flow, analysing threat data, and playing a key role in improving detection and response processes. You’ll be working across platforms like: Elastic SIEM Microsoft Sentinel Defender for Endpoint CrowdStrike Falcon MISP (Malware Information Sharing Platform) As the team scales, this role offers both strategic involvement and technical depth. There’s also the option to step into a management … happened, but why, how, and how to prevent it Comfortable being an escalation point for technical and analytical issues Working knowledge of key SIEM and EDR platforms (Elastic, Sentinel, CrowdStrike, etc.) Natural curiosity and willingness to get hands-on with data and investigations Broad exposure across cyber domains beyond pure SOC is highly valued Why This Role? Be a More ❯
flow, analysing threat data, and playing a key role in improving detection and response processes. You’ll be working across platforms like: Elastic SIEM Microsoft Sentinel Defender for Endpoint CrowdStrike Falcon MISP (Malware Information Sharing Platform) As the team scales, this role offers both strategic involvement and technical depth. There’s also the option to step into a management … happened, but why, how, and how to prevent it Comfortable being an escalation point for technical and analytical issues Working knowledge of key SIEM and EDR platforms (Elastic, Sentinel, CrowdStrike, etc.) Natural curiosity and willingness to get hands-on with data and investigations Broad exposure across cyber domains beyond pure SOC is highly valued Why This Role? Be a More ❯
flow, analysing threat data, and playing a key role in improving detection and response processes. You’ll be working across platforms like: Elastic SIEM Microsoft Sentinel Defender for Endpoint CrowdStrike Falcon MISP (Malware Information Sharing Platform) As the team scales, this role offers both strategic involvement and technical depth. There’s also the option to step into a management … happened, but why, how, and how to prevent it Comfortable being an escalation point for technical and analytical issues Working knowledge of key SIEM and EDR platforms (Elastic, Sentinel, CrowdStrike, etc.) Natural curiosity and willingness to get hands-on with data and investigations Broad exposure across cyber domains beyond pure SOC is highly valued Why This Role? Be a More ❯
Bury, Greater Manchester, United Kingdom Hybrid / WFH Options
Sanderson Government & Defence
flow, analysing threat data, and playing a key role in improving detection and response processes. You’ll be working across platforms like: Elastic SIEM Microsoft Sentinel Defender for Endpoint CrowdStrike Falcon MISP (Malware Information Sharing Platform) As the team scales, this role offers both strategic involvement and technical depth. There’s also the option to step into a management … happened, but why, how, and how to prevent it Comfortable being an escalation point for technical and analytical issues Working knowledge of key SIEM and EDR platforms (Elastic, Sentinel, CrowdStrike, etc.) Natural curiosity and willingness to get hands-on with data and investigations Broad exposure across cyber domains beyond pure SOC is highly valued Why This Role? Be a More ❯
Leigh, Greater Manchester, United Kingdom Hybrid / WFH Options
Sanderson Government & Defence
flow, analysing threat data, and playing a key role in improving detection and response processes. You’ll be working across platforms like: Elastic SIEM Microsoft Sentinel Defender for Endpoint CrowdStrike Falcon MISP (Malware Information Sharing Platform) As the team scales, this role offers both strategic involvement and technical depth. There’s also the option to step into a management … happened, but why, how, and how to prevent it Comfortable being an escalation point for technical and analytical issues Working knowledge of key SIEM and EDR platforms (Elastic, Sentinel, CrowdStrike, etc.) Natural curiosity and willingness to get hands-on with data and investigations Broad exposure across cyber domains beyond pure SOC is highly valued Why This Role? Be a More ❯
Bolton, Greater Manchester, United Kingdom Hybrid / WFH Options
Sanderson Government & Defence
flow, analysing threat data, and playing a key role in improving detection and response processes. You’ll be working across platforms like: Elastic SIEM Microsoft Sentinel Defender for Endpoint CrowdStrike Falcon MISP (Malware Information Sharing Platform) As the team scales, this role offers both strategic involvement and technical depth. There’s also the option to step into a management … happened, but why, how, and how to prevent it Comfortable being an escalation point for technical and analytical issues Working knowledge of key SIEM and EDR platforms (Elastic, Sentinel, CrowdStrike, etc.) Natural curiosity and willingness to get hands-on with data and investigations Broad exposure across cyber domains beyond pure SOC is highly valued Why This Role? Be a More ❯
Altrincham, Greater Manchester, United Kingdom Hybrid / WFH Options
Sanderson Government & Defence
flow, analysing threat data, and playing a key role in improving detection and response processes. You’ll be working across platforms like: Elastic SIEM Microsoft Sentinel Defender for Endpoint CrowdStrike Falcon MISP (Malware Information Sharing Platform) As the team scales, this role offers both strategic involvement and technical depth. There’s also the option to step into a management … happened, but why, how, and how to prevent it Comfortable being an escalation point for technical and analytical issues Working knowledge of key SIEM and EDR platforms (Elastic, Sentinel, CrowdStrike, etc.) Natural curiosity and willingness to get hands-on with data and investigations Broad exposure across cyber domains beyond pure SOC is highly valued Why This Role? Be a More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Sanderson Government & Defence
flow, analysing threat data, and playing a key role in improving detection and response processes. You’ll be working across platforms like: Elastic SIEM Microsoft Sentinel Defender for Endpoint CrowdStrike Falcon MISP (Malware Information Sharing Platform) As the team scales, this role offers both strategic involvement and technical depth. There’s also the option to step into a management … happened, but why, how, and how to prevent it Comfortable being an escalation point for technical and analytical issues Working knowledge of key SIEM and EDR platforms (Elastic, Sentinel, CrowdStrike, etc.) Natural curiosity and willingness to get hands-on with data and investigations Broad exposure across cyber domains beyond pure SOC is highly valued Why This Role? Be a More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Sanderson Government & Defence
flow, analysing threat data, and playing a key role in improving detection and response processes. You’ll be working across platforms like: Elastic SIEM Microsoft Sentinel Defender for Endpoint CrowdStrike Falcon MISP (Malware Information Sharing Platform) As the team scales, this role offers both strategic involvement and technical depth. There’s also the option to step into a management … happened, but why, how, and how to prevent it Comfortable being an escalation point for technical and analytical issues Working knowledge of key SIEM and EDR platforms (Elastic, Sentinel, CrowdStrike, etc.) Natural curiosity and willingness to get hands-on with data and investigations Broad exposure across cyber domains beyond pure SOC is highly valued Why This Role? Be a More ❯
Ashton-Under-Lyne, Greater Manchester, United Kingdom Hybrid / WFH Options
Sanderson Government & Defence
flow, analysing threat data, and playing a key role in improving detection and response processes. You’ll be working across platforms like: Elastic SIEM Microsoft Sentinel Defender for Endpoint CrowdStrike Falcon MISP (Malware Information Sharing Platform) As the team scales, this role offers both strategic involvement and technical depth. There’s also the option to step into a management … happened, but why, how, and how to prevent it Comfortable being an escalation point for technical and analytical issues Working knowledge of key SIEM and EDR platforms (Elastic, Sentinel, CrowdStrike, etc.) Natural curiosity and willingness to get hands-on with data and investigations Broad exposure across cyber domains beyond pure SOC is highly valued Why This Role? Be a More ❯
days a week in Berkshire This L2 SOC Analyst will have the previous following experience: Monitor and investigate security alerts using tools such as Splunk, Microsoft Defender, and CrowdStrike, escalating incidents as needed and ensuring timely resolution. Leverage Microsoft Co-pilot and automation workflows to streamline threat detection, incident triage, and response processes. Conduct in-depth log analysis and More ❯
grow in a dynamic, successful company. You will need: Excellent knowledge of SIEM tools e.g Microsoft Sentinel, Google Chronicle, or Elastic (preferable). Excellent knowledge of EDR tools e.g CrowdStrike, SentinelOne, Microsoft, Palo Alto (preferable). Strong knowledge of SOAR tools. Experience building and developing a SOC environment. Knowledge of automation and scripting. You will get: Flexible working pattern. More ❯
grow in a dynamic, successful company. You will need: Excellent knowledge of SIEM tools e.g Microsoft Sentinel, Google Chronicle, or Elastic (preferable). Excellent knowledge of EDR tools e.g CrowdStrike, SentinelOne, Microsoft, Palo Alto (preferable). Strong knowledge of SOAR tools. Experience building and developing a SOC environment. Knowledge of automation and scripting. You will get: Flexible working pattern. More ❯
to drive projects forward. Research, procure, deploy, and maintain software and hardware solutions. Collaborate with the Enterprise Security team to monitor, detect, and remediate security threats using tools like CrowdStrike, OPSWAT, and Code42. What You Bring: Strong administration skills in macOS and Windows OS. Proven hardware troubleshooting experience with Apple and Windows devices. Proficiency in JAMF and/or … Intune for mobile device management (MDM). Hands-on experience with Google Workspace, Slack, Active Directory, OPSWAT, CrowdStrike, and Code42. FleetDM experience. Knowledge of IAM, SSO, and MFA. Familiarity with Tines and APIs. Expertise in Google Workspace, Slack, and/or BetterCloud administration. Relevant certifications (MCP, A+, Network+, MCDST, Apple certifications). Education: AS or BS in Information Technology More ❯
Stakeholder Collaboration: Work in partnership with the client representatives and internal teams to ensure all project objectives are met. • Security & Compliance: Enforce industry security standards, utilizing tools like Cloudflare, CrowdStrike, and SonarQube. • DevOps & Infrastructure: Oversee DevOps practices and infrastructure management with AWS, Azure, Docker, and GitHub. • Agile Methodologies: Champion agile practices using tools such as Jira, Confluence, and Slack. … managing large-scale software development projects. • Cloud Proficiency: Extensive experience with cloud-based solutions, particularly AWS and Azure. • Security Savvy: Demonstrated expertise with security and compliance tools including Cloudflare, CrowdStrike, and SonarQube. • Agile & DevOps: Deep understanding and hands-on experience with agile methodologies and DevOps practices. • Strong Communicator: Excellent communication and stakeholder management skills essential for success in a More ❯
Oversee day-to-day operations of Cyber Defence teams (CERT, Security Tooling, Proactive Monitoring), managing advanced incident detection, threat hunting, and forensic investigations using platforms like Splunk, Defender, and CrowdStrike Collaborate with Security Engineering and Architecture to integrate AI/ML (e.g., Microsoft Copilot) and emerging security tech for real-time response, smarter automation, and enhanced endpoint/cloud More ❯
Network/Security Engineer - Contract - Cardiff, South Wales Initial 3 month contract available to assist with the deployment of Crowdstrike Falcon. You will need to be based around the Caerphilly/Cardiff area, as this will require on-site work, up to 3/4 days per week. Experience required; - Knowing the CrowdStrike Falcon Complete platform well is … critical - Hands-on experience deploying CrowdStrike - Previous experience as a Network/Security/Support Analyst/Engineer Interviews can be arranged immediately with a view of starting early June. Please apply via the link below, or email me directly (Joss. Escott @ Roberthalf. co. uk) Network/Security Engineer - Contract - Cardiff, South Wales Robert Half Ltd acts as an More ❯
leveraging tools like Splunk and Defender to contain and mitigate threats Design, maintain, and continuously enhance playbooks, response frameworks, and tabletop exercises, incorporating threat intelligence and detection insights from CrowdStrike and Splunk to mature IR readiness. Lead root cause analysis and develop actionable remediation plans; deliver executive-level reporting and trend analysis using integrated dashboards, combining insights from Splunk More ❯
of the following): Identity Services/IGA: CyberArk (CDE, Cloud and On-Prem deployments highly desirable) SailPoint or equivalent Identity Governance solutions SSE/SASE: zScaler General Security Technologies: CrowdStrike Microsoft security stack Current information for our applicants Business as usual? Not quite. Of course, the Corona crisis also presents us with major challenges. However, we are broadly positioned More ❯