Hemel Hempstead, Hertfordshire, England, United Kingdom
Fynity
and industry best practices For the SOC role you will have Hands-on experience working in a Security Operations Centre (SOC) Solid knowledge of SIEM tools such as Microsoft Sentinel or Splunk Familiarity with the MITRE ATT&CK framework and threat detection methodologies Strong analytical skills with a keen eye for detail in log analysis and network monitoring Basic understanding More ❯
Windows 11, Azure Hybrid AD Microsoft 365 Admin, Teams, Intune/Autopilot Cisco Firewalls, VLANs, VPNs, Umbrella VMware, Datto (VM management & restoration), RDS Active Directory, Group Policy, Powershell Sentinel, Defender, NAS maintenance Print management (Papercut), Service Desk Management Cyber Security Essentials Plus, ISO27001 standards What we're looking for: Proven experience in 1st/2nd line IT support Strong understanding More ❯
cybersecurity role, preferably within an MSP or fast-paced environment. Strong hands-on experience with SIEM, EDR, VPNs, firewalls, and cloud platforms (AWS, Azure, GCP). Expertise in Microsoft Sentinel, Cisco Splunk or Palo Alto QRadar, and KQL. Proven skills in threat detection, incident response, and forensic analysis. Knowledge of SOAR tools (especially Palo Alto XSOAR or similar). Familiarity More ❯
as MITRE ATT&CK required - Experience with open-source intelligence (OSINT) collection methods and tools preferred - Bachelor's Degree preferred - Preferred certifications include: GIAC Cyber Threat Intelligence (GCTI) Microsoft Sentinel We are equal opportunity/affirmative action employers, committed to diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender More ❯
in roles like Aegis Weapon System EDO or Joint Interface Control Officer, or as an Army/Air Force veteran with knowledge of MDS elements such as THAAD, LTAMDS, Sentinel, PATRIOT, or GMD. This is a fantastic opportunity to work at the forefront of missile defense technology, with a strong focus on technical expertise, innovation, and strategic development within the More ❯
as MITRE ATT&CK required - Experience with open-source intelligence (OSINT) collection methods and tools preferred - Bachelor's Degree preferred - Preferred certifications include: GIAC Cyber Threat Intelligence (GCTI) Microsoft Sentinel Splunk Enterprise Security We are equal opportunity/affirmative action employers, committed to diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color More ❯
is primarily managed by a service provider) Familiarity with cloud platforms and services (e.g. Azure, AWS, Azure vWAN) Experience with network security and monitoring tools (e.g. zScaler, SolarWinds, Microsoft Sentinel) Knowledge of IT service frameworks and standards (e.g. ISO 20000, ITSM) Experience working in large, complex IT environments Skilled in creating technical documentation and service designs Possess a valid UK More ❯
Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) GIAC Certified Intrusion Analyst (GCIA) GIAC Network Forensic Analyst (GNFA) GIAC Cloud Threat Detection (GCTD) GIAC Cloud Forensics Responder (GCFR) Microsoft Sentinel We are equal opportunity/affirmative action employers, committed to diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender More ❯
Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) GIAC Certified Intrusion Analyst (GCIA) GIAC Network Forensic Analyst (GNFA) GIAC Cloud Threat Detection (GCTD) GIAC Cloud Forensics Responder (GCFR) Microsoft Sentinel We are equal opportunity/affirmative action employers, committed to diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender More ❯
Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) GIAC Certified Intrusion Analyst (GCIA) GIAC Network Forensic Analyst (GNFA) GIAC Cloud Threat Detection (GCTD) GIAC Cloud Forensics Responder (GCFR) Microsoft Sentinel We are equal opportunity/affirmative action employers, committed to diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender More ❯
requirements Work neatly and ensure sites are left clean from waste after shifts Drive company van, including collection and delivery of materials between HO and sites Follow ECS/Sentinel scheme rules as an individual card holder/Lead Engineer/SPC Take reasonable care of oneself and others affected by acts or omissions at work Care for tools, PPE More ❯
and MITRE ATT&CK. Hands-on experience with cloud security (AWS, Azure, or GCP), IAM/PAM, network and endpoint protection. Proficiency with SIEM and monitoring tools (e.g., Microsoft Sentinel, Elastic Stack, Splunk, QRadar), and understanding of incident response. Strong knowledge of cybersecurity principles including threat modeling, zero trust, and defense-in-depth. Understanding of cryptography and key management. Strong More ❯
experience in a Security Operations Centre (SOC) environment Experience working as a SOC Level 2 Previous people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threat analysis In-depth understanding of: Client Server applications and multi-tier web environments Relational databases More ❯
product which monitors life and property. Integrate into an established team of IT professionals. Assist in internal infrastructure work and manage projects. Follow a contract to supply a new Sentinel system, meet each requirement, install, configure, train users, and support the system until go-live. Qualifications: Educational Requirements: Grade 4/5 or above in English & Maths GCSE Skills Required More ❯
understanding of key compliance requirements including ISO 27001 and Cyber Essentials Plus. Hands-on experience with Microsoft security technologies, particularly within Azure ecosystems, and familiarity with tools like Microsoft Sentinel and Defender XDR. If you are interested in this position, please apply directly on LinkedIn with an up to date copy of your CV. More ❯
understanding of key compliance requirements including ISO 27001 and Cyber Essentials Plus. Hands-on experience with Microsoft security technologies, particularly within Azure ecosystems, and familiarity with tools like Microsoft Sentinel and Defender XDR. If you are interested in this position, please apply directly on LinkedIn with an up to date copy of your CV. More ❯
for stakeholder visibility Translate technical elements into customer friendly narratives that can be shared via account teams to end customer Create a weekly report that tracks key metrics for sentinel aspects giving relevant stakeholders visibility of projects/work. Devise a ‘customer impact’ report that shows the value of the Service Own the process for updating and sharing these reports More ❯
Northampton, Northamptonshire, East Midlands, United Kingdom Hybrid / WFH Options
Connexa
to lead projects independently and work cross-functionally with technical and non-technical stakeholders. Desirable * Microsoft Azure certifications (AZ-104, AZ-305 or equivalent). * Knowledge of PowerShell, Intune, Sentinel, and Power Platform. * Familiarity with ITIL practices and enterprise infrastructure documentation. What You'll Gain * Opportunity to take full ownership of cloud and network infrastructure with autonomy and support. * Involvement More ❯
with Azure infrastructure design, deployment, and administration. Proficiency in Azure services. Proficiency in Linux command-line tools and administration. Understanding of cloud security tools and concepts, like MFA, Azure Sentinel, Conditional Access, and PIM. Monitoring and troubleshooting Azure services, virtual infrastructure, and Linux environments. Experience supporting end users in remote locations. Willingness to travel to support training CONUS/OCONUS. More ❯
using a suitable maturity model to develop the SOC, and the subsequent implementation of an agreed standard to improve this maturity where appropriate. Familiar with the following tools: Microsoft Sentinel Qualys VMDR Tenable VM MITRE ATT&CK Framework Desirable Certifications, Qualifications Experience: Computer Security Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst More ❯