guidance, ISO27001, JSP 440) Proven experience designing and implementing secure systems in enterprise or government settings Familiarity with cloud platforms (AWS/Azure), identity management, secure networking, encryption, andSIEM Strong communication and stakeholder engagement skills, able to advise both technical and business teams Desirable Experience Background in central government, defence, or critical national infrastructure Knowledge of architectural frameworks such More ❯
Proven ability in designing cyber security systems and governance. Familiar with tools and frameworks (e.g. NCSC, NIST, MITRE, GDPR, PCI DSS). Deep understanding of security controls (e.g. firewalls, SIEM, SOC, DLP). Proficient in leading and coordinating incident response. Effective at managing multiple priorities under pressure. Excellent communicator, able to engage stakeholders at all levels. Skilled in tailoring technical More ❯
Proven ability in designing cyber security systems and governance. Familiar with tools and frameworks (e.g. NCSC, NIST, MITRE, GDPR, PCI DSS). Deep understanding of security controls (e.g. firewalls, SIEM, SOC, DLP). Proficient in leading and coordinating incident response. Effective at managing multiple priorities under pressure. Excellent communicator, able to engage stakeholders at all levels. Skilled in tailoring technical More ❯
of scripts in Python JavaScript or PowerShell is a plus Experience with security design and architecture, content development, workload automation and use-cases Experienced with technologies such as EDR, SIEM, SOAR, NGFW and their ecosystems Familiarity with cloud technologies, providers (such as GCP, AWS, Azure) Familiarity with attack surface management is a plus Experience in customer-facing roles (internal or More ❯
Proven experience as a Cybersecurity Specialist or in a similar role within IT security ️ Strong knowledge of cybersecurity principles, threat intelligence, andsecurity controls ️ Experience with security tools (e.g., SIEM, firewalls, EDR, VPN, DLP) and vulnerability management ️ Solid understanding of regulatory frameworks and industry standards (e.g., GDPR, NIST, ISO 27001) ️ Certifications such as CISSP, CISM, CompTIA Security+, or CEH are More ❯
with complicated security-related concepts to technical and non-technical audiences. Proficient in the use of PowerBI or a similar dashboarding application. Knowledge of security systems (including working with SIEM data). SQL or database knowledge would be desirable. Relevant certifications such as CISSP, CISM, or CRISC (or equivalent) are preferred. Proven experience in managing and delivering technical projects andMore ❯
St. Albans, Hertfordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
with complicated security-related concepts to technical and non-technical audiences. Proficient in the use of PowerBI or a similar dashboarding application. Knowledge of security systems (including working with SIEM data). SQL or database knowledge would be desirable. Relevant certifications such as CISSP, CISM, or CRISC (or equivalent) are preferred. Proven experience in managing and delivering technical projects andMore ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
with complicated security-related concepts to technical and non-technical audiences. Proficient in the use of PowerBI or a similar dashboarding application. Knowledge of security systems (including working with SIEM data). SQL or database knowledge would be desirable. Relevant certifications such as CISSP, CISM, or CRISC (or equivalent) are preferred. Proven experience in managing and delivering technical projects andMore ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
with complicated security-related concepts to technical and non-technical audiences. Proficient in the use of PowerBI or a similar dashboarding application. Knowledge of security systems (including working with SIEM data). SQL or database knowledge would be desirable. Relevant certifications such as CISSP, CISM, or CRISC (or equivalent) are preferred. Proven experience in managing and delivering technical projects andMore ❯
CK, and Kill Chain methodologies. About You: Proven experience in Cyber Security, with a focus on incident response, security monitoring, and threat intelligence. Strong knowledge of security technologies, including SIEM tools, network security, IAM solutions, and DLP tools. Hands-on experience with incident investigation tools and network protocol analysis (e.g., Wireshark). Familiarity with cloud security assessments and industry benchmarks More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Iceberg
CK, and Kill Chain methodologies. About You: Proven experience in Cyber Security, with a focus on incident response, security monitoring, and threat intelligence. Strong knowledge of security technologies, including SIEM tools, network security, IAM solutions, and DLP tools. Hands-on experience with incident investigation tools and network protocol analysis (e.g., Wireshark). Familiarity with cloud security assessments and industry benchmarks More ❯
organizational skills Willingness to listen, learn and incorporate other ideas into all aspects of the job. MDM, Cloud APIs, Strong Networking concepts, Network Architecture Experience, Load Balancing Technologies andSIEM Excellent knowledge and prior experience selling network security technologies including but not limited to: Web Proxies/Secure Web Gateways, NG Firewalls, SSL/IPSec, SSO, DLP, CASB gateways andMore ❯
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
EDF Energy
technical guidance during investigations using alert data and logs. Respond to incidents promptly, investigate thoroughly, and mitigate risks effectively. Maintain and update incident response playbooks. Analyse data from logs, SIEM, and forensics; produce detailed reports and liaise with SecOps and SOAR teams. Lead incident reporting efforts and ensure templates and processes are current. Act as the key expert in cyber More ❯
you. Day to day responsibilities Lead threat detection and incident response across modern security platforms Monitor and analyse alerts from EDR/XDR platforms, cloud services (M365, AWS, Azure), SIEM systems and more. Manage and optimise security tools and detection rules. Create and deliver comprehensive client security reports. Respond to and analyse cyber incidents at all severity levels. Implement andMore ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Hamilton Barnes Associates Limited
and log management. Experience analysing log data and network security events. Desirable Skills: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst certification. Familiarity with additional SIEM tools such as QRadar. DV Clearance Eligibility Benefits: 25 days annual leave, with the option to purchase more Health cash plan Life assurance Pension scheme Generous flexible benefits fund Salary More ❯
Staying ahead of the curve on emerging threats, tactics, and techniques To secure this SOC role: Proven experience in a Security Operations Centre (SOC) environment Hands-on knowledge of SIEM tools (Microsoft Sentinel, Splunk, etc.) Familiarity with MITRE ATT&CK and threat detection methodologies Strong analytical mindset with log, endpoint, and network analysis skills Understanding of network protocols (TCP/ More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Reed Technology
including line management or team leadership . In-depth knowledge of ISO27001, GDPR, FCA SYSC, PCI DSS and other regulatory/compliance frameworks. Hands-on experience with security technologies: SIEM, IAM, vulnerability assessment, endpoint protection, cloud services (AWS, SaaS, IaaS) . Strong communication skills and stakeholder management abilities. Experience in incident response and enterprise risk reporting. Professional certifications such as More ❯
vulnerabilities. What We're Looking For Strong knowledge of audit & compliance frameworks (ISO 27001, Cyber Essentials, GDPR, DORA). Experience with CSOC tools such as Rapid7 InsightIDR or other SIEM solutions. Hands-on experience with internal/external audits and compliance assessments. Relevant security/audit certifications (CISA, CISM, CISSP, ISO 27001 Lead Auditor, Cyber Essentials Assessor, or equivalent). More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Spectrum IT Recruitment
vulnerabilities. What We're Looking For Strong knowledge of audit & compliance frameworks (ISO 27001, Cyber Essentials, GDPR, DORA). Experience with CSOC tools such as Rapid7 InsightIDR or other SIEM solutions. Hands-on experience with internal/external audits and compliance assessments. Relevant security/audit certifications (CISA, CISM, CISSP, ISO 27001 Lead Auditor, Cyber Essentials Assessor, or equivalent). More ❯
effectively communicate information internally and to customers Facilitate root cause investigations and manage the implementation of corrective and preventative measures Qualifications Previous experience with Endpoint Security software is required SIEM experience, including - Deep understanding of how SIEMs works Experience in creating custom collections and data parsing Experience in creating complex correlation rules, reports and dashboard Experience in integration and implementation More ❯
Bristol, Somerset, United Kingdom Hybrid / WFH Options
Bangura Solutions
requirements. Owning threat and vulnerability Management. Identifying, addressing current and emerging security threats and vulnerabilities. Researching, evaluating, and recommending security technologies, tools (eg, Firewalls, VPNs, IDS/IPS, EDR, SIEM, SOAR), and solutions to mitigate identified threats and address security needs. Key experience required Deep understanding of computer systems, networking, and cybersecurity principles. Hands-on experience with security technologies - Firewalls More ❯
support to the wider Cyber Security Team during incident response Maintain accurate documentation of all actions and resolutions Essential Experience Working knowledge of Microsoft Defender XDR and Microsoft Sentinel SIEM technologies Working knowledge of Microsoft Defender suite including Endpoint Detection and Response Understanding of key Microsoft 365 Cloud Technologies from a threat landscape perspective Essential Certifications SC-200 Microsoft Certified More ❯
a history of reliability and strong decision-making skills due to the trust imparted as an IRM analyst. Proficiency in using security tools and technologies such as Microsoft Sentinel SIEM, EDR and forensic analysis tools. Familiarity with KQL be beneficial for automating tasks and conducting advanced analysis. Beneficial: Understanding of data protection laws, regulations, and compliance requirements (e.g., GDPR, CCPA More ❯