Wokingham, England, United Kingdom Hybrid/Remote Options
Searchability NS&D
Contract SIEM Engineer Exciting contract opportunity to join a high-performing cybersecurity team Hybrid working model, three days onsite and two remote Contribute to cutting-edge SIEMand EDR deployments for a large-scale organisation Up to £500 per day (Inside IR35) Active SC clearance required ABOUT THE CLIENT: Our client is a well-established technology-driven organisation with a … advancing its cybersecurity capabilities. You will join a dedicated security team working to enhance threat detection and response across complex environments. This is a crucial role for an experienced SIEM Engineer to make a measurable impact by improving resilience and operational security. THE BENEFITS: Up to £500 per day (Inside IR35) Hybrid working arrangement Collaborative and innovative security culture Opportunity … to work with leading SIEMand EDR technologies THE SIEM ENGINEER ROLE: As a SIEM Engineer, you will design, deploy, and maintain SIEMand EDR solutions that strengthen the organisation’s security posture. You will work closely with IT andsecurity teams to manage log ingestion, implement integrations, and monitor system activity for potential threats. SIEM ENGINEER ESSENTIAL SKILLS: Proven More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid/Remote Options
Cathcart Technology
Azure and Microsoft 365 security tooling and cloud security principles. ** Strong understanding of frameworks such as ISO 27001, NIST, and the Well Architected Framework. ** Experience with technologies such as SIEM, DLP, IAM, EDR, WAF, and SASE. ** Ability to communicate complex technical concepts to both technical and non technical audiences. ** Relevant certifications (CISA, CISM, SABSA, TOGAF or similar) are advantageous. Why More ❯
NCSC guidelines, etc.). Review and enhance access controls, identity management, and data protection measures. Provide guidance and escalation support for security-related incidents and audits. Assist in maintaining SIEM visibility and refining detection use cases. What You Will Ideally Bring Proven experience in an IT Security Officer or similar role within a complex IT environment. Strong understanding of cybersecurity More ❯
oversight, you will also act as technical lead on several high-impact initiatives, including but not limited to: Global EDR consolidation (Microsoft Defender) MFA rollout Implementation of a new SIEM platform Key Responsibilities Lead the delivery of cyber security projects such as endpoint protection, vulnerability management, identity & access management, and network security. Develop and manage project plans, milestones, risks, andMore ❯
City of London, London, United Kingdom Hybrid/Remote Options
TRIA
oversight, you will also act as technical lead on several high-impact initiatives, including but not limited to: Global EDR consolidation (Microsoft Defender) MFA rollout Implementation of a new SIEM platform Key Responsibilities Lead the delivery of cyber security projects such as endpoint protection, vulnerability management, identity & access management, and network security. Develop and manage project plans, milestones, risks, andMore ❯
oversight, you will also act as technical lead on several high-impact initiatives, including but not limited to: Global EDR consolidation (Microsoft Defender) MFA rollout Implementation of a new SIEM platform Key Responsibilities Lead the delivery of cyber security projects such as endpoint protection, vulnerability management, identity & access management, and network security. Develop and manage project plans, milestones, risks, andMore ❯
City of London, London, United Kingdom Hybrid/Remote Options
Humanoid
access reviews and maintain least-privilege and zero-trust principles. Integrate IAM controls into SaaS and endpoint environments. Cyber Security Operations Implement and manage endpoint protection, vulnerability management, andSIEM/logging tools. Lead incident detection and response, including root-cause analysis and remediation tracking. Maintain Humanoid’s informationsecurity risk register and control library. Drive readiness for ISO More ❯
access reviews and maintain least-privilege and zero-trust principles. Integrate IAM controls into SaaS and endpoint environments. Cyber Security Operations Implement and manage endpoint protection, vulnerability management, andSIEM/logging tools. Lead incident detection and response, including root-cause analysis and remediation tracking. Maintain Humanoid’s informationsecurity risk register and control library. Drive readiness for ISO More ❯
Redditch, England, United Kingdom Hybrid/Remote Options
Arcus FM
in safeguarding our business operations andinformation assets. What You’ll Be Doing In this role, you will: Monitor, analyse and respond to outputs from key security systems including SIEM, email securityand endpoint protection tools Assist in the investigation and triage of security alerts and incidents Carry out regular vulnerability scanning, remediation planning, and support internal/external securityMore ❯
City of London, London, United Kingdom Hybrid/Remote Options
Ingentive
Microsoft certifications (relating to Azure-AZ, Security-SC, Power Platform-PL, Modern Work-MS and Copilot/AI). Excellent consulting, design and delivery of Microsoft Defender suite andSIEM/XDR. Effective technical hands-on experience configuring/implementing products such as Microsoft Azure, Entra & Purview. Accomplished in designing and implementing M365 security technologies, based on above, with little More ❯
Microsoft certifications (relating to Azure-AZ, Security-SC, Power Platform-PL, Modern Work-MS and Copilot/AI). Excellent consulting, design and delivery of Microsoft Defender suite andSIEM/XDR. Effective technical hands-on experience configuring/implementing products such as Microsoft Azure, Entra & Purview. Accomplished in designing and implementing M365 security technologies, based on above, with little More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid/Remote Options
Experian Ltd
and alerts associated with cyber threats, intrusions, and compromises alongside a team of global security analysts following documented SLOs and processes. Analyze events using security tooling and logging (e.g., SIEM, EDR) and assess potential risk/severity level of cyber threats; escalate higher-risk events to dedicated incident response andmanagement teams in the CFC according to established processes. Collaborate … Cloud Infrastructure (AWS, Azure, GCP), andSecurity Technologies (Anti-Virus, Intrusion Prevention, Web Application Firewalls) Interest in developing knowledge across common Incident Response andSecurity Monitoring applications such as SIEM (e.g., Qradar, Splunk), EDR (e.g., FireEye HX, CrowdStrike Falcon, Microsoft Defender), and SOAR (Palo Alto XSOAR, Google Secops/Chronicle) Desire to build technical skills and hands-on knowledge in … and reverse engineering In-depth knowledge of network and host security technologies and products (such as firewalls, network IDS, scanners) and improve these skills Security monitoring technologies, such as SIEM, IPS/IDS, UEBA, DLP, among others Scripting and automation Additional Information Benefits package includes: Flexible work environment, working hybrid or in the office if you prefer. Great compensation package More ❯
in a managerial role; You are certified (e.g., CISM, CISSP) and have knowledge of ISO 27001 and ISAE 3402; You are familiar with security technologies such as XDR, EDR, SIEM, NAC, IDS/IPS, and SASE; You have experience with incident response, risk assessment, andsecurity policy development; You have excellent command of both Dutch and English, in spoken andMore ❯
Central London, London, United Kingdom Hybrid/Remote Options
Colt Technology Services
highlight the risk to client environment Proficient in preparation of reports, dashboards and documentations. Knowledge/Experience of security technologies such as Cisco/Juniper Firewalls, Application Firewalls, IPS, SIEM, Proxy, NAC, etc. Skills: Network Protocols Cyber Security Tools/Products Cyber Security Policy Management Cyber Security Planning Cyber Security Risk Management What we offer: Our benefits support you through More ❯
highlight the risk to client environment Proficient in preparation of reports, dashboards and documentations. Knowledge/Experience of security technologies such as Cisco/Juniper Firewalls, Application Firewalls, IPS, SIEM, Proxy, NAC, etc. What We Offer You Looking to make a mark? At Colt, you’ll make a difference. Because around here, we empower people. We don’t tell you More ❯
Central London, London, United Kingdom Hybrid/Remote Options
Carrington Recruitment Solutions Limited
Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, andSIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery and ongoing support. This is a great opportunity and salary is dependent upon experience. More ❯
in forming collaborative working relationships with customers and other internal stakeholders. Confidence in effectively communicating technical incidents or security threats to non-technical stakeholders. Previous experience of working with SIEMand log monitoring tools. SC-200, SC-900 or equivalent certification would be beneficial but not essential. To be considered for this role, you must be UK based and eligible More ❯
Manchester Area, United Kingdom Hybrid/Remote Options
Gravitas Recruitment Group (Global) Ltd
understanding of AWS security, hybrid cloud, and DevSecOps. Familiarity with NIST, ISO 27001, OWASP, and CIS frameworks. Experience working in a payments environment (PCI compliant) Proficiency in tools like SIEM, IDS/IPS, DLP, IAM, and encryption. Strong communication and stakeholder influence skills. Certifications such as CISSP, CCSP, CISM, or TOGAF are a plus. What You’ll Get Salary up More ❯
Houston, Texas, United States Hybrid/Remote Options
K.L. McKinney
The ideal candidate will have expertise in threat detection, vulnerability assessments, andsecurity compliance to enhance our cybersecurity posture. Key Responsibilities: Threat Monitoring & Incident Response -Continuously monitor security logs, SIEM alerts, and network traffic for threats. -Analyze security events and escalate incidents based on severity and impact. -Investigate potential breaches, malware infections, and unauthorized access attempts. -Assist in incident response … . -Support audits and document security controls and procedures. -Develop security awareness training for employees to prevent phishing and social engineering attacks. Security Tool Optimization & Documentation -Maintain and configure SIEM, IDS/IPS, firewalls, EDR, andsecurity tools. -Document security incidents, analysis findings, and remediation steps. -Recommend improvements for security infrastructure and best practices. Qualifications & Skills: -Education: Bachelors degree in … a related field (preferred). -Experience: 2+ years in security operations, network security, or incident response. -Certifications (Preferred): Security+, CEH, CySA+, GSEC, or equivalent. -Technical Proficiency: o Experience with SIEM platforms (Splunk, QRadar, Sentinel, etc.). o Knowledge of firewalls, IDS/IPS, endpoint security, and forensic tools. o Familiarity with log analysis, malware detection, and threat intelligence. -Problem-Solving More ❯
Advocate for secure engineering best practices throughout the company Manage the standards, policies and guidelines of the InfoSec frameworks Maintain an on going informationsecurity awareness program Monitor our SIEM, and maintain useful reports and alerts in the system Main Skills/Competencies Significant industry experience in a technical security role (Security Engineering or Application Security Engineering) Experience speaking to More ❯
london, south east england, united kingdom Hybrid/Remote Options
Polaris Consulting & Services Ltd
Key Responsibilities Security Lead and manage customer questionnaires and client audits Oversight of vulnerability managementand ensure remediation across environments is in line with company policy Oversight of applicable SIEMand monitoring process to ensure that security response is in line with company policy Ensure that system andsecurity documentation is in line with company policy and is audit-ready More ❯