Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Action For Humanity
across Microsoft Azure environments. 3. Security Automation & Incident Response Automate security workflows with Power Automate, Power Apps, and Microsoft Defender XDR. Deploy Microsoft Sentinel (SIEM) for threat detection, log analysis, and incident response. Establish incident response playbooks and conduct forensic investigations when needed. 4. Compliance & Risk Management Ensure adherence to … Security. Skills Deep expertise in Microsoft 365 Security, Entra ID (Azure AD), Microsoft Intune, and Microsoft Defender Suite. Strong knowledge of IAM, MFA, PAM, SIEM (Microsoft Sentinel), andsecurity automation. Experience securing Microsoft Azure environments (Azure Security Center, Azure Policy, Conditional Access). Familiarity with hybrid and multi-cloud securityMore ❯
Herndon, Virginia, United States Hybrid / WFH Options
Marathon TS Inc
Atlassian, or Jenkins • Experience working within an Agile and version-controlled environment, including associated policies and best practices. Preferred Experience: • Design, Implement, and manage SIEM tools. Marathon TS is committed to the development of a creative, diverse and inclusive work environment. In order to provide equal employment and advancement opportunities More ❯
Coventry, England, United Kingdom Hybrid / WFH Options
Lorien
with Microsoft Office for documentation and reporting. Essential Technical Skills: Hands-on expertise in at least one of the following security domains/tools: SIEM EDR/SOAR/AV CNAPP/CSPM SAST/DAST WAFs/Firewalls Vulnerability Scanners Email & Web Gateways Other Information: This role includes participation More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Manchester Digital
an excellent opportunity to work with renowned vendors in the cybersecurity and networking industry. The client values attitude and approach highly. Experience with solutioning SIEM, SOAR, or Managed Security Services is preferred. Hands-on experience with DDoS, WAF, IDAM, EDR, MDM, or Vulnerability Management is a plus. We are also More ❯
security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, securityinformationandeventmanagement (SIEM) systems, and vulnerability assessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS More ❯
security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, securityinformationandeventmanagement (SIEM) systems, and vulnerability assessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, securityinformationandeventmanagement (SIEM) systems, and vulnerability assessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, securityinformationandeventmanagement (SIEM) systems, and vulnerability assessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS More ❯
City, Edinburgh, United Kingdom Hybrid / WFH Options
Deloitte LLP
security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, securityinformationandeventmanagement (SIEM) systems, and vulnerability assessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS More ❯
Strong documentation skills (Microsoft Word, Project, Visio) and a grasp of Enterprise Architecture methods like TOGAF (desirable). Familiarity with secure Internet solutions (firewalls, SIEM), LAN environments, and cloud architectures (public/private) is a plus. Knowledge of sector-specific networks such as HSCN, PSN, or JANET is highly advantageous. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
83zero Limited
Strong documentation skills (Microsoft Word, Project, Visio) and a grasp of Enterprise Architecture methods like TOGAF (desirable). Familiarity with secure Internet solutions (firewalls, SIEM), LAN environments, and cloud architectures (public/private) is a plus. Knowledge of sector-specific networks such as HSCN, PSN, or JANET is highly advantageous. More ❯
Leominster, Herefordshire, United Kingdom Hybrid / WFH Options
Leidos
and execution of system upgrades, migrations, and integration projects. Logging & Monitoring Integration: Configure and manage RHEL logs for ingestion into a SIEM (Securityinformationandeventmanagement); integrate Linux systems with SCOM (with assistance from the existing SCOM Infrastructure Engineer) for health monitoring. Antivirus & Endpoint Security: Ensure AV integration and … the ability to work independently and collaboratively. Desirable Skills: Familiarity with security frameworks such as CIS benchmarks or ISO 27001. Experience with log managementandSIEM solutions (ArcSight, Splunk, ELK Stack). Hands-on experience with Linux-based high availability and disaster recovery solutions. Familiarity with virtualization technologies. Experience with More ❯
security, best practice, VAPT and remediation. Key Responsibilities • Responsible for VAPT reporting and remediation • Hardware ,OS and Application hardening and patching • Monitoring and maintaining SIEM • Managing Zero trust privilege management • 365 Securityand best practice • Assisting with endpoint security • ISO 27001/CE+ Audits Requirements : The ideal candidate will have … and communication skills. Minimum technical skills required: • Windows, Linux, Vmware hardening and patching • Nessus reporting • ISO 27001/CE+ audits • Email security • Endpoint security • SIEMmanagement • 365 administration/best practice Desirable • Hardware Firewalls • HPE/Lenovo Servers and Sans • Network design and configuration • AWS/IBM cloud/Azure More ❯
Bethesda, Maryland, United States Hybrid / WFH Options
Lockheed Martin
driven individual who is committed to making a difference in the field of cybersecurity, we enc Basic Qualifications: • Extensive experience with SOC operations including SIEM, SOAR, threat hunting, incident investigation, endpoint protection, standard frameworks, Microsoft 365 security, and strategic planning. • Strong knowledge of cyber threat landscape, vulnerability assessments, incident response … and threat hunting methodologies. • Extensive knowledge in security tools and technologies, including SIEM, intrusion detection/prevention systems, and threat intelligence platforms. • Active TOP SECRET security clearance or recently active TOP SECRET clearance within 24 months with SCI eligibility. • U.S. Citizenship required Desired Skills: • Excellent analytical, problem-solving, and decision More ❯
Required Skills and Experience Extensive experience ( at least 5 years ) of Security Incident Handling & Security Incident Response. Experience in ruling and tuning Enterprise level SIEM tools. Extensive operations experience (minimum of 3+ years). Extensive knowledge of Security including types and methods of cyber-attack and underlying network protocols. Extensive … in driving incident resolution with, technology vendors and stakeholders. Demonstrable experience in supporting large, complex Networks and Hosting Estates using multiple technologies including: Managing SIEM's - (Qradar Preferred) (e.g. ArcSight/AlienVault/Microsoft Sentinel/LogRhythm). Enterprise level Operating Systems RedHat Linux & Windows Server command line required. Vulnerability More ❯
initiatives by identifying opportunities for, and implementation of new detections and improvements to existing detections. Leveraging in-house knowledge to enrich and benefit the SIEMand SOC (e.g. managing Sentinel watchlists, assisting with triage, sharing knowledge of our technical estate with the MSP analysts, etc.) Assisting with incident investigation and … You will have some of the following skills and experience: Experience in Cyber Threat Intelligence Experience in Threat Hunting Experience with the Microsoft Sentinel SIEM/SOAR platform Proficient in writing KQL Strong understanding of threat intelligence principles and practices. Strong understanding of security risk management Understanding of threat modelling More ❯
Lead integration of IT and OT monitoring solutions. Build OT-specific detection and response capabilities, including custom playbooks. Technology Implementation Oversee global deployment of SIEM (e.g., Splunk, Graylog, Wazuh), SOAR, EDR, and Threat Intel platforms. Vendor & Team Management Act as the primary contact for the outsourced SOC provider; manage SLAs … e.g., NIST, ISO, GDPR). Stay ahead of evolving cyber threats and trends. Ideal Candidate Strong Linux and open-source experience. Technical expertise with SIEM, SOAR, EDR, and OT protocols Familiar with SCADA/ICS environments and MITRE ATT&CK framework. Skilled in incident response, threat hunting, SLA management, andMore ❯
analysis, response, remediation, and reporting. Ensure effective vulnerability management, threat hunting, and penetration testing initiatives. Maintain and optimize the use of security technologies (e.g., SIEM, EDR, IDS/IPS, vulnerability scanners). Regularly report KPIs, threat intelligence, and incident impact summaries to executive stakeholders. Collaborate with cross-functional teams to … management role . Proven experience leading security operations teams and/or SOC environments . Strong technical background in cybersecurity tools and platforms, including SIEM (e.g., Splunk, QRadar), EDR, IDS/IPS, and vulnerability management solutions . Demonstrated experience in incident response managementand threat intelligence . Excellent communication skills More ❯
Reston, Virginia, United States Hybrid / WFH Options
Google, Inc
States.Minimum qualifications: Bachelor's degree or equivalent practical experience. 10 years of experience with Security Operations (SecOps) toolset including SecurityInformationandEventManagement (SIEM), Security Orchestration, Automation, and Response (SOAR), Threat Intelligence and Endpoint Detection and Response (EDR) tools. Experience engaging with, and presenting to, technical stakeholders and executive … . Active US Government Top Secret security clearance. About the job In this role, you will be helping customers derive value from cloud enabled SIEM/SOAR implementations. You will also be familiar with technologies such as Security Operations (SecOps) toolset including SecurityInformationandEventManagement (SIEM), Security Orchestration More ❯
a hands-on technical role focused on enhancing and maintaining the organisation's security capabilities, emphasising Azure infrastructure. This role supports the maturity of SIEM, SOC, and EDR capabilities while actively addressing emerging threats and vulnerabilities. The security engineer will also play a critical role in incident response, compliance, and … innovative security technologies to strengthen the organisation's defenses. Essential functions of the job: SOC operations: perform incident triaging, threat detection, and response activities. SIEM & EDR management: advance and configure SIEMand EDR systems to optimise threat detection and response in Azure environments. Incident response: investigate and mitigate security incidents … solutions. Experience required: Relevant certifications in public cloud securityand experience managing Azure cloud infrastructure. Proven expertise in security testing, IAM, vulnerability management, andSIEM configuration. Strong grasp of networking fundamentals, including DNS, WAF, and ingress, paired with experience in CPSM. Familiarity with GIT/version control, SDLC pipelines andMore ❯
Plymouth, Devon, South West, United Kingdom Hybrid / WFH Options
Inspire People
Your expertise includes Incident Response, where you have led technical investigations and developed response frameworks. You are proficient with SecurityInformationandEventManagement (SIEM) systems and adept at utilising Cyber Threat Intelligence within this context. You have a strong capability to manage technical risks and lead the implementation of … in producing and maintaining technical procedures and playbooks. Essential Experience: Experience within a Security Operations Centre or operational security environment Experience in configuring and maintaining SIEM tooling including operating procedures and playbook Utilisation of Cyber Threat Intelligence within a Security Operations context Experience in Incident Response, particularly in leading on More ❯
a similar position. You have a Strong knowledge of Security Operation Center design and cyber defense products (including IDS/IPS, Log management system, SIEM, Vulnerability scanner, APT detection tools, Threat information platforms, etc.), TTPs (Tactics/Technics/Processes) framework such as MITRE ATT&CK. More ❯
and pipeline generation If you've got it - we want it: Minimum of 1-3 years of previous hunting experience in SaaS, Security, or SIEM markets Fluent in Spanish and French Highly Preferred Familiarity with systems. Specifically Salesforce, Outreach.io, and ZoomInfo and other prospecting tools Strong business and tech acumen More ❯
Extraction and Parsing: Experience developing regular expressions for data extraction and parsing. Securityand Log Management Tools: Experience with securityinformationandeventmanagement (SIEM) products like Splunk, QRadar, Sentinel, Chronicle, etc, is highly desirable. Data Visualization and Monitoring: Familiarity with data visualization and monitoring tools, such as Power BI More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
non-technical audiences. • Strong understanding of OT infrastructure, networking, and end-user computing. • Proficiency in writing Kusto Query Language (KQL) for creating and tuning SIEM queries and alerts. • Experience in configuring and troubleshooting MFA, Privileged Access Management (PAM), andSecurityInformation & EventManagement (SIEM) systems, particularly Microsoft Sentinel. Desirable Experience More ❯