External Audit to respond to, and act upon, compliance related issues. Partner with business, IT, and product leads to define security controls across the SAP landscape, integrating with enterprise SIEM, vulnerability management, and incident response processes. Drive risk assessment and remediation for legacy ECC-to-S/4 migrations, ensuring consistent security baselines, traceable control evidence, and resilience against evolving More ❯
clearance) DV Bonus : 10% of base salary upon clearance and deployment on project Experience & Skills Minimum 2 years in security analyst role Experience : Security Operations Centre (SOC) or equivalent SIEM platforms Vulnerability management Incident response & resolution System log analysis Certifications : CompTIA or equivalent (preferred) Qualifications : Experience prioritized over formal education Please Apply/Reach Out to learn more More ❯
networks, and operating systems. Good written and verbal communication skills to explain risks to both technical and non-technical stakeholders. CompTIA Security+ or equivalent qualification ??. Desirable: Experience with SIEM systems, EDR, IDS/IPS, and vulnerability scanners. Previous experience in a law firm or professional services environment. Familiarity with Practice Management Systems (PMS) and Document Management Systems (DMS). More ❯
City of London, London, England, United Kingdom Hybrid/Remote Options
Broster Buchanan
the risks Your engineering experiences include Golang and Terraform Technologies AWS, GCP, Azure and private Data Centers Kubernetes, Helm, Flux Distributed systems, mostly Golang based with CockroachDB and NATS SIEM/SOAR, EDR, CNAPP, and a suite of open source tools with custom integrations This is a fully remote role, please email your CV to apply More ❯
scarborough, yorkshire and the humber, united kingdom
Alexander Dennis
platforms · Leading patch management, system upgrades, and infrastructure automation initiatives · Supporting cloud infrastructure (e.g., Azure, M365) and hybrid environments · Implementing hardening standards andsecurity controls across infrastructure · Familiarity with SIEM, EDR, and other security technologies · Collaborating on incident response, vulnerability remediation, and cyber investigations · Contributing to infrastructure andsecurity roadmaps, policies, and best practices What We're Looking For We More ❯
and disaster recovery processes. Administer and monitor Active Directory, Azure Entra, and Intune environments. Manage compliance policies, conditional access, and mobile device management. Work with third-party providers supporting SIEMand threat analytics systems. Lead on implementing IT security best practices, standards, and access controls. Support infrastructure andsecurity projects, including system upgrades and migrations. Create and maintain technical documentation More ❯
and disaster recovery processes. Administer and monitor Active Directory, Azure Entra, and Intune environments. Manage compliance policies, conditional access, and mobile device management. Work with third-party providers supporting SIEMand threat analytics systems. Lead on implementing IT security best practices, standards, and access controls. Support infrastructure andsecurity projects, including system upgrades and migrations. Create and maintain technical documentation More ❯
utilising tools like AWS Inspector, GuardDuty, andSecurity Hub, complemented by regular vulnerability scanning and penetration testing. Design, implement, and automate enterprise-level security systems and controls -including IAM, SIEM, DLP, firewalls, endpoint protection, and cloud-native guardrails-to safeguard assets across both cloud and hybrid environments. Actively respond to security events and incidents by leading investigations, coordinating remediation efforts … understanding of security principles, technologies, and industry best practices , including vulnerability and incident management. Practical experience with security monitoring and protection tools such as Firewalls, IDS/IPS, XDR, SIEM, CNAPP, and log collection platforms (e.g., CrowdStrike, Lacework). Experience in designing and implementing Identity and Access Management (IAM) solutions and maintaining secure authentication practices. Proficiency with Windows and Linux More ❯
Central London, London, United Kingdom Hybrid/Remote Options
Colt Technology Services
highlight the risk to client environment Proficient in preparation of reports, dashboards and documentations. Knowledge/Experience of security technologies such as Cisco/Juniper Firewalls, Application Firewalls, IPS, SIEM, Proxy, NAC, etc. Skills: Network Protocols Cyber Security Tools/Products Cyber Security Policy Management Cyber Security Planning Cyber Security Risk Management What we offer: Our benefits support you through More ❯
SABSA & TOGAF Experience following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity managementand federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability More ❯
would be the main focus of the role. Strong expertise with Microsoft Defender and Sentinel is needed. Key Skills & Experience from the Security Analyst: Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within More ❯
Milton Keynes, Loughton, Buckinghamshire, United Kingdom
VIQU IT
would be the main focus of the role. Strong expertise with Microsoft Defender and Sentinel is needed. Key Skills & Experience from the Security Analyst: Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within More ❯
best practices Engagement with the R&D Cyber Defence Centre for Airbus Cyber Solutions/Products Essential Skills: Good knowledge of multiple SOC tooling including IDPS/Firewalls/SIEM/Splunk/Email & Web Protection etc. Experience of implementing and fault finding Firewall technologies including Cisco ASR/Palo Alto/Fortinet Excellent understanding of network technologies Experience of More ❯
best practices Engagement with the R&D Cyber Defence Centre for Airbus Cyber Solutions/Products Essential Skills: Good knowledge of multiple SOC tooling including IDPS/Firewalls/SIEM/Splunk/Email & Web Protection etc. Experience of implementing and fault finding Firewall technologies including Cisco ASR/Palo Alto/Fortinet Excellent understanding of network technologies Experience of More ❯
security concepts, tools and best practices Engagement with R&D for Cyber Solutions/Products Essential Candidate Experience Good knowledge of multiple SOC tooling including IDPS/Firewalls/SIEM/Splunk/Email & Web Protection etc. Experience of implementing and fault finding Firewall technologies including Cisco ASR/Palo Alto/Fortinet Excellent understanding of network technologies Experience of More ❯
engineer stepping into cyber security. What You'll Bring Strong experience with Microsoft 365 security, Defender, Intune, and Azure AD/Entra ID . Working knowledge of Azure Sentinel (SIEM) and KQL. Solid understanding of patch managementand endpoint security. Previous involvement in Cyber Essentials Plus or ISO27001 accreditation. Clear communication skills, able to engage technical and non-technical stakeholders. More ❯
Central London, London, United Kingdom Hybrid/Remote Options
Carrington Recruitment Solutions Limited
Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, andSIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery and ongoing support. This is a great opportunity and salary is dependent upon experience. More ❯
principles. Strong knowledge of frameworks such as NIST, ISO 27001, OWASP, and CIS. Experience designing and implementing secure, compliant PCI-DSS solutions. Solid grounding in tools and technologies like SIEM, IDS/IPS, DLP, endpoint protection, IAM, and encryption. Ability to communicate complex concepts clearly and influence at all levels. Certifications such as CISSP, CCSP, CISM, or TOGAF are a More ❯
and webinars. Skills & Must-Haves Proven experience as a Cyber Security Pre-Sales Consultant (minimum 2 years). Strong understanding of cyber security solutions, including managed services, SOC/SIEM, vulnerability management, and compliance frameworks (ISO27001, NIST, Cyber Essentials, etc.). Excellent communication and presentation skills for both technical and non-technical audiences. Ability to build rapport and credibility with More ❯
and availability. Support change and release management. Oversee the transition of new security projects into SOC operations. Required Skills & Experience Active DV Strong experience with SOC tools (IDPS, Firewalls, SIEM/Splunk, Email & Web protection). Hands-on experience with Cisco ASR, Palo Alto, and Fortinet firewalls. Windows & RedHat server experience, including CIS hardening. If you're ready to take More ❯
and availability. Support change and release management. Oversee the transition of new security projects into SOC operations. Required Skills & Experience Active DV Strong experience with SOC tools (IDPS, Firewalls, SIEM/Splunk, Email & Web protection). Hands-on experience with Cisco ASR, Palo Alto, and Fortinet firewalls. Windows & RedHat server experience, including CIS hardening. If you're ready to take More ❯
effectively. Collaborate with cross-functional teams to deliver reliable and secure IT services. Skills & Experience Required Hands-on experience in patching and vulnerability management. Knowledge of centralised logging andSIEM platforms. Solid understanding of networking technologies including firewalls, switches, routers, VPNs, and IP subnetting. Familiarity with directory services (e.g. Active Directory). Exposure to cloud platforms such as AWS or More ❯