digital assets and maintaining the integrity, confidentiality, and availability of our information systems. Your expertise in Microsoft technologies and experience with SIEM (SecurityInformationandEventManagement) tools will be instrumental in identifying and mitigating security threats proactively. Responsibilities: 1. Security Monitoring and Incident Response: - Utilize SIEM tools such as … s degree in Computer Science, Information Technology, or a related field. - Proven experience as an IT Security Analyst, with a focus on Microsoft technologies andSIEM tools. - In-depth knowledge of security principles, protocols, and technologies, including firewalls, intrusion detection/prevention systems, and endpoint security solutions. - Hands-on experience … with Microsoft Azure, Active Directory, and related security features. - Proficiency in configuring and managing SIEM solutions, such as Microsoft Sentinel, Splunk, or IBM QRadar. - Strong analytical and problem-solving skills, with the ability to prioritise and manage multiple tasks in a fast-paced environment. - Relevant certifications such as CISSP, CISM more »
on bids and/or large and complex changes. Solid understanding of a variety of network and routing protocols. Experience with Network Management or SIEM designs, tooling or support. Demonstrable troubleshooting skills and approach to defect resolution. SDWAN experience is advantageous. Your benefits: 25 Days annual leave plus public holidays more »
Helensburgh, Scotland, United Kingdom Hybrid / WFH Options
Lockheed Martin
with ITIL4 practices. Deliver concise progress reports and compelling presentations to clients. Serve as a subject matter expert in SecurityInformationandEventManagement (SIEM), providing recommendations for product enhancements. Conduct thorough analysis of SIEM outputs, promptly identifying and escalating any incidents or breaches. Provide assurance support to team members … Information Systems Security Professional (CISSP). Experience in Government/Ministry of Defence settings is advantageous. Proficiency in implementing ITIL processes. Strong expertise in SIEM operations. Competence in Risk Managementand NIST Cyber Security Controls. Client-facing experience with exceptional stakeholder management skills. Ability to thrive in a fast-paced more »
Reading, England, United Kingdom Hybrid / WFH Options
Henderson Scott
investigating incidents, and assisting in incident response. You will also play a vital role in maintaining and optimizing our securityinformationandeventmanagement (SIEM) platform. While previous experience in a Managed Security Service Provider (MSSP) environment is advantageous, it is not a strict requirement. Key Responsibilities Utilize a SIEM … incident analysis and investigation, escalating issues as necessary. Contribute to containment strategies during security incidents, data loss, or breaches. Assist in the design and implementation of SIEM use cases to enhance detection capabilities. Ensure the SIEM platform's health through daily checks and proactive maintenance. Employ various applications and systems … and Hunting methodologies. Experience supporting Incident and Change Management processes. SOC Analyst - Fully remote UK (£50,000 - £70,000 + Bonus) Desired Skills and Experience SIEM/SOC/Threat Hunting/Cyber Security/QRadar more »
Code practices. • Assist in securing data platforms, including Data Bricks, Azure SQL, and other in-house developed apps/plugins. • Collaborate on implementing internal SIEM using Sentinel and work towards establishing an internal SOC. • Support the Infrastructure team in configuring firewalls securely and managing Fortinet FortiAnalyzer. • Provide guidance to Infrastructure … and Product teams on securing Microsoft 365 and Azure cloud services. • Establish and manage SIEMand SOAR capabilities using Azure Logic Apps or equivalents. • Enhance the usage and support of Entra ID (previously Azure AD) for IAM, Identity Governance, and PIM. • Document security processes, tool configurations, andsecurity service delivery more »
SOC team to ensure the effective support and delivery of the following: Provide around the clock protective monitoring through the use of industry leading SIEM, IDS and threat Intelligence Technologies. Provide advice and guidance to client targets of cyber attacks and malicious activity to a high standard. Provide incident reporting … and effective manner. Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM, EDR and Vulnerability Management tools Direct communication with customers on threats and alerts Providing customers with reports and presenting findings Assistance with active directory administration. more »
Cyber Security Analytics Analyst City/hybrid £45K-£54K + bonus and strong benefits Splunk SIEM Cyber Security Analytics Analyst is required to join the security division of prestigious financial services organisation with offices in the heart of the city. Within this role you will join a high-functioning in … an event are documented and remediated. Monitoring and analysing security relevant logs, events, and alerts including, but not limited to, logs from systems, applications, SIEM, AV, Firewalls, and IPS; document relevant incidents and suggest/co-ordinate appropriate remedial actions. Designing and managing security logging andSIEM programs and working more »
Oxfordshire, England, United Kingdom Hybrid / WFH Options
University of Oxford
on automation in collaboration with the Head of InformationSecurity Operations and the rest of the team. OxCERT runs an on-premises Elasticsearch-based SIEM solution, an Intrusion Detection System (IDS), and a vulnerability scanning service as well as other open source and commercial tools. We are one of the … Software and Open Source technologies and actively supports several related project communities. Current projects include the enhancement of the existing Elastic based securityinformationandeventmanagement system, the deployment of a new incident response tool, and development of an IT forensics capability. The team has achieved standing and recognition more »
mostly on-premises financial environment. Key Responsibilities: Lifecycle management of security, covering tools and technology platforms Supporting and managing security tools e.g. CyberArk , Qualys, SIEM tools Python Scripting for various purposes Automation/Build & Deployment of CI/CD pipelines (Ansible/Atlassian Stack) Implementation & integration of security technologies Use … case development and onboarding for Security Incident andEvent Monitoring (SIEM) Maintain software version and patch management for security products Essential Candidate Requirements: Strong background in Financial/Banking environments Python Scripting (advanced level) Expert in Automation ( Ansible ) Strong knowledge of 2 or more of the following tools: CyberArk, Qualys … Carbon Black, ArcSight, McAfee, SIEM tools etc. Extensive general knowledge of Cyber Security Relevant Security Certification/Educational qualification (e.g. CISSP) KEY SKILLS: Python, CyberArk, Qualys, CI/CD Pipelines, Automation, Deployment, Integration, Ansible, SIEM, On-Prem Technology, ArcSight, Carbon Black, McAfee To be considered, please ensure you complete your more »
responsibilities will include: Incident triage and investigation. Analysis of all suspicious email activity. Participating in threat hunt and offensive security exercises. Analysis of all SIEM logs, and the opportunity to get involved in some threat detection. Working with technical infrastructure teams on controls. You will need the following background. At … role Experience in a varied technical security role Experience of managing high priority security incidents Demonstrable business facing skills Experience of working with a SIEM platform – Splunk, QRadar, Elastic Security certifications highly desirable Experience of scripting/automation, threat hunting and offensive security highly desirable Please send your CV for more »
exceeding revenue targets. In-depth knowledge of MSSP offerings, including threat detection and response, managed detection and response (MDR), securityinformationandeventmanagement (SIEM), and other relevant cybersecurity solutions. Proven ability to build and lead high-performing sales teams, with a focus on fostering a culture of collaboration, innovation more »
Lincoln, Lincolnshire, East Midlands, United Kingdom Hybrid / WFH Options
Red Recruitment 24/7 Ltd
from both a practical andmanagement perspective. The role involves setting up, fine-tuning, and gathering intelligence from a SecurityInformationandEventManagement (SIEM) system. The IT Security Specialist will be responsible for reviewing infrastructure plans, adding recommendations, and procuring penetration tests from third-party services. They will ensure … adheres to the GDPR requirements. They will also develop and deliver annual IT security training and ensure compliancewith our Phishing Simulations Responsibilities: Develop and manage the SIEM, ensuring the effective capture and analysis of security data. Review infrastructure plans to identify potential security weaknesses and recommend enhancements. Coordinate with third … Assist other departments in developing policies and procedures to comply with GDPR, working with the DPO outsourcing company. Skills and Qualifications: Proven experience with SIEM tools and incident response Strong understanding of network infrastructure andsecurity protocols Experience with GDPR, data securityand other compliance regulations Experience with GDPR, data more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM Identity Access ManagementSIEMand MDR VA Vulnerability Analysis and mitigation DLP Data loss prevention PKI Public key infrastructure Ability to guide engineering teams through the deployment where required more »
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM Identity Access ManagementSIEMand MDR VA Vulnerability Analysis and mitigation DLP Data loss prevention PKI Public key infrastructure Ability to guide engineering teams through the deployment where required more »
the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, Identity managementand federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning A varied background, diverse programme exposure and a security based master's degree or alternatively STEM degree would be preferrable - however more »
areas including Cyber Essentials Plus CE+ , working knowledge of Desktop, Server and Network Security , NIS-D (Network Informationand Informative Systems Directive) , work with SIEMand Vulnerability scanning solutions as well as have specialised knowledge in Cyber Security best practice and the ability to work within ITIL guidelines. Main duties more »
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Sopra Steria Limited
and communicate effectively at all levels to both technical and non-technical audiences, assess and evaluate risk and understand the implications of new technologies. SIEM experience with designing, implementing and maintaining Splunk Excellent analytical and problem-solving skills coupled with ability to assess complex situations, identify risks, and recommend effective more »
andsecurity monitoring Understanding of threat modelling Investigation experience into Informationand Cyber security incidents Broad technical understanding covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware, SSL and others Experience and knowledge of NIST, COBIT, GCIA, GCIH, GCFA etc. This is an excellent opportunity more »
and projects. Requirements You will have worked a as Security Operations Engineer or similar role. You will have solid understanding of AWS, Microsoft security, SIEM, SOC, and programming. Solid experience of relevant security frameworks such as ISO27001, GDPR & HIPAA, NIST Cybersecurity Framework. Proven experience AWS and Azure cloud computing experience more »
capability, especially using PowerShell Bash. Familiarity with tools like zScaler, Solarwinds, Crowdstrike, Splunk. Experience with batch automation tools, Linux, and Azure. Working knowledge of SIEM Tools. Experience in Event Analysis, Triage, Incident Handling, and Root-Cause identification. What can we do for you? 22 days holiday On-sire gym at more »
Greater London, England, United Kingdom Hybrid / WFH Options
Oliver Bernard
for new and existing products and ways of working. Requirements: Proven knowledge of informationand cyber security engineering Great experience with PCI DSS. Good SIEM knowledge (Splunk is ideal) Great understanding of logs and log events across Linux, Windows, AWS, AV and Vulnerability scanning etc Good experience of Security Operations more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment
methodologies. Proficient with Microsoft, Windows, and related technologies. Familiarity with networking and network infrastructure. Experienced in designing, implementing, and managing Security services such as SIEM, Endpoint protection, EDR, and Vulnerability management platforms. To be considered for this position, please apply today or contact Sophie on snorton@weareninetwenty.com more »
Engineer or in a similar position. You will have experience in a broad variety of technology including AWS, Microsoft 365, internet protections, vulnerability management, SIEM, EDR. Experience securing on premises infrastructure and cloud services. Experience working with Systems Engineering teams, DevSecOps, CI/CD Senior Security Engineer - Onsite - £100K more »
time, budget and quality. Experience/essential and desired for successful job performance • Extensive experience in delivery of Security projects like Data loss prevention, SIEM, Identity access managementand Privileged Access management. • Significant practical experience of leading and managing Corporate/Infrastructure change programmes across an end-to-end project more »
our SOC Centre. Requirements: Proven experience as a SOC Analyst, with a focus on Level 3 responsibilities. Proficiency in Sentinel, Defender, Qradar, or similar SIEM tools. Strong analytical skills and attention to detail. Ability to work effectively in a team environment and communicate technical information to non-technical stakeholders. Flexibility more »