its security suite. A good understanding of Security Operations You're a fast learner, passionate about emerging security trends. Experience with security tools like SIEM, IDPS, Cloud Security, and EDR is a big plus. Experience with Zscaler, CrowdStrike, or Qualys Web3 and DeFi Experience with ISO27001 and SOC2 If you more »
relevant experience in: Have experience working in public sector, defence or ‘regulated’ organisations. Have SOC awareness and establishing SOC comms processes. Demonstrable experience in SIEM Procedure creation. Demonstrable experience of Secure by Design. Experience with Oracle Cloud and associated tooling. Have strong internal audit skills and experience. Have strong experience more »
VPN, TCP/IP, SSL, TLS, IDS/IPS, SSH, SNMP, NTP of security tools and technologies, including firewalls, IDS/IPS, VPN, andSIEMand scripting skills required (Python, Powershell scripting or Shell scripts preferred) to learn and adapt to new challenges problem-solving skills and excellent communication andmore »
Coventry, England, United Kingdom Hybrid / WFH Options
Lorien
tools to enable the detection and defence from threats to the society. Essential skills: • Experience of configuring security tools including one of the following: SIEM, EDR, AV, WAF or Secure Web Gateways. • Experience of integrating tools in an enterprise environment. • Proven problem-solving, analytical skills • Great experience of Microsoft Defender more »
in managing security consultants. Demonstrable consulting experience, trusted advisor, working in partnership with customers and a good relationship builder. Previous experience of working with SIEM products like Splunk, Exabeam, ArcSight, Sentinel, Cisco Sourcefire or other IPS/IDS products is essential Security transformation programmes – design andmanagement of security solution more »
Tier 1 Analysts to improve detection/analytical capabilities within the SOC and monitor SOC Tier 1 Analyst performance. Qualifications: Skills: Proficiency in using SIEM tools, especially Microsoft Sentinel and the Microsoft Defender suite. Proficiency in Kusto Query Language (KQL). Experience with the creation, configuration and use of Playbooks more »
of security principles, practices, and technologies, including encryption, authentication, and access control. Experience with security tools and technologies such as SAST, DAST, vulnerability scanners, SIEM, and WAF. Proficiency with CI/CD tools like Jenkins, GitLab, CircleCI, or similar, and infrastructure-as-code tools like Terraform, CloudFormation, or Ansible. Hands more »
of security principles, practices, and technologies, including encryption, authentication, and access control. Experience with security tools and technologies such as SAST, DAST, vulnerability scanners, SIEM, and WAF. Proficiency with CI/CD tools like Jenkins, GitLab, CircleCI, or similar, and infrastructure-as-code tools like Terraform, CloudFormation, or Ansible. Hands more »
Leeds, England, United Kingdom Hybrid / WFH Options
Fruition IT
Proven experience in deploying new projects, services and features to cloud. Ability to support SaaS platforms such as Mimecast, Varonis, Identity Management, Cisco Umbrella, SIEMand SASE services, as well as traditional on-premises servers and Windows operating systems, VMware and Storage Knowledge of device and mobility managementand applied more »
Experience: Bachelor’s degree in a related technical area. One or more relevant certifications such as CISSP, CISM, GCIH, CEH, or OSCP. Proficiency in SIEM Platforms, vulnerability management tools, and incident management processes. Experience in managing security functions or SOC capabilities. Strong analytical skills to analyze security monitoring data andmore »
and business or technical complexity Deep understanding of the technical concepts required in the role including LAN, WAN, WiFi, data-centre networks, unified comms SIEMand IPS/IDS technologies and toolset used for vulnerability scanning including Nessus Cloud computing including IaaS, PaaS and SaaS. Core network skills to include more »
or similar frameworks experience and certifications VMware VMware Cloud vSphere vSAN vCenter ESXi Dell VxRail Designing highly secure on prem infrastructure Cross Domain Gateways SIEM National Defence experience not essential but highly advantageous HLD and LLD Windows Data Diodes All applicants must either have or be able to obtain SC more »
Leeds, England, United Kingdom Hybrid / WFH Options
Harvey Nash
implementing security by design. Other essentials: Background that covers cyber technology, security operations, incident response, architecture, and training. Experience in implementing technology such as SIEM, XDR, SOAR, etc. Background in Financial Services or other regulated industries (desired) Experience in leading through leaders and developing an internal capability Good soft skills more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
to state affiliated groups. Preventing and detecting common attacker techniques and the MITRE ATT&CK framework. Tuning and configuring cyber security tools, for example SIEMand EDR tooling. How enterprise IT networks, Active Directory and Azure AD operate. Service Management of key partners This role comes with excellent benefits such more »
Technical Lead in a team of 10 and company size of 300. Skills: Experience in tools such as Tenable. Fundamental experience in EDR, XDR, SIEM, Microsoft Defender, Sentinel, Access Management Researching and accessing vulnerabilities Stakeholder management experience Managing vulnerability management services to clients Good communication skills Salary more »
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Matchtech
track record in leading a technical security team. Demonstrated experience in planning, developing, and implementing Azure security technologies. Familiarity with security technologies such as SIEM, firewalls, intrusion detection/prevention systems, antivirus software, authentication systems, and log management. Strong knowledge of security approaches, including risk analysis, attack vectors, cryptography, andmore »
Northampton, Northamptonshire, United Kingdom Hybrid / WFH Options
Constant Recruitment Ltd
other administrative tasks as needed. Key Technologies and Skills: Microsoft Windows Server Active Directory Linux IBM operating systems Microsoft Excel QUALYS PALO ALTO CORTEX SIEM tools (e.g., Splunk, ArcSight, LogRhythm) Patching and Update ManagementSecurity Monitoring Automation tools (e.g., Ansible, Puppet, Chef) Scripting languages (e.g., Python, PowerShell, Bash) Compliance frameworks more »
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Constant Recruitment Ltd
other administrative tasks as needed. Key Technologies and Skills: Microsoft Windows Server Active Directory Linux IBM operating systems Microsoft Excel QUALYS PALO ALTO CORTEX SIEM tools (e.g., Splunk, ArcSight, LogRhythm) Patching and Update ManagementSecurity Monitoring Automation tools (e.g., Ansible, Puppet, Chef) Scripting languages (e.g., Python, PowerShell, Bash) Compliance frameworks more »
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Constant Recruitment Ltd
other administrative tasks as needed. Key Technologies and Skills: Microsoft Windows Server Active Directory Linux IBM operating systems Microsoft Excel QUALYS PALO ALTO CORTEX SIEM tools (e.g., Splunk, ArcSight, LogRhythm) Patching and Update ManagementSecurity Monitoring Automation tools (e.g., Ansible, Puppet, Chef) Scripting languages (e.g., Python, PowerShell, Bash) Compliance frameworks more »
Sevenoaks, Kent, South East, United Kingdom Hybrid / WFH Options
Constant Recruitment
other administrative tasks as needed. Key Technologies and Skills: Microsoft Windows Server Active Directory Linux IBM operating systems Microsoft Excel QUALYS PALO ALTO CORTEX SIEM tools (e.g., Splunk, ArcSight, LogRhythm) Patching and Update ManagementSecurity Monitoring Automation tools (e.g., Ansible, Puppet, Chef) Scripting languages (e.g., Python, PowerShell, Bash) Compliance frameworks more »
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Picture More Ltd
of planning, development and implementation of Azure security-related technologies An excellent understanding of infrastructure and application technologies An excellent understanding of security technologies: SIEM, Firewalls, intrusion detection/prevention systems, anti-virus software, authentication systems, log management, content filtering, etc. An excellent understanding of security approaches: ISMS, risk analysis more »
Triage issues escalated to the SOC and ensure that appropriate follow-up measures are taken in a timely and professional manner Utilising industry leading SIEM, AV, MDR, Networking, Identity, Email, and Cloud based tools Assist with the development and continuous improvement of runbooks, identifying efficiencies where applicable Identifying and suggesting more »
in previous Incident Response function environments. Experience with tools for open-source investigation (WireShark, TCPDump, Netflow, etc.); network defence monitoring technologies (IDS/IPS, SIEM, Firewalls, etc.); and sandboxing technologies for static and dynamic malware analysis (IDA Pro, REMnux, etc.). Working knowledge of leading a technical team and mentoring more »