Group IT Infrastructure Manager Our client based in Tamworth, is seeking a Group IT Infrastructure Manager to support over 300 users across sites in the UK, Ireland, Scotland and Dubai. You'll lead a team of skilled IT individuals, fostering a collaborative and service focused culture. From delivering large-scale infrastructure projects to ensuring the seamless day-to-day operation of critical systems, the Group IT Infrastructure Manager will work on meaningful projects, collaborate with cross functional teams, and directly influence the success of our organisation. As a Group IT Infrastructure Manager, you will need to have/be: Networking Strong network admin, installation, and troubleshooting skills (CCNA level). Experience with Cisco, Fortinet, Ruckus; performance and security focused. Skilled in VLANs, VPNs, firewalls, QoS, and high-availability design. Hardware & Infrastructure Good understanding of hardware, cabling, wireless tech, and IT security basics. Experience with rack servers, RAID, SAN/NAS storage. Competent with monitoring tools (SolarWinds, Nagios, PRTG). Microsoft Technologies Strong Windows Server (Apply online only , AD, Group Policy, and systems admin. Working knowledge of Exchange Online. Experience with Azure AD and hybrid identity. Familiar with Intune and JAMF for device management. Solid Office 365 and Windows 10/11 admin skills. Virtualisation & Cloud Skilled in Hyper-V and VMware (resource management, backups, failover). Exposure to Azure, AWS, GCP for migrations and optimisation. Communication Systems Experience with enterprise VoIP systems. Knowledge of IP CCTV setup, storage, and network integration. Backup & DR Proficient with Veeam for backup/replication. Experience in DR planning, failover, and resilience testing. Security & Compliance Strong grasp of cybersecurity (firewalls, EPP, vulnerabilities, threat detection). Understanding of ISO 27001 and GDPR; audit support experience. Familiar with SIEM tools (Splunk, Sentinel). Operating Systems & Automation Working knowledge of Linux (Ubuntu, CentOS). Scripting with PowerShell, Bash, Python. Familiar with ITSM platforms (ServiceNow, Freshservice). Soft Skills Strong analytical and problem-solving ability. Excellent communicator across technical/non-technical teams. Highly organised with good multitasking skills. Leadership experience driving team performance and improvement. Certifications Essential: MCSE, ITIL, CCNA (or equivalent) Desirable: CISSP / Security+, ISO 27001, PRINCE2 Details: Salary : 65, 000 - 70, 000 Working Hours : Full time Monday - Friday Location : Tamworth (on site full time) Duration : Permanent Role of Group IT Infrastructure Manager: Visible, approachable leader across all sites. Partner with departments to deliver proactive, value-driven IT solutions. Provide IT input in management meetings to support strategic decisions. Support wider teams during peak periods to maintain smooth operations. Oversee daily IT operations across servers, applications, and networks. Manage installation, upgrades, and maintenance of hardware/software. Lead procurement and lifecycle management of IT equipment. Ensure system performance through testing, monitoring, and improvement. Manage and optimise WAN infrastructure across all sites. Maintain strong security controls to protect systems and data. Proactively identify and resolve vulnerabilities through updates and patches. Maintain robust disaster recovery and backup strategies. Assess technology risks and implement mitigation measures. Test and refine DR and continuity plans to ensure resilience. Lead major infrastructure projects, upgrades, and migrations. Work with MIS to align infrastructure and system development. Create project plans, manage resources, and deliver on time and budget. Manage the IT budget and track expenditure. Build strong vendor relationships, negotiate contracts, and ensure SLAs are met. Lead and develop 3rd Line Engineers and Helpdesk teams. Oversee Helpdesk performance and ensure timely issue resolution. Foster a collaborative, customer-focused, and continuously improving culture. Stay updated on new technologies and recommend improvements. Drive continuous improvement across infrastructure and service delivery. Align IT services and projects with long-term organisational goals. Strong analytical thinker with excellent problem-solving skills. Willing to work evenings/weekends/public holidays when required. Benefits of working as a Group IT Infrastructure Manager: 23 days annual leave + bank holidays Option to purchase up to 5 extra days annual leave Health Cashback Plan Pension Scheme Life Assurance Free Parking
16/01/2026
Full time
Group IT Infrastructure Manager Our client based in Tamworth, is seeking a Group IT Infrastructure Manager to support over 300 users across sites in the UK, Ireland, Scotland and Dubai. You'll lead a team of skilled IT individuals, fostering a collaborative and service focused culture. From delivering large-scale infrastructure projects to ensuring the seamless day-to-day operation of critical systems, the Group IT Infrastructure Manager will work on meaningful projects, collaborate with cross functional teams, and directly influence the success of our organisation. As a Group IT Infrastructure Manager, you will need to have/be: Networking Strong network admin, installation, and troubleshooting skills (CCNA level). Experience with Cisco, Fortinet, Ruckus; performance and security focused. Skilled in VLANs, VPNs, firewalls, QoS, and high-availability design. Hardware & Infrastructure Good understanding of hardware, cabling, wireless tech, and IT security basics. Experience with rack servers, RAID, SAN/NAS storage. Competent with monitoring tools (SolarWinds, Nagios, PRTG). Microsoft Technologies Strong Windows Server (Apply online only , AD, Group Policy, and systems admin. Working knowledge of Exchange Online. Experience with Azure AD and hybrid identity. Familiar with Intune and JAMF for device management. Solid Office 365 and Windows 10/11 admin skills. Virtualisation & Cloud Skilled in Hyper-V and VMware (resource management, backups, failover). Exposure to Azure, AWS, GCP for migrations and optimisation. Communication Systems Experience with enterprise VoIP systems. Knowledge of IP CCTV setup, storage, and network integration. Backup & DR Proficient with Veeam for backup/replication. Experience in DR planning, failover, and resilience testing. Security & Compliance Strong grasp of cybersecurity (firewalls, EPP, vulnerabilities, threat detection). Understanding of ISO 27001 and GDPR; audit support experience. Familiar with SIEM tools (Splunk, Sentinel). Operating Systems & Automation Working knowledge of Linux (Ubuntu, CentOS). Scripting with PowerShell, Bash, Python. Familiar with ITSM platforms (ServiceNow, Freshservice). Soft Skills Strong analytical and problem-solving ability. Excellent communicator across technical/non-technical teams. Highly organised with good multitasking skills. Leadership experience driving team performance and improvement. Certifications Essential: MCSE, ITIL, CCNA (or equivalent) Desirable: CISSP / Security+, ISO 27001, PRINCE2 Details: Salary : 65, 000 - 70, 000 Working Hours : Full time Monday - Friday Location : Tamworth (on site full time) Duration : Permanent Role of Group IT Infrastructure Manager: Visible, approachable leader across all sites. Partner with departments to deliver proactive, value-driven IT solutions. Provide IT input in management meetings to support strategic decisions. Support wider teams during peak periods to maintain smooth operations. Oversee daily IT operations across servers, applications, and networks. Manage installation, upgrades, and maintenance of hardware/software. Lead procurement and lifecycle management of IT equipment. Ensure system performance through testing, monitoring, and improvement. Manage and optimise WAN infrastructure across all sites. Maintain strong security controls to protect systems and data. Proactively identify and resolve vulnerabilities through updates and patches. Maintain robust disaster recovery and backup strategies. Assess technology risks and implement mitigation measures. Test and refine DR and continuity plans to ensure resilience. Lead major infrastructure projects, upgrades, and migrations. Work with MIS to align infrastructure and system development. Create project plans, manage resources, and deliver on time and budget. Manage the IT budget and track expenditure. Build strong vendor relationships, negotiate contracts, and ensure SLAs are met. Lead and develop 3rd Line Engineers and Helpdesk teams. Oversee Helpdesk performance and ensure timely issue resolution. Foster a collaborative, customer-focused, and continuously improving culture. Stay updated on new technologies and recommend improvements. Drive continuous improvement across infrastructure and service delivery. Align IT services and projects with long-term organisational goals. Strong analytical thinker with excellent problem-solving skills. Willing to work evenings/weekends/public holidays when required. Benefits of working as a Group IT Infrastructure Manager: 23 days annual leave + bank holidays Option to purchase up to 5 extra days annual leave Health Cashback Plan Pension Scheme Life Assurance Free Parking
SentinelOne Architect/SME - Remote - 3-4 months + (SentinelOne, Sentinel One) Blue chip client is looking for a SentinelOne Architect/SME Role is remote MUST BE PAYE THROUGH UMBRELLA (INSIDE IR35) Role Description: MUST HAVE: experience with SentinelOne and not Azure/Microsoft Sentinel Seeking a highly skilled SentinelOne Security Architect & Engineer to own the design and implementation of an on-premises SentinelOne deployment. This role requires deep technical expertise in endpoint protection, architecture design, and hands-on implementation. The ideal candidate will be responsible for producing High-Level Designs (HLDs), Low-Level Designs (LLDs), and executing the build and configuration of the solution in a secure enterprise environment. Required Skills & Experience: Proven experience architecting and deploying SentinelOne in enterprise environments. Strong understanding of endpoint protection, threat detection, and response capabilities. Experience with on-prem infrastructure on virtualized platform, networking, and storage. Ability to produce HLDs and LLDs with clarity and precision. Excellent communication and stakeholder engagement skills. Involved with integrating SentinelOne with SIEM/SOAR platforms (eg, Splunk) and deployment to Windows and RHEL endpoints. Preferred Qualifications: SentinelOne certifications (eg, SentinelOne Certified Architect or equivalent). Scripting knowledge (eg, PowerShell, Python) for automation and integration. Please send CV for full details and immediate interviews. We are a preferred supplier to the client
13/01/2026
Contractor
SentinelOne Architect/SME - Remote - 3-4 months + (SentinelOne, Sentinel One) Blue chip client is looking for a SentinelOne Architect/SME Role is remote MUST BE PAYE THROUGH UMBRELLA (INSIDE IR35) Role Description: MUST HAVE: experience with SentinelOne and not Azure/Microsoft Sentinel Seeking a highly skilled SentinelOne Security Architect & Engineer to own the design and implementation of an on-premises SentinelOne deployment. This role requires deep technical expertise in endpoint protection, architecture design, and hands-on implementation. The ideal candidate will be responsible for producing High-Level Designs (HLDs), Low-Level Designs (LLDs), and executing the build and configuration of the solution in a secure enterprise environment. Required Skills & Experience: Proven experience architecting and deploying SentinelOne in enterprise environments. Strong understanding of endpoint protection, threat detection, and response capabilities. Experience with on-prem infrastructure on virtualized platform, networking, and storage. Ability to produce HLDs and LLDs with clarity and precision. Excellent communication and stakeholder engagement skills. Involved with integrating SentinelOne with SIEM/SOAR platforms (eg, Splunk) and deployment to Windows and RHEL endpoints. Preferred Qualifications: SentinelOne certifications (eg, SentinelOne Certified Architect or equivalent). Scripting knowledge (eg, PowerShell, Python) for automation and integration. Please send CV for full details and immediate interviews. We are a preferred supplier to the client
CBSbutler Holdings Limited trading as CBSbutler
Reading, Oxfordshire
SC Cleared SIEM/EDR Engineer Contract - Hybrid Reading (3 days onsite) - Immediate Start Hiring for an experienced SIEM/EDR Engineer. Our client will put you through the SC Clearance if you do not have this, you will just need to be eligible. Rate is paying between 380 - 430 per day insideIR35. - Rolling contract for 12-24 months - Hybrid working, 3 days per week on site in the Reading area, 2 working from home - Cutting edge Cyber Security environment e.g. Microsoft Sentinel, Elastic ELK stack, Tanium, Trellix, Defender, custom log ingestion, KQL, Python/PowerShell scripting - Heavy focus on Linux, syslog architecture, custom integrations, threat hunting and detection engineering Skills and Experience: - Strong background in Cyber Security Engineering - Solid hands-on experience deploying and managing SIEM + EDR platforms - Strong syslog/Linux skills Please apply for immediate interview! CBSbutler is operating and advertising as an Employment Agency for permanent positions and as an Employment Business for interim / contract / temporary positions. CBSbutler is an Equal Opportunities employer and we encourage applicants from all backgrounds.
12/01/2026
Contractor
SC Cleared SIEM/EDR Engineer Contract - Hybrid Reading (3 days onsite) - Immediate Start Hiring for an experienced SIEM/EDR Engineer. Our client will put you through the SC Clearance if you do not have this, you will just need to be eligible. Rate is paying between 380 - 430 per day insideIR35. - Rolling contract for 12-24 months - Hybrid working, 3 days per week on site in the Reading area, 2 working from home - Cutting edge Cyber Security environment e.g. Microsoft Sentinel, Elastic ELK stack, Tanium, Trellix, Defender, custom log ingestion, KQL, Python/PowerShell scripting - Heavy focus on Linux, syslog architecture, custom integrations, threat hunting and detection engineering Skills and Experience: - Strong background in Cyber Security Engineering - Solid hands-on experience deploying and managing SIEM + EDR platforms - Strong syslog/Linux skills Please apply for immediate interview! CBSbutler is operating and advertising as an Employment Agency for permanent positions and as an Employment Business for interim / contract / temporary positions. CBSbutler is an Equal Opportunities employer and we encourage applicants from all backgrounds.
IT Engineer - Microsoft Defender Security Operations 3 months London - hybrid Inside IR35 - Umbrella only Role Overview We are seeking an accomplished IT Engineer with specialist expertise in the Microsoft Defender security ecosystem. The successful candidate will strengthen cyber defence across endpoints, identities, cloud services, and hybrid infrastructure. Key Responsibilities Security operations and threat defence Manage and optimise Microsoft Defender across Endpoint, Identity, Cloud Apps, Office 365, and Cloud Security Posture Management. Monitor alerts and conduct threat investigations. Support incident response with containment and remediation. Conduct proactive threat hunting. Platform administration and governance Configure policy baselines and protection profiles. Maintain governance and compliance alignment. Lead version management and capability tuning. Maintain documentation for configurations and processes. Stakeholder engagement and improvement Collaborate with Infrastructure, Cloud, and Cyber Security teams. Provide security insights to projects. Produce reporting for stakeholders. Identify automation and workflow enhancements. Essential Skills Strong experience with Microsoft Defender platforms. Incident investigation skills across endpoint, identity, and cloud. Understanding of Microsoft 365, Azure, and Zero Trust. Skilled in ASR rules, AV baselines, and KQL analytics. Desirable Skills Experience with Microsoft Sentinel. Understanding of MITRE ATT and CK. Exposure to red team activities. Familiarity with automation using PowerShell. Professional Attributes Analytical thinker. Resilient and proactive. Strong communicator. Collaborative mindset. Qualifications Microsoft security certifications such as SC 200, SC 300, or SC 400. Broader cloud or cyber qualifications beneficial.
12/01/2026
Contractor
IT Engineer - Microsoft Defender Security Operations 3 months London - hybrid Inside IR35 - Umbrella only Role Overview We are seeking an accomplished IT Engineer with specialist expertise in the Microsoft Defender security ecosystem. The successful candidate will strengthen cyber defence across endpoints, identities, cloud services, and hybrid infrastructure. Key Responsibilities Security operations and threat defence Manage and optimise Microsoft Defender across Endpoint, Identity, Cloud Apps, Office 365, and Cloud Security Posture Management. Monitor alerts and conduct threat investigations. Support incident response with containment and remediation. Conduct proactive threat hunting. Platform administration and governance Configure policy baselines and protection profiles. Maintain governance and compliance alignment. Lead version management and capability tuning. Maintain documentation for configurations and processes. Stakeholder engagement and improvement Collaborate with Infrastructure, Cloud, and Cyber Security teams. Provide security insights to projects. Produce reporting for stakeholders. Identify automation and workflow enhancements. Essential Skills Strong experience with Microsoft Defender platforms. Incident investigation skills across endpoint, identity, and cloud. Understanding of Microsoft 365, Azure, and Zero Trust. Skilled in ASR rules, AV baselines, and KQL analytics. Desirable Skills Experience with Microsoft Sentinel. Understanding of MITRE ATT and CK. Exposure to red team activities. Familiarity with automation using PowerShell. Professional Attributes Analytical thinker. Resilient and proactive. Strong communicator. Collaborative mindset. Qualifications Microsoft security certifications such as SC 200, SC 300, or SC 400. Broader cloud or cyber qualifications beneficial.
Lead Security Engineer Permanent - 65k - 75k + strong benefits Location: Hybrid - Cardiff Your new company I am looking to recruit a skilled Lead Security Engineer to join a growing financial services organisation in Cardiff. The company has strong benefits, a great culture, and are at a good stage in their journey. This role is hybrid, looking at 2-3 days a week, so you will need to be located locally. Your new role You'll be the Lead Security person, reporting into the CTO, with 1 direct report currently. The role will grow over the coming years, but there is an initial plan to deploy Sentinel and Purview, with other good plans in place for the coming years. This is a strong opportunity for a Security Engineer looking to take that next step or for a hands-on Security Manager looking for a great new environment. Responsibilities include: Cyber Security management Identity and Access Management Microsoft Security suite coverage Azure Security Engineering Threat detection, IR & Forensics What you'll need to succeed Necessary - Experience implementing and monitoring Microsoft Sentinel Purview implementation and monitoring experience (desirable). Ability to be on site in Cardiff 2/3 days a week. Experience with Azure Strong communication skills, lots of working with other departments and colleagues. What you'll get in return As well as a salary of up to 75,000, there is also a company bonus scheme, typically 5-10%, Private Medical Insurance, 25 holiday days (increasing over time) plus bank holidays, matched pension contribution up to 8%, as well as other perks and benefits. What you need to do now If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV. If this job isn't quite right for you, but you are looking for a new position, please contact us for a confidential discussion about your career. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
09/01/2026
Full time
Lead Security Engineer Permanent - 65k - 75k + strong benefits Location: Hybrid - Cardiff Your new company I am looking to recruit a skilled Lead Security Engineer to join a growing financial services organisation in Cardiff. The company has strong benefits, a great culture, and are at a good stage in their journey. This role is hybrid, looking at 2-3 days a week, so you will need to be located locally. Your new role You'll be the Lead Security person, reporting into the CTO, with 1 direct report currently. The role will grow over the coming years, but there is an initial plan to deploy Sentinel and Purview, with other good plans in place for the coming years. This is a strong opportunity for a Security Engineer looking to take that next step or for a hands-on Security Manager looking for a great new environment. Responsibilities include: Cyber Security management Identity and Access Management Microsoft Security suite coverage Azure Security Engineering Threat detection, IR & Forensics What you'll need to succeed Necessary - Experience implementing and monitoring Microsoft Sentinel Purview implementation and monitoring experience (desirable). Ability to be on site in Cardiff 2/3 days a week. Experience with Azure Strong communication skills, lots of working with other departments and colleagues. What you'll get in return As well as a salary of up to 75,000, there is also a company bonus scheme, typically 5-10%, Private Medical Insurance, 25 holiday days (increasing over time) plus bank holidays, matched pension contribution up to 8%, as well as other perks and benefits. What you need to do now If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV. If this job isn't quite right for you, but you are looking for a new position, please contact us for a confidential discussion about your career. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
ROLE TITLE: SOC Analyst - SC Cleared LOCATION: flexible (can be predominantly remote) The ideal candidate must have active SC clearance We are actively looking to secure an SOC Analyst to join Experis. Experis Consultancy is a Global entity with a well-established team with over 1000 consultants on assignment across 20 clients globally. Our UK operation is growing and has very aggressive plans for expansion over the coming years. We form part of the Manpower group of companies that turn over $20 billion a year collectively. Experis UK have partnerships with major clients across the UK spanning multiple industries; our approach is a very personal one, with both our clients and our own employees. We are passionate about training, technology and career development. Skills required: Microsoft Certified: Security Operations Analyst Associate Certification (SC200) is a mandatory requirement for role fulfilment Experience working with SIEM technologies and security tooling An understanding of IT Infrastructure and Networking An understanding of vulnerability and threat management An understanding of the incident response lifecycle T he ability to work in a close team and independently The ability to be adaptable to a high pace changeable workload An interest in security and threat management Nice to have skills A SOC Analyst will be responsible for providing Protective Monitoring Services across a range of Secure Customers. They will be responsible for the day to day monitoring using various SIEM Tools (Qradar, Sentinel & LogRhythm). Some of the responsibilities that come along with this role include the following: Security Analytics Incident investigation, triage and escalation Threat monitoring and response Trend reporting Rule tuning and continual service improvement The role involves working alongside other team members including SOC engineers and Service Managers. Benefits Include: Contributory pension scheme Employee Assistance Program Medical and Dental cover 22 days holiday + bank holidays Maternity Pay/Shared Parental leave and paternity leave Sick pay Suitable Candidates should submit CVs in the first instance.
09/01/2026
Full time
ROLE TITLE: SOC Analyst - SC Cleared LOCATION: flexible (can be predominantly remote) The ideal candidate must have active SC clearance We are actively looking to secure an SOC Analyst to join Experis. Experis Consultancy is a Global entity with a well-established team with over 1000 consultants on assignment across 20 clients globally. Our UK operation is growing and has very aggressive plans for expansion over the coming years. We form part of the Manpower group of companies that turn over $20 billion a year collectively. Experis UK have partnerships with major clients across the UK spanning multiple industries; our approach is a very personal one, with both our clients and our own employees. We are passionate about training, technology and career development. Skills required: Microsoft Certified: Security Operations Analyst Associate Certification (SC200) is a mandatory requirement for role fulfilment Experience working with SIEM technologies and security tooling An understanding of IT Infrastructure and Networking An understanding of vulnerability and threat management An understanding of the incident response lifecycle T he ability to work in a close team and independently The ability to be adaptable to a high pace changeable workload An interest in security and threat management Nice to have skills A SOC Analyst will be responsible for providing Protective Monitoring Services across a range of Secure Customers. They will be responsible for the day to day monitoring using various SIEM Tools (Qradar, Sentinel & LogRhythm). Some of the responsibilities that come along with this role include the following: Security Analytics Incident investigation, triage and escalation Threat monitoring and response Trend reporting Rule tuning and continual service improvement The role involves working alongside other team members including SOC engineers and Service Managers. Benefits Include: Contributory pension scheme Employee Assistance Program Medical and Dental cover 22 days holiday + bank holidays Maternity Pay/Shared Parental leave and paternity leave Sick pay Suitable Candidates should submit CVs in the first instance.
We re looking for a Senior Security Engineer for our client in the data sector, based in London, on an initial 3 to 6 month contract paying up to £500 per day Outside IR35. This role offers hybrid working with an expectation to attend the office 3 days per week. You will focus on hands-on remediation across Azure and endpoint environments, improving Defender for Cloud findings, closing vulnerabilities, and strengthening security posture. The role is delivery-led and ideal for someone who enjoys fixing issues rather than only advising. The successful Senior Security Engineer will have experience with: Defender for Cloud, Defender for Endpoint and EASM Vulnerability remediation and Secure Score improvement Purview (DLP, sensitivity labels, insider risk) Compliance uplift for ISO 27001, SOC 2, GDPR and NIS2 Configuration hardening, patching and policy deployment Entra ID, Conditional Access, PIM and cloud identity controls PowerShell and Microsoft Graph for automation Nice to have: Sentinel exposure, Zero Trust knowledge, regulated-sector experience. Certifications required: AZ-500, SC-100 (or working towards), plus one of MS-500, SC-400 or SC-900. Desirable: CCSP. Interested? Please apply below. Senior Security Engineer, Azure Security Engineer, Cloud Security Engineer, Defender for Cloud, Defender for Endpoint, EASM, Purview, DLP, Conditional Access, PIM, Sentinel, Vulnerability Remediation, Cloud Hardening, London, Hybrid
08/01/2026
Contractor
We re looking for a Senior Security Engineer for our client in the data sector, based in London, on an initial 3 to 6 month contract paying up to £500 per day Outside IR35. This role offers hybrid working with an expectation to attend the office 3 days per week. You will focus on hands-on remediation across Azure and endpoint environments, improving Defender for Cloud findings, closing vulnerabilities, and strengthening security posture. The role is delivery-led and ideal for someone who enjoys fixing issues rather than only advising. The successful Senior Security Engineer will have experience with: Defender for Cloud, Defender for Endpoint and EASM Vulnerability remediation and Secure Score improvement Purview (DLP, sensitivity labels, insider risk) Compliance uplift for ISO 27001, SOC 2, GDPR and NIS2 Configuration hardening, patching and policy deployment Entra ID, Conditional Access, PIM and cloud identity controls PowerShell and Microsoft Graph for automation Nice to have: Sentinel exposure, Zero Trust knowledge, regulated-sector experience. Certifications required: AZ-500, SC-100 (or working towards), plus one of MS-500, SC-400 or SC-900. Desirable: CCSP. Interested? Please apply below. Senior Security Engineer, Azure Security Engineer, Cloud Security Engineer, Defender for Cloud, Defender for Endpoint, EASM, Purview, DLP, Conditional Access, PIM, Sentinel, Vulnerability Remediation, Cloud Hardening, London, Hybrid
Threat Intelligence Analyst - initial 3-6 month contract Portsmouth or London (2 days a week onsite) 500 - 600 a day (inside IR35) We're seeking a highly experienced Threat Intelligence Analyst to lead adversary tracking, threat analysis, and intelligence integration across this large organisation. This is a senior, hands-on role combining strategic threat insight with operational delivery, acting as the primary threat intelligence specialist within the InfoSec function and managing a third-party intelligence provider. This role is ideal for someone who understands the UK threat landscape, particularly critical national infrastructure and public sector risks, and can translate threat intelligence into actionable detection, response, and executive insight. Key Responsibilities Lead threat actor tracking and attribution, focusing on APTs, ransomware, supply chain attacks and UK-relevant campaigns Maintain adversary profiles using MITRE ATT&CK, Diamond Model and sector-specific threat frameworks Correlate internal security telemetry with external intelligence feeds (e.g. MISP, Recorded Future, ISACs, Microsoft TI) Operationalise STIX/TAXII feeds and enrich IOC/IOA pipelines for SOC and Incident Response teams Translate threat intelligence into actionable detections, working with engineers on KQL/SPL queries and proactive threat hunts Produce regular threat reports and briefings for SOC leadership, CISO and senior stakeholders, including board-level risk narratives Manage and oversee a third-party cyber threat intelligence provider, ensuring quality, relevance and value Engage with UK threat-sharing communities and maintain internal threat intelligence documentation and playbooks Required Skills & Experience 5+ years' experience in Threat Intelligence, SOC or Incident Response Strong working knowledge of MITRE ATT&CK and threat actor lifecycle analysis Hands-on experience with threat intelligence platforms such as MISP, Recorded Future, Anomali or similar Strong experience with Microsoft security tooling, ideally Sentinel and Defender Proficiency in KQL and working knowledge of Python for automation and enrichment Experience integrating intelligence into SIEM, EDR/XDR, and cloud security platforms (Microsoft, AWS, CrowdStrike, etc.) Deep understanding of the UK cyber threat landscape, particularly critical national infrastructure and public sector threats Comfortable operating as a sole senior threat intelligence specialist while collaborating across SOC and InfoSec teams Desirable Certifications GIAC Cyber Threat Intelligence (GCTI) CREST Threat Intelligence Analyst GCIH, SC-200, AWS Security Specialty We're looking for someone who can interview in Jan and ideally start within a few weeks so please apply asap
07/01/2026
Contractor
Threat Intelligence Analyst - initial 3-6 month contract Portsmouth or London (2 days a week onsite) 500 - 600 a day (inside IR35) We're seeking a highly experienced Threat Intelligence Analyst to lead adversary tracking, threat analysis, and intelligence integration across this large organisation. This is a senior, hands-on role combining strategic threat insight with operational delivery, acting as the primary threat intelligence specialist within the InfoSec function and managing a third-party intelligence provider. This role is ideal for someone who understands the UK threat landscape, particularly critical national infrastructure and public sector risks, and can translate threat intelligence into actionable detection, response, and executive insight. Key Responsibilities Lead threat actor tracking and attribution, focusing on APTs, ransomware, supply chain attacks and UK-relevant campaigns Maintain adversary profiles using MITRE ATT&CK, Diamond Model and sector-specific threat frameworks Correlate internal security telemetry with external intelligence feeds (e.g. MISP, Recorded Future, ISACs, Microsoft TI) Operationalise STIX/TAXII feeds and enrich IOC/IOA pipelines for SOC and Incident Response teams Translate threat intelligence into actionable detections, working with engineers on KQL/SPL queries and proactive threat hunts Produce regular threat reports and briefings for SOC leadership, CISO and senior stakeholders, including board-level risk narratives Manage and oversee a third-party cyber threat intelligence provider, ensuring quality, relevance and value Engage with UK threat-sharing communities and maintain internal threat intelligence documentation and playbooks Required Skills & Experience 5+ years' experience in Threat Intelligence, SOC or Incident Response Strong working knowledge of MITRE ATT&CK and threat actor lifecycle analysis Hands-on experience with threat intelligence platforms such as MISP, Recorded Future, Anomali or similar Strong experience with Microsoft security tooling, ideally Sentinel and Defender Proficiency in KQL and working knowledge of Python for automation and enrichment Experience integrating intelligence into SIEM, EDR/XDR, and cloud security platforms (Microsoft, AWS, CrowdStrike, etc.) Deep understanding of the UK cyber threat landscape, particularly critical national infrastructure and public sector threats Comfortable operating as a sole senior threat intelligence specialist while collaborating across SOC and InfoSec teams Desirable Certifications GIAC Cyber Threat Intelligence (GCTI) CREST Threat Intelligence Analyst GCIH, SC-200, AWS Security Specialty We're looking for someone who can interview in Jan and ideally start within a few weeks so please apply asap
IT Support Engineer (Hybrid / Remote working Considered) My client is expanding and is seeking a proactive, technically strong IT Support Engineer to join their growing team. If you thrive in a fast-paced MSP environment, enjoy tackling complex technical challenges, and want exposure to a wide range of modern technologies, this role will suit you perfectly. You ll act as a key escalation point for technical issues across Microsoft 365, Azure, Windows Server, networking and endpoint management. You ll work extensively with their RMM platform and cybersecurity tooling including SentinelOne, Huntress and backup solutions-so a strong focus on security and reliability is essential. This is a client-facing role that requires excellent troubleshooting skills, outstanding communication and a commitment to high-quality service delivery. What You ll Be Doing Providing remote and on-site support across multiple client environments Acting as an escalation point for 1st line engineers and seeing issues through to full resolution Monitoring, managing and remediating systems using RMM tools Troubleshooting issues across Microsoft 365, Azure AD, Windows Server and endpoint devices Supporting endpoint security, EDR platforms (SentinelOne, Huntress) and backup solutions Assisting with deployments, migrations and infrastructure upgrades Escalating complex issues to senior engineers or vendors where appropriate Maintaining accurate technical documentation and communicating clearly with clients Contributing to process improvements and best-practice initiatives What You ll Bring Essential: 2+ years experience in an MSP or multi-client IT support environment Strong knowledge of Microsoft 365, Intune and Azure AD Solid understanding of Windows Server, Active Directory and Group Policy Good networking fundamentals (VLANs, firewalls, VPNs, DNS, DHCP) Strong troubleshooting ability with a see it through mindset Excellent communication and customer-service skills Full UK driving licence and willingness to travel Desirable: Experience with RMM and PSA tools Hands-on experience with SentinelOne, Huntress or similar EDR/security platforms Experience supporting image-based, file-level and/or cloud backups Understanding of Cyber Essentials and security best practice Certifications such as CompTIA Network+, Microsoft 365 Fundamentals or similar Who You Are You ll be a great fit if you re client-focused, pragmatic and genuinely passionate about technology. My client values integrity, reliability and innovation. The team is collaborative and supportive, and they re looking for someone who remains calm under pressure, has a methodical approach to problem-solving, and brings a good sense of humour to the job. Benefits: Remote Working Bonus 24 days holiday + Bank Holidays + Christmas Shut Down Interested? Click Apply Now! IT Support Engineer
06/01/2026
Full time
IT Support Engineer (Hybrid / Remote working Considered) My client is expanding and is seeking a proactive, technically strong IT Support Engineer to join their growing team. If you thrive in a fast-paced MSP environment, enjoy tackling complex technical challenges, and want exposure to a wide range of modern technologies, this role will suit you perfectly. You ll act as a key escalation point for technical issues across Microsoft 365, Azure, Windows Server, networking and endpoint management. You ll work extensively with their RMM platform and cybersecurity tooling including SentinelOne, Huntress and backup solutions-so a strong focus on security and reliability is essential. This is a client-facing role that requires excellent troubleshooting skills, outstanding communication and a commitment to high-quality service delivery. What You ll Be Doing Providing remote and on-site support across multiple client environments Acting as an escalation point for 1st line engineers and seeing issues through to full resolution Monitoring, managing and remediating systems using RMM tools Troubleshooting issues across Microsoft 365, Azure AD, Windows Server and endpoint devices Supporting endpoint security, EDR platforms (SentinelOne, Huntress) and backup solutions Assisting with deployments, migrations and infrastructure upgrades Escalating complex issues to senior engineers or vendors where appropriate Maintaining accurate technical documentation and communicating clearly with clients Contributing to process improvements and best-practice initiatives What You ll Bring Essential: 2+ years experience in an MSP or multi-client IT support environment Strong knowledge of Microsoft 365, Intune and Azure AD Solid understanding of Windows Server, Active Directory and Group Policy Good networking fundamentals (VLANs, firewalls, VPNs, DNS, DHCP) Strong troubleshooting ability with a see it through mindset Excellent communication and customer-service skills Full UK driving licence and willingness to travel Desirable: Experience with RMM and PSA tools Hands-on experience with SentinelOne, Huntress or similar EDR/security platforms Experience supporting image-based, file-level and/or cloud backups Understanding of Cyber Essentials and security best practice Certifications such as CompTIA Network+, Microsoft 365 Fundamentals or similar Who You Are You ll be a great fit if you re client-focused, pragmatic and genuinely passionate about technology. My client values integrity, reliability and innovation. The team is collaborative and supportive, and they re looking for someone who remains calm under pressure, has a methodical approach to problem-solving, and brings a good sense of humour to the job. Benefits: Remote Working Bonus 24 days holiday + Bank Holidays + Christmas Shut Down Interested? Click Apply Now! IT Support Engineer
Cyber Security & Centralised Services Manager Location: London Bridge Company: Managed Service Provider (MSP) This role will be office-based for the first 3 6 months, with the option to move to a hybrid working arrangement thereafter. Our client is a well-established MSP based in London Bridge. They are a close-knit team of 30 IT professionals delivering end-to-end technology services and support to a diverse range of clients, with a strong emphasis on cybersecurity, resilience and regulatory compliance. The Opportunity: We are seeking an experienced Cyber Security & Centralised Services Managerwith a strong cybersecurity focus to join our growing technical team. In this pivotal role, you will: Act as the primary escalation point for complex IT and cybersecurity incidents. Manage and secure core client infrastructure and cloud environments. Ensure centralised security, monitoring, and incident response platforms operate effectively. You will collaborate closely with our Service Desk, Projects and Account Management teams to maintain high standards of service, document solutions and mentor junior engineers in line with cybersecurity best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. Key Responsibilities Cyber Security & Centralised Services Manager: Serve as the primary escalation point for complex IT and cybersecurity incidents, including malware infections, ransomware attacks, phishing attempts, and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment with best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. Lead and coordinate incident response efforts, including root cause analysis, threat containment and post-incident reporting for clients. Collaborate with the Project and Service Desk teams to embed security into deployments, migrations, upgrades, and automation workflows, ensuring systems remain secure by design. Maintain and improve Standard Operating Procedures (SOPs) for security operations, ensuring knowledge is shared across the team for rapid incident handling. Provide mentorship and cybersecurity guidance to junior engineers and Service Desk staff, fostering a culture of security awareness and proactive threat management. Perform ongoing threat intelligence monitoring and security trend analysis to anticipate risks and protect client environments. Support clients in security reporting, compliance reviews, and continuous improvement initiatives, helping them meet regulatory and industry security standards. Cyber Security & Centralised Services Manager Key Skills & Experience: Proven experience in a 3rd Line / Senior Engineer role within an MSP or security-focused IT environment, supporting multiple clients and environments. Strong knowledge of Microsoft technologies (Azure, Microsoft 365, SharePoint, Intune/Entra) with a focus on security configuration, hardening and monitoring. In-depth understanding of networking, firewalls, VPNs, Windows Server, Active Directory and hybrid cloud security architectures. Hands-on experience with endpoint protection, EDR/MDR/XDR platforms, email security, RMM tools, and centralised monitoring systems. Familiarity with security frameworks and compliance standards, including Cyber Essentials, Cyber Essentials Plus, ISO27001, NIST, and GDPR requirements. Skilled in vulnerability management, threat detection, incident response, and remediation planning, including experience with ransomware and phishing mitigation. Strong communication skills with the ability to present technical and security findings to non-technical stakeholders and clients. Proactive mindset in threat hunting, risk assessments and continuous improvement of client security posture. Mentorship and leadership experience, providing cybersecurity guidance to junior engineers and Service Desk teams. Cyber Security & Centralised Services Manager - Desirable Certifications: Microsoft Certified: Azure Administrator / Solutions Expert CompTIA Security+, CISSP, CISM or equivalent cybersecurity qualification ITIL Foundation Vendor-specific certifications (Fortinet, SentinelOne, Datto, Mimecast, Huntress, etc.) Why Join the Company: Be part of a technically strong, supportive and collaborative security-conscious team in central London. Play a key role in strategic security projects, incident response and continuous improvement initiatives. Access ongoing training, certifications and professional development in cybersecurity. Join a company that holds the core values of Honesty, Accountability, Commitment, Innovation, Expertise and Collaboration
06/01/2026
Full time
Cyber Security & Centralised Services Manager Location: London Bridge Company: Managed Service Provider (MSP) This role will be office-based for the first 3 6 months, with the option to move to a hybrid working arrangement thereafter. Our client is a well-established MSP based in London Bridge. They are a close-knit team of 30 IT professionals delivering end-to-end technology services and support to a diverse range of clients, with a strong emphasis on cybersecurity, resilience and regulatory compliance. The Opportunity: We are seeking an experienced Cyber Security & Centralised Services Managerwith a strong cybersecurity focus to join our growing technical team. In this pivotal role, you will: Act as the primary escalation point for complex IT and cybersecurity incidents. Manage and secure core client infrastructure and cloud environments. Ensure centralised security, monitoring, and incident response platforms operate effectively. You will collaborate closely with our Service Desk, Projects and Account Management teams to maintain high standards of service, document solutions and mentor junior engineers in line with cybersecurity best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. Key Responsibilities Cyber Security & Centralised Services Manager: Serve as the primary escalation point for complex IT and cybersecurity incidents, including malware infections, ransomware attacks, phishing attempts, and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment with best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. Lead and coordinate incident response efforts, including root cause analysis, threat containment and post-incident reporting for clients. Collaborate with the Project and Service Desk teams to embed security into deployments, migrations, upgrades, and automation workflows, ensuring systems remain secure by design. Maintain and improve Standard Operating Procedures (SOPs) for security operations, ensuring knowledge is shared across the team for rapid incident handling. Provide mentorship and cybersecurity guidance to junior engineers and Service Desk staff, fostering a culture of security awareness and proactive threat management. Perform ongoing threat intelligence monitoring and security trend analysis to anticipate risks and protect client environments. Support clients in security reporting, compliance reviews, and continuous improvement initiatives, helping them meet regulatory and industry security standards. Cyber Security & Centralised Services Manager Key Skills & Experience: Proven experience in a 3rd Line / Senior Engineer role within an MSP or security-focused IT environment, supporting multiple clients and environments. Strong knowledge of Microsoft technologies (Azure, Microsoft 365, SharePoint, Intune/Entra) with a focus on security configuration, hardening and monitoring. In-depth understanding of networking, firewalls, VPNs, Windows Server, Active Directory and hybrid cloud security architectures. Hands-on experience with endpoint protection, EDR/MDR/XDR platforms, email security, RMM tools, and centralised monitoring systems. Familiarity with security frameworks and compliance standards, including Cyber Essentials, Cyber Essentials Plus, ISO27001, NIST, and GDPR requirements. Skilled in vulnerability management, threat detection, incident response, and remediation planning, including experience with ransomware and phishing mitigation. Strong communication skills with the ability to present technical and security findings to non-technical stakeholders and clients. Proactive mindset in threat hunting, risk assessments and continuous improvement of client security posture. Mentorship and leadership experience, providing cybersecurity guidance to junior engineers and Service Desk teams. Cyber Security & Centralised Services Manager - Desirable Certifications: Microsoft Certified: Azure Administrator / Solutions Expert CompTIA Security+, CISSP, CISM or equivalent cybersecurity qualification ITIL Foundation Vendor-specific certifications (Fortinet, SentinelOne, Datto, Mimecast, Huntress, etc.) Why Join the Company: Be part of a technically strong, supportive and collaborative security-conscious team in central London. Play a key role in strategic security projects, incident response and continuous improvement initiatives. Access ongoing training, certifications and professional development in cybersecurity. Join a company that holds the core values of Honesty, Accountability, Commitment, Innovation, Expertise and Collaboration
Senior 3rd Line IT Engineer Location: London Bridge Company: Managed Service Provider (MSP) This role will be office-based for the first 3 6 months, with the option to move to a hybrid working arrangement thereafter. Our client is a well-established MSP based in London Bridge. They are a close-knit team of 30 IT professionals delivering end-to-end technology services and support to a diverse range of clients, with a strong focus on reliability, security, and customer care. The Opportunity We are seeking an experienced Senior 3rd Line Engineer to join our growing technical team. This pivotal role involves: Acting as the go-to escalation point for complex issues Managing core client infrastructure and cloud environments Ensuring centralized security and monitoring platforms run smoothly You will work closely with our Service Desk and Project teams, maintaining high service standards, documenting solutions, and mentoring junior engineers through effective Standard Operating Procedures (SOPs). Senior 3rd Line IT Engineer - Key Responsibilities Act as the primary escalation point for complex 2nd/3rd line incidents and service requests across infrastructure, networking, Azure, Microsoft 365, and cybersecurity. Manage and maintain client systems and centralized services, including Mimecast, Avanan, SentinelOne, MDR/XDR, Fortinet, DR/BC, Huntress, Autotask, and Datto RMM. Provide and present clients with centralized services reports and cybersecurity reviews. Collaborate with the Project team on deployments, migrations, automations, and upgrades across on-premises and cloud environments. Develop and document Standard Operating Procedures (SOPs) to assist the Service Desk with first-response troubleshooting. Contribute to continual service improvement by reviewing recurring incidents and identifying training or process opportunities. Mentor and provide technical guidance to Service Desk engineers. Ensure that all systems and processes align with best practices in cybersecurity, resilience, and performance. Key Skills & Experience Proven experience in a 3rd Line / Senior Engineer role within an MSP environment Strong knowledge of Microsoft technologies, including Azure, 365, SharePoint, and Intune Excellent understanding of networking, firewalls, VPNs, and Windows Server environments Experience with RMM tools, security platforms, and endpoint management Familiarity with tools and platforms such as Mimecast, Avanan, SentinelOne, MDR/XDR, Fortinet, Huntress, Datto, and Autotask Strong troubleshooting, analytical, and communication skills Ability to work independently and collaboratively across teams Experience with Cyber Essentials, Cyber Essentials Plus, and other frameworks such as NIST, ISO27001 Commitment to producing clear documentation and knowledge sharing Desirable Certifications Microsoft Certified: Azure Administrator / Solutions Expert CompTIA Security+, CISSP, or similar cybersecurity qualification ITIL Foundation Vendor-specific certifications (Fortinet, SentinelOne, Datto, etc.) Why Join the Company Join a technically strong, supportive, and collaborative team in central London Work across diverse clients, technologies, and industries Play a key role in strategic projects and continuous improvement initiatives Access ongoing training, certifications, and professional development opportunities Be part of a company that values reliability, security, and delivering excellent customer service
06/01/2026
Full time
Senior 3rd Line IT Engineer Location: London Bridge Company: Managed Service Provider (MSP) This role will be office-based for the first 3 6 months, with the option to move to a hybrid working arrangement thereafter. Our client is a well-established MSP based in London Bridge. They are a close-knit team of 30 IT professionals delivering end-to-end technology services and support to a diverse range of clients, with a strong focus on reliability, security, and customer care. The Opportunity We are seeking an experienced Senior 3rd Line Engineer to join our growing technical team. This pivotal role involves: Acting as the go-to escalation point for complex issues Managing core client infrastructure and cloud environments Ensuring centralized security and monitoring platforms run smoothly You will work closely with our Service Desk and Project teams, maintaining high service standards, documenting solutions, and mentoring junior engineers through effective Standard Operating Procedures (SOPs). Senior 3rd Line IT Engineer - Key Responsibilities Act as the primary escalation point for complex 2nd/3rd line incidents and service requests across infrastructure, networking, Azure, Microsoft 365, and cybersecurity. Manage and maintain client systems and centralized services, including Mimecast, Avanan, SentinelOne, MDR/XDR, Fortinet, DR/BC, Huntress, Autotask, and Datto RMM. Provide and present clients with centralized services reports and cybersecurity reviews. Collaborate with the Project team on deployments, migrations, automations, and upgrades across on-premises and cloud environments. Develop and document Standard Operating Procedures (SOPs) to assist the Service Desk with first-response troubleshooting. Contribute to continual service improvement by reviewing recurring incidents and identifying training or process opportunities. Mentor and provide technical guidance to Service Desk engineers. Ensure that all systems and processes align with best practices in cybersecurity, resilience, and performance. Key Skills & Experience Proven experience in a 3rd Line / Senior Engineer role within an MSP environment Strong knowledge of Microsoft technologies, including Azure, 365, SharePoint, and Intune Excellent understanding of networking, firewalls, VPNs, and Windows Server environments Experience with RMM tools, security platforms, and endpoint management Familiarity with tools and platforms such as Mimecast, Avanan, SentinelOne, MDR/XDR, Fortinet, Huntress, Datto, and Autotask Strong troubleshooting, analytical, and communication skills Ability to work independently and collaboratively across teams Experience with Cyber Essentials, Cyber Essentials Plus, and other frameworks such as NIST, ISO27001 Commitment to producing clear documentation and knowledge sharing Desirable Certifications Microsoft Certified: Azure Administrator / Solutions Expert CompTIA Security+, CISSP, or similar cybersecurity qualification ITIL Foundation Vendor-specific certifications (Fortinet, SentinelOne, Datto, etc.) Why Join the Company Join a technically strong, supportive, and collaborative team in central London Work across diverse clients, technologies, and industries Play a key role in strategic projects and continuous improvement initiatives Access ongoing training, certifications, and professional development opportunities Be part of a company that values reliability, security, and delivering excellent customer service
Job Title: SOC Engineer Location: On-site, London moving to hybrid 3 days on-site after 2-week induction Start Date: Immediate Contract length: 31/03/26 further extensions expected Clearance Required: BPSS (must be obtained prior to onboarding) Day rate: 400 - 500 Candidates must hold or be eligible for SC clearance Our client is seeking a SOC Analyst to join a security operations team in London. The role is focused on real-time monitoring, investigation, and incident response across a modern enterprise security environment. Key Responsibilities Monitor, triage, and respond to security alerts across multiple platforms, including Microsoft and endpoint security tools. Conduct in-depth investigations of security events, escalating and containing incidents as required. Optimise and tune detection rules, policies, and alerting mechanisms to improve SOC efficiency. Collaborate with internal teams to support security operations, threat analysis, and incident recovery. Produce clear incident documentation, reports, and recommendations for continuous improvement. Contribute to maintaining and enhancing SOC processes, runbooks, and operational workflows. Required Technical Expertise Sentinel, MDE, and MDI deployments Proven experience in a hands-on SOC Analyst role within an enterprise environment Strong understanding of security operations, threat detection, and incident response workflows Excellent communication skills and the ability to work effectively within a collaborative SOC team Desirable Skills Experience with incident documentation and reporting Familiarity with security frameworks (MITRE ATT&CK, NIST, ISO 27001) Ability to adapt quickly to new tools, threats, and operational priorities Any relevant certifications (e.g., Security+, CySA+, Microsoft SC-series, GIAC)
05/01/2026
Contractor
Job Title: SOC Engineer Location: On-site, London moving to hybrid 3 days on-site after 2-week induction Start Date: Immediate Contract length: 31/03/26 further extensions expected Clearance Required: BPSS (must be obtained prior to onboarding) Day rate: 400 - 500 Candidates must hold or be eligible for SC clearance Our client is seeking a SOC Analyst to join a security operations team in London. The role is focused on real-time monitoring, investigation, and incident response across a modern enterprise security environment. Key Responsibilities Monitor, triage, and respond to security alerts across multiple platforms, including Microsoft and endpoint security tools. Conduct in-depth investigations of security events, escalating and containing incidents as required. Optimise and tune detection rules, policies, and alerting mechanisms to improve SOC efficiency. Collaborate with internal teams to support security operations, threat analysis, and incident recovery. Produce clear incident documentation, reports, and recommendations for continuous improvement. Contribute to maintaining and enhancing SOC processes, runbooks, and operational workflows. Required Technical Expertise Sentinel, MDE, and MDI deployments Proven experience in a hands-on SOC Analyst role within an enterprise environment Strong understanding of security operations, threat detection, and incident response workflows Excellent communication skills and the ability to work effectively within a collaborative SOC team Desirable Skills Experience with incident documentation and reporting Familiarity with security frameworks (MITRE ATT&CK, NIST, ISO 27001) Ability to adapt quickly to new tools, threats, and operational priorities Any relevant certifications (e.g., Security+, CySA+, Microsoft SC-series, GIAC)
I am currently looking for 2 experienced Cyber Security Engineers (DV Cleared) for a client, based in Milton Keynes with occasional travel to London. DV Clearance is essential - applicants without current clearance unfortunately cannot be considered. About the Role: These roles sit within a client's Cybersecurity Operations function. You will play a key part in designing, implementing, and maintaining the platforms that support enterprise-scale security operations. From SIEM and log collection to endpoint detection, automation, and integration, you'll help ensure the SOC team has the reliable and scalable infrastructure it needs to detect, investigate, and respond to threats. Responsibilities: Manage and optimise SIEM platforms (Splunk, Microsoft Sentinel, open-source alternatives) across hybrid-cloud environments Configure and maintain log/data pipelines from endpoints, cloud services, and network devices Ensure high availability, reliability, and performance of core security platforms Integrate new security tools into the ecosystem, including automation via APIs, Scripting, and AI Maintain clear documentation, diagrams, and procedures to support knowledge sharing and consistency Skills & Experience: Strong hands-on experience with SIEM technologies (Splunk, Sentinel, etc.) Knowledge of cloud platforms (Azure, AWS, GCP) and hybrid environments Scripting skills (Python, PowerShell) for automation and integration Experience with SOAR and SecDevOps practices (Git, GitHub, Azure DevOps, CI/CD) Good understanding of frameworks such as NIST, MITRE ATT&CK, CAF Background in Incident Response or SOC analysis is highly valued Soft Skills: Strong analytical and problem-solving mindset Effective communication and collaboration skills Ability to thrive in a fast-paced, dynamic environment Certifications (Splunk, Microsoft, SANS, etc.) are desirable but not required. Location: Milton Keynes (with some travel to London) Positions: 2 available If you're DV cleared and want to take on a challenging and rewarding role with a leading organisation, I'd love to hear from you.
06/10/2025
Contractor
I am currently looking for 2 experienced Cyber Security Engineers (DV Cleared) for a client, based in Milton Keynes with occasional travel to London. DV Clearance is essential - applicants without current clearance unfortunately cannot be considered. About the Role: These roles sit within a client's Cybersecurity Operations function. You will play a key part in designing, implementing, and maintaining the platforms that support enterprise-scale security operations. From SIEM and log collection to endpoint detection, automation, and integration, you'll help ensure the SOC team has the reliable and scalable infrastructure it needs to detect, investigate, and respond to threats. Responsibilities: Manage and optimise SIEM platforms (Splunk, Microsoft Sentinel, open-source alternatives) across hybrid-cloud environments Configure and maintain log/data pipelines from endpoints, cloud services, and network devices Ensure high availability, reliability, and performance of core security platforms Integrate new security tools into the ecosystem, including automation via APIs, Scripting, and AI Maintain clear documentation, diagrams, and procedures to support knowledge sharing and consistency Skills & Experience: Strong hands-on experience with SIEM technologies (Splunk, Sentinel, etc.) Knowledge of cloud platforms (Azure, AWS, GCP) and hybrid environments Scripting skills (Python, PowerShell) for automation and integration Experience with SOAR and SecDevOps practices (Git, GitHub, Azure DevOps, CI/CD) Good understanding of frameworks such as NIST, MITRE ATT&CK, CAF Background in Incident Response or SOC analysis is highly valued Soft Skills: Strong analytical and problem-solving mindset Effective communication and collaboration skills Ability to thrive in a fast-paced, dynamic environment Certifications (Splunk, Microsoft, SANS, etc.) are desirable but not required. Location: Milton Keynes (with some travel to London) Positions: 2 available If you're DV cleared and want to take on a challenging and rewarding role with a leading organisation, I'd love to hear from you.
Security Engineer - 3-month contract - Northampton/Remote My Customer is looking for a proactive Security Engineer to join their team and take ownership of monitoring, triaging, and responding to security alerts across their Microsoft security ecosystem. Strong experience troubleshooting and responding to alerts would be the main focus of the role. Strong expertise with Microsoft Defender and Sentinel is needed. Key Skills & Experience from the Security Engineer Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within Sentinel or similar). Understanding of threat detection, log analysis, and automation within Microsoft's security ecosystem. Key Responsibilities of the Security Engineer Monitor, investigate, and respond to security alerts and incidents in Microsoft Sentinel and Microsoft Defender . Perform detailed security event analysis and correlation, escalating incidents where necessary. Develop and optimise SOAR (Security Orchestration, Automation and Response) playbooks to enhance incident response and efficiency. Collaborate with wider IT and security teams to improve threat detection, incident handling, and response processes. Beneficial Experience Exposure to Operational Technology (OT) environments. Experience with Tenable (vulnerability management). Knowledge of Microsoft Purview (data governance, compliance, and information protection). The Security Engineer is required onsite, 2 days a week in Northampton and 3 days remote. Apply now to speak with VIQU IT in confidence about the Security Engineer role. Or reach out to Connor Smal via the VIQU IT website. Do you know someone great? We'll thank you with up to £1,000 if your referral is successful (terms apply).
06/10/2025
Contractor
Security Engineer - 3-month contract - Northampton/Remote My Customer is looking for a proactive Security Engineer to join their team and take ownership of monitoring, triaging, and responding to security alerts across their Microsoft security ecosystem. Strong experience troubleshooting and responding to alerts would be the main focus of the role. Strong expertise with Microsoft Defender and Sentinel is needed. Key Skills & Experience from the Security Engineer Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within Sentinel or similar). Understanding of threat detection, log analysis, and automation within Microsoft's security ecosystem. Key Responsibilities of the Security Engineer Monitor, investigate, and respond to security alerts and incidents in Microsoft Sentinel and Microsoft Defender . Perform detailed security event analysis and correlation, escalating incidents where necessary. Develop and optimise SOAR (Security Orchestration, Automation and Response) playbooks to enhance incident response and efficiency. Collaborate with wider IT and security teams to improve threat detection, incident handling, and response processes. Beneficial Experience Exposure to Operational Technology (OT) environments. Experience with Tenable (vulnerability management). Knowledge of Microsoft Purview (data governance, compliance, and information protection). The Security Engineer is required onsite, 2 days a week in Northampton and 3 days remote. Apply now to speak with VIQU IT in confidence about the Security Engineer role. Or reach out to Connor Smal via the VIQU IT website. Do you know someone great? We'll thank you with up to £1,000 if your referral is successful (terms apply).
Your new company As part of their continued investment in technology and cyber resilience, my client is seeking a Cloud Security Engineer to join their dynamic Technology Directorate. This is a pivotal role supporting the Head of Cyber Security and Infrastructure in strengthening the cyber security estate and ensuring robust protection across our digital platforms. Your new role As Cloud Security Engineer, you will play a key role in enhancing cyber resilience. You'll be responsible for leveraging tools such as Microsoft Defender, Sentinel, Azure, and their SOC partner to conduct threat analysis, risk assessments, and implement effective controls. You'll support the delivery of their Cyber Security Sub Strategy in line with the Cyber Assessment Framework, and contribute to the design and operation of threat intelligence, incident response, vulnerability management, and ethical hacking capabilities. You'll work closely with internal stakeholders and external partners to ensure compliance with ISO27001, Cyber Essentials+, and other regulatory frameworks. This role also involves reporting on cyber threats and performance using Power BI, supporting penetration testing, and contributing to the development of secure IT architecture and access control policies. What you'll need to succeed Extensive experience administering the Azure platform and Microsoft security tools (Defender, Sentinel, Intune, Autopilot). Strong understanding of cyber security frameworks including ISO27001, Cyber Essentials+, and the Cyber Assessment Framework. Proven experience in identity and access management, end-user device management, and working with external SOCs. Ability to deliver against cyber security roadmaps, respond to incidents, and remediate vulnerabilities. Experience in building Power BI dashboards and writing security policies and SOPs. A collaborative mindset with excellent communication skills and a proactive approach to continuous improvement. What you'll get in return A chance to make a real impact in a purpose-driven organisation. Flexible working arrangements. Access to professional development and training. A supportive and inclusive culture. Competitive salary up to £52K and benefits package. What you need to do now If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us now. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at hays.co.uk
03/10/2025
Full time
Your new company As part of their continued investment in technology and cyber resilience, my client is seeking a Cloud Security Engineer to join their dynamic Technology Directorate. This is a pivotal role supporting the Head of Cyber Security and Infrastructure in strengthening the cyber security estate and ensuring robust protection across our digital platforms. Your new role As Cloud Security Engineer, you will play a key role in enhancing cyber resilience. You'll be responsible for leveraging tools such as Microsoft Defender, Sentinel, Azure, and their SOC partner to conduct threat analysis, risk assessments, and implement effective controls. You'll support the delivery of their Cyber Security Sub Strategy in line with the Cyber Assessment Framework, and contribute to the design and operation of threat intelligence, incident response, vulnerability management, and ethical hacking capabilities. You'll work closely with internal stakeholders and external partners to ensure compliance with ISO27001, Cyber Essentials+, and other regulatory frameworks. This role also involves reporting on cyber threats and performance using Power BI, supporting penetration testing, and contributing to the development of secure IT architecture and access control policies. What you'll need to succeed Extensive experience administering the Azure platform and Microsoft security tools (Defender, Sentinel, Intune, Autopilot). Strong understanding of cyber security frameworks including ISO27001, Cyber Essentials+, and the Cyber Assessment Framework. Proven experience in identity and access management, end-user device management, and working with external SOCs. Ability to deliver against cyber security roadmaps, respond to incidents, and remediate vulnerabilities. Experience in building Power BI dashboards and writing security policies and SOPs. A collaborative mindset with excellent communication skills and a proactive approach to continuous improvement. What you'll get in return A chance to make a real impact in a purpose-driven organisation. Flexible working arrangements. Access to professional development and training. A supportive and inclusive culture. Competitive salary up to £52K and benefits package. What you need to do now If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us now. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at hays.co.uk
"At Klipboard we've introduced a flexible hybrid work policy, where employees spend three days in the office and two days working from home. This approach promotes a balanced work environment that combines office collaboration with the comfort and convenience of remote work." Klipboard provides specialist software, services and support to deliver fully integrated trading and business management solutions to companies in the distributive trade - wherever they are in the world. With a unique depth of knowledge and experience in ERP/SaaS solutions, Klipboard has a wide range of clients includes wholesalers, distributors, merchants and retailers from small traders to multinational enterprises. Klipboard has offices in the UK, Ireland, The Netherlands, South Africa, Kenya and North America. Our mission is simple: to design and deliver high performance, integrated ERP solutions that enable our distributive trade customers to source effectively, stock efficiently, sell profitably and service competitively We are seeking a 3rd Line Support Engineer to join our dynamic team and provide exceptional technical support to a global client base. This role offers the opportunity to transition from traditional IT solutions to advanced cloud and security technologies. The successful candidate will have an excellent base of experience and knowledge with traditional Microsoft technologies such as Windows Server, Active Directory, Group Policy and Microsoft 365. The successful candidate will then work with the latest Microsoft services, developing expertise in areas such as: Azure Cloud & Virtual Desktops Microsoft Sentinel Microsoft Defender for Cloud Privileged Identity Management Microsoft Defender for Endpoint This position involves operating in a fast-paced MSP environment to ensure the availability, performance, and security of customers' cloud workloads. Key Responsibilities: Provide high-quality support for incidents and service requests raised through our Service Desk, working with technologies such as Active Directory, Azure Active Directory, Group Policy, Exchange Online, Windows Server, and Remote Desktop Services. Respond to monitoring alerts for Microsoft Azure IaaS/PaaS/SaaS services, network connectivity, and Microsoft 365 services to proactively address potential issues. Investigate and resolve security alerts for Microsoft 365 users and Azure workloads, addressing concerns like user account security, suspicious activity, antivirus alerts, and Endpoint Detection and Response (EDR) notifications. Review, install, and test security and application updates, leveraging automation to maintain and improve customer environments. Ensure the operational integrity, performance, and security of customer cloud-based services through proactive monitoring and expertise. Collaborate with customers and internal teams to implement migrations and deliver solutions tailored to customer requirements. Maintain regular communication with customers via Service Desk tools and Teams meetings. Working Arrangements Hybrid working model: 3-4 days remote, 1 day in the office. All necessary equipment for home working will be provided. Shift pattern includes: Week 1: 6:30 AM to 3:00 PM Week 2: 9:00 AM to 5:30 PM Week 3: 1:30 PM to 10:00 PM On-call responsibilities (paid per rotation) and occasional out-of-hours work (paid overtime). Candidate Profile The ideal candidate will: Be an effective communicator who prioritizes customer satisfaction. Possess strong interpersonal skills to collaborate with team members and customer IT representatives. Have prior experience in a Service Desk environment with the ability to manage and prioritize tasks effectively. Be enthusiastic about learning new skills in cloud computing, IT security, and Microsoft solutions, pursuing relevant certifications. Exhibit a detail-oriented approach to problem-solving and task execution. Skills, Knowledge and Experience: Proficiency in traditional Microsoft Windows Server solutions, including: Active Directory and Group Policy File and Print services Remote Desktop Services PowerShell scripting Fundamental knowledge of TCP/IP networking, VPNs, and network connectivity. Experience administering Microsoft 365 services (Email, OneDrive, Teams, SharePoint). Understanding of IT security practices and tools (e.g., Antivirus, Email Filtering, Web Filtering). Required Experience Previous experience within a 3rd Line Role is extremely desirable Previous experience within an MSP environment is preferred Active Directory: 3 years Microsoft Windows Server: 3 years IP networking: 2 year Microsoft 365 administration: 3 years Active Microsoft Azure, 365 & Windows Server certifications are preferred. Equal Opportunities As a global company, we value and respect the diversity of our workforce, aiming to empower everyone to embrace each other's differences. We are committed to creating an inclusive workplace where diversity, equity, and inclusion are integral to our company and culture. We recognize the benefits of a diverse workforce, where creativity and valuing differences enable us all to thrive and sparks innovation. If you require any help, adjustments and/or support during the interview and offer process then please advise our TA or HR team. To all recruitment agencies: Klipboard does not accept agency speculative resumes. At present we only accept CV's from Agencies on our PSL who have been assigned specific position/s. Please do not forward resumes to our careers site or direct to Klipboard employee as this does not constitute an introduction and Klipboard retrospectively will not be liable for any candidate ownership or fees related to unsolicited resumes.
03/10/2025
Full time
"At Klipboard we've introduced a flexible hybrid work policy, where employees spend three days in the office and two days working from home. This approach promotes a balanced work environment that combines office collaboration with the comfort and convenience of remote work." Klipboard provides specialist software, services and support to deliver fully integrated trading and business management solutions to companies in the distributive trade - wherever they are in the world. With a unique depth of knowledge and experience in ERP/SaaS solutions, Klipboard has a wide range of clients includes wholesalers, distributors, merchants and retailers from small traders to multinational enterprises. Klipboard has offices in the UK, Ireland, The Netherlands, South Africa, Kenya and North America. Our mission is simple: to design and deliver high performance, integrated ERP solutions that enable our distributive trade customers to source effectively, stock efficiently, sell profitably and service competitively We are seeking a 3rd Line Support Engineer to join our dynamic team and provide exceptional technical support to a global client base. This role offers the opportunity to transition from traditional IT solutions to advanced cloud and security technologies. The successful candidate will have an excellent base of experience and knowledge with traditional Microsoft technologies such as Windows Server, Active Directory, Group Policy and Microsoft 365. The successful candidate will then work with the latest Microsoft services, developing expertise in areas such as: Azure Cloud & Virtual Desktops Microsoft Sentinel Microsoft Defender for Cloud Privileged Identity Management Microsoft Defender for Endpoint This position involves operating in a fast-paced MSP environment to ensure the availability, performance, and security of customers' cloud workloads. Key Responsibilities: Provide high-quality support for incidents and service requests raised through our Service Desk, working with technologies such as Active Directory, Azure Active Directory, Group Policy, Exchange Online, Windows Server, and Remote Desktop Services. Respond to monitoring alerts for Microsoft Azure IaaS/PaaS/SaaS services, network connectivity, and Microsoft 365 services to proactively address potential issues. Investigate and resolve security alerts for Microsoft 365 users and Azure workloads, addressing concerns like user account security, suspicious activity, antivirus alerts, and Endpoint Detection and Response (EDR) notifications. Review, install, and test security and application updates, leveraging automation to maintain and improve customer environments. Ensure the operational integrity, performance, and security of customer cloud-based services through proactive monitoring and expertise. Collaborate with customers and internal teams to implement migrations and deliver solutions tailored to customer requirements. Maintain regular communication with customers via Service Desk tools and Teams meetings. Working Arrangements Hybrid working model: 3-4 days remote, 1 day in the office. All necessary equipment for home working will be provided. Shift pattern includes: Week 1: 6:30 AM to 3:00 PM Week 2: 9:00 AM to 5:30 PM Week 3: 1:30 PM to 10:00 PM On-call responsibilities (paid per rotation) and occasional out-of-hours work (paid overtime). Candidate Profile The ideal candidate will: Be an effective communicator who prioritizes customer satisfaction. Possess strong interpersonal skills to collaborate with team members and customer IT representatives. Have prior experience in a Service Desk environment with the ability to manage and prioritize tasks effectively. Be enthusiastic about learning new skills in cloud computing, IT security, and Microsoft solutions, pursuing relevant certifications. Exhibit a detail-oriented approach to problem-solving and task execution. Skills, Knowledge and Experience: Proficiency in traditional Microsoft Windows Server solutions, including: Active Directory and Group Policy File and Print services Remote Desktop Services PowerShell scripting Fundamental knowledge of TCP/IP networking, VPNs, and network connectivity. Experience administering Microsoft 365 services (Email, OneDrive, Teams, SharePoint). Understanding of IT security practices and tools (e.g., Antivirus, Email Filtering, Web Filtering). Required Experience Previous experience within a 3rd Line Role is extremely desirable Previous experience within an MSP environment is preferred Active Directory: 3 years Microsoft Windows Server: 3 years IP networking: 2 year Microsoft 365 administration: 3 years Active Microsoft Azure, 365 & Windows Server certifications are preferred. Equal Opportunities As a global company, we value and respect the diversity of our workforce, aiming to empower everyone to embrace each other's differences. We are committed to creating an inclusive workplace where diversity, equity, and inclusion are integral to our company and culture. We recognize the benefits of a diverse workforce, where creativity and valuing differences enable us all to thrive and sparks innovation. If you require any help, adjustments and/or support during the interview and offer process then please advise our TA or HR team. To all recruitment agencies: Klipboard does not accept agency speculative resumes. At present we only accept CV's from Agencies on our PSL who have been assigned specific position/s. Please do not forward resumes to our careers site or direct to Klipboard employee as this does not constitute an introduction and Klipboard retrospectively will not be liable for any candidate ownership or fees related to unsolicited resumes.
ROLE TITLE: SOC Analyst - SC Cleared LOCATION: Hursley The ideal candidate will have active SC Clearance or be eligible to undergo SC Clearance. We are actively looking to secure an SOC Analyst to join Experis. Experis Consultancy is a Global entity with a well-established team with over 1000 consultants on assignment across 20 clients globally. Our UK operation is growing and has very aggressive plans for expansion over the coming years. We form part of the Manpower group of companies that turn over $20 billion a year collectively. Experis UK have partnerships with major clients across the UK spanning multiple industries; our approach is a very personal one, with both our clients and our own employees. We are passionate about training, technology and career development. Skills required: Microsoft Certified: Security Operations Analyst Associate Certification (SC200) is a mandatory requirement for role fulfilment Experience working with SIEM technologies and security tooling An understanding of IT Infrastructure and Networking An understanding of vulnerability and threat management An understanding of the incident response lifecycle T he ability to work in a close team and independently The ability to be adaptable to a high pace changeable workload An interest in security and threat management Nice to have skills A SOC Analyst will be responsible for providing Protective Monitoring Services across a range of Secure Customers. They will be responsible for the day to day monitoring using various SIEM Tools (Qradar, Sentinel & LogRhythm). Some of the responsibilities that come along with this role include the following: Security Analytics Incident investigation, triage and escalation Threat monitoring and response Trend reporting Rule tuning and continual service improvement The role involves working alongside other team members including SOC engineers and Service Managers. Benefits Include: Contributory pension scheme Employee Assistance Program Medical and Dental cover 22 days holiday + bank holidays Maternity Pay/Shared Parental leave and paternity leave Sick pay Suitable Candidates should submit CVs in the first instance.
01/10/2025
Full time
ROLE TITLE: SOC Analyst - SC Cleared LOCATION: Hursley The ideal candidate will have active SC Clearance or be eligible to undergo SC Clearance. We are actively looking to secure an SOC Analyst to join Experis. Experis Consultancy is a Global entity with a well-established team with over 1000 consultants on assignment across 20 clients globally. Our UK operation is growing and has very aggressive plans for expansion over the coming years. We form part of the Manpower group of companies that turn over $20 billion a year collectively. Experis UK have partnerships with major clients across the UK spanning multiple industries; our approach is a very personal one, with both our clients and our own employees. We are passionate about training, technology and career development. Skills required: Microsoft Certified: Security Operations Analyst Associate Certification (SC200) is a mandatory requirement for role fulfilment Experience working with SIEM technologies and security tooling An understanding of IT Infrastructure and Networking An understanding of vulnerability and threat management An understanding of the incident response lifecycle T he ability to work in a close team and independently The ability to be adaptable to a high pace changeable workload An interest in security and threat management Nice to have skills A SOC Analyst will be responsible for providing Protective Monitoring Services across a range of Secure Customers. They will be responsible for the day to day monitoring using various SIEM Tools (Qradar, Sentinel & LogRhythm). Some of the responsibilities that come along with this role include the following: Security Analytics Incident investigation, triage and escalation Threat monitoring and response Trend reporting Rule tuning and continual service improvement The role involves working alongside other team members including SOC engineers and Service Managers. Benefits Include: Contributory pension scheme Employee Assistance Program Medical and Dental cover 22 days holiday + bank holidays Maternity Pay/Shared Parental leave and paternity leave Sick pay Suitable Candidates should submit CVs in the first instance.
Outside IR35, Dev/Sec Ops Engineer, Azure, AWS, Technical Blueprint, Best practice, Regulatory Environment background, London + West Midlands. We are seeking a Senior Dev Sec Ops Consultant to lead governance, architecture guidance, and assurance for cloud and infrastructure security across Microsoft Azure, AWS, and key SaaS platforms. This role is pivotal in defining technical blueprints, setting security standards, and ensuring regulatory compliance with Cyber Essentials Plus, ISO 27001, and Zero Trust principles. You will work closely with IT and platform teams to embed best practices, validate implementations, and support audit readiness across IaaS, PaaS, and SaaS environments. Key Responsibilities Define and maintain multi-cloud security standards and reference blueprints (eg Azure Policy/Initiatives, AWS Control Tower/SCPs) Own security architecture patterns and contribute to HLD/LLD, threat models, and risk assessments Set assurance criteria and control evidence requirements for internal teams and third-party vendors Establish policy-as-code requirements and maintain an exceptions register with expiry and risk ownership Define identity and access control standards (Entra ID Conditional Access, MFA, PIM; AWS IAM federation) Govern SaaS security onboarding (SSO, OAuth governance, DLP controls, vendor assessments) Specify telemetry and logging requirements for Microsoft Sentinel/SOC and review analytics/reporting Lead compliance mapping for ISO 27001 and curate audit-ready evidence packs Chair Cloud & Platform Security design reviews and participate in CAB for risk appraisal Strong regulatory sector experience Educate and influence teams through guidance, clinics, and coaching sessions Familiarity with IaaS, PaaS, SaaS risk models and audit frameworks Excellent written communication and facilitation skills to drive adoption and influence stakeholders Additional Skills Certifications: AZ-500, SC-100, SC-200, AZ-700, AWS Security Specialty, CISSP (or equivalents) Experience with blueprint catalogues and architecture governance processes Working knowledge of containers/Kubernetes (AKS/EKS) policy models While this role focuses on governance and assurance, hands-on use may be required for validation: Azure : Policy/Initiatives, Defender for Cloud, Entra ID, PIM AWS : Control Tower, SCPs, Security Hub, GuardDuty, IAM Security & Monitoring : Microsoft Sentinel (KQL), Defender XDR, audit dashboards Documentation & Governance : Blueprint repositories, risk registers, ITSM/CAB records If this role is of interest please send your CV to review ASAP
01/10/2025
Contractor
Outside IR35, Dev/Sec Ops Engineer, Azure, AWS, Technical Blueprint, Best practice, Regulatory Environment background, London + West Midlands. We are seeking a Senior Dev Sec Ops Consultant to lead governance, architecture guidance, and assurance for cloud and infrastructure security across Microsoft Azure, AWS, and key SaaS platforms. This role is pivotal in defining technical blueprints, setting security standards, and ensuring regulatory compliance with Cyber Essentials Plus, ISO 27001, and Zero Trust principles. You will work closely with IT and platform teams to embed best practices, validate implementations, and support audit readiness across IaaS, PaaS, and SaaS environments. Key Responsibilities Define and maintain multi-cloud security standards and reference blueprints (eg Azure Policy/Initiatives, AWS Control Tower/SCPs) Own security architecture patterns and contribute to HLD/LLD, threat models, and risk assessments Set assurance criteria and control evidence requirements for internal teams and third-party vendors Establish policy-as-code requirements and maintain an exceptions register with expiry and risk ownership Define identity and access control standards (Entra ID Conditional Access, MFA, PIM; AWS IAM federation) Govern SaaS security onboarding (SSO, OAuth governance, DLP controls, vendor assessments) Specify telemetry and logging requirements for Microsoft Sentinel/SOC and review analytics/reporting Lead compliance mapping for ISO 27001 and curate audit-ready evidence packs Chair Cloud & Platform Security design reviews and participate in CAB for risk appraisal Strong regulatory sector experience Educate and influence teams through guidance, clinics, and coaching sessions Familiarity with IaaS, PaaS, SaaS risk models and audit frameworks Excellent written communication and facilitation skills to drive adoption and influence stakeholders Additional Skills Certifications: AZ-500, SC-100, SC-200, AZ-700, AWS Security Specialty, CISSP (or equivalents) Experience with blueprint catalogues and architecture governance processes Working knowledge of containers/Kubernetes (AKS/EKS) policy models While this role focuses on governance and assurance, hands-on use may be required for validation: Azure : Policy/Initiatives, Defender for Cloud, Entra ID, PIM AWS : Control Tower, SCPs, Security Hub, GuardDuty, IAM Security & Monitoring : Microsoft Sentinel (KQL), Defender XDR, audit dashboards Documentation & Governance : Blueprint repositories, risk registers, ITSM/CAB records If this role is of interest please send your CV to review ASAP
Infrastructure & Security Engineer - Retail Sector London (Hybrid) 30% BAU/70% Project Work Permanent | Immediate Interviews Available We're partnering with a London-based retail brand currently undergoing infrastructure transformation. This is a fantastic opportunity for an experienced Infrastructure & Security Engineer to join a fast-moving organisation investing heavily in technology and digital maturity. You'll play a key role in both business-as-usual operations (30%) and a wide range of modernisation and transformation projects (70%), helping to reshape the future of the company's IT infrastructure. This opportunity is perfect for an experienced Infrastructure or Network Engineer who enjoys being hands-on with both Legacy systems and modern cloud-first environments. If you're looking to work on meaningful projects within a dynamic retail business, this could be the next step in your career. Key Responsibilities Work as a hands-on infrastructure and security engineer, delivering technical improvements and helping to secure enterprise systems. Support and maintain a range of technologies including VMware, Windows Server, Azure, Microsoft 365, and SQL Server. Help manage and enhance the company's Cisco Meraki network infrastructure across head office and retail sites. Contribute to vulnerability management, compliance (PCIDSS), and alignment with NIST/ISO27001 standards. Assist in the deployment of secure, scalable device imaging using Intune & Autopilot for POS, hospitality, and corporate users. Configure and manage SIEM, endpoint protection, IAM, MFA, and RBAC to strengthen infrastructure security. Create and maintain infrastructure documentation, diagrams, and operational runbooks. Support disaster recovery processes and participate in testing and readiness planning. Collaboration & Communication Work closely with internal IT teams and third-party vendors to deliver secure, high-performing infrastructure solutions. Share expertise and promote best practices in infrastructure, networking, and security across the organisation. Contribute to a security-first culture, providing guidance and support across teams. Key Experience & Skills We're looking for candidates with strong experience in: Microsoft Infrastructure: Windows Server, Azure, Microsoft 365, Entra ID, Active Directory, Group Policy Networking: Cisco networking (LAN/WAN/Wi-Fi, TCP/IP, Firewalls, Switching/Routing) Virtualisation: VMware vSphere, ESXi, vCenter Scripting: PowerShell Security & Compliance: Microsoft Defender, Sentinel, IAM, PCIDSS, MFA, RBAC Hardware: Dell server/storage platforms Monitoring & DR: Familiarity with SolarWinds, PRTG, Zabbix, backup tools, and DR best practices If this role is of interest please share your CV and we will be in touch!
01/10/2025
Full time
Infrastructure & Security Engineer - Retail Sector London (Hybrid) 30% BAU/70% Project Work Permanent | Immediate Interviews Available We're partnering with a London-based retail brand currently undergoing infrastructure transformation. This is a fantastic opportunity for an experienced Infrastructure & Security Engineer to join a fast-moving organisation investing heavily in technology and digital maturity. You'll play a key role in both business-as-usual operations (30%) and a wide range of modernisation and transformation projects (70%), helping to reshape the future of the company's IT infrastructure. This opportunity is perfect for an experienced Infrastructure or Network Engineer who enjoys being hands-on with both Legacy systems and modern cloud-first environments. If you're looking to work on meaningful projects within a dynamic retail business, this could be the next step in your career. Key Responsibilities Work as a hands-on infrastructure and security engineer, delivering technical improvements and helping to secure enterprise systems. Support and maintain a range of technologies including VMware, Windows Server, Azure, Microsoft 365, and SQL Server. Help manage and enhance the company's Cisco Meraki network infrastructure across head office and retail sites. Contribute to vulnerability management, compliance (PCIDSS), and alignment with NIST/ISO27001 standards. Assist in the deployment of secure, scalable device imaging using Intune & Autopilot for POS, hospitality, and corporate users. Configure and manage SIEM, endpoint protection, IAM, MFA, and RBAC to strengthen infrastructure security. Create and maintain infrastructure documentation, diagrams, and operational runbooks. Support disaster recovery processes and participate in testing and readiness planning. Collaboration & Communication Work closely with internal IT teams and third-party vendors to deliver secure, high-performing infrastructure solutions. Share expertise and promote best practices in infrastructure, networking, and security across the organisation. Contribute to a security-first culture, providing guidance and support across teams. Key Experience & Skills We're looking for candidates with strong experience in: Microsoft Infrastructure: Windows Server, Azure, Microsoft 365, Entra ID, Active Directory, Group Policy Networking: Cisco networking (LAN/WAN/Wi-Fi, TCP/IP, Firewalls, Switching/Routing) Virtualisation: VMware vSphere, ESXi, vCenter Scripting: PowerShell Security & Compliance: Microsoft Defender, Sentinel, IAM, PCIDSS, MFA, RBAC Hardware: Dell server/storage platforms Monitoring & DR: Familiarity with SolarWinds, PRTG, Zabbix, backup tools, and DR best practices If this role is of interest please share your CV and we will be in touch!
We are actively recruiting for a Security Consultant to work in our SOC Consulting services, within our Detection & Response (D&R) Practice. Working to support our customers assess their SOC capabilities, align on the right direction for meeting their business needs and completing the transformation journey. Remote UK locations are available with occasional travel to either Adarma offices and customer locations. What you'll do For our customers, you'll be both a true partner and a trusted source of expert insight and advice. Leading on either one critical security area or broader strategic challenges, you'll understand and analyse their needs, before recommending the right way forward. you'll also scope complex projects and support the development and implementation of new solutions. And you'll drive our own progress too mentoring a team and helping our pre-sales team develop new opportunities for us to make an impact. How you'll grow We have a strong culture of learning and development, so you'll have plenty of opportunity to grow in your specialist area and beyond. In time, you could progress to Senior Consultant, or focus more on your technical skills in a senior engineer or architect role. What you'll bring You have a solid knowledge of security operations processes and tools plus best practice in fields such as SIEM solution design, use case development, SOC maturity, XDR/EDR, Log Management and detection testing. Crucially, you re an outstanding communicator and relationship builder too, able to bring the best out of others. Previous experience in the design and reviewing of security detection solutions Experienced in the implementation and management of SIEM, EDR and NDR technologies (eg Splunk, Microsoft Sentinel/Defender, CrowdStrike Falcon/Humio, Google Chronicle, SentinelOne, ArcSight, QRadar, Logrythm, Vectra, ExtraHop, etc) Previous experience in designing and implementing detection and response use cases with data source analysis and onboarding Experience of complex and/or large-scale security detection solutions Previous project experience from a Consultancy perspective; commercial acumen IT Security/Cyber Security project experience A security operations expert with broad experience and CISSP/CISM certification or equivalent, you know how to plan and deliver complex cybersecurity projects. Benefits Excellent compensation and benefits package, including Company Pension, Private Health Care and Cash-Back Plan, Car Leasing Scheme and more Ongoing training and development opportunities, resulting in industry recognised accreditations and qualifications Flexible working hours, occasional home office (where possible) We encourage autonomy and entrepreneurship enabling our consultants and employees to influence the strategy and direction of the business Adarma We began life in 2009, with a fierce determination to make cyber resilience a reality for every organisation, every day. This has guided us as we've adapted and grown to become one of the UK's leading threat specialists. Our journey is remarkable. But what's ahead is even more inspiring. Together, we're growing and transforming like never before. We're partnering with even more customers and creating more innovative and resilient solutions. And we're taking our thinking and our whole sector further, every single day.
20/09/2022
Full time
We are actively recruiting for a Security Consultant to work in our SOC Consulting services, within our Detection & Response (D&R) Practice. Working to support our customers assess their SOC capabilities, align on the right direction for meeting their business needs and completing the transformation journey. Remote UK locations are available with occasional travel to either Adarma offices and customer locations. What you'll do For our customers, you'll be both a true partner and a trusted source of expert insight and advice. Leading on either one critical security area or broader strategic challenges, you'll understand and analyse their needs, before recommending the right way forward. you'll also scope complex projects and support the development and implementation of new solutions. And you'll drive our own progress too mentoring a team and helping our pre-sales team develop new opportunities for us to make an impact. How you'll grow We have a strong culture of learning and development, so you'll have plenty of opportunity to grow in your specialist area and beyond. In time, you could progress to Senior Consultant, or focus more on your technical skills in a senior engineer or architect role. What you'll bring You have a solid knowledge of security operations processes and tools plus best practice in fields such as SIEM solution design, use case development, SOC maturity, XDR/EDR, Log Management and detection testing. Crucially, you re an outstanding communicator and relationship builder too, able to bring the best out of others. Previous experience in the design and reviewing of security detection solutions Experienced in the implementation and management of SIEM, EDR and NDR technologies (eg Splunk, Microsoft Sentinel/Defender, CrowdStrike Falcon/Humio, Google Chronicle, SentinelOne, ArcSight, QRadar, Logrythm, Vectra, ExtraHop, etc) Previous experience in designing and implementing detection and response use cases with data source analysis and onboarding Experience of complex and/or large-scale security detection solutions Previous project experience from a Consultancy perspective; commercial acumen IT Security/Cyber Security project experience A security operations expert with broad experience and CISSP/CISM certification or equivalent, you know how to plan and deliver complex cybersecurity projects. Benefits Excellent compensation and benefits package, including Company Pension, Private Health Care and Cash-Back Plan, Car Leasing Scheme and more Ongoing training and development opportunities, resulting in industry recognised accreditations and qualifications Flexible working hours, occasional home office (where possible) We encourage autonomy and entrepreneurship enabling our consultants and employees to influence the strategy and direction of the business Adarma We began life in 2009, with a fierce determination to make cyber resilience a reality for every organisation, every day. This has guided us as we've adapted and grown to become one of the UK's leading threat specialists. Our journey is remarkable. But what's ahead is even more inspiring. Together, we're growing and transforming like never before. We're partnering with even more customers and creating more innovative and resilient solutions. And we're taking our thinking and our whole sector further, every single day.