for diverse audiences Ability to adapt to evolving threats and technologies Experience Extensive security operations experience Prior CIRT team experience Leadership in Security Incident Response Experience with SIEM/SOAR tools Knowledge of threat intelligence, vulnerability management, network security Experience with threat analysis andsecurity alerts Familiarity with frameworks like MITRE ATT&CK, NIST CSF Leadership or strong potential in More ❯
Alexander Mann Solutions - Public Sector Resourcing
of network and host-based telemetry relevant for threat detection Desirable . Azure certifications (SC-200, AZ-500, MS-500) . Experience with LogRhythm SIEM Platform . Knowledge of SOAR tools andautomation (Logic Apps, Sentinel Playbooks) Please be aware that this role can only be worked within the UK and not Overseas. Sellafield Ltd is committed to eliminating discrimination More ❯
London, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
EC2, S3, SQS. Attend technical workshops and represent the project at key meetings such as ADF and TDAs. Represent the project in all technical discussions related to Splunk, onboarding, SOAR, Attack Analyzer, etc. Essential Skills: SIEM engineering and architecture skills, specifically in Splunk SaaS. Experience with delivery lifecycle improvements for Splunk SaaS. Experience in defining SIEM improvements within Cyber Security … etc. Desirable Skills: Public Sector experience. Experience with other SIEM solutions. Experience with multiple cybersecurity technologies. Essential Qualifications: Cloud Security Architecture (CSA) Splunk Cloud Administrator Splunk Enterprise Security Splunk SOAR Administrator Splunk Certified Cybersecurity Defence Analyst Implementing Microsoft Azure Infrastructure Solutions Developing Windows Azure and Web Services Security Information & Event Management (SIEM) JIRA, Confluence, Git Desirable Qualifications: CISSP Ethical Hacking More ❯
London, England, United Kingdom Hybrid / WFH Options
55 Exec Search
hunting , and real-time defence management , guiding and mentoring two junior SOC analysts. The SOC team is deeply committed to leveraging the latest in automationand artificial intelligence, including SOAR platforms, to deliver smarter, faster, and more effective security outcomes. This role provides a unique opportunity to help shape the future of a next-gen SOC environment. This role combines More ❯
London, England, United Kingdom Hybrid / WFH Options
Eduardomolet
of security frameworks, such as NIST, ISO 27001, or similar. Excellent communication skills, with the ability to clearly convey technical details to diverse audiences. Previous experience in SIEM/SOAR within large-scale, complex environments. Familiarity with other security tools and technologies. Desirable Skills Relevant certifications (e.g., CISSP, CEH, Microsoft Certified: Security, Compliance, and Identity Fundamentals) a plus. If you More ❯
R2 Analyst helps maintain a vigilant and proactive defence against evolving cyber threats, enabling the organisation to operate securely and with confidence. Summary Threat Detection and Monitoring: Monitor the SOAR platform for EDR Logs, SIEM Logs, IDS Logs and Managed Intelligence sources. Identify potential threats, vulnerabilities, and indicators of compromise. Initiate escalation procedures to counteract potential threats and vulnerabilities. Ability More ❯
designing or implementing micro segmentation (e.g., Cisco Titration, Illumio, Guardicore) Background in regulated industries like financial services, healthcare, Resources or government Familiarity with DNS-based threat detection, SIEM/SOAR integration, and cloud security access brokers (CASB) Why Join Us at Accenture in This Role? Leadership in Next-Generation Cybersecurity : As a trusted security partner, Accenture leads the way in More ❯
designing or implementing micro segmentation (e.g., Cisco Titration, Illumio, Guardicore) Background in regulated industries like financial services, healthcare, Resources or government Familiarity with DNS-based threat detection, SIEM/SOAR integration, and cloud security access brokers (CASB) Why Join Us at Accenture in This Role? Leadership in Next-Generation Cybersecurity : As a trusted security partner, Accenture leads the way in More ❯
designing or implementing micro segmentation (e.g., Cisco Titration, Illumio, Guardicore) Background in regulated industries like financial services, healthcare, Resources or government Familiarity with DNS-based threat detection, SIEM/SOAR integration, and cloud security access brokers (CASB) Why Join Us at Accenture in This Role? Leadership in Next-Generation Cybersecurity : As a trusted security partner, Accenture leads the way in More ❯
SC-200, PCNSE, Fortinet NSE, CCFR, or Zscaler Certified Expert Background in regulated industries like financial services, healthcare, Resources or government Familiarity with DNS-based threat detection, SIEM/SOAR integration, and cloud security access brokers (CASB) Why Join Us at Accenture in This Role? Leadership in Next-Generation Cybersecurity : As a trusted security partner, Accenture leads the way in More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Queen Square Recruitment
investigation and resolution of high-severity security incidents Conduct proactive threat hunting using Microsoft Sentinel and the Defender suite Develop and fine-tune analytic rules, detection use-cases, andSOAR playbooks Monitor and optimise license consumption across Microsoft security tools Manage log onboarding/offboarding processes across varied sources and environments Drive SOC maturity initiatives, identifying and implementing process improvements … the MITRE ATT&CK framework and threat modeling Solid understanding of Windows, Linux, networking, and endpoint security Skilled in threat intelligence, digital forensics, and advanced incident handling Experience with SOAR platforms andsecurityautomation Excellent written and verbal communication skills Nice to Have Experience in the retail or FMCG sector supporting large-scale SOC environments Background in major incident responseMore ❯
Occasional on-call support for critical incidents. Requirements Proven experience in a cybersecurity and IT infrastructure role. Strong knowledge of Microsoft and Cisco security stack. Familiarity with SIEM/SOAR/XDR platforms and incident response frameworks. Excellent understanding of network security, firewalls, VPNs, ZTA, endpoint protection, phishing and social media platforms. Experience with hybrid environments (on-prem and cloud More ❯
such as ISO 27001, 27002, 27017, and 27108 DESIRABLE SKILLS AND EXPERIENCE CISSP, CISM, CCSP, CRISC, or similar certifications Knowledge of Active Directory, Cryptography, IAM, PKI, server hardening, SIEM, SOAR, and virtualization (VMware) Experience in pre-sales activities and supporting delivery collateral Familiarity with MITRE ATT&CK and ITIL frameworks Who we are: We’re a global business empowering local More ❯
London, England, United Kingdom Hybrid / WFH Options
Bridewell Consulting Limited
identity protection technologies (XDR) for a cloud focused environment. Designing and deploying identity and access management solutions for cloud identity providers. Supporting and designing deployments of cloud SIEM/SOAR technologies in enterprise environments. Assessing and reviewing customer cloud security posture across multiple solutions and technologies. Creating and maintaining technical project documentations such as technical configuration documents or low-level More ❯
CISM, CCSP, CRISC or equivalent experience Good knowledge covering several of the following examples (this list is not exhaustive): AD, Cryptography, End User Computing, IAM, PKI, Server hardening, SIEM, SOAR, virtualisation (VMware) Participate in pre-sales tasks and perform ongoing support of delivery collateral. Familiarity with MITRE ATT&CK Familiarity with ITIL Who we are: We're a business with More ❯
investigations Process/Playbook/Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell Threat modelling and Hunting methodologies More ❯
investigations Process/Playbook/Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell Threat modelling and Hunting methodologies More ❯
cloud and on-premises environments * Lead incident response efforts for security breaches and events, including forensic investigations and root cause analysis * Develop and enhance our SOAR (SecurityOrchestration, AutomationandResponse) capabilities to streamline security operations * Monitor and analyze security logs, alerts, and events using SIEM tools to identify and respond to potential threats * Implement and manage cloud security controls More ❯
Contract Role - SOAR Engineer/Analyst (Google SecOps) - Leeds/Remote - 12 Months Initial - Inside IR35 We are seeking a skilled SOAR Engineer/Analyst responsible for designing, developing, implementing, and maintaining automation playbooks to improve incident response efficiency within the Security Operations Centre utilizing Google SecOps Role Overview: Job Title: SOAR Engineer/Analyst (Google SecOps) Location: Leeds/… s degree in Computer Science, Cybersecurity, or related discipline, or equivalent hands-on experience. 2-5 years of experience in security operations or security engineering. Hands-on experience with SOAR platforms (e.g., Cortex XSOAR, Splunk SOAR, IBM Resilient). Strong familiarity with: Google SecOps/Chronicle Darktrace (AI-based threat detection) CrowdStrike Falcon platform Scripting experience in Python, PowerShell, or … with CI/CD for playbook development and version control (e.g., Git). Familiarity with other SOC tools (e.g., ServiceNow, Jira, Splunk, Elastic, SentinelOne). Security certifications such as: SOAR-specific certifications (e.g., Cortex XSOAR Certified Engineer) CrowdStrike Certified Falcon Responder Google Cybersecurity Certificate General security certs (e.g., CySA+, GCIH, CISSP) Please feel free to contact myself - Daisy Nguyen at More ❯
Contract Role – SOAR Engineer/Analyst (Google SecOps) – Leeds/Remote – 12 Months Initial – Inside IR35 We are seeking a skilled SOAR Engineer/Analyst responsible for designing, developing, implementing, and maintaining automation playbooks to improve incident response efficiency within the Security Operations Centre utilizing Google SecOps Role Overview: Job Title: SOAR Engineer/Analyst (Google SecOps) Location: Leeds/… s degree in Computer Science, Cybersecurity, or related discipline, or equivalent hands-on experience. 2–5 years of experience in security operations or security engineering. Hands-on experience with SOAR platforms (e.g., Cortex XSOAR, Splunk SOAR, IBM Resilient). Strong familiarity with: Google SecOps/Chronicle Darktrace (AI-based threat detection) CrowdStrike Falcon platform Scripting experience in Python, PowerShell, or … with CI/CD for playbook development and version control (e.g., Git). Familiarity with other SOC tools (e.g., ServiceNow, Jira, Splunk, Elastic, SentinelOne). Security certifications such as: SOAR-specific certifications (e.g., Cortex XSOAR Certified Engineer) CrowdStrike Certified Falcon Responder Google Cybersecurity Certificate General security certs (e.g., CySA+, GCIH, CISSP) Please feel free to contact myself – Daisy Nguyen (dnguyen More ❯
external service providers. Collaboration Across Teams: Work across cybersecurity and IT teams to drive integrated security solutions. Security Tool Management: Manage and optimise SOC technologies like SIEM, EDR, andSOAR for effective threat detection. Training and Development: Implement training programs to enhance SOC analysts' technical skills and incident response. Vendor Management: Manage third-party vendors and MSSPs to ensure they More ❯
Windsor, England, United Kingdom Hybrid / WFH Options
Women in Tech UK
Microsoft Azure and AWS. Relevant certifications (e.g., Microsoft SC-200, AWS Certified Cloud Practitioner). Proficiency in network/application protocols and operating systems. Experience with security tools (EDR, SOAR, SIEM). Preferred scripting/programming experience. Knowledge of cyber security legislation and best practices. Preferred experience dealing with incidents in a wide range of environments, including OT and ICS More ❯
information, access logs, and coordinate response activities. Support process improvements and contribute to the ongoing development of the incident response capability. Technical Skills & Experience: Experience conducting investigations using SIEM, SOAR, EDR and similar technologies. Strong knowledge of digital forensic practices, including evidence handling and chain of custody. Familiarity with NIST 800-61 or similar incident response frameworks. Proficient in log More ❯
London, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
and mitigate risks in systems and applications. Lead the design, implementation and optimisation of SIEM solutions (e.g. Splunk, Sentinel). Integrate SIEM systems with other security tools like EDR, SOARand threat intelligence feeds. Skills Extensive experience in Cyber Security, with a significant portion in a leadership role. A background in SOC engineering tools combined with expertise in either cloud More ❯
London, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
of security frameworks, such as NIST, ISO 27001, or similar. Excellent communication skills, with the ability to clearly convey technical details to diverse audiences. Previous experience in SIEM/SOAR within large-scale, complex environments. Familiarity with other security tools and technologies. Desirable Skills: Relevant certifications (e.g., CISSP, CEH, Microsoft Certified: Security, Compliance, and Fundamentals) a plus. If you are More ❯