilitate the onboarding of new information systems, including the assessment, parsing, onboarding of log … and use case and rule development. The Requirements Senior Cyber Securityandsecurity operations experience Experience in managing Microsoft Sentinel, including Lighthouse Experience of onboarding, tuning, reporting and configuring SIEM solutions Experience of threat intelligence Leadership and mentoring experience and skills Understanding of low-level concepts including operating systems and networking Commercial experience in Penetration Testing and/or SecurityMore ❯
Splunk Architect - Government - Remote - £800 per day inside IR35 - 9 Months A central Government organisation are looking for an experiencedSplunk Architect to join them andwork alongside the SIEM product owner to drive forward strategic and tactical improvements. The overall aim for this role is to suggest, implement or manage implementation of tactical and strategic improvements to the SIEMand associated … components. This would be working with a delivery manager, business analyst and operations teams where required. Person profile: SIEM Engineering and Architecture skills, specifically in Splunk SaaS Full end to end experience of delivery lifecycle experience for improvements to Splunk SaaS Experience of defining improvements within Cyber departments, particularly, SIEM improvements within Cyber Security Operations Centre (CSOC) functions that result … in an increase in SIEM Maturity Levels. Splunk SaaS experience and expertise as a lead architect and/or engineer A credible technology leader who can drive through technology and process change. Good communications, reporting and presentational skills. Desirable qualifications: Certified Information Systems Security Professional (CISSP) Ethical Hacking and Intrusion Prevention Implementing Microsoft Azure Infrastructure Solutions Developing Windows Azure andMore ❯
ensure vulnerability compliance. Preferred Qualifications: Professional certification such as GSEC, SSCP, Security+, CEH. Experience working from Incident Response Playbooks. Experience working with case management tools, SOAR, email security solutions, SIEM, and EDR technologies. Experience developing automation through scripting languages such as Python. At McDonald’s, we are committed to creating an inclusive culture that means people can be their best More ❯
is robust Who are you? You will have experience in vulnerability management, cybersecurity, or a related field Experience with tools such as MS Defender, Tenable, Qualys, Rapid7 Knowledge of SIEM, EDR, andsecurity orchestration tools (e.g., MS Sentinel/Defender, Splunk, Palo Alto XSOAR) Solid understanding of security frameworks like NIST, CIS, ISO 27001, and MITRE ATT&CK Strong leadership More ❯
Southampton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Monitoring : Conduct regular security assessments, vulnerability scans, and monitor/respond to security incidents using tools such as Azure Sentinel and other security technologies (XDR, NDR, IDS/IPS, SIEM). Root Cause Analysis and Compliance : Perform root cause analysis for security incidents, implement corrective actions, and ensure compliance with industry regulations (GDPR, HIPAA). DevOps Integration : Collaborate with development … including a deep understanding of Azure networking, compute, storage, and databases. Security Tools : Hands-on experience with security tools and technologies (e.g., Azure Sentinel, XDR, NDR, IDS/IPS, SIEM). Automation & Scripting : Proficiency in scripting (e.g., PowerShell, Azure CLI) and working with Azure DevOps. Desirable Skills : Experience with containerization, knowledge of Azure Data Lake, Azure IoT Hub, and API More ❯
6pm–6am), 4 days off . Essential Skills and Experience: Proven experience in a Security Operations Centre (SOC) environment Previous people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier … Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1 Familiarity with additional SIEM technologies, especially QRadar Role & Responsibilities As a SOC Shift Lead , you will ensure the smooth operation and continual enhancement of SOC processes and personnel. You will play a pivotal role More ❯
London, England, United Kingdom Hybrid / WFH Options
Iceberg
leading response efforts, and helping shape how we defend against the next wave of cyber threats. What You’ll Be Doing Monitor and manage a suite of security tools (SIEM, IDS/IPS, DLP, and others) to detect and respond to threats in real-time. Triage, investigate and escalate incidents with sound judgement — this isn’t checkbox security work. Dive … re not new to this. You’ve been in the trenches and know what it takes to stay ahead of threat actors. Ideally, you bring: Hands-on experience with SIEM platforms , especially Splunk. Strong familiarity with MITRE ATT&CK , intrusion detection/prevention systems, and malware behaviour. Confidence in network traffic analysis (PCAP, NetFlow) and endpoint forensics. The ability to More ❯
enterprise environment. In-depth knowledge of cybersecurity best practices, threat landscape, and regulatory requirements (e.g., GDPR, HIPAA, NIST). Proficiency with security tools and technologies such as firewalls, VPNs, SIEM, IDS/IPS, and endpoint protection. Excellent analytical, problem-solving, and decision-making skills. Strong communication and interpersonal skills, with the ability to effectively collaborate with technical and non-technical More ❯
access security brokers (CASB). • Experience with SOC or NOC environments. A good understanding of SOC deployment or operation and/or typical SOC solutions or technologies (e.g. SOAR, SIEM, orchestration and automation, threat intelligence, incident response) would be a plus. • Proven ability to handle technical escalations, working closely with both technical and business stakeholders. • Experience with vendors' Professional Services More ❯
Intune, Config Manager, vulnerability management) Microsoft Entra (including PIM and ID Protection) & Conditional Access Microsoft Purview & all DLP policies Microsoft Azure (IaaS, PaaS, Firewall, Backup & PAWs) Cloud monitoring, alerting & SIEM solutions (including Sentinel) Enterprise Architecture Practice They will also have responsibility for leading adoption and adherence to all enterprise architectural strategies, principles, standards and policies. They will be the technical More ❯
of 2 years' experience with cloud platforms such as AWS, Azure, and Google Cloud. Experience with Okta, Salesforce, Slack, Jira, and Github. Experience with security tools and technologies, including SIEM, IDS/IPS, and endpoint protection. Proven success in contributing to a team-oriented environment. Proven ability to provide creative solutions to problems. Thorough knowledge of AWS/Azure services More ❯
plans Conduct trend analysis and develop defense signatures Desired Skills: Certifications such as GIAC, GCIH, GCIA, ITIL Familiarity with NIST frameworks, Cyber Kill Chain Experience with case management, SOAR, SIEM, EDR tools Experience with multinational organizations and automation scripting (Python) Qualifications: Bachelor's degree or equivalent in Computer Science, Cybersecurity, or related fields Additional Information: At McDonald's, we embrace More ❯
and critical systems. Support security audits and identity risk assessments, addressing access anomalies and reducing attack surfaces. Enhance identity threat detection and response capabilities in collaboration with SOC andSIEM teams. Required Skills & Experience 6+ years of hands-on IAM experience, with at least 2 years in an architect or senior engineering role. Expertise in Entra ID (Azure AD), Entra More ❯
Analyst, you will be a key player in the frontline defence against cyber threats. Working within the Security Operations Centre, you will monitor and respond to security alerts, manage SIEM systems, and contribute to continuous improvement of the organisation's security posture. You'll also collaborate with wider InfoSec teams to support audits and testing. Key Responsibilities Prioritise and respond … to security alerts and incidents raised via the organisation's monitoring platforms. Manage the SIEMand MSSP relationships, including development of use cases and rule tuning. Investigate alerts from a wide range of security technologies (e.g., Cloud, Brand Surveillance, MSSP tools). Provide support for ongoing security investigations and incident response activities. Assist InfoSec Governance, Risk & Compliance (GRC) teams with … readiness and response. Enhance existing incident response playbooks and contribute to security policy development. Participate in the team's on-call rota. Ideal Candidate Profile Hands-on experience with SIEM platforms andsecurity monitoring technologies. Good understanding of security tools and concepts, especially Endpoint Detection & Response (EDR), Data Loss Prevention (DLP), and antivirus solutions. Strong working knowledge of Microsoft Windows More ❯
of Cloud infrastructure- ability to effectively deploy and manage cloud environments and integrate technologies that are part of customer stacks, to accurately replicate and resolve customer issues Knowledge of SIEM, vulnerability management tools, firewalls, malware, exploits, operating system structure and behavior Strong consulting and project management skills, with validated results working as a trusted advisor to drive business value for More ❯