Hemel Hempstead, Hertfordshire, United Kingdom Hybrid / WFH Options
The People Network
SIEM or Cyber Engineer Are you a skilled SIEM Engineer or Cyber Security professional with strong SIEM experience looking to make a real impact? We have an exciting opportunity for a talented individual to join a security team protecting country critical systems in Aerospace and Defence clients based in Hemel … Hempstead with the flexibility of working from home 2 days a week! In this SIEM role, you'll play a vital role in: Designing and implementing best-in-class SIEM solutions (Splunk and/or Sentinel) to fortify our clients' security posture, with a focus on Defence and National Security. … robust detection rules to stay ahead of evolving threats. Actively participating in the design and optimization of security platforms. Im looking for Cyber/SIEM professional with a strong skillset in: SIEM or Cyber Security engineering: Deep understanding of security concepts and experience with SIEM solutions (Splunk and/or more »
and incident management. Possess a working knowledge of Cisco network switches, routers, firewalls and VPN, network security, administration of DLP, antivirusantimalware, IDS/IPS, SIEM, SMTP, Email security, AD, Group Policy, DNS, DHCP, and VLANs. Experience with identity access management solutions, such as SAMLOATH Experience with HIDS and NIDS The more »
may serve as an advantage, or a willingness to work towards. Technology recognised certifications such as Public Cloud (AWS/Azure/GCP), EDR, SIEMand VM vendor certifications. Industry-recognized certifications such as CompTIA Security+, GIAC Security Essentials (GSEC), ISO 27001 Lead Auditor/Implementer, ISC2, ISACA and EC more »
or equivalent experience. 2-4 years of experience in a SOC Analyst or similar role. Strong knowledge of security methodologies, processes, and technologies (firewalls, SIEM, IDS/IPS). Proficiency in TCP/IP protocols, network analysis, and troubleshooting. Experience with incident response and threat intelligence. Excellent written and verbal more »
Bonus + Bens dep on exp and certifications Environment:- Architecture, LLD, Implementation, Microsoft Defender, Microsoft Azure Security Centre, Azure, Intune, Endpoint Protection Platforms, EDR, SIEM, SOC, Risk Assessments, MDM, IAM, Customer Facing, Configuration. My client, a prestigious provider of managed services is looking to hire at Microsoft Security Consultant/ more »
ISO/IEC 27001, COBIT and NIST; awareness and understanding of compliance and data protection regulations, such as GDPR o Understanding of firewalls, proxies, SIEM, antivirus and IDPS concepts o Background in one or more security technologies and a good awareness of the range of available security solutions ▪ Bachelor’s more »
Protection (AIP). Ability to develop and implement strategies for compliance with data protection regulations. Knowledge and experience in security technologies such as EDR, SIEM, and Vulnerability Management is a plus. Relevant security certifications (CISSP, GCIA, CISM, etc.) and/or product certifications (Azure, Windows, AD, etc.) are desirable. This more »
in designing and implementing security architectures for complex IT environments, including cloud-based and hybrid infrastructures. Experience with security technologies and tools such as SIEM, IDS/IPS, DLP, WAF, MFA, etc. Excellent analytical, problem-solving, and decision-making skills, with the ability to prioritize and manage multiple tasks andmore »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM Identity Access ManagementSIEMand MDR VA Vulnerability Analysis and mitigation DLP Data loss prevention PKI Public key infrastructure Ability to guide engineering teams through the deployment where required more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM Identity Access ManagementSIEMand MDR VA Vulnerability Analysis and mitigation DLP Data loss prevention PKI Public key infrastructure Ability to guide engineering teams through the deployment where required more »
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM Identity Access ManagementSIEMand MDR VA Vulnerability Analysis and mitigation DLP Data loss prevention PKI Public key infrastructure Ability to guide engineering teams through the deployment where required more »
regulations.Experience and in-depth technical knowledge of deploying, maintaining, and configuring various security technologies within a large and complex environment (anti-malware/EDR, SIEM solutions, vulnerability scanners, patch management, CASB, DLP, penetration testing tools, etc.).Knowledge of TCP/IP and related network protocols, including standard protocols like TCP more »
Experience and in-depth technical knowledge of deploying, maintaining, and configuring various security technologies within a large and complex environment (anti-malware/EDR, SIEM solutions, vulnerability scanners, patch management, CASB, DLP, penetration testing tools, etc.). Knowledge of TCP/IP and related network protocols, including standard protocols like more »
Security Engineering, Network securityand/or SOC experience. Experienced engineer with demonstrable detailed knowledge of security products, Web Application Firewalls, SASE, access control, SIEM, AV, email and web security gateways, firewalls, load-balancers, ACLs, TCP/IP, routing and switching. Strong understanding of Security Infrastructure design, IT Security best more »
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Proactive Appointments Limited
Security Engineering, Network securityand/or SOC experience. Experienced engineer with demonstrable detailed knowledge of security products, Web Application Firewalls, SASE, access control, SIEM, AV, email and web security gateways, firewalls, load-balancers, ACLs, TCP/IP, routing and switching. Strong understanding of Security Infrastructure design, IT Security best more »
andsecurity monitoring Understanding of threat modelling Investigation experience into Informationand Cyber security incidents Broad technical understanding covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware, SSL and others Experience and knowledge of NIST, COBIT, GCIA, GCIH, GCFA etc. This is an excellent opportunity more »
Cyber Security Experience of working in environments using ISO27001 or Cyber Essentials Plus would be beneficial Strong knowledge of security tooling and technologies including SIEM, vulnerability management, DLP etc Good knowledge and understanding of public Cloud platforms (e.g. AWS and Azure) Good understanding of the current threat landscape Excellent communication more »
and projects. Requirements You will have worked a as Security Operations Engineer or similar role. You will have solid understanding of AWS, Microsoft security, SIEM, SOC, and programming. Solid experience of relevant security frameworks such as ISO27001, GDPR & HIPAA, NIST Cybersecurity Framework. Proven experience AWS and Azure cloud computing experience more »
South East London, England, United Kingdom Hybrid / WFH Options
Oliver Bernard
architecture, procurements and projects.Requirements You will have worked a as Security Operations Engineer or similar role.You will have solid understanding of AWS, Microsoft security, SIEM, SOC, and programming.Solid experience of relevant security frameworks such as ISO27001, GDPR & HIPAA, NIST Cybersecurity Framework.Proven experience AWS and Azure cloud computing experience Understanding of more »
a security operations centre (SOC) and responding to security alerts. Experience in creating response playbooks and handling escalations. Additional experience in EDR, M365 security, SIEM, Vulnerability management, MITRE attack framework, and Incident response. Strong stakeholder engagement skills and the ability to promote a secure mindset within an organisation. Previous experience more »
capability, especially using PowerShell Bash. Familiarity with tools like zScaler, Solarwinds, Crowdstrike, Splunk. Experience with batch automation tools, Linux, and Azure. Working knowledge of SIEM Tools. Experience in Event Analysis, Triage, Incident Handling, and Root-Cause identification. What can we do for you? 22 days holiday On-sire gym at more »
such as access control, cryptography, and network/application security. Familiarity with security frameworks (e.g., NIST CF, ISO 27001, CSA CCM). Experience with SIEM systems, threat modeling (STRIDE, PASTA), API security, and secure coding principles (OWASP Top 10). Expertise in container and serverless security, and IaC security principles. more »
and risk levels Develop and maintain SecOps documentation, policies, and procedures Maintain cybersecurity solutions across systems, applications, and infrastructure Investigate security alerts from the SIEM tool and take appropriate incident response actions. Communicate with stakeholders about security incidents, detailing actions taken. Support the Cyber Incident Response Manager by triaging events more »
Proven work experience as a Cybersecurity Analyst or Engineer or similar role · Experience with computer network penetration testing and techniques · Understanding of firewalls, proxies, SIEM, antivirus and IDPS concepts · Ability to identify and mitigate network vulnerabilities and explain how to avoid them · Knowledge of security frameworks and standards, such as more »
and communication Important Knowledge Cybersecurity Capability Maturity Model (C2M2) and NIST Cyber Security Framework (CSF) Current awareness of the market for data analytics andSIEM platforms, including emerging leaders and Network security implementations (e.g host-based IDS, IPS), including their function and placement Cyber defence andinformationsecurity policies, procedures more »