Terraform, Ansible). Proficiency in CI/CD tools (GitHub Actions, Jenkins, CircleCI). Solid understanding of Linux systems and scripting (Bash, PowerShell, Python). Familiarity with security principles , SIEM/SOC tools, or incident response. Knowledge of networking fundamentals and APIs. Excellent problem-solving and communication skills. Nice to Have Experience with containerization (Docker, Kubernetes). Exposure to monitoring More ❯
Terraform, Ansible). Proficiency in CI/CD tools (GitHub Actions, Jenkins, CircleCI). Solid understanding of Linux systems and scripting (Bash, PowerShell, Python). Familiarity with security principles , SIEM/SOC tools, or incident response. Knowledge of networking fundamentals and APIs. Excellent problem-solving and communication skills. Nice to Have Experience with containerization (Docker, Kubernetes). Exposure to monitoring More ❯
if you had: Programming and scripting such as Python, Perl, Bash, PowerShell, C++. CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar. If you are interested in this role but not sure if your skills and experience are exactly what we’re More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Picture More
initiatives. About You Minimum 5 years’ experience in informationsecurity within a global enterprise environment . Strong knowledge of cloud and network security (Azure, O365). Experienced in DLP, SIEM, and incident response processes. Familiar with ISO 27001/27002 and governance frameworks. CISSP or CEH certification preferred. Excellent communication, stakeholder management, and documentation skills. Why Join? You’ll be More ❯
Birmingham, West Midlands, England, United Kingdom
Robert Walters
Automated security monitoring Lead third-party risk management & vendor security programmes Experience of DevSecOps practises and SDLC Design/Implement security frameworks - ISO 27001, NIST Hands-on experience of SIEM, DLP, IAM, Endpoint Technology The permanent opportunity for a InformationSecurity Manager, will pay a salary up to £85,000 with bonus, based out of the central Birmingham offices - one More ❯
services strongly preferred). Expertise in IAM technologies (SailPoint, Okta, Azure AD, CyberArk, Ping Identity), DLP platforms (Symantec, Microsoft Purview, Forcepoint, Digital Guardian), andsecurity engineering tools (EDR, CSPM, SIEM, SOAR, vulnerability management). Strong knowledge of Zero Trust, data protection regulations (GDPR, FCA, PRA), cloud-native security, and DevSecOps practices. Exceptional leadership, communication, and stakeholder engagement skills, with the More ❯
Aberdeen, City of Aberdeen, United Kingdom Hybrid/Remote Options
Hays Technology
owning or implementing a strategy * Strong communication skills * A technical IT background with a good understanding of networking, communication protocols and cloud technologies. * A technical security foundation of utilising SIEM, EDR and vulnerability management tools to facilitate your engagements with the organisation's MSSP What's on Offer * Up to £76,000 per annum * Flexible and hybrid working - 40% of More ❯
Employment Type: Permanent
Salary: £65000 - £79000/annum Up to £76,000 + 28% employer pension
Aberdeen, Aberdeenshire, Scotland, United Kingdom Hybrid/Remote Options
Hays Specialist Recruitment Limited
owning or implementing a strategy * Strong communication skills* A technical IT background with a good understanding of networking, communication protocols and cloud technologies.* A technical security foundation of utilising SIEM, EDR and vulnerability management tools to facilitate your engagements with the organisation's MSSP What's on Offer * Up to £76,000 per annum* Flexible and hybrid working - 40% of More ❯
in collaboration with technology teams. Respond to incidents alongside the Head of InformationSecurity Work with the MSSP across incident response and proactive monitoring. Maintain and optimise Microsoft Sentinel SIEM, XDR/MDR/EDR solutions, and supporting tools. Track deployment and health of all security products across the business. Stay ahead of emerging threats and evolving technologies. What We More ❯
in collaboration with technology teams. Respond to incidents alongside the Head of InformationSecurity Work with the MSSP across incident response and proactive monitoring. Maintain and optimise Microsoft Sentinel SIEM, XDR/MDR/EDR solutions, and supporting tools. Track deployment and health of all security products across the business. Stay ahead of emerging threats and evolving technologies. What We More ❯
internal and external security assessments and audits - Update and maintain incident response plans, playbooks, and procedures - Provide 3rd-line support to IT colleagues and the wider business Technical Skills: - SIEMand SOAR platforms - Log analytics, rule creation, tuning, and threat hunting - Familiarity with security frameworks - Azure and M365 security configuration and alert investigation - Dashboards and visualisation tools - Firewalls (CheckPoint, VMware More ❯
with internal and external security assessments and audits- Update and maintain incident response plans, playbooks, and procedures- Provide 3rd-line support to IT colleagues and the wider businessTechnical Skills:- SIEMand SOAR platforms- Log analytics, rule creation, tuning, and threat hunting- Familiarity with security frameworks- Azure and M365 security configuration and alert investigation- Dashboards and visualisation tools- Firewalls (CheckPoint, VMware More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Career Legal
DDoS protection, and encryption. Mentor junior engineers, elevate best practices, and help us on our journey to ISO 27001 certification. What You Bring Deep hands-on expertise across EDR, SIEM, NAC, MFA, PAM, and cloud security environments. Proven experience with security frameworks such as ISO 27001, NIST, CIS, and PCI-DSS. Certifications like CISSP, CPSA, or Palo Alto Certified SecurityMore ❯
Southampton, Hampshire, England, United Kingdom Hybrid/Remote Options
Proactive Appointments
day-to-day operations of the Counter Threat Unit, ensuring security controls are effectively implemented across infrastructure and cloud environments. Configure, maintain, and optimise security tools and solutions (e.g., SIEM, EDR )to protect enterprise systems. Monitor systems and networks for anomalies, gather and analyse threat intelligence, and contribute to situational awareness. Skills and experience: Minimum 4 years’ experience within IT More ❯
technical guidance and training to end users and internal teams on security best practices. Support the installation and configuration of security software and hardware, including firewalls, endpoint protection, andSIEM tools. Ensure compliance with relevant standards and frameworks (e.g., ISO 27001, Cyber Essentials). Mentor and support the growth of aspiring cyber security professionals within the team. Work with 3rdparty More ❯
Incident Response: Oversee the day-to-day operation of security systems and tools, including firewalls, intrusion detection/prevention systems (IDS/IPS), antivirus, anti-malware, SIEM (SecurityInformationandEventManagement), vulnerability scanners, and data encryption solutions. Manage vulnerability management programs, including regular scanning, penetration testing, and remediation of identified weaknesses. Lead and manage security incident response, including detection … creating Cyber Security roadmaps. Strong understanding of informationsecurity principles, frameworks (e.g., ISO 27001, NIST, Cyber Essentials), and best practices. Hands-on experience with security technologies such as firewalls, SIEM, IDS/IPS, vulnerability scanners, endpoint detection and response (EDR), and identity management solutions. Experience with cloud security (e.g., Azure Security). Proven experience in managing security incidents and conducting More ❯
knowledge of network protocols (TCP/IP) andsecurity practices (IPSec, SSL-VPN, NAT, GRE) Hands-on experience with cloud infrastructure operations and troubleshooting customer tech stacks. Familiarity with SIEM tools, vulnerability management, malware analysis, and firewall configurations Ability to communicate complex technical solutions to a wide range of audiences, both technical and non-technical Skilled in Python, JSON, YAML More ❯
malware analysis and reverse engineering. Scripting/programming skills (Python, Bash, PowerShell, etc.). Relevant certifications (e.g., CREST Practitioner Intrusion Analyst, Blue Team Level 1). Exposure to other SIEM platforms like QRadar. Additional Info: Permanent role with a generous benefits package including 25 days annual leave (plus buy/sell options), pension, life assurance, health cash plan, and a More ❯
defence capability. Please note the on-call rota is every 1 in 6 weeks. Responsibilities Cyber Defence authority for real-time monitoring of Element's security platforms such as SIEMand Extended Detection and Response (XDR) Prompt analysis and triage of alerts andsecurity events. Support the Incident Response (IR) team to report potential or actual incidents Conduct proactive Threat More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Experis
prem infrastructure on virtualized platform , networking, and storage. * Ability to produce HLDs and LLDs with clarity and precision. * Excellent communication and stakeholder engagement skills. * Involved with integrating SentinelOne with SIEM/SOAR platforms (e.g., Splunk) and deployment to Windows and RHEL endpoints. Preferred Qualifications: * SentinelOne certifications (e.g., SentinelOne Certified Architect or equivalent). * Scripting knowledge (e.g., PowerShell, Python) for automation More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid/Remote Options
Cathcart Technology
Azure and Microsoft 365 security tooling and cloud security principles. ** Strong understanding of frameworks such as ISO 27001, NIST, and the Well Architected Framework. ** Experience with technologies such as SIEM, DLP, IAM, EDR, WAF, and SASE. ** Ability to communicate complex technical concepts to both technical and non technical audiences. ** Relevant certifications (CISA, CISM, SABSA, TOGAF or similar) are advantageous. Why More ❯
Infrastructure-as-Code (e.g., ARM, Bicep, Terraform). • Experience implementing zero-trust architectures and identity-driven security models. • Knowledge of monitoring platforms such as Azure Monitor, Sentinel, or enterprise SIEM/SOAR tools. • Experience with backup, DR, and business continuity solutions. • Certification in Microsoft, Azure, or ITIL. Personal Attributes • Clear communicator with the ability to translate technical issues into business More ❯