London, England, United Kingdom Hybrid / WFH Options
RSM UK
ago London, England, United Kingdom 3 weeks ago Business InformationSecurity Officer, Europe London, England, United Kingdom 22 hours ago London, England, United Kingdom 3 weeks ago Security Consultant, SIEM/SOAR, Mandiant London, England, United Kingdom 1 week ago Consultant- Cyber Security Consulting & Advisory London, England, United Kingdom 1 week ago London, England, United Kingdom 1 week ago Greater More ❯
is expensed 37.5 hour week with early finish one day a week Structured progression and internal knowledge-sharing culture Key Responsibilities Triage and investigate alerts from a range of SIEMand EDR platforms Perform initial escalation, incident classification, and severity assessment Conduct threat hunting and intel correlation using raw log sources Produce clear incident documentation and response reports Participate in More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Goodman Masson
organisation. The role also includes conducting vulnerability assessments, supporting audits, and helping to strengthen third-party security compliance. Key Responsibilities: Monitor security systems and investigate incidents Operate firewalls, EDR, SIEM tools, and encryption software Support vulnerability testing and risk analysis Assist with third-party vendor assessments and internal audits Contribute to the ongoing improvement of security processes What We’re More ❯
London, England, United Kingdom Hybrid / WFH Options
Marlin Selection
technical leader in safeguarding sensitive data and systems. Key Responsibilities/Duties Manage WAF and DDoS systems Manage the Web Security Gateway Manage the Email Security Gateway Manage the SIEM, SOAR, Identity Protection, EDR, and respond to alerts and threats Carry out vulnerability scans, identify risks, and perform remediation Manage perimeter and VPN firewalls Manage MFA and SSO Manage MDMMAM … working knowledge and experience managing the following technology stack: CrowdStrike EDR Mimecast Mail Security Gateway Duo Okta Rapid7 IVM, Tenable IO, or Nessus Rapid7 IDR or CrowdStrike Next Gen SIEM Palo Alto Firewalls and Panorama InTune and Conditional Access Experience with the following technology stack is advantageous; understanding the principles is required: Imperva WAF and DDoS Menlo Web Security Gateway More ❯
technical leader in safeguarding sensitive data and systems. Key Responsibilities/Duties Manage WAF and DDoS systems Manage the Web Security Gateway Manage the Email Security Gateway Manage the SIEM, SOAR, Identity Protection and EDR, and respond to alerts and threats. Carry out vulnerability scans, identify risks, and remediation. Manage the perimeter and VPN firewalls. Manage MFA and SSO. Manage … in managing the majority of the following technology stack CrowdStrike EDR Mimecast Mail Security Gateway Duo Okta Rapid7 IVM, Tenable IO or Nessus Rapid7 IDR or CrowdStrike Next Gen SIEM Palo Alto Firewalls and Panorama InTune and Conditional Access Entra ID, Active Directory, DNS, GPO Experience using the following technology stack would be advantageous; understanding the principles is required. Imperva More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Marlin Selection Recruitment
technical leader in safeguarding sensitive data and systems. Key Responsibilities/Duties Manage WAF and DDoS systems Manage the Web Security Gateway Manage the Email Security Gateway Manage the SIEM, SOAR, Identity Protection and EDR, and respond to alerts and threats. Carry out vulnerability scans, identify risks, and remediation. Manage the perimeter and VPN firewalls. Manage MFA and SSO. Manage … in managing the majority of the following technology stack CrowdStrike EDR Mimecast Mail Security Gateway Duo Okta Rapid7 IVM, Tenable IO or Nessus Rapid7 IDR or CrowdStrike Next Gen SIEM Palo Alto Firewalls and Panorama InTune and Conditional Access Entra ID, Active Directory, DNS, GPO Experience using the following technology stack would be advantageous; understanding the principles is required. Imperva More ❯
technical leader in safeguarding sensitive data and systems. Key Responsibilities/Duties Manage WAF and DDoS systems Manage the Web Security Gateway Manage the Email Security Gateway Manage the SIEM, SOAR, Identity Protection, EDR, and respond to alerts and threats Carry out vulnerability scans, identify risks, and perform remediation Manage perimeter and VPN firewalls Manage MFA and SSO Manage MDM … working knowledge and experience with the following technology stack: CrowdStrike EDR Mimecast Mail Security Gateway Duo Okta Rapid7 IVM, Tenable IO, or Nessus Rapid7 IDR or CrowdStrike Next Gen SIEM Palo Alto Firewalls and Panorama InTune and Conditional Access Experience with the following technologies is advantageous; understanding their principles is required: Imperva WAF and DDoS Menlo Web Security Gateway KnowBe4 More ❯
Newbury, England, United Kingdom Hybrid / WFH Options
Sanderson Government & Defence
bigger picture; investigating threats, guiding incident flow, analysing threat data, and playing a key role in improving detection and response processes. You’ll be working across platforms like: Elastic SIEM Microsoft Sentinel Defender for Endpoint CrowdStrike Falcon MISP (Malware Information Sharing Platform) As the team scales, this role offers both strategic involvement and technical depth. There’s also the option … mindset – focused on not just what happened, but why, how, and how to prevent it Comfortable being an escalation point for technical and analytical issues Working knowledge of key SIEMand EDR platforms (Elastic, Sentinel, CrowdStrike, etc.) Natural curiosity and willingness to get hands-on with data and investigations Broad exposure across cyber domains beyond pure SOC is highly valued More ❯
Oxford, England, United Kingdom Hybrid / WFH Options
University of Oxford
policy development and designing secure systems, while continuously identifying opportunities to strengthen the university's security posture. In addition, you'll manage threat detection and analysis activities, including monitoring SIEM, IDS/IPS, and endpoint protection systems. You'll lead threat hunting and forensic investigations, maintain and refine incident response plans and playbooks, and drive ongoing improvements through lessons learned … and regular simulation exercises. About You Proven experience in cyber incident response Strong technical knowledge of SIEM, EDR, IDS/IPS, and networking Excellent communication and leadership skills This role meets the criteria for sponsorship under the Skilled Worker visa. The University will meet the cost of the Skilled Worker visa and NHS surcharge for applicants that require a visa. More ❯
of IT/Security experience (or a related Bachelor's degree with hands-on exposure) Experience working in a Security Operations Centre or similar security environment Strong understanding of SIEM tools (e.g., LogRhythm, Splunk) Comfortable working across Windows, Mac, and Linux environments Familiarity with IAM practices Excellent communication and documentation skills Desirable but not essential: CompTIA Security+ or similar certifications More ❯
Newry, County Down, United Kingdom Hybrid / WFH Options
MCS Group
of IT/Security experience (or a related Bachelor's degree with hands-on exposure) Experience working in a Security Operations Centre or similar security environment Strong understanding of SIEM tools (e.g., LogRhythm, Splunk) Comfortable working across Windows, Mac, and Linux environments Familiarity with IAM practices Excellent communication and documentation skills Desirable but not essential: CompTIA Security+ or similar certifications More ❯
Craigavon, County Armagh, United Kingdom Hybrid / WFH Options
MCS Group
of IT/Security experience (or a related Bachelor's degree with hands-on exposure) Experience working in a Security Operations Centre or similar security environment Strong understanding of SIEM tools (e.g., LogRhythm, Splunk) Comfortable working across Windows, Mac, and Linux environments Familiarity with IAM practices Excellent communication and documentation skills Desirable but not essential: CompTIA Security+ or similar certifications More ❯
Security Engineering or Threat Intelligence teams. Experience in analyzing and tuning WAF traffic, collaborating with domain/product owners to reduce false positives and strengthen protections. Strong experience with SIEM solutions such as Splunk or Kibana. Proficiency in maintaining and troubleshooting IAM platforms, including SSO integration. Experience with vulnerability managementand scanning solutions. Proficient with XDR platforms, ensuring continuous improvement More ❯
Derby, Derbyshire, United Kingdom Hybrid / WFH Options
risual Limited
new capabilities and technologies for identification, prevention, detection and recovery of cyber incidents. What will you bring? At least 12 months experience in a SOC environment (or equivalent) using SIEM/EDR Close attention to detail Strong time-managementand organizational skills. Able to build and maintain strong relationships with clients, becoming a trusted advisor. Strong understanding of foundational IT … and networking concepts Confident writing SIEM queries and performing threat-hunting Excellent communication skills, both written and oral, to a range of audiences, including senior management. Responsibilities Compiling and presenting high quality monthly reports for our clients, combining data from multiple security platforms and providing expert insight and recommendations. Assisting Level 1 analysts with alert triage and escalation Creating and … improving report templates & components in-line with feedback from clients. Assisting with training and support for our junior analysts Proactively suggesting improvements for existing SIEM alarms and develop new use-cases based on threat intelligence and client threat models. Creating and improving SOC dashboards to give real time visibility for clients and stakeholders Onboarding new clients, including deploying technical resources More ❯
a 6-month initial contract, working remotely. This role is operating outside of IR35. Candidates must be based in the UK. Key Responsibilities: Monitor and investigate security alerts using SIEM tools (e.g., Splunk, Microsoft Sentinel ). Conduct threat-hunting activities to proactively identify suspicious behavior and potential threats. Analyze logs and network traffic to identify anomalies. Collaborate with incident response … processes and detection capabilities. What We're Looking For: Strong background in cybersecurity with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA More ❯
a 6-month initial contract, working remotely. This role is operating outside of IR35. Candidates must be based in the UK. Key Responsibilities: Monitor and investigate security alerts using SIEM tools (e.g., Splunk, Microsoft Sentinel). Conduct threat-hunting activities to proactively identify suspicious behavior and potential threats. Analyze logs and network traffic to identify anomalies. Collaborate with incident response … SOC processes and detection capabilities. What We're Looking For: Strong background in cybersecurity with hands-on SOC experience. Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel, or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA More ❯
East London, London, United Kingdom Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
a 6-month initial contract, working remotely. This role is operating outside of IR35. Candidates must be based in the UK. Key Responsibilities: Monitor and investigate security alerts using SIEM tools (e.g., Splunk, Microsoft Sentinel ). Conduct threat-hunting activities to proactively identify suspicious behavior and potential threats. Analyze logs and network traffic to identify anomalies. Collaborate with incident response … processes and detection capabilities. What We're Looking For: Strong background in cybersecurity with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
a 6-month initial contract, working remotely. This role is operating outside of IR35. Candidates must be based in the UK. Key Responsibilities: Monitor and investigate security alerts using SIEM tools (e.g., Splunk, Microsoft Sentinel ). Conduct threat-hunting activities to proactively identify suspicious behavior and potential threats. Analyze logs and network traffic to identify anomalies. Collaborate with incident response … processes and detection capabilities. What We're Looking For: Strong background in cybersecurity with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA More ❯
Bury, Greater Manchester, United Kingdom Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
a 6-month initial contract, working remotely. This role is operating outside of IR35. Candidates must be based in the UK. Key Responsibilities: Monitor and investigate security alerts using SIEM tools (e.g., Splunk, Microsoft Sentinel ). Conduct threat-hunting activities to proactively identify suspicious behavior and potential threats. Analyze logs and network traffic to identify anomalies. Collaborate with incident response … processes and detection capabilities. What We're Looking For: Strong background in cybersecurity with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA More ❯
Leigh, Greater Manchester, United Kingdom Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
a 6-month initial contract, working remotely. This role is operating outside of IR35. Candidates must be based in the UK. Key Responsibilities: Monitor and investigate security alerts using SIEM tools (e.g., Splunk, Microsoft Sentinel ). Conduct threat-hunting activities to proactively identify suspicious behavior and potential threats. Analyze logs and network traffic to identify anomalies. Collaborate with incident response … processes and detection capabilities. What We're Looking For: Strong background in cybersecurity with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
a 6-month initial contract, working remotely. This role is operating outside of IR35. Candidates must be based in the UK. Key Responsibilities: Monitor and investigate security alerts using SIEM tools (e.g., Splunk, Microsoft Sentinel ). Conduct threat-hunting activities to proactively identify suspicious behavior and potential threats. Analyze logs and network traffic to identify anomalies. Collaborate with incident response … processes and detection capabilities. What We're Looking For: Strong background in cybersecurity with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA More ❯
Bolton, Greater Manchester, United Kingdom Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
a 6-month initial contract, working remotely. This role is operating outside of IR35. Candidates must be based in the UK. Key Responsibilities: Monitor and investigate security alerts using SIEM tools (e.g., Splunk, Microsoft Sentinel ). Conduct threat-hunting activities to proactively identify suspicious behavior and potential threats. Analyze logs and network traffic to identify anomalies. Collaborate with incident response … processes and detection capabilities. What We're Looking For: Strong background in cybersecurity with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA More ❯
Altrincham, Greater Manchester, United Kingdom Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
a 6-month initial contract, working remotely. This role is operating outside of IR35. Candidates must be based in the UK. Key Responsibilities: Monitor and investigate security alerts using SIEM tools (e.g., Splunk, Microsoft Sentinel ). Conduct threat-hunting activities to proactively identify suspicious behavior and potential threats. Analyze logs and network traffic to identify anomalies. Collaborate with incident response … processes and detection capabilities. What We're Looking For: Strong background in cybersecurity with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA More ❯
Central London / West End, London, United Kingdom Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
a 6-month initial contract, working remotely. This role is operating outside of IR35. Candidates must be based in the UK. Key Responsibilities: Monitor and investigate security alerts using SIEM tools (e.g., Splunk, Microsoft Sentinel ). Conduct threat-hunting activities to proactively identify suspicious behavior and potential threats. Analyze logs and network traffic to identify anomalies. Collaborate with incident response … processes and detection capabilities. What We're Looking For: Strong background in cybersecurity with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA More ❯
Ashton-Under-Lyne, Greater Manchester, United Kingdom Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
a 6-month initial contract, working remotely. This role is operating outside of IR35. Candidates must be based in the UK. Key Responsibilities: Monitor and investigate security alerts using SIEM tools (e.g., Splunk, Microsoft Sentinel ). Conduct threat-hunting activities to proactively identify suspicious behavior and potential threats. Analyze logs and network traffic to identify anomalies. Collaborate with incident response … processes and detection capabilities. What We're Looking For: Strong background in cybersecurity with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA More ❯