Coedkernew, Newport, Gwent, Wales, United Kingdom Hybrid / WFH Options
Sopra Steria
excellence. Ensure practices meet Cyber Essentials Plus and ISO 27001 requirements, supporting audits and certification. Identify gaps, implement enhancements, and drive automation for continuous improvement. Integrate Tenable tools with SIEM, CMDB, and ticketing systems to streamline workflows. Serve as SME in vulnerability management for incident response, risk assessments, and architecture reviews. Represent the function in cross-functional forums, steering committees More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
VirusTotal, Shodan, and Domain tools Experience using industry-standard digital forensics tools and procedures Experience with computer programming languages, including PHP, Python, SQL, C++, Perl, or Java Experience with SIEMand Endpoint tools, including Splunk, Defender, QRadar, and ArcSight Experience with penetration testing TS/SCI clearance with a polygraph CEH and Security+ or CSA+ Certification, and GIAC Cyber Threat More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Langley James Limited
maintain robust security across their infrastructure. Key responsibilities include managing MaiServers, Firewalls and Micorsoft Gateways. You will be involved in Managing WAF/DDoS, web/email security gateways, SIEM/SOAR/EDR (alert response), firewalls, MFA/SSO, MDM/MAM, vulnerability scans/remediation, security certificates, IDS/IPS, PAM, and deliver security awareness training. Remediate penetration More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
degree in Cybersecurity, Information Technology, Computer Science, or a related field. •Basic knowledge of cybersecurity principles, including threat detection, risk management, and incident response. •Familiarity with security tools like SIEM systems, firewalls, or endpoint protection is a plus. •Strong analytical and problem-solving skills. •Excellent communication skills with the ability to explain technical concepts to non-technical audiences. •A proactive More ❯
escalated incidents and mentor junior engineers. Implement and maintain container platforms (Docker, Kubernetes) and automation frameworks (Terraform, Ansible, CI/CD). Apply advanced security practices including zero-trust, SIEM integration and EDR. Prepare and maintain technical documentation, policies, and procedures. Support enterprise backup, disaster recovery and business continuity capabilities. Contribute to change management, incident management, and occasional out-of More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Precise Placements
escalated incidents and mentor junior engineers. Implement and maintain container platforms (Docker, Kubernetes) and automation frameworks (Terraform, Ansible, CI/CD). Apply advanced security practices including zero-trust, SIEM integration and EDR. Prepare and maintain technical documentation, policies, and procedures. Support enterprise backup, disaster recovery and business continuity capabilities. Contribute to change management, incident management, and occasional out-of More ❯
Cambridge, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
REDTECH RECRUIT
Experience with ISO27001 and compliance frameworks Scripting and coding skills (e.g., Python, PowerShell, Bash) Exposure to CI/CD, Infrastructure as Code (IaC), and Azure DevOps pipelines Experience with SIEM platforms (ideally Azure Sentinel) and EDR tooling We would love to see experience or interest in DevSecOps practices Strong problem-solving ability with a pragmatic and collaborative approach Responsibilities for … Cloud Security Engineer/Security Operations Engineer/SOC Engineer/InfoSec Engineer/Infrastructure Security/DevSecOps Engineer/Security Automation/Threat Detection/Threat Intelligence/SIEM/Azure Sentinel/Microsoft Defender/Endpoint Security/PowerShell/Python/Bash/Azure DevOps/Infrastructure as Code/CI/CD/Network Security/ More ❯
/solution architecture or a technical cyber role Solid grasp of Zero Trust, Defence in Depth, and Secure by Design principles Hands-on knowledge of tools like HashiCorp Vault, SIEM platforms, and endpoint protection Experience in regulated sectors (MOD preferred) and familiarity with Azure security Certifications (desirable): CISSP, CISM, CCSP, TOGAF, SABSA, ArchiMate What's on offer? Competitive salary up More ❯
Huntingdon, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
AS environments Technology skills/Experience Understanding of principles of network and boundary protection technologies (firewalls, mail gateways, load balancers, antivirus, IPS, IDS, Diodes) Understanding of Protective Monitoring systems (SIEM/SOC) and the principles of their deployment. Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc) Understanding of encryption and protocols and structures in support of deployment, e.g. More ❯
AS environments Technology skills/Experience Understanding of principles of network and boundary protection technologies (firewalls, mail gateways, load balancers, antivirus, IPS, IDS, Diodes) Understanding of Protective Monitoring systems (SIEM/SOC) and the principles of their deployment. Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc) Understanding of encryption and protocols and structures in support of deployment, e.g. More ❯
cambridge, east anglia, united kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
AS environments Technology skills/Experience Understanding of principles of network and boundary protection technologies (firewalls, mail gateways, load balancers, antivirus, IPS, IDS, Diodes) Understanding of Protective Monitoring systems (SIEM/SOC) and the principles of their deployment. Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc) Understanding of encryption and protocols and structures in support of deployment, e.g. More ❯
huntingdonshire, east anglia, united kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
AS environments Technology skills/Experience Understanding of principles of network and boundary protection technologies (firewalls, mail gateways, load balancers, antivirus, IPS, IDS, Diodes) Understanding of Protective Monitoring systems (SIEM/SOC) and the principles of their deployment. Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc) Understanding of encryption and protocols and structures in support of deployment, e.g. More ❯
Wall, Hexham, Northumberland, England, United Kingdom Hybrid / WFH Options
Goodman Masson
organisation. The role also includes conducting vulnerability assessments, supporting audits, and helping to strengthen third-party security compliance. Key Responsibilities: Monitor security systems and investigate incidents Operate firewalls, EDR, SIEM tools, and encryption software Support vulnerability testing and risk analysis Assist with third-party vendor assessments and internal audits Contribute to the ongoing improvement of security processes What We’re More ❯
in forming collaborative working relationships with customers and other internal stakeholders. Confidence in effectively communicating technical incidents or security threats to non-technical stakeholders. Previous experience of working with SIEMand log monitoring tools. SC-200, SC-900 or equivalent certification would be beneficial but not essential. To be considered for this role, you must be UK based and eligible More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
Microsoft Security Operations Analyst certification. Experience: Demonstrated experience in responding to cyber security threats. Proficiency in the use of antivirus technologies. Experience with Endpoint Detection & Response solutions. Familiarity with SIEM platforms. Skills: Awareness of vulnerabilities andsecurity standards. Knowledge of HMG Security Standards and Processes. Ability to balance business needs with technical andsecurity standards. Attributes: Commercial awareness. Familiarity with More ❯
Washington, Washington DC, United States Hybrid / WFH Options
OMW Consulting
in Washington, D.C. You must have an active Secret clearance or higher and a solid background in informationsecurity fundamentals and core technologies (e.g., authentication, encryption, firewalls, vulnerability scanning, SIEM/SOAR, audit logs). Your main responsibilities in this position will include: Achieving ATOs for the company's software across multiple government customers with minimal oversight. Providing outstanding customer More ❯
in a managerial role; You are certified (e.g., CISM, CISSP) and have knowledge of ISO 27001 and ISAE 3402; You are familiar with security technologies such as XDR, EDR, SIEM, NAC, IDS/IPS, and SASE; You have experience with incident response, risk assessment, andsecurity policy development; You have excellent command of both Dutch and English, in spoken andMore ❯
Management frameworks, Security incident analysis, digital forensics, crisis management, SOC operations and supporting tools Strong knowledge and practical experience of cyber security platforms/tooling including IDS/IPS, SIEM, EDR/MDR, and system/device hardening would be advantageous. Also, during your professional experience you will have gained experience in an OT/IT or electronics engineering/ More ❯
North West London, London, United Kingdom Hybrid / WFH Options
British Heart Foundation
Storage Management (physical SAN and software-defined) With practical experience of securing and hardening platforms, as well as experience of using vulnerability management systems, youll also have exposure to SIEM/XDR/MDR systems and knowledge and practical experience of Service Management tools (Manage Engine). Youll have significant experience of implementing and supporting Infrastructure technology solutions, as well More ❯
requirements. Excellent communication and stakeholder management skills. Comfortable working in a fast-paced, iterative, and agile environment. Preferred Experience: Solid understanding of cyber security concepts such as threat detection, SIEM, anomaly detection, and incident response. Experience with tools for tracking ML models in production (e.g., MLflow). We encourage you to apply even if your experience is not a More ❯
assurance. Knowledge of frameworks and standards such as ISO 27001, GDPR/DPA, and risk management methodologies. Experience with a broad range of security tools and technologies (vulnerability scanning, SIEM, authentication/authorisation, firewalls, DLP, cloud, networking etc). Excellent communication skills – able to present findings and influence stakeholders. Security qualifications such as CISSP, CISM or ISO 27001 Lead Auditor More ❯
contribution to the design of the preliminary and detailed designs of the solution: it includes the study of alternatives and a risk assessmentConsult on potential security components architectures (e.g. SIEM, IAM, gateways, detection and deception capabilities )Evaluate architectures against Business Line policy and major cyber security standards & regulation frameworks (NIST, ISO, JSP, etc.)Produce justification for architectural choicesEnsure technical coordination More ❯
Washington, Washington DC, United States Hybrid / WFH Options
OMW Consulting
in Washington, D.C. You must have an active Secret clearance or higher and a solid background in informationsecurity fundamentals and core technologies (e.g., authentication, encryption, firewalls, vulnerability scanning, SIEM/SOAR, audit logs). Your main responsibilities in this position will include: Achieving ATOs for the company's software across multiple government customers with minimal oversight. Providing outstanding customer More ❯
end to end network infrastructure automation capabilities. Proficiency in configuring, managing, and troubleshooting Firewalls. Cisco, Palo Alto etc. Experience with intrusion detection/prevention systems, as well as with SIEM tools andsecurity incident response. Design and implement secure network architectures, including Firewalls, intrusion detection/prevention systems, and encryption technologies. Be able to communicate to technical and non-technical More ❯