team and customer. Collaborate with teams to design and implement Sentinel for specific client needs. Configure and optimise Sentinel for advanced security monitoring and threat detection. Conduct regular assessments and audits to ensure Sentinel effectiveness. Troubleshoot and resolve technical issues related to Sentinel deployments. Your Profile: Technical key skills … during problem solving. Collaborative attitude to refine and progress understanding of requirements and deliverables. Good to have: Experience in Security Operations OR in a threat hunting role. Rewards & Benefits: TCS is consistently voted a Top Employer in the UK and globally. Our competitive salary packages feature pension, health care more »
Active Directory, Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security. Expertise in securing virtualized environments, including threatdetection, incident response, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Tunstall Healthcare (UK) Ltd
and information security strategy that aligns with business objectives, Lead, mentor, and oversee a small global team responsible for security operations, incident response, and threatdetection, fostering a culture of continuous improvement, innovation, and excellence, Collaborate with the Group IT team to ensure the organisation is protected against more »
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
McGregor Boyall Associates Limited
Active Directory, Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security Expertise in securing virtualized environments, including threatdetection, incident response, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
McGregor Boyall Associates Limited
Active Directory, Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security Expertise in securing virtualized environments, including threatdetection, incident response, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
McGregor Boyall Associates Limited
Active Directory, Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security Expertise in securing virtualized environments, including threatdetection, incident response, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management more »
SR2 | Socially Responsible Recruitment | Certified B Corporation™
a key part in the Cyber/Information Security function. You will drive and enhance their current operational processes and contribute across Security Assurance, ThreatDetection, Risk Management, CPSM & Threat Intelligence. Skills required: Control Frameworks & Industry Standards (ISO27001, 27002, GDPR, NIST) Security Operations Performance Tracking Data Security … Malware Detection, Threat & Incident response For the right person this is a huge opportunity - considering the sustained growth that they're going through, this role has a dotted line to management or C suite positions. This is a 2 stage process - initial 30 minute chat and 60 minute more »
reading, south east england, United Kingdom Hybrid / WFH Options
Henderson Scott
necessary. Contribute to containment strategies during security incidents, data loss, or breaches. Assist in the design and implementation of SIEM use cases to enhance detection capabilities. Ensure the SIEM platform's health through daily checks and proactive maintenance. Employ various applications and systems, including firewalls, IDS, NAC, and encryption … on-call incident response team on a rotational basis (fortnightly). Generate relevant reports, including end-of-day summaries, handover reports, management intelligence, and threat and risk analyses. Liaise with third-party vendors when necessary to troubleshoot SIEM platform issues. Ensure all deliverables align with agreed-upon KPIs and … Proven 2 years of experience in a similar role, preferably within the Managed Security Service industry. Experience providing Managed Security Services or working in Threat/Risk Management environments, with a preference for SIEM platform exposure. Proficiency in monitoring security events, analyzing alerts, and managing security incidents, including incident more »
london, south east england, United Kingdom Hybrid / WFH Options
McGregor Boyall
Docker, Kubernetes and more. What You'll Do Architect and automate sophisticated, scalable security systems, processes and controls Oversee and evolve comprehensive security monitoring, threatdetection and intrusion prevention/response Proactively assess risks and threats to develop strategic cybersecurity controls Function as a security force multiplier through more »
hemel hempstead, east anglia, United Kingdom Hybrid / WFH Options
The People Network
on Defence and National Security. Crafting and delivering seamless onboarding experiences for our Managed SOC clients. Providing expert engineering support to analysts for efficient threatdetection and response. Developing and maintaining robust detection rules to stay ahead of evolving threats. Actively participating in the design and optimization more »
Hinckley, England, United Kingdom Hybrid / WFH Options
DP World
resource utilization Implement and manage multi-factor authentication solutions for enhanced security across various systems and applications. Manage and monitor Endpoint security Platforms including detection and respond to advanced threats. Implement and maintain web and reverse proxy solutions, ensuring secure and reliable access to internal and external resources. Implement … Implementing security measures and protocols to safeguard the organization's IT infrastructure from potential threats and cyberattacks. This may include setting up firewalls, intrusion detection systems, and access controls. Investigating and resolving technical issues related to hardware, software, and network components. Troubleshooting may involve diagnosing problems, working with vendors … attitude, self starter, adaptable who welcomes challenge and problem solving Solid experience in managing and maintaining Windows Server environments, knowledge of Endpoint protection for threatdetection and response. Exposure and experience in implementing various IT infrastructure in a fast paced challenging environment Proficiency in backup and replication technologies more »
manchester, north west england, United Kingdom Hybrid / WFH Options
Chapman Tate Associates
of Azure resources (VMs, storage, networking, databases, etc.) Implement and enforce security best practices within the Azure environment, including access control, identity management, and threatdetection Monitor Azure services for performance and identify opportunities for optimization Automate routine tasks using Azure automation tools (ARM templates, Azure CLI, PowerShell more »
stockport, north west england, United Kingdom Hybrid / WFH Options
Chapman Tate Associates
of Azure resources (VMs, storage, networking, databases, etc.) Implement and enforce security best practices within the Azure environment, including access control, identity management, and threatdetection Monitor Azure services for performance and identify opportunities for optimization Automate routine tasks using Azure automation tools (ARM templates, Azure CLI, PowerShell more »
Warrington, England, United Kingdom Hybrid / WFH Options
Tata Consultancy Services
needs. Key Responsibilities: Collaborate with teams to design and implement Sentinel for specific client needs. Configure and optimise Sentinel for advanced security monitoring and threat detection. Conduct regular assessments and audits to ensure Sentinel effectiveness. Troubleshoot and resolve technical issues related to Sentinel deployments. Your Profile: Technical key skills more »
edinburgh, central scotland, United Kingdom Hybrid / WFH Options
McGregor Boyall
Active Directory, Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security Expertise in securing virtualized environments, including threatdetection, incident response, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management more »
City of Westminster, England, United Kingdom Hybrid / WFH Options
MASS
as Key Account Manager for one such interesting customer, for whom we significantly contribute to designing and developing conceptual models into the future of threatdetection and countermeasures, influencing the EW domain. Whilst our main hubs of engineering activity are at our Cambridgeshire and Lincolnshire HQs, this role more »
london, south east england, United Kingdom Hybrid / WFH Options
Anson McCade
create large sets of data, which can be efficiently processed to provide actionable intelligence. • Candidates will be working with Big Data, innovative security and threatdetection systems in turn contributing to the system design and development decisions, which affect the integration of both future and existing systems. • The more »
edinburgh, central scotland, United Kingdom Hybrid / WFH Options
Denholm Associates
Manager, you will help to deliver improvements across a number of our cyber security domains including; Security Data & Analytics, Security Automation, Incident Response and Threat Detection. Additionally, you will work closely with our Cyber Security Operation Centre and with other security functions as well as specialist 3rd party security … network, cloud and logging technologies Security Orchestration Automation and Response, building security automation playbooks and integration's Security Data & Analytics, onboarding data and developing detection logic and analytics Essential Criteria: Demonstrable experience working in cyber security Experience supporting security tools, such as SOAR, SIEM, EDR, NGFW, CSPM, WAF, AV … microservices architecture, Kubernetes, Containers, CI/CD pipelines and DevSecOps Passion for security and self-development to keep up to date with the evolving threat and vulnerability landscape, new technologies and service improvements If you would like more information on this role, please get in touch to discuss. more »
South West London, London, United Kingdom Hybrid / WFH Options
MASS Consultants
as Key Account Manager for one such interesting customer, for whom we significantly contribute to designing and developing conceptual models into the future of threatdetection and countermeasures, influencing the EW domain. Whilst our main hubs of engineering activity are at our Cambridgeshire and Lincolnshire HQs, this role more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Stott & May Professional Search Limited
the Security Engineer will design and implement security solutions in the Microsoft Security stack. The ideal candidate will come from a Security Operations or Threat Hunting background. Being the Liaison between SOC teams and clients, you will need strong expertise in cloud security concepts (ideally within Azure), and be … able to perform security assessments and scan for vulnerabilities. If you have prior experience with Microsoft Defender, Azure Sentinel, threatdetection and are able to accurately consult clients about their needs, whilst implementing effective security solutions, I strongly recommend applying. An excellent opportunity to upskill and develop your more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
the Job Leading the Response: Acting swiftly and decisively during security incidents to mitigate risks. Incident Lifecycle Management: Overseeing incidents from the moment of detection, through the containment and eradication stages, to the final resolution. Post-Incident Analysis: Conducting detailed investigations post-incident to understand the root cause and … to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on the organization's security systems to detect any suspicious activities early. Threat Analysis: Evaluating potential threats and vulnerabilities to ensure that the organization is prepared to defend against them. Strategic Defense Implementation: Putting in place robust … unified security strategy. This role demands a proactive mindset, deep technical expertise, and strong leadership skills to navigate the complex and ever-evolving cyber threat landscape. It's about being always prepared, constantly learning, and effectively communicating to maintain and enhance the organization's security posture. Tasks & Responsibilities Evaluate more »
Greater London, England, United Kingdom Hybrid / WFH Options
Anson McCade
create large sets of data, which can be efficiently processed to provide actionable intelligence. • Candidates will be working with Big Data, innovative security and threatdetection systems in turn contributing to the system design and development decisions, which affect the integration of both future and existing systems. • The more »
Docker, Kubernetes and more. What You'll Do Architect and automate sophisticated, scalable security systems, processes and controls Oversee and evolve comprehensive security monitoring, threatdetection and intrusion prevention/response Proactively assess risks and threats to develop strategic cybersecurity controls Function as a security force multiplier through more »
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
IT Human Resources
Active Directory, Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security. Expertise in securing virtualized environments, including threatdetection, incident response, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management more »
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
IT Human Resources
Active Directory, Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security. Expertise in securing virtualized environments, including threatdetection, incident response, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management more »