Hemel Hempstead, Hertfordshire, United Kingdom Hybrid / WFH Options
The People Network
SIEM or Cyber Engineer Are you a skilled SIEM Engineer or Cyber Security professional with strong SIEM experience looking to make a real impact? We have an exciting opportunity for a talented individual to join a security team protecting country critical systems in Aerospace and Defence clients based in Hemel … Hempstead with the flexibility of working from home 2 days a week! In this SIEM role, you'll play a vital role in: Designing and implementing best-in-class SIEM solutions (Splunk and/or Sentinel) to fortify our clients' security posture, with a focus on Defence and National Security. … robust detection rules to stay ahead of evolving threats. Actively participating in the design and optimization of security platforms. Im looking for Cyber/SIEM professional with a strong skillset in: SIEM or Cyber Security engineering: Deep understanding of security concepts and experience with SIEM solutions (Splunk and/or more »
Bonus + Bens dep on exp and certifications Environment:- Architecture, LLD, Implementation, Microsoft Defender, Microsoft Azure Security Centre, Azure, Intune, Endpoint Protection Platforms, EDR, SIEM, SOC, Risk Assessments, MDM, IAM, Customer Facing, Configuration. My client, a prestigious provider of managed services is looking to hire at Microsoft Security Consultant/ more »
ISO/IEC 27001, COBIT and NIST; awareness and understanding of compliance and data protection regulations, such as GDPR o Understanding of firewalls, proxies, SIEM, antivirus and IDPS concepts o Background in one or more security technologies and a good awareness of the range of available security solutions ▪ Bachelor’s more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM Identity Access ManagementSIEMand MDR VA Vulnerability Analysis and mitigation DLP Data loss prevention PKI Public key infrastructure Ability to guide engineering teams through the deployment where required more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM Identity Access ManagementSIEMand MDR VA Vulnerability Analysis and mitigation DLP Data loss prevention PKI Public key infrastructure Ability to guide engineering teams through the deployment where required more »
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM Identity Access ManagementSIEMand MDR VA Vulnerability Analysis and mitigation DLP Data loss prevention PKI Public key infrastructure Ability to guide engineering teams through the deployment where required more »
and a team of cyber analysts, preferably in a large and complex organisation. Expert knowledge of security operations processes, tools and technologies, such as SIEM, SOAR, EDR, XDR NDR, threat intelligence, vulnerability management, forensics and malware analysis. Strong understanding of security frameworks, standards and regulations, such as ISO 27001, NIST more »
Security Engineering, Network securityand/or SOC experience. Experienced engineer with demonstrable detailed knowledge of security products, Web Application Firewalls, SASE, access control, SIEM, AV, email and web security gateways, firewalls, load-balancers, ACLs, TCP/IP, routing and switching. Strong understanding of Security Infrastructure design, IT Security best more »
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Proactive Appointments Limited
Security Engineering, Network securityand/or SOC experience. Experienced engineer with demonstrable detailed knowledge of security products, Web Application Firewalls, SASE, access control, SIEM, AV, email and web security gateways, firewalls, load-balancers, ACLs, TCP/IP, routing and switching. Strong understanding of Security Infrastructure design, IT Security best more »
Didcot, Oxfordshire, United Kingdom Hybrid / WFH Options
Alexander Mann Solutions - Public Sector Resourcing
policy and applying a pragmatic approach to resolution of sophisticated problems Knowledge of security technologies potentially including Microsoft 365 security tools, patch management tools, SIEM, IPS, IDS and content inspection. The role is conditional on having or obtaining UK National Security Vetting Security Clearance (SC) If this role sounds like more »
Cyber Security Experience of working in environments using ISO27001 or Cyber Essentials Plus would be beneficial Strong knowledge of security tooling and technologies including SIEM, vulnerability management, DLP etc Good knowledge and understanding of public Cloud platforms (e.g. AWS and Azure) Good understanding of the current threat landscape Excellent communication more »
capability, especially using PowerShell Bash. Familiarity with tools like zScaler, Solarwinds, Crowdstrike, Splunk. Experience with batch automation tools, Linux, and Azure. Working knowledge of SIEM Tools. Experience in Event Analysis, Triage, Incident Handling, and Root-Cause identification. What can we do for you? 22 days holiday On-sire gym at more »
and risk levels Develop and maintain SecOps documentation, policies, and procedures Maintain cybersecurity solutions across systems, applications, and infrastructure Investigate security alerts from the SIEM tool and take appropriate incident response actions. Communicate with stakeholders about security incidents, detailing actions taken. Support the Cyber Incident Response Manager by triaging events more »
Proven work experience as a Cybersecurity Analyst or Engineer or similar role · Experience with computer network penetration testing and techniques · Understanding of firewalls, proxies, SIEM, antivirus and IDPS concepts · Ability to identify and mitigate network vulnerabilities and explain how to avoid them · Knowledge of security frameworks and standards, such as more »
and communication Important Knowledge Cybersecurity Capability Maturity Model (C2M2) and NIST Cyber Security Framework (CSF) Current awareness of the market for data analytics andSIEM platforms, including emerging leaders and Network security implementations (e.g host-based IDS, IPS), including their function and placement Cyber defence andinformationsecurity policies, procedures more »
and communication Important Knowledge Cybersecurity Capability Maturity Model (C2M2) and NIST Cyber Security Framework (CSF) Current awareness of the market for data analytics andSIEM platforms, including emerging leaders and Network security implementations (e.g host-based IDS, IPS), including their function and placement Cyber defence andinformationsecurity policies, procedures more »
Security Centre (NCSC) Cyber Assessment Framework (CAF) and ISA/IEC 62443, ISO/IEC 27001/27002, GDPR.Working knowledge of security technologies including SIEM, SOAR, EDR, AV, IDS/IPS, NAC, AD, DLP, Web Filtering, Email Filtering, Behavioural Analytics.Knowledge of adversarial tactics, techniques, procedures (TTPs) and industry standard frameworks more »
a Managed Service Provider (MSP) environment. Strong understanding of networking protocols, security technologies, and best practices. Hands-on experience with security tools such as SIEM, IDS/IPS, antivirus, firewalls, and endpoint protection. Familiarity with industry regulations and standards (e.g., GDPR, HIPAA, PCI DSS). Excellent analytical and problem-solving more »
infrastructure, including Hyper-V and VMWare. Practical experience in Storage Solutions, Backup and Replication Services (DFS, VEEAM, ASR). Experienced with security controls including SIEM, Vulnerability Scanning, Server and Client Security, ZScaler and Microsoft Defender for Cloud. Demonstrable experience of similar position/role or working within established architecture practice. more »
NCSC) Cyber Assessment Framework (CAF) and ISA/IEC 62443, ISO/IEC 27001/27002, and GDPR. Working knowledge of security technologies including SIEM, SOAR, EDR, AV, IDS/IPS, NAC, AD, DLP, Web Filtering, Email Filtering, Behavioural Analytics. Knowledge of adversarial tactics, techniques, procedures (TTPs) and industry standard more »
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
SDL Solutions Limited
updated on IT security trends and regulations. Maintain accurate security documentation. Skills and Qualifications: Understanding of computer networking across LANs and WANs Knowledge of SIEM solutions Any knowledge of Azure Security principles Ideally experience with Microsoft Defender stack Knowledge of essential cybersecurity principles and practices Excellent communication, stakeholder management, andmore »
Bradford, England, United Kingdom Hybrid / WFH Options
Caraffi
policies, and standards. Assess risk and compliance for solutions at scale, with a focus on 5000+ endpoints, and implement security infrastructure solutions such as SIEM, Access Governance, SASE, and Endpoint Protection. Apply informationsecurity standards (e.g., ISO 27001, ISF, NIST), industry security guidance (OWASP & CIS), and risk assessment frameworks to more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment
methodologies. Proficient with Microsoft, Windows, and related technologies. Familiarity with networking and network infrastructure. Experienced in designing, implementing, and managing Security services such as SIEM, Endpoint protection, EDR, and Vulnerability management platforms. To be considered for this position, please apply today or contact Sophie on snorton@weareninetwenty.com more »
and communicate effectively at all levels to both technical and non-technical audiences, assess and evaluate risk and understand the implications of new technologies. SIEM experience with designing, implementing and maintaining Splunk Excellent analytical and problem-solving skills coupled with ability to assess complex situations, identify risks, and recommend effective more »
configuration, and implementation of security controls and services. Design, configure and manage an array of Cyber Security tools and technologies including anti-virus products, SIEM, EDR, XDR and CMDBs. Develop and deliver secure system profiles and maintain a view of compliance. Assist the development of granular Asset Management tooling andmore »