London, South East, England, United Kingdom Hybrid / WFH Options
Salt Search
search addresses scenario described in use case Responsible for the creation of procedures, high-level/low-level documentation, implementation of processes and development of staff in relation to SIEM detection logic Coach a team (from a technical perspective); review work outputs and provide quality assurance Analyses and identifies areas of improvement with existing processes, procedures, and documentation Demonstrates how … to use SIEM & Enterprise Security products to both technical/non-technical personnel Provides expert technical advice and counsel in the design, monitoring and improvement of SIEMsecurity systems Prioritize and coordinate backlog of threat detection requests, making sure we have a healthy balance between defect resolution and new features Qualifications: Technical Skills: In depth experience in development and maintenance … of SIEM use cases Fluent in Splunk's search processing language (SPL) Excellent knowledge of Splunk Enterprise and Splunk Enterprise Security Sound knowledge about Splunk Common Information Model and log normalization using Data Models Solid understanding of cybersecurity technologies, protocols, and applications Excellent English communication skills (written and oral)! Nice to have: Splunk Core Certified (Advanced) Power User (crucial) Splunk More ❯
search addresses scenario described in use case Responsible for the creation of procedures, high-level/low-level documentation, implementation of processes and development of staff in relation to SIEM detection logic Coach a team (from a technical perspective); review work outputs and provide quality assurance Analyses and identifies areas of improvement with existing processes, procedures, and documentation Demonstrates how … to use SIEM & Enterprise Security products to both technical/non-technical personnel Provides expert technical advice and counsel in the design, monitoring and improvement of SIEMsecurity systems Prioritize and coordinate backlog of threat detection requests, making sure we have a healthy balance between defect resolution and new features Qualifications: Technical Skills: In depth experience in development and maintenance … of SIEM use cases Fluent in Splunk's search processing language (SPL) Excellent knowledge of Splunk Enterprise and Splunk Enterprise Security Sound knowledge about Splunk Common Information Model and log normalization using Data Models Solid understanding of cybersecurity technologies, protocols, and applications Excellent English communication skills (written and oral)! Nice to have: Splunk Core Certified (Advanced) Power User (crucial) Splunk More ❯
Abingdon, Oxfordshire, United Kingdom Hybrid / WFH Options
Sophos Group
that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide, defending More ❯
that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide, defending More ❯
London, England, United Kingdom Hybrid / WFH Options
Sophos Group
that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide, defending More ❯
London, England, United Kingdom Hybrid / WFH Options
Dataminr
solutions with third-party products Experience in Cyber Securityand SaaS platforms is a plus. Specifically, familiarity with endpoint or network security space - eg. EDR, AV, incident response, forensics, SIEM, firewall, HIPS/IDS, etc. Knowledge of malware, threat intelligence, and/or sandbox analysis. Certifications such as CISSP, CEH,OSCP, and SANS also a plus About Dataminr At Dataminr More ❯
Stockport, Lancashire, United Kingdom Hybrid / WFH Options
zyncgroup.io
be responsible for: Contributing to the setup and ongoing enhancement of the Security Operations Center (SOC). Investigating security incidents and implementing effective countermeasures. Utilizing SOC tools such as SIEM, vulnerability scanners, and incident response solutions. Performing threat hunting by analyzing and assessing security events on central platforms. Documenting incidents thoroughly in ticketing andSIEM systems, and generating detailed reports. More ❯
West London, London, United Kingdom Hybrid / WFH Options
Circle Group
their sleeves and figure things out when needed. Essential experience: 2+ years in a SOC/Blue team or similar defensive security role, hands on the tech. Familiarity with SIEM esp, Microsoft Sentinel and Defender (e.g., Defender for Endpoint, Defender for Identity). Strong verbal and written communication skills. Ability to lead or coordinate during incident response engagements. A broad More ❯
Washington, Washington DC, United States Hybrid / WFH Options
OMW Consulting
in Washington, D.C. You must have an active Secret clearance or higher and a solid background in informationsecurity fundamentals and core technologies (e.g., authentication, encryption, firewalls, vulnerability scanning, SIEM/SOAR, audit logs). Your main responsibilities in this position will include: Achieving ATOs for the company's software across multiple government customers with minimal oversight. Providing outstanding customer More ❯
Maidstone, England, United Kingdom Hybrid / WFH Options
Payter B.V
and oversight for software, cloud infrastructure, and internal IT projects Harden cloud environments and internal IT systems against attacks and vulnerabilities Implement and manage security assessment tools (vulnerability management, SIEM) across all environments Lead comprehensive penetration testing program for payment applications, infrastructure, and internal systems Risk Management & Compliance Perform regular internal security audits and policy compliance reviews across all IT … become part of an international scale-up, shaping the future in a booming market where you can have impact and growth opportunities. Technical skills: Security Technologies & Tools ● Experience with SIEM solutions ● Proficiency with vulnerability management platforms ● Knowledge of container security solutions ● Experience with secret management solutions Cloud & Infrastructure Security ● Expertise in GCP IAM, security controls, and compliance frameworks ● Experience with More ❯
London, England, United Kingdom Hybrid / WFH Options
PAYTER
and oversight for software, cloud infrastructure, and internal IT projects Harden cloud environments and internal IT systems against attacks and vulnerabilities Implement and manage security assessment tools (vulnerability management, SIEM) across all environments Lead comprehensive penetration testing program for payment applications, infrastructure, and internal systems Risk Management & Compliance Perform regular internal security audits and policy compliance reviews across all IT … become part of an international scale-up, shaping the future in a booming market where you can have impact and growth opportunities. Technical skills: Security Technologies & Tools • Experience with SIEM solutions • Proficiency with vulnerability management platforms • Knowledge of container security solutions • Experience with secret management solutions Cloud & Infrastructure Security • Expertise in GCP IAM, security controls, and compliance frameworks • Experience with More ❯
Intune/Autopilot, device security, and endpoint protection. Extensive experience with zscaler SOC2 experience-preparation, execution, audit remediation, and vendor coordination. Comfort with modern security tools: SSO, MDM, EDR, SIEM, password managers, VPN, etc. Ability to prioritize, execute, and deliver without handholding. Willingness to go from drafting policies to implementing scripts - whatever it takes. Experience managing vendors, contracts, and external More ❯
London, England, United Kingdom Hybrid / WFH Options
Valstro
Intune/Autopilot, device security, and endpoint protection. Extensive experience with zscaler SOC2 experience—preparation, execution, audit remediation, and vendor coordination. Comfort with modern security tools: SSO, MDM, EDR, SIEM, password managers, VPN, etc. Ability to prioritize, execute, and deliver without handholding. Willingness to go from drafting policies to implementing scripts - whatever it takes. Experience managing vendors, contracts, and external More ❯
a target operating model for a Security Operations Centre Expertise in security monitoring design, threat detection, and incident response Experience in selecting tools for SecurityInformationandEventManagement (SIEM) Proficiency in IT security documentation, including policies, standards, processes, procedures, and patterns Experience in risk and threat modelling within a high-threat government environment To apply, please submit your latest More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
a target operating model for a Security Operations Centre Expertise in security monitoring design, threat detection, and incident response Experience in selecting tools for SecurityInformationandEventManagement (SIEM) Proficiency in IT security documentation, including policies, standards, processes, procedures, and patterns Experience in risk and threat modelling within a high-threat government environment To apply, please submit your latest More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
SUMMER-BROWNING ASSOCIATES LIMITED
a target operating model for a Security Operations Centre Expertise in security monitoring design, threat detection, and incident response Experience in selecting tools for SecurityInformationandEventManagement (SIEM) Proficiency in IT security documentation, including policies, standards, processes, procedures, and patterns Experience in risk and threat modelling within a high-threat government environment To apply, please submit your latest More ❯
newport, wales, united kingdom Hybrid / WFH Options
SUMMER-BROWNING ASSOCIATES LIMITED
a target operating model for a Security Operations Centre Expertise in security monitoring design, threat detection, and incident response Experience in selecting tools for SecurityInformationandEventManagement (SIEM) Proficiency in IT security documentation, including policies, standards, processes, procedures, and patterns Experience in risk and threat modelling within a high-threat government environment To apply, please submit your latest More ❯
Bradley Stoke, Gloucestershire, UK Hybrid / WFH Options
SUMMER-BROWNING ASSOCIATES LIMITED
a target operating model for a Security Operations Centre Expertise in security monitoring design, threat detection, and incident response Experience in selecting tools for SecurityInformationandEventManagement (SIEM) Proficiency in IT security documentation, including policies, standards, processes, procedures, and patterns Experience in risk and threat modelling within a high-threat government environment To apply, please submit your latest More ❯
bath, south west england, united kingdom Hybrid / WFH Options
SUMMER-BROWNING ASSOCIATES LIMITED
a target operating model for a Security Operations Centre Expertise in security monitoring design, threat detection, and incident response Experience in selecting tools for SecurityInformationandEventManagement (SIEM) Proficiency in IT security documentation, including policies, standards, processes, procedures, and patterns Experience in risk and threat modelling within a high-threat government environment To apply, please submit your latest More ❯
bradley stoke, south west england, united kingdom Hybrid / WFH Options
SUMMER-BROWNING ASSOCIATES LIMITED
a target operating model for a Security Operations Centre Expertise in security monitoring design, threat detection, and incident response Experience in selecting tools for SecurityInformationandEventManagement (SIEM) Proficiency in IT security documentation, including policies, standards, processes, procedures, and patterns Experience in risk and threat modelling within a high-threat government environment To apply, please submit your latest More ❯
you will take on professional responsibilities within the Cyber SecurityManagement team, supporting departments in managing Cyber Detection and Protection measures, including Vulnerability Management, SecurityInformationandEventManagement (SIEM), Incident Management, and overseeing the Change Approval Process. Collaboration with business and asset owners, as well as managing the outsourced services provided by our main service provider, Deutsche Börse AG More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
hoc travel to other sites/data centres. The Role The Cyber Security Engineer will be joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will … virtualisation, etc. Hands-on experience in the management of IDS/IPS, Firewalls, VPN, EDR/XDR, mail filtering and other security products Experience of SecurityInformationEventManagement (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as More ❯
data. This includes aligning with regulatory requirements, shareholder expectations, and recognised best practices. You would be primarily focused on: Endpoint Detection and Response Specops CyberArk Identity managementSecurityInformationandEventManagement Other responsibilities: Subject Matter Expertise on cyber threats and protections Oversight, managementand design of the security infrastructure including WAF, Proxy, Email Gateway, Logging, Endpoint, IDS, IDP, etc. More ❯
Cheshire, England, United Kingdom Hybrid / WFH Options
Oliver James
data. This includes aligning with regulatory requirements, shareholder expectations, and recognised best practices. You would be primarily focused on: Endpoint Detection and Response Specops CyberArk Identity managementSecurityInformationandEventManagement Other responsibilities: Subject Matter Expertise on cyber threats and protections Oversight, managementand design of the security infrastructure including WAF, Proxy, Email Gateway, Logging, Endpoint, IDS, IDP, etc. More ❯