networking technologies, server and storage systems, and cloud infrastructure (such as AWS or Azure). • Solid understanding of cyber security principles, including risk assessment, threatdetection, and security frameworks. • The ability to communicate effectively and articulate complex concepts in a clear and concise manner. • Excellent problem-solving skills. more »
configure, and command a symphony of security tools - EDR/XDR, vulnerability management, email gateways, you name it. Fine-tune rules and detections, optimising threatdetection and reducing false alarms. • Network Security Sage: Possess a deep understanding of network protocols, security concepts, and monitoring tools. Firewalls, IDS/ more »
designing, developing, and maintaining our security information and event management (SIEM) system. Your focus will be on leveraging Elasticsearch and related technologies to enhance threatdetection, incident response, and overall security posture. What you’ll be doing • Data Ingestion and Enrichment: o Configure Elasticsearch pipelines for data ingestion … from various sources, primarily from Kafka o Enhance data enrichment by integrating threat intelligence feeds and contextual information. • SIEM Solution Development: o Collaborate with security analysts and architects to design and implement SIEM solutions using Elasticsearch. o Optimize SIEM rules, alerts, and dashboards for efficient threat detection. • Query more »
Preston, Lancashire, United Kingdom Hybrid / WFH Options
BAE Systems
KQL combined with the ability to create custom KQL scripts that are used to conduct sophisticated security data analysis and uplift incident response and threatdetection capabilities within a SIEM Highly motivated with the ability to work autonomously to complete a range of tasks to time and quality more »
Employment Type: Permanent
Salary: £60000/annum Depending on skills and experience
Warrington, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
team and customer. Collaborate with teams to design and implement Sentinel for specific client needs. Configure and optimise Sentinel for advanced security monitoring and threat detection. Conduct regular assessments and audits to ensure Sentinel effectiveness. Troubleshoot and resolve technical issues related to Sentinel deployments. Your Profile: Strong understanding of more »
Hinckley, England, United Kingdom Hybrid / WFH Options
DP World
resource utilization Implement and manage multi-factor authentication solutions for enhanced security across various systems and applications. Manage and monitor Endpoint security Platforms including detection and respond to advanced threats. Implement and maintain web and reverse proxy solutions, ensuring secure and reliable access to internal and external resources. Implement … Implementing security measures and protocols to safeguard the organization's IT infrastructure from potential threats and cyberattacks. This may include setting up firewalls, intrusion detection systems, and access controls. Investigating and resolving technical issues related to hardware, software, and network components. Troubleshooting may involve diagnosing problems, working with vendors … attitude, self starter, adaptable who welcomes challenge and problem solving Solid experience in managing and maintaining Windows Server environments, knowledge of Endpoint protection for threatdetection and response. Exposure and experience in implementing various IT infrastructure in a fast paced challenging environment Proficiency in backup and replication technologies more »
Manchester Area, United Kingdom Hybrid / WFH Options
Chapman Tate Associates
of Azure resources (VMs, storage, networking, databases, etc.) Implement and enforce security best practices within the Azure environment, including access control, identity management, and threatdetection Monitor Azure services for performance and identify opportunities for optimization Automate routine tasks using Azure automation tools (ARM templates, Azure CLI, PowerShell more »
Stockport, England, United Kingdom Hybrid / WFH Options
Chapman Tate Associates
of Azure resources (VMs, storage, networking, databases, etc.) Implement and enforce security best practices within the Azure environment, including access control, identity management, and threatdetection Monitor Azure services for performance and identify opportunities for optimization Automate routine tasks using Azure automation tools (ARM templates, Azure CLI, PowerShell more »
SK5, Heaton Norris, Borough of Stockport, Greater Manchester, United Kingdom Hybrid / WFH Options
Chapman Tate Associates
of Azure resources (VMs, storage, networking, databases, etc.) Implement and enforce security best practices within the Azure environment, including access control, identity management, and threatdetection Monitor Azure services for performance and identify opportunities for optimization Automate routine tasks using Azure automation tools (ARM templates, Azure CLI, PowerShell more »
Oldham, Greater Manchester, North West, United Kingdom
BluetownOnline Ltd
IT infrastructure components, including databases, storage solutions, and backup systems Ability to translate business requirements into efficient IT solutions Proficiency in cybersecurity practices, including threatdetection, prevention, and incident response Professional work ethic with a client-driven focus and attention to detail Familiarity with IT project management methodologies more »
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
BlackRock
robust and quick to market. The suite of applications developed and maintained by the team are used to enhance the firm’s information security threatdetection, compliance, entitlement management architectures and audit assurance programs. You'll have the freedom to challenge the status quo, mentor fellow engineers, and more »
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
McGregor Boyall
Active Directory, Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security Expertise in securing virtualized environments, including threatdetection, incident response, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
McGregor Boyall Associates Limited
Active Directory, Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security Expertise in securing virtualized environments, including threatdetection, incident response, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management more »
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
McGregor Boyall Associates Limited
Active Directory, Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security Expertise in securing virtualized environments, including threatdetection, incident response, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management more »
drive value for the organization. The suite of applications developed and maintained by the team are used to enhance the firm’s information security threatdetection, compliance, entitlement management architectures and audit assurance programs. Key Responsibilities: Analysing requirements from the business and understanding their processes. Documenting requirements in more »
robust and quick to market. The suite of applications developed and maintained by the team are used to enhance the firm’s information security threatdetection, compliance, entitlement management architectures and audit assurance programs. You'll have the freedom to challenge the status quo, mentor fellow engineers, and more »
Warrington, England, United Kingdom Hybrid / WFH Options
Tata Consultancy Services
needs. Key Responsibilities: Collaborate with teams to design and implement Sentinel for specific client needs. Configure and optimise Sentinel for advanced security monitoring and threat detection. Conduct regular assessments and audits to ensure Sentinel effectiveness. Troubleshoot and resolve technical issues related to Sentinel deployments. Your Profile: Technical key skills more »
the Security Engineer will design and implement security solutions in the Microsoft Security stack. The ideal candidate will come from a Security Operations or Threat Hunting background. Being the Liaison between SOC teams and clients, you will need strong expertise in cloud security concepts (ideally within Azure), and be … able to perform security assessments and scan for vulnerabilities. If you have prior experience with Microsoft Defender, Azure Sentinel, threatdetection and are able to accurately consult clients about their needs, whilst implementing effective security solutions, I strongly recommend applying. An excellent opportunity to upskill and develop your more »
their test case writing ability. The suite of applications developed and maintained by the team are used to enhance the firm’s information security threatdetection, compliance, entitlement management architectures and audit assurance programs. You'll have the freedom to challenge the status quo, mentor fellow engineers, and more »
and utilize expertise to map the attack chain across complex environments, encompassing cloud, identity, email, network, and endpoint. In-depth understanding of the cyber threat landscape, particularly in the aviation sector. Demonstrated ability to translate threat knowledge into proactive threat detection. Proficient in analyzing and researching new … or trending attacks, threat actors, malware samples, and tactics, techniques, and procedures (TTPs) Excellent English language skills in reading, writing, and speaking, with the capability to articulate security insights effectively, both in creating and interpreting security metrics, and in presenting them clearly to all levels of hierarchy, including senior … leadership. Experience: Minimum of 5 years of experience in endpoint security, malware analysis, threat hunting, penetration testing, incident response, reverse engineering, or digital forensics. Familiarity with AWS cloud infrastructure, with hands-on experience monitoring associated logs, including GuardDuty, CloudTrail, and VPC Flow. Proven experience with Akamai security tools such more »
Central (DACH, Cz, Pl etc.) Europe. This individual will be working within an established Telco sector Cybersecurity company whom are experts in Network Traffic, ThreatDetection and Telco Network centric cybersecurity solutions. This is a new position and whilst we would love to find someone with Telco Sector more »
as Key Account Manager for one such interesting customer, for whom we significantly contribute to designing and developing conceptual models into the future of threatdetection and countermeasures, influencing the EW domain. Whilst our main hubs of engineering activity are at our Cambridgeshire and Lincolnshire HQs, this role more »
South West London, London, United Kingdom Hybrid / WFH Options
MASS Consultants
as Key Account Manager for one such interesting customer, for whom we significantly contribute to designing and developing conceptual models into the future of threatdetection and countermeasures, influencing the EW domain. Whilst our main hubs of engineering activity are at our Cambridgeshire and Lincolnshire HQs, this role more »
and has previously built user - facing privacy and security capabilities knows how to ensure the integrity and protection of data , i.e. encryption , access controls , threatdetection , incident response, GDPR, etc has worked on large corporate accounts , and is confident with the longer-lifecycle enterprise selling process is excited more »
Greater London, England, United Kingdom Hybrid / WFH Options
Anson McCade
create large sets of data, which can be efficiently processed to provide actionable intelligence. • Candidates will be working with Big Data, innovative security and threatdetection systems in turn contributing to the system design and development decisions, which affect the integration of both future and existing systems. • The more »