New Orleans, Louisiana, United States Hybrid / WFH Options
TTEC
our Great Place to Work certification in the United States says it all! What You'll Do Investigate security alerts and threat hunting leads across a variety of technologies (SIEM, EDR, email security, cloud, etc) as part of the SOC and with the Threat Management team. Maintain situational awareness of changes to threat landscape, industry trends, and internal operating environment. … and response to significant security events What You Bring to the Role Hands-on SOC experience investigating and responding to security events across two or more of the following: SIEM, EDR, email security, NGFW, cloud platforms, threat intelligence Must have cloud platform expertise (GCP, AWS, Asure) Strong foundational knowledge of core enterprise information technologies andsecurity principles Strong communication andMore ❯
Sioux Falls, South Dakota, United States Hybrid / WFH Options
TTEC
our Great Place to Work certification in the United States says it all! What You'll Do Investigate security alerts and threat hunting leads across a variety of technologies (SIEM, EDR, email security, cloud, etc) as part of the SOC and with the Threat Management team. Maintain situational awareness of changes to threat landscape, industry trends, and internal operating environment. … and response to significant security events What You Bring to the Role Hands-on SOC experience investigating and responding to security events across two or more of the following: SIEM, EDR, email security, NGFW, cloud platforms, threat intelligence Must have cloud platform expertise (GCP, AWS, Asure) Strong foundational knowledge of core enterprise information technologies andsecurity principles Strong communication andMore ❯
Salt Lake City, Utah, United States Hybrid / WFH Options
TTEC
our Great Place to Work certification in the United States says it all! What You'll Do Investigate security alerts and threat hunting leads across a variety of technologies (SIEM, EDR, email security, cloud, etc) as part of the SOC and with the Threat Management team. Maintain situational awareness of changes to threat landscape, industry trends, and internal operating environment. … and response to significant security events What You Bring to the Role Hands-on SOC experience investigating and responding to security events across two or more of the following: SIEM, EDR, email security, NGFW, cloud platforms, threat intelligence Must have cloud platform expertise (GCP, AWS, Asure) Strong foundational knowledge of core enterprise information technologies andsecurity principles Strong communication andMore ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Exertis
continuous improvement of our security policies, procedures and controls. As part of the team, youll: Oversee the implementation and enforcement of security policies, standards and tools including endpoint protection, SIEM, SOC and vulnerability management systems. Conduct risk assessments and threat modelling, maintaining the IT risk register and supporting the deployment of security controls, aligned with regulatory and business requirements. Lead … thrives in a fast-paced, collaborative, results-driven environment. To excel in this role, youll bring: Strong understanding of network and system security Experience with security technologies such as SIEM, IDS/IPS, endpoint protection and encryption is desirable. Experience with auditing A natural ability to build rapport with clients and colleagues. Strong communication and relationship management skills. Your Rewards More ❯
Paddington, Greater London, England Hybrid / WFH Options
Nexus Jobs Limited
increased cyber threats and compliant to industry standards. This role covers information protection, including data loss protection and data classification, and threat protection, including securityinformationandeventmanagement (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusion detection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team … preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM solutions Understanding of common frameworks, such as ITIL or LEAN is preferred Good exposure of user environment management, including desktops/laptops, profile More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
PRS
all PCs and Windows Servers in customer environments. Deploy and configure suitable anti-virus solutions for all servers and workstations. Deploy, configure, and maintain SecurityInformationandEventManagement (SIEM) solutions. Document and provide knowledge transfer across multiple groups internally and externally. Assist customers with hardware and software upgrades. Act as the interface for New Infrastructure Introduction. Help customers with … hold a valid driving licence. Must be willing and eligible to obtain security clearance. Desirable: Knowledge of UNIX/Linux system administration. Experience with Network Attached Storage. Experience with SIEM solutions. Experience with Atlassian Confluence. Broad knowledge of regulatory compliance. Experience with Kubernetes and containerized deployment methods. Experience and Education Requirements: Bachelors degree or equivalent in a technology-related field More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
hoc travel to other sites/data centres. The Role The Cyber Security Engineer will be joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will … virtualisation, etc. Hands-on experience in the management of IDS/IPS, Firewalls, VPN, EDR/XDR, mail filtering and other security products Experience of SecurityInformationEventManagement (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Context Recruitment Limited
controls supporting risk mitigation and contributing to the continual improvement of the business's security composure. Responsibilities: * Provide expertise on application, network and infrastructure security * Monitor security solutions including SIEM, threat detection and data security, endpoint protection, network analytics for alerts * Provide documentation for technical standards to meet corporate security policies/industry best practice * Perform security reviews, identify gaps … root cause of security issues and design appropriate solutions Required Experience: * Prior experience working within the security industry, with a strong background in M365 infrastructure. * Experience of working with SIEM tools * Exposure to email security tools (Sophos, O365 etc) * Excellent patch management skills (Intune SCCM, MECM Endpoint Manager and WSUS) * Experience with vulnerability scanning andmanagement (Insight VM) * Experience with More ❯
Basingstoke, Hampshire, England, United Kingdom Hybrid / WFH Options
Corriculo Ltd
hoc travel to other sites/data centres. The Role The Cyber Security Engineer will be joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will … sized organisation Hands-on experience in the management of IDS/IPS, Firewalls, VPN, EDR/XDR, mail filtering and other security products Experience of SecurityInformationEventManagement (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as More ❯