. Working knowledge of networking, operating systems (Windows/IOS), and security protocols. Experience with one or more security tools (e.g., Splunk, Nessus, CrowdStrike, Palo Alto, Wireshark). Basic understanding of cloud security concepts (AWS, Azure, or GCP is a plus). Ability to analyse logs, spot anomalies, and More ❯
well-architected and secure-by-design approach. Experience in malware/software analysis, vulnerability management, and incident response. Experience with cybersecurity tools such as CrowdStrike, Wiz, Tenable, Proofpoint, Microsoft Defender and other threat detection suites. Experience and comfort working with various network platforms including Fortinet, Palo Alto and F5. More ❯
Linux, Mac). Advanced understanding of networking concepts and ability to analyze network artifacts. Demonstrate experience in using Endpoint Detection and Response software (Sentinel1, Crowdstrike, Defender ETC.). Advanced knowledge of at least one leading SIEM platform (Sentinel, Splunk, Elastic, IBM Qradar, Chronicle etc.). Possess at least one More ❯
following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (Carbon Black, Microsoft Defender ATP, FireEye, CrowdStrike) Programming (Python, or other languages) What you can expect from us We won’t just meet your expectations. We’ll defy them. So you More ❯
following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (Carbon Black, Microsoft Defender ATP, FireEye, CrowdStrike) Programming (Python, or other languages) What you can expect from us We won’t just meet your expectations. We’ll defy them. So you More ❯
attack tactics, techniques, and procedures (TTPs). Exhibit skills using common Incident Response and Security Monitoring applications such as SIEM (Splunk), EDR (FireEye HX, CrowdStrike Falcon, McAfee mVision EDR), WAF, IPS. Additional Information Benefits package includes: Flexible work environment, working hybrid or in the office if you prefer. Great More ❯
attack tactics, techniques, and procedures (TTPs). Exhibit skills using common Incident Response and Security Monitoring applications such as SIEM (Splunk), EDR (FireEye HX, CrowdStrike Falcon, McAfee mVision EDR), WAF, IPS. Additional Information Benefits package includes: Flexible work environment, working hybrid or in the office if you prefer. Great More ❯
attack tactics, techniques, and procedures (TTPs). Exhibit skills using common Incident Response and Security Monitoring applications such as SIEM (Splunk), EDR (FireEye HX, CrowdStrike Falcon, McAfee mVision EDR), WAF, IPS. Additional Information Benefits package includes: Flexible work environment, working hybrid or in the office if you prefer. Great More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Experian Ltd
attack tactics, techniques, and procedures (TTPs). Exhibit skills using common Incident Response and Security Monitoring?applications such as SIEM (Splunk), EDR (FireEye HX, CrowdStrike Falcon, McAfee mVision EDR.), WAF, IPS Additional Information Benefits package includes: Flexible work environment, working hybrid or in the office if you prefer. Great More ❯
attack tactics, techniques, and procedures (TTPs). Exhibit skills using common Incident Response and Security Monitoring applications such as SIEM (Splunk), EDR (FireEye HX, CrowdStrike Falcon, McAfee mVision EDR), WAF, IPS. Additional Information Benefits package includes: Flexible work environment, working hybrid or in the office if you prefer. Great More ❯
the cloud experience needed. Skills & Experience Required: 2+ years of experience as a security operations/information security analyst within an AWS environment Strong CrowdStrike experience is preferred Experience with a range of SIEM, SOAR and vulnerability management tools Experience advising on security best practices and developing SOC playbooks More ❯
problem-solving skills in an agile and resilient manner. Required technical experience: Microsoft Sentinel Microsoft Defender products Splunk Cloud + Splunk Enterprise Security (ES) Crowdstrike Falcon Tenable Vulnerability Management Be yourself. We embrace diverse perspectives, experiences, and backgrounds. Please let us know if you require support or adjustments to More ❯
problem-solving skills in an agile and resilient manner. Required technical experience: Microsoft Sentinel Microsoft Defender products Splunk Cloud + Splunk Enterprise Security (ES) Crowdstrike Falcon Tenable Vulnerability Management Be yourself. We embrace diverse perspectives, experiences, and backgrounds. Please let us know if you require support or adjustments to More ❯
problem-solving skills in an agile and resilient manner. Required technical experience: Microsoft Sentinel Microsoft Defender products Splunk Cloud + Splunk Enterprise Security (ES) Crowdstrike Falcon Tenable Vulnerability Management Be yourself. We embrace diverse perspectives, experiences, and backgrounds. Please let us know if you require support or adjustments to More ❯
problem-solving skills in an agile and resilient manner. Required technical experience: Microsoft Sentinel Microsoft Defender products Splunk Cloud + Splunk Enterprise Security (ES) Crowdstrike Falcon Tenable Vulnerability Management Be yourself. We embrace diverse perspectives, experiences, and backgrounds. Please let us know if you require support or adjustments to More ❯
problem-solving skills in an agile and resilient manner. Required technical experience: Microsoft Sentinel Microsoft Defender products Splunk Cloud + Splunk Enterprise Security (ES) Crowdstrike Falcon Tenable Vulnerability Management Be yourself. We embrace diverse perspectives, experiences, and backgrounds. Please let us know if you require support or adjustments to More ❯
Stone Technologies Ltd trading as Converge Technology Solutions
technologies and cloud architecture (Microsoft and AWS). Relevant certifications such as CISSP, CISM. Vendor experience/accreditations with Microsoft, IBM, Palo Alto, Fortinet, Crowdstrike, and Cisco. Essential Experience or Skills: Pre-sales experience within the cybersecurity market. Highly perceptive with an analytical mindset. Excellent communication and presentation skills. More ❯
secure environments. Key Responsibilities: Cloud Security Operations: Securely manage Azure, M365 & AWS security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response: Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM): Design and enforce robust IAM policies … Management: Expertise in managing vulnerabilities across diverse assets and implementing application security in cloud environments. Security tooling: experience in any of the following; (Wiz, CrowdStrike, Proofpoint, BitSight, Akamai, CATO) Experience with security engineering, incident response, threat hunting, or digital forensics. Preferred Qualifications: Relevant cybersecurity certifications such as CISSP, CISM More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
resilient and secure environments. Cloud Security Operations : Securely manage Azure, M365 & AWS security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and enforce robust IAM policies … Management: Expertise in managing vulnerabilities across diverse assets and implementing application security in cloud environments. Security tooling: experience in any of the following; (Wiz, CrowdStrike, Proofpoint, BitSight, Akamai, CATO) Experience with security engineering, incident response, threat hunting, or digital forensics. Preferred Qualifications: Relevant cybersecurity certifications such as CISSP, CISM More ❯
resilient and secure environments. Cloud Security Operations : Securely manage Azure, M365 & AWS security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and enforce robust IAM policies … Management: Expertise in managing vulnerabilities across diverse assets and implementing application security in cloud environments. Security tooling: experience in any of the following; (Wiz, CrowdStrike, Proofpoint, BitSight, Akamai, CATO) Experience with security engineering, incident response, threat hunting, or digital forensics. Preferred Qualifications: Relevant cybersecurity certifications such as CISSP, CISM More ❯
Strong troubleshooting skills (endpoint/server/infrastructure) Hands-on with SIEM (e.g. Splunk), PAM (e.g. CyberArk), WAF, email security, and endpoint tools (e.g. CrowdStrike, Microsoft Sentinel) Knowledge of SPF, DKIM, and DMARC Familiar with cloud environments, ideally Azure Exposure to scripting (PowerShell/Python) and tools like Terraform More ❯
Strong troubleshooting skills (endpoint/server/infrastructure) Hands-on with SIEM (e.g. Splunk), PAM (e.g. CyberArk), WAF, email security, and endpoint tools (e.g. CrowdStrike, Microsoft Sentinel) Knowledge of SPF, DKIM, and DMARC Familiar with cloud environments, ideally Azure Exposure to scripting (PowerShell/Python) and tools like Terraform More ❯
stack, and security frameworks. Knowledge of compliance guidelines and solution design. Relevant certifications (CISSP, CISM, CompTIA, CCNA) a plus. Familiar with vendors like Microsoft, Crowdstrike, Sophos, Fortinet, and Palo Alto. If this sounds like the job for you, we urge your to please submit your CV for consideration and More ❯