/DevOps). Knowledge of security frameworks and regulatory compliance standards (NIST CSF, SOX ITGC, GDPR, MITRE ATT&CK, etc.) Experience with common industry SIEMand vulnerability management platforms. Experience maintaining the Microsoft Defender platform and other Microsoft security products. Ability to rank and prioritize vulnerabilities andsecurity recommendations appropriately More ❯
management. Possess a working knowledge of Cisco network switches, routers, firewalls and VPN, network security, administration of DLP, antivirus/antimalware, IDS/IPS, SIEM, SMTP, Email security, AD, Group Policy, DNS, DHCP, and VLANs. Experience with identity access management solutions, such as SAML/OATH. Experience with HIDS andMore ❯
household Onsite perks including free parking, tea and coffee stations, and a subsidized café with free breakfast toast Responsibilities Security Monitoring & Incident Response: Use SIEM tools like Exabeam, LogRhythm, Splunk, or Arcsight to monitor security events, detect threats, and analyze data to address incidents swiftly. Vulnerability Management Tools: Conduct regular More ❯
systems and understanding a variety of IT platforms. We are looking for people who possess any of the following technical skills: Proficiency in using SIEM platforms (Splunk highly desirable). Familiarity with EDR (Endpoint Detection and Response) tools and network monitoring tools. Experience with cloud environments , particularly AWS , including securityMore ❯
RAN architectures andsecurity requirements. Strong knowledge of network security protocols, VPN, firewall management, and intrusion detection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks (e.g., GDPR, HIPAA, ISO 27001). In-depth understanding of routers, switches, firewalls More ❯
relevant to SaaS products, preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusion detection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools. You own relevant certifications (Security+, IAT II/III level or similar). You excel in risk assessments, vulnerability More ❯
firewalls, VPNs, and cloud-based networking solutions. Experience with IAM systems (e.g., Azure AD/Microsoft Entra) andsecurity tools (e.g., endpoint protection, DLP, SIEM). Hands-on expertise with troubleshooting hardware, software, and SaaS issues. Security Knowledge: Familiarity with security frameworks and standards such as SOC 2, ISO More ❯
and response, and supporting the implementation of security controls and policies across cloud, on-premise, and hybrid environments. This role also involves working with SIEM solutions, automating security workflows, and contributing to the company's compliance with Cyber Essentials Plus and ISO 27001 standards. Key Responsibilities: Design, implement, and manage … and threat management. Leverage Infrastructure as Code (IaC) principles using Terraform to automate security policies and infrastructure deployment. Utilize SecurityInformationandEventManagement (SIEM) solutions (preferably Microsoft Sentinel SIEM ) to monitor, detect, and respond to security incidents. Create and maintain runbooks for security incident response, including automating workflows to … cloud infrastructure, managing security controls). SIEM Solutions: First-hand experience working with SIEM solutions , particularly Microsoft Sentinel SIEM . Experience in designing and managing SIEM rule sets, creating dashboards, and correlating data for threat detection. Familiarity with securityevent log analysis, alerts management, and incident response workflows. Cybersecurity Frameworks More ❯
systems, and cloud technologies. Strong understanding of security principles, practices, and frameworks (e.g., PCI, NIST, ISO 27001). Experience with security tools such as SIEM, IDS/IPS, endpoint protection, and penetration testing tools. Experience with public cloud security, specifically AWS, Azure, and Google Cloud Platform (GCP). You will More ❯
data protection, and cyber law Strong troubleshooting abilities in systems, networking, and cloud environments Proven hands-on experience with tools like PAM, EDR, CASB, SIEM, DLP, email filtering , and vulnerability management Proficient in cloud services , especially in environments using virtual machines, identity management, web apps , and networking components (e.g., virtual More ❯
security (AWS, Azure, GCP). Apply risk-based and threat-based approaches to evaluate and recommend appropriate and proportionate security technologies and solutions (e.g., SIEM, IAM, CASB, container security). Outline key security components, interfaces, and dependencies. Develop architectural diagrams and overviews. Document security design principles and provide rationale. Ensure More ❯
experience in security operations or incident response. Bachelor's degree in Cybersecurity, Computer Science, or related field, or equivalent work experience. Extensive knowledge of SIEM, EDR, Web & Email Gateways, Cloud Security, and firewall technologies. Proficiency in scripting languages such as Python and PowerShell, with a strong understanding of TCP/ More ❯
Minimum 3 years' experience in cybersecurity. Strong knowledge of security frameworks (NIST 800, ISO 27001) and GDPR regulations. Experience with network security infrastructure andSIEM tools (Splunk, SolarWinds). Proficiency in Windows/Linux system administration and virtualization technologies (VMware, Hyper-V). Previous experience within the finance or banking More ❯
depth technical knowledge of deploying, maintaining, and configuring a wide range of security technologies within a large and complex environment (anti-malware/EDR, SIEM solutions, vulnerability scanners, patch management, CASB, DLP, penetration testing tools, etc.) Knowledge of TCP/IP and related network protocols: knowledge of standard network protocols More ❯
London, England, United Kingdom Hybrid / WFH Options
Anson McCade
. Expertise in threat/risk modelling, network security, encryption, authentication, and access control. Skilled in configuring security technologies like firewalls, IDS/IPS, SIEM, and vulnerability tools. Knowledge of cloud security (AWS, Azure, and Google) and DevSecOps practices. Experienced in researching emerging tech trends, securing solutions, and using CI More ❯
Hunting and Threat Intelligence (MITRE ATT&CK) Cloud Security Penetration Testing Security Automation (SOAR) It would help if you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (Carbon Black, Microsoft Defender ATP, FireEye, CrowdStrike) Intrusion Detection More ❯
GDPR, DPA 2018) . Familiarity with risk management frameworks like NIST CSF, CIS Controls, and ISO 27005 . Experience with cyber security tools (e.g., SIEM, Malware Protection, Firewalls and others) is a plus. Strong reporting and communication skills-ability to brief executives and regulators. Ability to design, implement, and enforce More ❯
security operations. Good understanding of security frameworks and regulations (e.g., NIST CSF, ISO 27001, GDPR, CIS controls). Familiarity with security technologies such as SIEM, endpoint security, intrusion detection, and secure coding practices. Excellent problem-solving skills and the ability to translate security concepts into technical solutions. Strong communication skills More ❯
a similar cybersecurity role, ideally within an enterprise environment. In-depth knowledge of security principles, methodologies, and tools (e.g., firewalls, VPNs, IDS/IPS, SIEM, encryption, access control). Expertise in cloud security (AWS, Azure, Google Cloud) and understanding of cloud-native security principles. Strong understanding of network security, application More ❯
of security frameworks (e.g., NIST, CIS, ISO 27001) and compliance standards (e.g., PCI-DSS, PSD2, GDPR). Hands-on experience with security technologies (e.g., SIEM, endpoint protection, cloud security tools). Exceptional leadership and communication skills, with the ability to engage and influence diverse stakeholders. Working at Allica Bank At More ❯
cybersecurity principles and frameworks; ISO27001, NIST, GDPR etc. Knowledge and experience with MS Sentinel, Cisco Meraki, MS Defender, Endpoint protection Knowledge and experience with SIEM, IDS/IPS, firewalls, endpoint protection systems, and vulnerability management Knowledge and experience analysing and interpreting security logs, event data, and alerts to identify potential More ❯
the OT/IT boundary, including segmentation, firewalls, monitoring, and remote access safeguards. Familiarity with enterprise security tooling, including vulnerability management platforms, endpoint protection, SIEM, identity and access management, and logging solutions. Knowledge of regulatory frameworks and industry standards relevant to the E&U sector. Ability to conduct technical risk More ❯
secure operation of their services. Key Responsibilities: Implement and manage security tools and technologies: Deploy and manage security solutions such as Microsoft Sentinel for SIEMand Tanium for Threat and Vulnerability Management (TVM). Conduct security assessments and vulnerability scans: Regularly assess the security posture of applications and infrastructure, identifying More ❯