efficiently as the team grows. You’ll be: Building, integrating, and optimising SIEM pipelines and data sources Developing and maintaining runbooks, playbooks, and automation workflows Supporting SOC Analysts with detection, triage, and response activities Working with CrowdStrike LogScale (Humio) to fine-tune alerting and detection logic Driving low MTTD and MTTR through innovation and continuous improvement About You … cause. You’ll bring: Strong scripting skills (Python, PowerShell, or Bash) Experience with KQL or similar query languages Hands-on experience with CrowdStrike, SIEM, or EDR tooling Exposure to threatdetection, log ingestion, and alert optimisation Excellent analytical thinking and initiative — you don’t wait to be told what to fix Why Join Be part of a greenfield More ❯
security monitoring platform, ensuring optimal performance, scalability, and integration with security tools. Participate in infrastructure projects to develop, plan, and implement solutions for security monitoring. Design, implement, and maintain detection rulesets. Scope, plan, and track log integrations. Guide, develop, and grow the SIEM Engineering team. Collaborate with the wider ThreatDetection & Response team to ensure the SIEM More ❯
security monitoring platform, ensuring optimal performance, scalability, and integration with security tools. Participate in infrastructure projects to develop, plan, and implement solutions for security monitoring. Design, implement, and maintain detection rulesets. Scope, plan, and track log integrations. Guide, develop, and grow the SIEM Engineering team. Collaborate with the wider ThreatDetection & Response team to ensure the SIEM More ❯
Employment Type: Contract
Rate: From £350 to £400 per day Contract (InsideIR35)
Birmingham, West Midlands, West Midlands (County), United Kingdom
Experis
the build and configuration of the solution in a secure enterprise environment. Required Skills & Experience: * Proven experience architecting and deploying SentinelOne in enterprise environments. * Strong understanding of endpoint protection, threatdetection, and response capabilities. * Experience with on-prem infrastructure on virtualized platform , networking, and storage. * Ability to produce HLDs and LLDs with clarity and precision. * Excellent communication and More ❯
in implementing security controls, mitigating risk and contributing to the continuous improvement of the company's overall security posture. Responsibilities: * Monitor security tools including SIEM (QRadar) and respond to threatdetection alerts * Triage, analyse and prioritise security (via ServiceNow) * Investigate root causes of security issues and design effective remediation solutions * Oversee Patch Management * Conduct vulnerability scans with Qualys More ❯
NHS Bristol, North Somerset and South Gloucestershire Integrated Care Board
The postholder will: Lead and oversee the operation, maintenance, and performance of the SWSDE platform, ensuring security, stability, and scalability at all times. Manage and monitor system security , including threatdetection, risk management, and incident response, ensuring compliance with SATRE, ISO27001, DSPT, and NHS cybersecurity frameworks. Develop and maintain secure data pipelines from contributing NHS and partner organisations More ❯
in a hosting provider or managed service provider environment Strong working knowledge of ISO 27001, ISO 27017, ISO 27018, and ISO 22301 Hands-on experience with scanning and vulnerability detection applications Hands-on experience of Real time threatdetection software Ability to analyze and explain exploitability of vulnerabilities, including attack vectors, prerequisites, and mitigations Skilled in producing More ❯
This includes onboarding log sources, developing analytical rules, creating automation for triage and remediation, and integrating with other IT and Operational Technology platforms. You will collaborate with the wider ThreatDetection and Response team to ensure the SIEM platform meets their day-to-day needs and provide support during incidents as necessary. Key Responsibilities of the SIEM Engineer … the security monitoring platform, ensuring it meets the company's evolving security requirements. Participate in infrastructure projects to plan and implement solutions for security monitoring. Design, implement, and maintain detection rulesets to identify and respond to security threats. Scope, plan, and track log integrations to enhance the SIEM platform's capabilities. Guide, develop, and grow the SIEM Engineering team More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Context Recruitment Limited
supporting risk mitigation and contributing to the continual improvement of the business's security composure. Responsibilities: * Provide expertise on application, network and infrastructure security * Monitor security solutions including SIEM, threatdetection and data security, endpoint protection, network analytics for alerts * Provide documentation for technical standards to meet corporate security policies/industry best practice * Perform security reviews, identify More ❯
support IT security projects, ensuring secure, timely, and effective project delivery. The client would like someone with NIST and Cyber Essentials. Strong knowledge of network security, endpoint protection, and threatdetection/protection. Always staying one step ahead, investigating cybersecurity tools to ensure strong, up-to-date defences across on-prem, cloud AWS and SaaS environments. The role More ❯
alignment with Zero Trust security principles. Provide consulting-level guidance on IAM adoption, migration from legacy platforms, and application onboarding. Drive proactive use of Microsoft Defender for Identity for threatdetection and identity-based risk management. Partner with security leadership to ensure compliance with audit, regulatory, and governance requirements. Serve as enterprise escalation point for identity-related issues More ❯
University Hospitals Bristol and Weston NHS Foundation Trust (UHBW)
equivalent)/CISA/CISSP/CISM Desirable Other Informatics, Cyber, Data Protection qualification Knowledge Essential Ability to guide and provide assurance over the effectiveness of security controls, including threatdetection, vulnerability management, incident response, and overall organisational cyber resilience. Desirable Mature understanding of NHS and public sector digital risk profile and audit principles and practice. Experience Essential More ❯
Windows Administration is required to automate system tasks and maintain cross-platform stability. The role also involves integrating and managing SecOps tooling , implementing and tuning EDR solutions for advanced threatdetection and response, and leveraging log aggregators to centralise and analyse system and security data. This position demands a proactive engineer who can enhance platform security, streamline operations More ❯
looking for someone who lives and breathes Security, whilst you do not have to be highly technical, you do need to have a strong understanding of cyber security, risk, threatdetection and the infrastructure that comes with it. You ll also need to be great at building partnerships whether that be currently in a vendor alliance role, or More ❯
looking for someone who lives and breathes Security, whilst you do not have to be highly technical, you do need to have a strong understanding of cyber security, risk, threatdetection and the infrastructure that comes with it. You'll also need to be great at building partnerships whether that be currently in a vendor alliance role, or More ❯
successful Staff Security Engineer - Security Data Specialist at OVO if you Data automation and AI-enablement: Designs and implements robust automation and AI augmentation frameworks and tools (e.g. for threatdetection, security finding and incident remediation and risk operations). Automates security playbooks , policies and guardrails in workflows, CI/CD and/or the IDE. Secure development More ❯
scale environments, offering exposure to varied client infrastructures, advanced tooling, and complex security challenges. You’ll play a key part in maturing the security function—leading incident investigations, enhancing threat visibility, and mentoring the next generation of analysts—while continuously developing your skills with funded training and certification pathways. What You’ll Do Lead and investigate high-impact cyber … beyond dashboards to build detections, correlations, and meaningful insights. Experience centralising log sources and onboarding new tools and data feeds into a SIEM/SOAR platform. Strong understanding of threat hunting methodologies, vulnerability management, and incident response. Knowledge of frameworks: ISO27001, NIST CSF, SOC2, Cyber Essentials Plus. Comfortable adapting to unfamiliar tooling and integrating new technologies quickly. Why Join … at the cutting edge of security in a global MSP with enterprise clients and complex estates. Move beyond “keeping the lights on” — contribute to strategy, tooling improvement, and advanced threat detection. Career pathways into senior engineering, incident response leadership, or architecture roles. Ongoing funded training and certification investment. Opportunity to cross-train into wider InfoSec disciplines including GRC, Zero More ❯
Gloucester, England, United Kingdom Hybrid/Remote Options
Anson McCade
of the latest technologies to create large sets of data, which can be efficiently processed to provide actionable intelligence. • Candidates will be working with Big Data, innovative security and threatdetection systems in turn contributing to the system design and development decisions, which affect the integration of both future and existing systems. • The ideal software developer will be More ❯
Gloucestershire, England, United Kingdom Hybrid/Remote Options
Anson McCade
of the latest technologies to create large sets of data, which can be efficiently processed to provide actionable intelligence. • Candidates will be working with Big Data, innovative security and threatdetection systems in turn contributing to the system design and development decisions, which affect the integration of both future and existing systems. • The ideal software developer will be More ❯