it job board logo
  • Home
  • Find IT Jobs
  • Register CV
  • Career Advice
  • Contact us
  • Employers
    • Register as Employer
    • Pricing Plans
  • Recruiting? Post a job
  • Sign in
  • Sign up
  • Home
  • Find IT Jobs
  • Register CV
  • Career Advice
  • Contact us
  • Employers
    • Register as Employer
    • Pricing Plans
Sorry, that job is no longer available. Here are some results that may be similar to the job you were looking for.

14 jobs found

Email me jobs like this
Refine Search
Current Search
microsoft sentinel engineer
Oscar Associates Ltd
SOC Engineer
Oscar Associates Ltd Sheffield, Yorkshire
Role: SOC Engineer Location: Sheffield (Hybrid) Work Pattern: Full Time (Mon - Fri - 9 - 5:30) Salary: £45,000 - £50,000 A fantastic opportunity has opened for an experienced Security Operations Engineer to join a UK-based Managed Security Service Provider, supporting their growing client base across multiple industry verticals. Their SOC delivers around the clock protective monitoring, detection, and incident response capabilities utilising industry-leading technology. This is a hybrid role based in Sheffield, requiring two days per week in the office. There is also potential to be on-call as the SOC operates 24x7x365. Key Responsibilities: Monitor and respond to security incidents using industry-leading tooling, providing advice and guidance to clients targeted by cyber-attacks. Produce accurate and timely incident reports for both internal and client-facing audiences. Deploy and configure SIEM, EDR, and Vulnerability Management tools as part of client onboarding. Perform malware analysis and event correlation to extract and operationalise Indicators of Compromise. Develop new detection rules and automation to enhance monitoring capabilities. Act as a technical escalation point and mentor for junior SOC team members. Contribute to security policy, SOC procedures, and continuous improvement initiatives. Deliver demos to prospective clients and assist with scoping engagements. Requirements: Experience working within a SOC or similar security operations environment. Strong communication skills and confidence in a client-facing role. Certifications such as Microsoft SC-200, AZ-500, or SC-100 are highly desirable. Experience with any of the following: Microsoft Sentinel, Microsoft Defender, USM Anywhere, SentinelOne, Tenable IO. Benefits: Salary £45,000-£50,000 Hybrid working (2 days per week in office) Standard UK office hours - no shift work Role: SOC Engineer Location: Sheffield (Hybrid) Work Pattern: Full Time (Mon - Fri - 9 - 5:30) Salary: £45,000 - £50,000 Oscar Associates (UK) Limited is acting as an Employment Agency in relation to this vacancy. To understand more about what we do with your data please review our privacy policy in the privacy section of the Oscar website.
06/03/2026
Full time
Role: SOC Engineer Location: Sheffield (Hybrid) Work Pattern: Full Time (Mon - Fri - 9 - 5:30) Salary: £45,000 - £50,000 A fantastic opportunity has opened for an experienced Security Operations Engineer to join a UK-based Managed Security Service Provider, supporting their growing client base across multiple industry verticals. Their SOC delivers around the clock protective monitoring, detection, and incident response capabilities utilising industry-leading technology. This is a hybrid role based in Sheffield, requiring two days per week in the office. There is also potential to be on-call as the SOC operates 24x7x365. Key Responsibilities: Monitor and respond to security incidents using industry-leading tooling, providing advice and guidance to clients targeted by cyber-attacks. Produce accurate and timely incident reports for both internal and client-facing audiences. Deploy and configure SIEM, EDR, and Vulnerability Management tools as part of client onboarding. Perform malware analysis and event correlation to extract and operationalise Indicators of Compromise. Develop new detection rules and automation to enhance monitoring capabilities. Act as a technical escalation point and mentor for junior SOC team members. Contribute to security policy, SOC procedures, and continuous improvement initiatives. Deliver demos to prospective clients and assist with scoping engagements. Requirements: Experience working within a SOC or similar security operations environment. Strong communication skills and confidence in a client-facing role. Certifications such as Microsoft SC-200, AZ-500, or SC-100 are highly desirable. Experience with any of the following: Microsoft Sentinel, Microsoft Defender, USM Anywhere, SentinelOne, Tenable IO. Benefits: Salary £45,000-£50,000 Hybrid working (2 days per week in office) Standard UK office hours - no shift work Role: SOC Engineer Location: Sheffield (Hybrid) Work Pattern: Full Time (Mon - Fri - 9 - 5:30) Salary: £45,000 - £50,000 Oscar Associates (UK) Limited is acting as an Employment Agency in relation to this vacancy. To understand more about what we do with your data please review our privacy policy in the privacy section of the Oscar website.
Morson Edge
System Engineer - Networks 2089
Morson Edge
System Engineer Location: East London (Hybrid office/home) Rate: £450 £500 per day (Inside IR35) Duration: Initial 3 4 month contract (backlog clearance) with strong potential for extension or permanent conversion Client Environment: Major London Rail customers (TfL, Network Rail station systems) Overview We are seeking a mid-to-senior Cybersecurity & Network Assurance Engineer to join a high-performing networks team supporting critical rail infrastructure in London. This role will focus on cybersecurity governance, assurance, and technical documentation , ensuring networked systems meet customer, regulatory, and industry standards. You will play a key role in clearing an immediate backlog of assurance deliverables while providing technical oversight to junior engineers and supporting SIEM integration activities. This is a hybrid East London role with no trackside/site access required. Key Responsibilities Cybersecurity Governance & Assurance Produce and maintain: Cyber Security Management Plans (CSMP) Risk assessments and threat models Assurance and compliance documentation Control framework mappings Align artefacts to client standards (TfL / Network Rail) and industry frameworks Support continual improvement of cyber assurance processes Standards & Compliance Map controls and documentation to: ISO/IEC 27001 IEC 62443 (OT security) Customer-specific rail standards Ensure deliverables meet governance and audit requirements Network Security & Architecture Assurance Provide design assurance for: Secure communications Firewalls (e.g., Cisco, Juniper) Switching and routed network environments Assess effectiveness of implemented security controls in networked systems SIEM Integration Support Produce documentation for SIEM onboarding: Data source identification Logging requirements Use-case and control alignment Support assurance activities for SIEM integration (e.g., Microsoft Sentinel environments) Stakeholder & Team Engagement Act as a technical interface to client stakeholders Translate technical risk and assurance findings for non-technical audiences Provide guidance and quality oversight to junior engineers/graduate staff Essential Experience Cybersecurity governance & assurance in enterprise or critical infrastructure environments Proven delivery of: Risk assessments Threat modelling Cyber security management documentation Control framework mapping Strong knowledge of ISO/IEC 27001 and IEC 62443 Solid understanding of network architecture and secure communications Experience assessing firewalls, switching, and routed networks from a security perspective Familiarity with SIEM concepts and onboarding processes (e.g., Microsoft Sentinel) Ability to produce clear, client-aligned technical documentation Experience working with stakeholders and presenting assurance outcomes Desirable Experience Experience in rail, transport, or OT environments Hands-on network configuration (Cisco, Juniper) Experience with network management and policy enforcement tools Knowledge of Windows Server architectures Prior contract/consulting experience Experience aligning to customer templates or London-specific standards Qualifications & Certifications HND, degree, or equivalent experience in IT, networking, or cybersecurity Cisco CCNA/CCNP (or equivalent experience) Security certifications such as CISSP , CompTIA CySA+ , or similar (desirable) ITIL Foundation (desirable) Clearance Must be eligible for BPSS clearance Key Behaviours Strong written and verbal communication skills Ability to operate at mid-to-senior level with minimal supervision Comfortable guiding junior team members Able to work in a governance, assurance, and documentation-heavy role Collaborative approach in a multi-stakeholder environment
02/03/2026
Contractor
System Engineer Location: East London (Hybrid office/home) Rate: £450 £500 per day (Inside IR35) Duration: Initial 3 4 month contract (backlog clearance) with strong potential for extension or permanent conversion Client Environment: Major London Rail customers (TfL, Network Rail station systems) Overview We are seeking a mid-to-senior Cybersecurity & Network Assurance Engineer to join a high-performing networks team supporting critical rail infrastructure in London. This role will focus on cybersecurity governance, assurance, and technical documentation , ensuring networked systems meet customer, regulatory, and industry standards. You will play a key role in clearing an immediate backlog of assurance deliverables while providing technical oversight to junior engineers and supporting SIEM integration activities. This is a hybrid East London role with no trackside/site access required. Key Responsibilities Cybersecurity Governance & Assurance Produce and maintain: Cyber Security Management Plans (CSMP) Risk assessments and threat models Assurance and compliance documentation Control framework mappings Align artefacts to client standards (TfL / Network Rail) and industry frameworks Support continual improvement of cyber assurance processes Standards & Compliance Map controls and documentation to: ISO/IEC 27001 IEC 62443 (OT security) Customer-specific rail standards Ensure deliverables meet governance and audit requirements Network Security & Architecture Assurance Provide design assurance for: Secure communications Firewalls (e.g., Cisco, Juniper) Switching and routed network environments Assess effectiveness of implemented security controls in networked systems SIEM Integration Support Produce documentation for SIEM onboarding: Data source identification Logging requirements Use-case and control alignment Support assurance activities for SIEM integration (e.g., Microsoft Sentinel environments) Stakeholder & Team Engagement Act as a technical interface to client stakeholders Translate technical risk and assurance findings for non-technical audiences Provide guidance and quality oversight to junior engineers/graduate staff Essential Experience Cybersecurity governance & assurance in enterprise or critical infrastructure environments Proven delivery of: Risk assessments Threat modelling Cyber security management documentation Control framework mapping Strong knowledge of ISO/IEC 27001 and IEC 62443 Solid understanding of network architecture and secure communications Experience assessing firewalls, switching, and routed networks from a security perspective Familiarity with SIEM concepts and onboarding processes (e.g., Microsoft Sentinel) Ability to produce clear, client-aligned technical documentation Experience working with stakeholders and presenting assurance outcomes Desirable Experience Experience in rail, transport, or OT environments Hands-on network configuration (Cisco, Juniper) Experience with network management and policy enforcement tools Knowledge of Windows Server architectures Prior contract/consulting experience Experience aligning to customer templates or London-specific standards Qualifications & Certifications HND, degree, or equivalent experience in IT, networking, or cybersecurity Cisco CCNA/CCNP (or equivalent experience) Security certifications such as CISSP , CompTIA CySA+ , or similar (desirable) ITIL Foundation (desirable) Clearance Must be eligible for BPSS clearance Key Behaviours Strong written and verbal communication skills Ability to operate at mid-to-senior level with minimal supervision Comfortable guiding junior team members Able to work in a governance, assurance, and documentation-heavy role Collaborative approach in a multi-stakeholder environment
Symmetric Recruitment Ltd
SOC Manager
Symmetric Recruitment Ltd City, Manchester
SOC Engineering Lead £70,000 - £80,000 DOE Hybrid Working UKSV clearance required candidates must hold or be eligible to obtain clearance. This role leads the Security Engineering function within a high-performing Security Operations Centre. It is a pivotal leadership position responsible for onboarding delivery, platform engineering, detection optimisation and technical transition into live SOC services. The team is technically strong. What it needs is structure, prioritisation and consistent leadership. You will bring clarity, accountability and calm while remaining technically credible and hands-on. This is not a pure management role. You must be able to lead from the front. The Role You will: • Lead and schedule the SOC Engineering team across onboarding and live service activity • Own technical delivery during customer onboarding and transition • Oversee Sentinel connector deployment, Defender integration, rule tuning and SOAR playbooks • Ensure structured service handover into SOC operations with clear documentation • Act as escalation point for complex engineering issues in live environments • Maintain SLA adherence and platform health • Improve detection logic, automation and enrichment capability • Drive engineering standards, reporting clarity and workload discipline • Coach and develop junior engineers • Maintain technical authority across Microsoft Sentinel, Defender suite, Entra ID and Azure security architecture What Success Looks Like • Onboarding delivered on time with validated integrations • Clean handover into SOC with documented runbooks • Improved automation and measurable SOC efficiency gains • A structured, aligned engineering team with clear ownership Essential Experience • Experience leading a Security Engineering team within an MSP, MSSP or SOC environment • Strong hands-on expertise with Microsoft Sentinel and Defender XDR • Deep understanding of Azure security architecture and ingestion strategy • Proven experience configuring connectors and tuning detection rules • Experience with SOAR platforms • Strong KQL capability • Ability to manage competing priorities in fast-paced environments • Experience managing ingestion costs or cloud service optimisation • Confident customer communication Desirable • Integration experience (Mimecast, Darktrace, legacy EDR platforms) • ITIL exposure (change and incident management) • Google Cloud or AWS knowledge • Microsoft security certifications • GIAC, CISSP, CYSA+ or equivalent Leadership Profile You are: • Structured and operationally disciplined • Calm under pressure • Comfortable holding accountability • Technically credible with engineers • Clear and direct with customers • Focused on outcomes, not activity This role will not suit someone who prefers individual contribution without people leadership responsibility.
28/02/2026
Full time
SOC Engineering Lead £70,000 - £80,000 DOE Hybrid Working UKSV clearance required candidates must hold or be eligible to obtain clearance. This role leads the Security Engineering function within a high-performing Security Operations Centre. It is a pivotal leadership position responsible for onboarding delivery, platform engineering, detection optimisation and technical transition into live SOC services. The team is technically strong. What it needs is structure, prioritisation and consistent leadership. You will bring clarity, accountability and calm while remaining technically credible and hands-on. This is not a pure management role. You must be able to lead from the front. The Role You will: • Lead and schedule the SOC Engineering team across onboarding and live service activity • Own technical delivery during customer onboarding and transition • Oversee Sentinel connector deployment, Defender integration, rule tuning and SOAR playbooks • Ensure structured service handover into SOC operations with clear documentation • Act as escalation point for complex engineering issues in live environments • Maintain SLA adherence and platform health • Improve detection logic, automation and enrichment capability • Drive engineering standards, reporting clarity and workload discipline • Coach and develop junior engineers • Maintain technical authority across Microsoft Sentinel, Defender suite, Entra ID and Azure security architecture What Success Looks Like • Onboarding delivered on time with validated integrations • Clean handover into SOC with documented runbooks • Improved automation and measurable SOC efficiency gains • A structured, aligned engineering team with clear ownership Essential Experience • Experience leading a Security Engineering team within an MSP, MSSP or SOC environment • Strong hands-on expertise with Microsoft Sentinel and Defender XDR • Deep understanding of Azure security architecture and ingestion strategy • Proven experience configuring connectors and tuning detection rules • Experience with SOAR platforms • Strong KQL capability • Ability to manage competing priorities in fast-paced environments • Experience managing ingestion costs or cloud service optimisation • Confident customer communication Desirable • Integration experience (Mimecast, Darktrace, legacy EDR platforms) • ITIL exposure (change and incident management) • Google Cloud or AWS knowledge • Microsoft security certifications • GIAC, CISSP, CYSA+ or equivalent Leadership Profile You are: • Structured and operationally disciplined • Calm under pressure • Comfortable holding accountability • Technically credible with engineers • Clear and direct with customers • Focused on outcomes, not activity This role will not suit someone who prefers individual contribution without people leadership responsibility.
Experis
Technical Account Manager
Experis
Technical Account Manager The Technical Account Manager (TAM) SOC is accountable for the technical success and value realisation of managed detection and response services across a portfolio of clients. You will help clients optimise SOC operations, interpret detection insights, and translate technical outputs into measurable business outcomes. This role is collaborative and client-facing, supporting incident escalation, guiding operational maturity, and enabling long-term adoption of technologies and services. While not a shift-based position, you will be comfortable engaging at SOC depth, understanding how alerts, detections, and incidents flow through a 24/7 environment. Key Responsibilities As a Technical Account Manager (TAM) you serve as the primary technical point of contact for assigned SOC and managed detection clients, developing and maintaining a strong understanding of their monitored environments, log sources, and detection coverage. Your responsibility is to ensure Security technologies and services, spanning SOC operations, SIEM/XDR/EDR, Vulnerability & Exposure Management, and Security Automation & Orchestration (SOAR) are aligned to the client's strategy and objectives, adopted effectively, and continuously improved to enhance client experience and satisfaction. Provide high level SME knowledge, oversight, and guidance to help clients extract maximum value from technology products and services. Interpret SOC outputs, incidents, and operational trends for clients, translating technical data into business and risk-focused insight. Support incident escalation and coordination when required, guiding root cause analysis, post-incident learning, and preventive action planning. Identify continuous improvement opportunities for SOC detections, content, log source coverage, and security automation workflows. Provide guidance, enablement, and demonstrations to accelerate adoption and maturity of technologies and managed services. Collaborate with SOC Operations, Security Engineering, and client-facing teams to co-develop use cases, workflows, and SOC operating processes. Support onboarding of new clients, defining readiness gates, change plans, and ensuring robust rollback procedures. Attend and contribute to monthly and quarterly service reviews, connecting KPIs and SLAs to actionable improvements and roadmap recommendations. Act as a technical escalation point for deployed services and technologies, ensuring clients receive timely and accurate resolution. Maintain alignment with account management and client success teams, co-owning success plans, roadmaps, and delivery outcomes. Technical and Professional Qualifications Practical experience with SOC platforms and technologies, including Microsoft Sentinel, CrowdStrike NG SIEM/XDR, Tenable One, EDR/EPP, and related SOC tools. Strong understanding of infrastructure, operating systems (Windows/Linux), Active Directory/identity management, and permissions-based controls. Hands-on experience designing detection content, use cases, tuning, suppression, and SOAR workflows, with understanding of data pipelines and connector optimisation. Proven track record in technical account management, client-facing technical leadership, or equivalent, with ownership of success plans and service reviews. Excellent presentation, communication, and interpersonal skills, capable of engaging with both technical teams and senior business stakeholders. Continuous improvement mindset, connecting SOC metrics (e.g., coverage, false positive rate, MTTA/MTTR) to tangible client value. Experience managing multiple stakeholders, balancing strategic planning with operational delivery.
25/02/2026
Full time
Technical Account Manager The Technical Account Manager (TAM) SOC is accountable for the technical success and value realisation of managed detection and response services across a portfolio of clients. You will help clients optimise SOC operations, interpret detection insights, and translate technical outputs into measurable business outcomes. This role is collaborative and client-facing, supporting incident escalation, guiding operational maturity, and enabling long-term adoption of technologies and services. While not a shift-based position, you will be comfortable engaging at SOC depth, understanding how alerts, detections, and incidents flow through a 24/7 environment. Key Responsibilities As a Technical Account Manager (TAM) you serve as the primary technical point of contact for assigned SOC and managed detection clients, developing and maintaining a strong understanding of their monitored environments, log sources, and detection coverage. Your responsibility is to ensure Security technologies and services, spanning SOC operations, SIEM/XDR/EDR, Vulnerability & Exposure Management, and Security Automation & Orchestration (SOAR) are aligned to the client's strategy and objectives, adopted effectively, and continuously improved to enhance client experience and satisfaction. Provide high level SME knowledge, oversight, and guidance to help clients extract maximum value from technology products and services. Interpret SOC outputs, incidents, and operational trends for clients, translating technical data into business and risk-focused insight. Support incident escalation and coordination when required, guiding root cause analysis, post-incident learning, and preventive action planning. Identify continuous improvement opportunities for SOC detections, content, log source coverage, and security automation workflows. Provide guidance, enablement, and demonstrations to accelerate adoption and maturity of technologies and managed services. Collaborate with SOC Operations, Security Engineering, and client-facing teams to co-develop use cases, workflows, and SOC operating processes. Support onboarding of new clients, defining readiness gates, change plans, and ensuring robust rollback procedures. Attend and contribute to monthly and quarterly service reviews, connecting KPIs and SLAs to actionable improvements and roadmap recommendations. Act as a technical escalation point for deployed services and technologies, ensuring clients receive timely and accurate resolution. Maintain alignment with account management and client success teams, co-owning success plans, roadmaps, and delivery outcomes. Technical and Professional Qualifications Practical experience with SOC platforms and technologies, including Microsoft Sentinel, CrowdStrike NG SIEM/XDR, Tenable One, EDR/EPP, and related SOC tools. Strong understanding of infrastructure, operating systems (Windows/Linux), Active Directory/identity management, and permissions-based controls. Hands-on experience designing detection content, use cases, tuning, suppression, and SOAR workflows, with understanding of data pipelines and connector optimisation. Proven track record in technical account management, client-facing technical leadership, or equivalent, with ownership of success plans and service reviews. Excellent presentation, communication, and interpersonal skills, capable of engaging with both technical teams and senior business stakeholders. Continuous improvement mindset, connecting SOC metrics (e.g., coverage, false positive rate, MTTA/MTTR) to tangible client value. Experience managing multiple stakeholders, balancing strategic planning with operational delivery.
Proftech Talent
Group IT Infrastructure Manager
Proftech Talent Tamworth, Staffordshire
Group IT Infrastructure Manager Our client based in Tamworth, is seeking a Group IT Infrastructure Manager to support over 300 users across sites in the UK, Ireland, Scotland and Dubai. You'll lead a team of skilled IT individuals, fostering a collaborative and service focused culture. From delivering large-scale infrastructure projects to ensuring the seamless day-to-day operation of critical systems, the Group IT Infrastructure Manager will work on meaningful projects, collaborate with cross functional teams, and directly influence the success of our organisation. As a Group IT Infrastructure Manager, you will need to have/be: Networking Strong network admin, installation, and troubleshooting skills (CCNA level). Experience with Cisco, Fortinet, Ruckus; performance and security focused. Skilled in VLANs, VPNs, firewalls, QoS, and high-availability design. Hardware & Infrastructure Good understanding of hardware, cabling, wireless tech, and IT security basics. Experience with rack servers, RAID, SAN/NAS storage. Competent with monitoring tools (SolarWinds, Nagios, PRTG). Microsoft Technologies Strong Windows Server (Apply online only , AD, Group Policy, and systems admin. Working knowledge of Exchange Online. Experience with Azure AD and hybrid identity. Familiar with Intune and JAMF for device management. Solid Office 365 and Windows 10/11 admin skills. Virtualisation & Cloud Skilled in Hyper-V and VMware (resource management, backups, failover). Exposure to Azure, AWS, GCP for migrations and optimisation. Communication Systems Experience with enterprise VoIP systems. Knowledge of IP CCTV setup, storage, and network integration. Backup & DR Proficient with Veeam for backup/replication. Experience in DR planning, failover, and resilience testing. Security & Compliance Strong grasp of cybersecurity (firewalls, EPP, vulnerabilities, threat detection). Understanding of ISO 27001 and GDPR; audit support experience. Familiar with SIEM tools (Splunk, Sentinel). Operating Systems & Automation Working knowledge of Linux (Ubuntu, CentOS). Scripting with PowerShell, Bash, Python. Familiar with ITSM platforms (ServiceNow, Freshservice). Soft Skills Strong analytical and problem-solving ability. Excellent communicator across technical/non-technical teams. Highly organised with good multitasking skills. Leadership experience driving team performance and improvement. Certifications Essential: MCSE, ITIL, CCNA (or equivalent) Desirable: CISSP / Security+, ISO 27001, PRINCE2 Details: Salary : 65, 000 - 70, 000 Working Hours : Full time Monday - Friday Location : Tamworth (on site full time) Duration : Permanent Role of Group IT Infrastructure Manager: Visible, approachable leader across all sites. Partner with departments to deliver proactive, value-driven IT solutions. Provide IT input in management meetings to support strategic decisions. Support wider teams during peak periods to maintain smooth operations. Oversee daily IT operations across servers, applications, and networks. Manage installation, upgrades, and maintenance of hardware/software. Lead procurement and lifecycle management of IT equipment. Ensure system performance through testing, monitoring, and improvement. Manage and optimise WAN infrastructure across all sites. Maintain strong security controls to protect systems and data. Proactively identify and resolve vulnerabilities through updates and patches. Maintain robust disaster recovery and backup strategies. Assess technology risks and implement mitigation measures. Test and refine DR and continuity plans to ensure resilience. Lead major infrastructure projects, upgrades, and migrations. Work with MIS to align infrastructure and system development. Create project plans, manage resources, and deliver on time and budget. Manage the IT budget and track expenditure. Build strong vendor relationships, negotiate contracts, and ensure SLAs are met. Lead and develop 3rd Line Engineers and Helpdesk teams. Oversee Helpdesk performance and ensure timely issue resolution. Foster a collaborative, customer-focused, and continuously improving culture. Stay updated on new technologies and recommend improvements. Drive continuous improvement across infrastructure and service delivery. Align IT services and projects with long-term organisational goals. Strong analytical thinker with excellent problem-solving skills. Willing to work evenings/weekends/public holidays when required. Benefits of working as a Group IT Infrastructure Manager: 23 days annual leave + bank holidays Option to purchase up to 5 extra days annual leave Health Cashback Plan Pension Scheme Life Assurance Free Parking
16/02/2026
Full time
Group IT Infrastructure Manager Our client based in Tamworth, is seeking a Group IT Infrastructure Manager to support over 300 users across sites in the UK, Ireland, Scotland and Dubai. You'll lead a team of skilled IT individuals, fostering a collaborative and service focused culture. From delivering large-scale infrastructure projects to ensuring the seamless day-to-day operation of critical systems, the Group IT Infrastructure Manager will work on meaningful projects, collaborate with cross functional teams, and directly influence the success of our organisation. As a Group IT Infrastructure Manager, you will need to have/be: Networking Strong network admin, installation, and troubleshooting skills (CCNA level). Experience with Cisco, Fortinet, Ruckus; performance and security focused. Skilled in VLANs, VPNs, firewalls, QoS, and high-availability design. Hardware & Infrastructure Good understanding of hardware, cabling, wireless tech, and IT security basics. Experience with rack servers, RAID, SAN/NAS storage. Competent with monitoring tools (SolarWinds, Nagios, PRTG). Microsoft Technologies Strong Windows Server (Apply online only , AD, Group Policy, and systems admin. Working knowledge of Exchange Online. Experience with Azure AD and hybrid identity. Familiar with Intune and JAMF for device management. Solid Office 365 and Windows 10/11 admin skills. Virtualisation & Cloud Skilled in Hyper-V and VMware (resource management, backups, failover). Exposure to Azure, AWS, GCP for migrations and optimisation. Communication Systems Experience with enterprise VoIP systems. Knowledge of IP CCTV setup, storage, and network integration. Backup & DR Proficient with Veeam for backup/replication. Experience in DR planning, failover, and resilience testing. Security & Compliance Strong grasp of cybersecurity (firewalls, EPP, vulnerabilities, threat detection). Understanding of ISO 27001 and GDPR; audit support experience. Familiar with SIEM tools (Splunk, Sentinel). Operating Systems & Automation Working knowledge of Linux (Ubuntu, CentOS). Scripting with PowerShell, Bash, Python. Familiar with ITSM platforms (ServiceNow, Freshservice). Soft Skills Strong analytical and problem-solving ability. Excellent communicator across technical/non-technical teams. Highly organised with good multitasking skills. Leadership experience driving team performance and improvement. Certifications Essential: MCSE, ITIL, CCNA (or equivalent) Desirable: CISSP / Security+, ISO 27001, PRINCE2 Details: Salary : 65, 000 - 70, 000 Working Hours : Full time Monday - Friday Location : Tamworth (on site full time) Duration : Permanent Role of Group IT Infrastructure Manager: Visible, approachable leader across all sites. Partner with departments to deliver proactive, value-driven IT solutions. Provide IT input in management meetings to support strategic decisions. Support wider teams during peak periods to maintain smooth operations. Oversee daily IT operations across servers, applications, and networks. Manage installation, upgrades, and maintenance of hardware/software. Lead procurement and lifecycle management of IT equipment. Ensure system performance through testing, monitoring, and improvement. Manage and optimise WAN infrastructure across all sites. Maintain strong security controls to protect systems and data. Proactively identify and resolve vulnerabilities through updates and patches. Maintain robust disaster recovery and backup strategies. Assess technology risks and implement mitigation measures. Test and refine DR and continuity plans to ensure resilience. Lead major infrastructure projects, upgrades, and migrations. Work with MIS to align infrastructure and system development. Create project plans, manage resources, and deliver on time and budget. Manage the IT budget and track expenditure. Build strong vendor relationships, negotiate contracts, and ensure SLAs are met. Lead and develop 3rd Line Engineers and Helpdesk teams. Oversee Helpdesk performance and ensure timely issue resolution. Foster a collaborative, customer-focused, and continuously improving culture. Stay updated on new technologies and recommend improvements. Drive continuous improvement across infrastructure and service delivery. Align IT services and projects with long-term organisational goals. Strong analytical thinker with excellent problem-solving skills. Willing to work evenings/weekends/public holidays when required. Benefits of working as a Group IT Infrastructure Manager: 23 days annual leave + bank holidays Option to purchase up to 5 extra days annual leave Health Cashback Plan Pension Scheme Life Assurance Free Parking
Harvey Nash
Cyber Security Engineer
Harvey Nash Milton Keynes, Buckinghamshire
I am currently looking for 2 experienced Cyber Security Engineers (DV Cleared) for a client, based in Milton Keynes with occasional travel to London. DV Clearance is essential - applicants without current clearance unfortunately cannot be considered. About the Role: These roles sit within a client's Cybersecurity Operations function. You will play a key part in designing, implementing, and maintaining the platforms that support enterprise-scale security operations. From SIEM and log collection to endpoint detection, automation, and integration, you'll help ensure the SOC team has the reliable and scalable infrastructure it needs to detect, investigate, and respond to threats. Responsibilities: Manage and optimise SIEM platforms (Splunk, Microsoft Sentinel, open-source alternatives) across hybrid-cloud environments Configure and maintain log/data pipelines from endpoints, cloud services, and network devices Ensure high availability, reliability, and performance of core security platforms Integrate new security tools into the ecosystem, including automation via APIs, Scripting, and AI Maintain clear documentation, diagrams, and procedures to support knowledge sharing and consistency Skills & Experience: Strong hands-on experience with SIEM technologies (Splunk, Sentinel, etc.) Knowledge of cloud platforms (Azure, AWS, GCP) and hybrid environments Scripting skills (Python, PowerShell) for automation and integration Experience with SOAR and SecDevOps practices (Git, GitHub, Azure DevOps, CI/CD) Good understanding of frameworks such as NIST, MITRE ATT&CK, CAF Background in Incident Response or SOC analysis is highly valued Soft Skills: Strong analytical and problem-solving mindset Effective communication and collaboration skills Ability to thrive in a fast-paced, dynamic environment Certifications (Splunk, Microsoft, SANS, etc.) are desirable but not required. Location: Milton Keynes (with some travel to London) Positions: 2 available If you're DV cleared and want to take on a challenging and rewarding role with a leading organisation, I'd love to hear from you.
06/10/2025
Contractor
I am currently looking for 2 experienced Cyber Security Engineers (DV Cleared) for a client, based in Milton Keynes with occasional travel to London. DV Clearance is essential - applicants without current clearance unfortunately cannot be considered. About the Role: These roles sit within a client's Cybersecurity Operations function. You will play a key part in designing, implementing, and maintaining the platforms that support enterprise-scale security operations. From SIEM and log collection to endpoint detection, automation, and integration, you'll help ensure the SOC team has the reliable and scalable infrastructure it needs to detect, investigate, and respond to threats. Responsibilities: Manage and optimise SIEM platforms (Splunk, Microsoft Sentinel, open-source alternatives) across hybrid-cloud environments Configure and maintain log/data pipelines from endpoints, cloud services, and network devices Ensure high availability, reliability, and performance of core security platforms Integrate new security tools into the ecosystem, including automation via APIs, Scripting, and AI Maintain clear documentation, diagrams, and procedures to support knowledge sharing and consistency Skills & Experience: Strong hands-on experience with SIEM technologies (Splunk, Sentinel, etc.) Knowledge of cloud platforms (Azure, AWS, GCP) and hybrid environments Scripting skills (Python, PowerShell) for automation and integration Experience with SOAR and SecDevOps practices (Git, GitHub, Azure DevOps, CI/CD) Good understanding of frameworks such as NIST, MITRE ATT&CK, CAF Background in Incident Response or SOC analysis is highly valued Soft Skills: Strong analytical and problem-solving mindset Effective communication and collaboration skills Ability to thrive in a fast-paced, dynamic environment Certifications (Splunk, Microsoft, SANS, etc.) are desirable but not required. Location: Milton Keynes (with some travel to London) Positions: 2 available If you're DV cleared and want to take on a challenging and rewarding role with a leading organisation, I'd love to hear from you.
VIQU Ltd
Security Engineer
VIQU Ltd Northampton, Northamptonshire
Security Engineer - 3-month contract - Northampton/Remote My Customer is looking for a proactive Security Engineer to join their team and take ownership of monitoring, triaging, and responding to security alerts across their Microsoft security ecosystem. Strong experience troubleshooting and responding to alerts would be the main focus of the role. Strong expertise with Microsoft Defender and Sentinel is needed. Key Skills & Experience from the Security Engineer Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within Sentinel or similar). Understanding of threat detection, log analysis, and automation within Microsoft's security ecosystem. Key Responsibilities of the Security Engineer Monitor, investigate, and respond to security alerts and incidents in Microsoft Sentinel and Microsoft Defender . Perform detailed security event analysis and correlation, escalating incidents where necessary. Develop and optimise SOAR (Security Orchestration, Automation and Response) playbooks to enhance incident response and efficiency. Collaborate with wider IT and security teams to improve threat detection, incident handling, and response processes. Beneficial Experience Exposure to Operational Technology (OT) environments. Experience with Tenable (vulnerability management). Knowledge of Microsoft Purview (data governance, compliance, and information protection). The Security Engineer is required onsite, 2 days a week in Northampton and 3 days remote. Apply now to speak with VIQU IT in confidence about the Security Engineer role. Or reach out to Connor Smal via the VIQU IT website. Do you know someone great? We'll thank you with up to £1,000 if your referral is successful (terms apply).
06/10/2025
Contractor
Security Engineer - 3-month contract - Northampton/Remote My Customer is looking for a proactive Security Engineer to join their team and take ownership of monitoring, triaging, and responding to security alerts across their Microsoft security ecosystem. Strong experience troubleshooting and responding to alerts would be the main focus of the role. Strong expertise with Microsoft Defender and Sentinel is needed. Key Skills & Experience from the Security Engineer Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within Sentinel or similar). Understanding of threat detection, log analysis, and automation within Microsoft's security ecosystem. Key Responsibilities of the Security Engineer Monitor, investigate, and respond to security alerts and incidents in Microsoft Sentinel and Microsoft Defender . Perform detailed security event analysis and correlation, escalating incidents where necessary. Develop and optimise SOAR (Security Orchestration, Automation and Response) playbooks to enhance incident response and efficiency. Collaborate with wider IT and security teams to improve threat detection, incident handling, and response processes. Beneficial Experience Exposure to Operational Technology (OT) environments. Experience with Tenable (vulnerability management). Knowledge of Microsoft Purview (data governance, compliance, and information protection). The Security Engineer is required onsite, 2 days a week in Northampton and 3 days remote. Apply now to speak with VIQU IT in confidence about the Security Engineer role. Or reach out to Connor Smal via the VIQU IT website. Do you know someone great? We'll thank you with up to £1,000 if your referral is successful (terms apply).
Hays Specialist Recruitment Limited
Cloud Security Engineer
Hays Specialist Recruitment Limited Leeds, Yorkshire
Your new company As part of their continued investment in technology and cyber resilience, my client is seeking a Cloud Security Engineer to join their dynamic Technology Directorate. This is a pivotal role supporting the Head of Cyber Security and Infrastructure in strengthening the cyber security estate and ensuring robust protection across our digital platforms. Your new role As Cloud Security Engineer, you will play a key role in enhancing cyber resilience. You'll be responsible for leveraging tools such as Microsoft Defender, Sentinel, Azure, and their SOC partner to conduct threat analysis, risk assessments, and implement effective controls. You'll support the delivery of their Cyber Security Sub Strategy in line with the Cyber Assessment Framework, and contribute to the design and operation of threat intelligence, incident response, vulnerability management, and ethical hacking capabilities. You'll work closely with internal stakeholders and external partners to ensure compliance with ISO27001, Cyber Essentials+, and other regulatory frameworks. This role also involves reporting on cyber threats and performance using Power BI, supporting penetration testing, and contributing to the development of secure IT architecture and access control policies. What you'll need to succeed Extensive experience administering the Azure platform and Microsoft security tools (Defender, Sentinel, Intune, Autopilot). Strong understanding of cyber security frameworks including ISO27001, Cyber Essentials+, and the Cyber Assessment Framework. Proven experience in identity and access management, end-user device management, and working with external SOCs. Ability to deliver against cyber security roadmaps, respond to incidents, and remediate vulnerabilities. Experience in building Power BI dashboards and writing security policies and SOPs. A collaborative mindset with excellent communication skills and a proactive approach to continuous improvement. What you'll get in return A chance to make a real impact in a purpose-driven organisation. Flexible working arrangements. Access to professional development and training. A supportive and inclusive culture. Competitive salary up to £52K and benefits package. What you need to do now If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us now. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at hays.co.uk
03/10/2025
Full time
Your new company As part of their continued investment in technology and cyber resilience, my client is seeking a Cloud Security Engineer to join their dynamic Technology Directorate. This is a pivotal role supporting the Head of Cyber Security and Infrastructure in strengthening the cyber security estate and ensuring robust protection across our digital platforms. Your new role As Cloud Security Engineer, you will play a key role in enhancing cyber resilience. You'll be responsible for leveraging tools such as Microsoft Defender, Sentinel, Azure, and their SOC partner to conduct threat analysis, risk assessments, and implement effective controls. You'll support the delivery of their Cyber Security Sub Strategy in line with the Cyber Assessment Framework, and contribute to the design and operation of threat intelligence, incident response, vulnerability management, and ethical hacking capabilities. You'll work closely with internal stakeholders and external partners to ensure compliance with ISO27001, Cyber Essentials+, and other regulatory frameworks. This role also involves reporting on cyber threats and performance using Power BI, supporting penetration testing, and contributing to the development of secure IT architecture and access control policies. What you'll need to succeed Extensive experience administering the Azure platform and Microsoft security tools (Defender, Sentinel, Intune, Autopilot). Strong understanding of cyber security frameworks including ISO27001, Cyber Essentials+, and the Cyber Assessment Framework. Proven experience in identity and access management, end-user device management, and working with external SOCs. Ability to deliver against cyber security roadmaps, respond to incidents, and remediate vulnerabilities. Experience in building Power BI dashboards and writing security policies and SOPs. A collaborative mindset with excellent communication skills and a proactive approach to continuous improvement. What you'll get in return A chance to make a real impact in a purpose-driven organisation. Flexible working arrangements. Access to professional development and training. A supportive and inclusive culture. Competitive salary up to £52K and benefits package. What you need to do now If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us now. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at hays.co.uk
Klipboard
3rd Line Engineer
Klipboard Bromsgrove, Worcestershire
"At Klipboard we've introduced a flexible hybrid work policy, where employees spend three days in the office and two days working from home. This approach promotes a balanced work environment that combines office collaboration with the comfort and convenience of remote work." Klipboard provides specialist software, services and support to deliver fully integrated trading and business management solutions to companies in the distributive trade - wherever they are in the world. With a unique depth of knowledge and experience in ERP/SaaS solutions, Klipboard has a wide range of clients includes wholesalers, distributors, merchants and retailers from small traders to multinational enterprises. Klipboard has offices in the UK, Ireland, The Netherlands, South Africa, Kenya and North America. Our mission is simple: to design and deliver high performance, integrated ERP solutions that enable our distributive trade customers to source effectively, stock efficiently, sell profitably and service competitively We are seeking a 3rd Line Support Engineer to join our dynamic team and provide exceptional technical support to a global client base. This role offers the opportunity to transition from traditional IT solutions to advanced cloud and security technologies. The successful candidate will have an excellent base of experience and knowledge with traditional Microsoft technologies such as Windows Server, Active Directory, Group Policy and Microsoft 365. The successful candidate will then work with the latest Microsoft services, developing expertise in areas such as: Azure Cloud & Virtual Desktops Microsoft Sentinel Microsoft Defender for Cloud Privileged Identity Management Microsoft Defender for Endpoint This position involves operating in a fast-paced MSP environment to ensure the availability, performance, and security of customers' cloud workloads. Key Responsibilities: Provide high-quality support for incidents and service requests raised through our Service Desk, working with technologies such as Active Directory, Azure Active Directory, Group Policy, Exchange Online, Windows Server, and Remote Desktop Services. Respond to monitoring alerts for Microsoft Azure IaaS/PaaS/SaaS services, network connectivity, and Microsoft 365 services to proactively address potential issues. Investigate and resolve security alerts for Microsoft 365 users and Azure workloads, addressing concerns like user account security, suspicious activity, antivirus alerts, and Endpoint Detection and Response (EDR) notifications. Review, install, and test security and application updates, leveraging automation to maintain and improve customer environments. Ensure the operational integrity, performance, and security of customer cloud-based services through proactive monitoring and expertise. Collaborate with customers and internal teams to implement migrations and deliver solutions tailored to customer requirements. Maintain regular communication with customers via Service Desk tools and Teams meetings. Working Arrangements Hybrid working model: 3-4 days remote, 1 day in the office. All necessary equipment for home working will be provided. Shift pattern includes: Week 1: 6:30 AM to 3:00 PM Week 2: 9:00 AM to 5:30 PM Week 3: 1:30 PM to 10:00 PM On-call responsibilities (paid per rotation) and occasional out-of-hours work (paid overtime). Candidate Profile The ideal candidate will: Be an effective communicator who prioritizes customer satisfaction. Possess strong interpersonal skills to collaborate with team members and customer IT representatives. Have prior experience in a Service Desk environment with the ability to manage and prioritize tasks effectively. Be enthusiastic about learning new skills in cloud computing, IT security, and Microsoft solutions, pursuing relevant certifications. Exhibit a detail-oriented approach to problem-solving and task execution. Skills, Knowledge and Experience: Proficiency in traditional Microsoft Windows Server solutions, including: Active Directory and Group Policy File and Print services Remote Desktop Services PowerShell scripting Fundamental knowledge of TCP/IP networking, VPNs, and network connectivity. Experience administering Microsoft 365 services (Email, OneDrive, Teams, SharePoint). Understanding of IT security practices and tools (e.g., Antivirus, Email Filtering, Web Filtering). Required Experience Previous experience within a 3rd Line Role is extremely desirable Previous experience within an MSP environment is preferred Active Directory: 3 years Microsoft Windows Server: 3 years IP networking: 2 year Microsoft 365 administration: 3 years Active Microsoft Azure, 365 & Windows Server certifications are preferred. Equal Opportunities As a global company, we value and respect the diversity of our workforce, aiming to empower everyone to embrace each other's differences. We are committed to creating an inclusive workplace where diversity, equity, and inclusion are integral to our company and culture. We recognize the benefits of a diverse workforce, where creativity and valuing differences enable us all to thrive and sparks innovation. If you require any help, adjustments and/or support during the interview and offer process then please advise our TA or HR team. To all recruitment agencies: Klipboard does not accept agency speculative resumes. At present we only accept CV's from Agencies on our PSL who have been assigned specific position/s. Please do not forward resumes to our careers site or direct to Klipboard employee as this does not constitute an introduction and Klipboard retrospectively will not be liable for any candidate ownership or fees related to unsolicited resumes.
03/10/2025
Full time
"At Klipboard we've introduced a flexible hybrid work policy, where employees spend three days in the office and two days working from home. This approach promotes a balanced work environment that combines office collaboration with the comfort and convenience of remote work." Klipboard provides specialist software, services and support to deliver fully integrated trading and business management solutions to companies in the distributive trade - wherever they are in the world. With a unique depth of knowledge and experience in ERP/SaaS solutions, Klipboard has a wide range of clients includes wholesalers, distributors, merchants and retailers from small traders to multinational enterprises. Klipboard has offices in the UK, Ireland, The Netherlands, South Africa, Kenya and North America. Our mission is simple: to design and deliver high performance, integrated ERP solutions that enable our distributive trade customers to source effectively, stock efficiently, sell profitably and service competitively We are seeking a 3rd Line Support Engineer to join our dynamic team and provide exceptional technical support to a global client base. This role offers the opportunity to transition from traditional IT solutions to advanced cloud and security technologies. The successful candidate will have an excellent base of experience and knowledge with traditional Microsoft technologies such as Windows Server, Active Directory, Group Policy and Microsoft 365. The successful candidate will then work with the latest Microsoft services, developing expertise in areas such as: Azure Cloud & Virtual Desktops Microsoft Sentinel Microsoft Defender for Cloud Privileged Identity Management Microsoft Defender for Endpoint This position involves operating in a fast-paced MSP environment to ensure the availability, performance, and security of customers' cloud workloads. Key Responsibilities: Provide high-quality support for incidents and service requests raised through our Service Desk, working with technologies such as Active Directory, Azure Active Directory, Group Policy, Exchange Online, Windows Server, and Remote Desktop Services. Respond to monitoring alerts for Microsoft Azure IaaS/PaaS/SaaS services, network connectivity, and Microsoft 365 services to proactively address potential issues. Investigate and resolve security alerts for Microsoft 365 users and Azure workloads, addressing concerns like user account security, suspicious activity, antivirus alerts, and Endpoint Detection and Response (EDR) notifications. Review, install, and test security and application updates, leveraging automation to maintain and improve customer environments. Ensure the operational integrity, performance, and security of customer cloud-based services through proactive monitoring and expertise. Collaborate with customers and internal teams to implement migrations and deliver solutions tailored to customer requirements. Maintain regular communication with customers via Service Desk tools and Teams meetings. Working Arrangements Hybrid working model: 3-4 days remote, 1 day in the office. All necessary equipment for home working will be provided. Shift pattern includes: Week 1: 6:30 AM to 3:00 PM Week 2: 9:00 AM to 5:30 PM Week 3: 1:30 PM to 10:00 PM On-call responsibilities (paid per rotation) and occasional out-of-hours work (paid overtime). Candidate Profile The ideal candidate will: Be an effective communicator who prioritizes customer satisfaction. Possess strong interpersonal skills to collaborate with team members and customer IT representatives. Have prior experience in a Service Desk environment with the ability to manage and prioritize tasks effectively. Be enthusiastic about learning new skills in cloud computing, IT security, and Microsoft solutions, pursuing relevant certifications. Exhibit a detail-oriented approach to problem-solving and task execution. Skills, Knowledge and Experience: Proficiency in traditional Microsoft Windows Server solutions, including: Active Directory and Group Policy File and Print services Remote Desktop Services PowerShell scripting Fundamental knowledge of TCP/IP networking, VPNs, and network connectivity. Experience administering Microsoft 365 services (Email, OneDrive, Teams, SharePoint). Understanding of IT security practices and tools (e.g., Antivirus, Email Filtering, Web Filtering). Required Experience Previous experience within a 3rd Line Role is extremely desirable Previous experience within an MSP environment is preferred Active Directory: 3 years Microsoft Windows Server: 3 years IP networking: 2 year Microsoft 365 administration: 3 years Active Microsoft Azure, 365 & Windows Server certifications are preferred. Equal Opportunities As a global company, we value and respect the diversity of our workforce, aiming to empower everyone to embrace each other's differences. We are committed to creating an inclusive workplace where diversity, equity, and inclusion are integral to our company and culture. We recognize the benefits of a diverse workforce, where creativity and valuing differences enable us all to thrive and sparks innovation. If you require any help, adjustments and/or support during the interview and offer process then please advise our TA or HR team. To all recruitment agencies: Klipboard does not accept agency speculative resumes. At present we only accept CV's from Agencies on our PSL who have been assigned specific position/s. Please do not forward resumes to our careers site or direct to Klipboard employee as this does not constitute an introduction and Klipboard retrospectively will not be liable for any candidate ownership or fees related to unsolicited resumes.
Experis
SOC Analyst - SC Cleared
Experis
ROLE TITLE: SOC Analyst - SC Cleared LOCATION: Hursley The ideal candidate will have active SC Clearance or be eligible to undergo SC Clearance. We are actively looking to secure an SOC Analyst to join Experis. Experis Consultancy is a Global entity with a well-established team with over 1000 consultants on assignment across 20 clients globally. Our UK operation is growing and has very aggressive plans for expansion over the coming years. We form part of the Manpower group of companies that turn over $20 billion a year collectively. Experis UK have partnerships with major clients across the UK spanning multiple industries; our approach is a very personal one, with both our clients and our own employees. We are passionate about training, technology and career development. Skills required: Microsoft Certified: Security Operations Analyst Associate Certification (SC200) is a mandatory requirement for role fulfilment Experience working with SIEM technologies and security tooling An understanding of IT Infrastructure and Networking An understanding of vulnerability and threat management An understanding of the incident response lifecycle T he ability to work in a close team and independently The ability to be adaptable to a high pace changeable workload An interest in security and threat management Nice to have skills A SOC Analyst will be responsible for providing Protective Monitoring Services across a range of Secure Customers. They will be responsible for the day to day monitoring using various SIEM Tools (Qradar, Sentinel & LogRhythm). Some of the responsibilities that come along with this role include the following: Security Analytics Incident investigation, triage and escalation Threat monitoring and response Trend reporting Rule tuning and continual service improvement The role involves working alongside other team members including SOC engineers and Service Managers. Benefits Include: Contributory pension scheme Employee Assistance Program Medical and Dental cover 22 days holiday + bank holidays Maternity Pay/Shared Parental leave and paternity leave Sick pay Suitable Candidates should submit CVs in the first instance.
01/10/2025
Full time
ROLE TITLE: SOC Analyst - SC Cleared LOCATION: Hursley The ideal candidate will have active SC Clearance or be eligible to undergo SC Clearance. We are actively looking to secure an SOC Analyst to join Experis. Experis Consultancy is a Global entity with a well-established team with over 1000 consultants on assignment across 20 clients globally. Our UK operation is growing and has very aggressive plans for expansion over the coming years. We form part of the Manpower group of companies that turn over $20 billion a year collectively. Experis UK have partnerships with major clients across the UK spanning multiple industries; our approach is a very personal one, with both our clients and our own employees. We are passionate about training, technology and career development. Skills required: Microsoft Certified: Security Operations Analyst Associate Certification (SC200) is a mandatory requirement for role fulfilment Experience working with SIEM technologies and security tooling An understanding of IT Infrastructure and Networking An understanding of vulnerability and threat management An understanding of the incident response lifecycle T he ability to work in a close team and independently The ability to be adaptable to a high pace changeable workload An interest in security and threat management Nice to have skills A SOC Analyst will be responsible for providing Protective Monitoring Services across a range of Secure Customers. They will be responsible for the day to day monitoring using various SIEM Tools (Qradar, Sentinel & LogRhythm). Some of the responsibilities that come along with this role include the following: Security Analytics Incident investigation, triage and escalation Threat monitoring and response Trend reporting Rule tuning and continual service improvement The role involves working alongside other team members including SOC engineers and Service Managers. Benefits Include: Contributory pension scheme Employee Assistance Program Medical and Dental cover 22 days holiday + bank holidays Maternity Pay/Shared Parental leave and paternity leave Sick pay Suitable Candidates should submit CVs in the first instance.
Experis IT
Senior Dev Sec Ops Engineer/Consultant - Outside IR35
Experis IT
Outside IR35, Dev/Sec Ops Engineer, Azure, AWS, Technical Blueprint, Best practice, Regulatory Environment background, London + West Midlands. We are seeking a Senior Dev Sec Ops Consultant to lead governance, architecture guidance, and assurance for cloud and infrastructure security across Microsoft Azure, AWS, and key SaaS platforms. This role is pivotal in defining technical blueprints, setting security standards, and ensuring regulatory compliance with Cyber Essentials Plus, ISO 27001, and Zero Trust principles. You will work closely with IT and platform teams to embed best practices, validate implementations, and support audit readiness across IaaS, PaaS, and SaaS environments. Key Responsibilities Define and maintain multi-cloud security standards and reference blueprints (eg Azure Policy/Initiatives, AWS Control Tower/SCPs) Own security architecture patterns and contribute to HLD/LLD, threat models, and risk assessments Set assurance criteria and control evidence requirements for internal teams and third-party vendors Establish policy-as-code requirements and maintain an exceptions register with expiry and risk ownership Define identity and access control standards (Entra ID Conditional Access, MFA, PIM; AWS IAM federation) Govern SaaS security onboarding (SSO, OAuth governance, DLP controls, vendor assessments) Specify telemetry and logging requirements for Microsoft Sentinel/SOC and review analytics/reporting Lead compliance mapping for ISO 27001 and curate audit-ready evidence packs Chair Cloud & Platform Security design reviews and participate in CAB for risk appraisal Strong regulatory sector experience Educate and influence teams through guidance, clinics, and coaching sessions Familiarity with IaaS, PaaS, SaaS risk models and audit frameworks Excellent written communication and facilitation skills to drive adoption and influence stakeholders Additional Skills Certifications: AZ-500, SC-100, SC-200, AZ-700, AWS Security Specialty, CISSP (or equivalents) Experience with blueprint catalogues and architecture governance processes Working knowledge of containers/Kubernetes (AKS/EKS) policy models While this role focuses on governance and assurance, hands-on use may be required for validation: Azure : Policy/Initiatives, Defender for Cloud, Entra ID, PIM AWS : Control Tower, SCPs, Security Hub, GuardDuty, IAM Security & Monitoring : Microsoft Sentinel (KQL), Defender XDR, audit dashboards Documentation & Governance : Blueprint repositories, risk registers, ITSM/CAB records If this role is of interest please send your CV to review ASAP
01/10/2025
Contractor
Outside IR35, Dev/Sec Ops Engineer, Azure, AWS, Technical Blueprint, Best practice, Regulatory Environment background, London + West Midlands. We are seeking a Senior Dev Sec Ops Consultant to lead governance, architecture guidance, and assurance for cloud and infrastructure security across Microsoft Azure, AWS, and key SaaS platforms. This role is pivotal in defining technical blueprints, setting security standards, and ensuring regulatory compliance with Cyber Essentials Plus, ISO 27001, and Zero Trust principles. You will work closely with IT and platform teams to embed best practices, validate implementations, and support audit readiness across IaaS, PaaS, and SaaS environments. Key Responsibilities Define and maintain multi-cloud security standards and reference blueprints (eg Azure Policy/Initiatives, AWS Control Tower/SCPs) Own security architecture patterns and contribute to HLD/LLD, threat models, and risk assessments Set assurance criteria and control evidence requirements for internal teams and third-party vendors Establish policy-as-code requirements and maintain an exceptions register with expiry and risk ownership Define identity and access control standards (Entra ID Conditional Access, MFA, PIM; AWS IAM federation) Govern SaaS security onboarding (SSO, OAuth governance, DLP controls, vendor assessments) Specify telemetry and logging requirements for Microsoft Sentinel/SOC and review analytics/reporting Lead compliance mapping for ISO 27001 and curate audit-ready evidence packs Chair Cloud & Platform Security design reviews and participate in CAB for risk appraisal Strong regulatory sector experience Educate and influence teams through guidance, clinics, and coaching sessions Familiarity with IaaS, PaaS, SaaS risk models and audit frameworks Excellent written communication and facilitation skills to drive adoption and influence stakeholders Additional Skills Certifications: AZ-500, SC-100, SC-200, AZ-700, AWS Security Specialty, CISSP (or equivalents) Experience with blueprint catalogues and architecture governance processes Working knowledge of containers/Kubernetes (AKS/EKS) policy models While this role focuses on governance and assurance, hands-on use may be required for validation: Azure : Policy/Initiatives, Defender for Cloud, Entra ID, PIM AWS : Control Tower, SCPs, Security Hub, GuardDuty, IAM Security & Monitoring : Microsoft Sentinel (KQL), Defender XDR, audit dashboards Documentation & Governance : Blueprint repositories, risk registers, ITSM/CAB records If this role is of interest please send your CV to review ASAP
Station
Infrastructure & Security Engineer X 2 - London/Hybrid - Permanent
Station
Infrastructure & Security Engineer - Retail Sector London (Hybrid) 30% BAU/70% Project Work Permanent | Immediate Interviews Available We're partnering with a London-based retail brand currently undergoing infrastructure transformation. This is a fantastic opportunity for an experienced Infrastructure & Security Engineer to join a fast-moving organisation investing heavily in technology and digital maturity. You'll play a key role in both business-as-usual operations (30%) and a wide range of modernisation and transformation projects (70%), helping to reshape the future of the company's IT infrastructure. This opportunity is perfect for an experienced Infrastructure or Network Engineer who enjoys being hands-on with both Legacy systems and modern cloud-first environments. If you're looking to work on meaningful projects within a dynamic retail business, this could be the next step in your career. Key Responsibilities Work as a hands-on infrastructure and security engineer, delivering technical improvements and helping to secure enterprise systems. Support and maintain a range of technologies including VMware, Windows Server, Azure, Microsoft 365, and SQL Server. Help manage and enhance the company's Cisco Meraki network infrastructure across head office and retail sites. Contribute to vulnerability management, compliance (PCIDSS), and alignment with NIST/ISO27001 standards. Assist in the deployment of secure, scalable device imaging using Intune & Autopilot for POS, hospitality, and corporate users. Configure and manage SIEM, endpoint protection, IAM, MFA, and RBAC to strengthen infrastructure security. Create and maintain infrastructure documentation, diagrams, and operational runbooks. Support disaster recovery processes and participate in testing and readiness planning. Collaboration & Communication Work closely with internal IT teams and third-party vendors to deliver secure, high-performing infrastructure solutions. Share expertise and promote best practices in infrastructure, networking, and security across the organisation. Contribute to a security-first culture, providing guidance and support across teams. Key Experience & Skills We're looking for candidates with strong experience in: Microsoft Infrastructure: Windows Server, Azure, Microsoft 365, Entra ID, Active Directory, Group Policy Networking: Cisco networking (LAN/WAN/Wi-Fi, TCP/IP, Firewalls, Switching/Routing) Virtualisation: VMware vSphere, ESXi, vCenter Scripting: PowerShell Security & Compliance: Microsoft Defender, Sentinel, IAM, PCIDSS, MFA, RBAC Hardware: Dell server/storage platforms Monitoring & DR: Familiarity with SolarWinds, PRTG, Zabbix, backup tools, and DR best practices If this role is of interest please share your CV and we will be in touch!
01/10/2025
Full time
Infrastructure & Security Engineer - Retail Sector London (Hybrid) 30% BAU/70% Project Work Permanent | Immediate Interviews Available We're partnering with a London-based retail brand currently undergoing infrastructure transformation. This is a fantastic opportunity for an experienced Infrastructure & Security Engineer to join a fast-moving organisation investing heavily in technology and digital maturity. You'll play a key role in both business-as-usual operations (30%) and a wide range of modernisation and transformation projects (70%), helping to reshape the future of the company's IT infrastructure. This opportunity is perfect for an experienced Infrastructure or Network Engineer who enjoys being hands-on with both Legacy systems and modern cloud-first environments. If you're looking to work on meaningful projects within a dynamic retail business, this could be the next step in your career. Key Responsibilities Work as a hands-on infrastructure and security engineer, delivering technical improvements and helping to secure enterprise systems. Support and maintain a range of technologies including VMware, Windows Server, Azure, Microsoft 365, and SQL Server. Help manage and enhance the company's Cisco Meraki network infrastructure across head office and retail sites. Contribute to vulnerability management, compliance (PCIDSS), and alignment with NIST/ISO27001 standards. Assist in the deployment of secure, scalable device imaging using Intune & Autopilot for POS, hospitality, and corporate users. Configure and manage SIEM, endpoint protection, IAM, MFA, and RBAC to strengthen infrastructure security. Create and maintain infrastructure documentation, diagrams, and operational runbooks. Support disaster recovery processes and participate in testing and readiness planning. Collaboration & Communication Work closely with internal IT teams and third-party vendors to deliver secure, high-performing infrastructure solutions. Share expertise and promote best practices in infrastructure, networking, and security across the organisation. Contribute to a security-first culture, providing guidance and support across teams. Key Experience & Skills We're looking for candidates with strong experience in: Microsoft Infrastructure: Windows Server, Azure, Microsoft 365, Entra ID, Active Directory, Group Policy Networking: Cisco networking (LAN/WAN/Wi-Fi, TCP/IP, Firewalls, Switching/Routing) Virtualisation: VMware vSphere, ESXi, vCenter Scripting: PowerShell Security & Compliance: Microsoft Defender, Sentinel, IAM, PCIDSS, MFA, RBAC Hardware: Dell server/storage platforms Monitoring & DR: Familiarity with SolarWinds, PRTG, Zabbix, backup tools, and DR best practices If this role is of interest please share your CV and we will be in touch!
Adarma Limited
Security Consultant - SOC Consulting
Adarma Limited
We are actively recruiting for a Security Consultant to work in our SOC Consulting services, within our Detection & Response (D&R) Practice. Working to support our customers assess their SOC capabilities, align on the right direction for meeting their business needs and completing the transformation journey. Remote UK locations are available with occasional travel to either Adarma offices and customer locations. What you'll do For our customers, you'll be both a true partner and a trusted source of expert insight and advice. Leading on either one critical security area or broader strategic challenges, you'll understand and analyse their needs, before recommending the right way forward. you'll also scope complex projects and support the development and implementation of new solutions. And you'll drive our own progress too mentoring a team and helping our pre-sales team develop new opportunities for us to make an impact. How you'll grow We have a strong culture of learning and development, so you'll have plenty of opportunity to grow in your specialist area and beyond. In time, you could progress to Senior Consultant, or focus more on your technical skills in a senior engineer or architect role. What you'll bring You have a solid knowledge of security operations processes and tools plus best practice in fields such as SIEM solution design, use case development, SOC maturity, XDR/EDR, Log Management and detection testing. Crucially, you re an outstanding communicator and relationship builder too, able to bring the best out of others. Previous experience in the design and reviewing of security detection solutions Experienced in the implementation and management of SIEM, EDR and NDR technologies (eg Splunk, Microsoft Sentinel/Defender, CrowdStrike Falcon/Humio, Google Chronicle, SentinelOne, ArcSight, QRadar, Logrythm, Vectra, ExtraHop, etc) Previous experience in designing and implementing detection and response use cases with data source analysis and onboarding Experience of complex and/or large-scale security detection solutions Previous project experience from a Consultancy perspective; commercial acumen IT Security/Cyber Security project experience A security operations expert with broad experience and CISSP/CISM certification or equivalent, you know how to plan and deliver complex cybersecurity projects. Benefits Excellent compensation and benefits package, including Company Pension, Private Health Care and Cash-Back Plan, Car Leasing Scheme and more Ongoing training and development opportunities, resulting in industry recognised accreditations and qualifications Flexible working hours, occasional home office (where possible) We encourage autonomy and entrepreneurship enabling our consultants and employees to influence the strategy and direction of the business Adarma We began life in 2009, with a fierce determination to make cyber resilience a reality for every organisation, every day. This has guided us as we've adapted and grown to become one of the UK's leading threat specialists. Our journey is remarkable. But what's ahead is even more inspiring. Together, we're growing and transforming like never before. We're partnering with even more customers and creating more innovative and resilient solutions. And we're taking our thinking and our whole sector further, every single day.
20/09/2022
Full time
We are actively recruiting for a Security Consultant to work in our SOC Consulting services, within our Detection & Response (D&R) Practice. Working to support our customers assess their SOC capabilities, align on the right direction for meeting their business needs and completing the transformation journey. Remote UK locations are available with occasional travel to either Adarma offices and customer locations. What you'll do For our customers, you'll be both a true partner and a trusted source of expert insight and advice. Leading on either one critical security area or broader strategic challenges, you'll understand and analyse their needs, before recommending the right way forward. you'll also scope complex projects and support the development and implementation of new solutions. And you'll drive our own progress too mentoring a team and helping our pre-sales team develop new opportunities for us to make an impact. How you'll grow We have a strong culture of learning and development, so you'll have plenty of opportunity to grow in your specialist area and beyond. In time, you could progress to Senior Consultant, or focus more on your technical skills in a senior engineer or architect role. What you'll bring You have a solid knowledge of security operations processes and tools plus best practice in fields such as SIEM solution design, use case development, SOC maturity, XDR/EDR, Log Management and detection testing. Crucially, you re an outstanding communicator and relationship builder too, able to bring the best out of others. Previous experience in the design and reviewing of security detection solutions Experienced in the implementation and management of SIEM, EDR and NDR technologies (eg Splunk, Microsoft Sentinel/Defender, CrowdStrike Falcon/Humio, Google Chronicle, SentinelOne, ArcSight, QRadar, Logrythm, Vectra, ExtraHop, etc) Previous experience in designing and implementing detection and response use cases with data source analysis and onboarding Experience of complex and/or large-scale security detection solutions Previous project experience from a Consultancy perspective; commercial acumen IT Security/Cyber Security project experience A security operations expert with broad experience and CISSP/CISM certification or equivalent, you know how to plan and deliver complex cybersecurity projects. Benefits Excellent compensation and benefits package, including Company Pension, Private Health Care and Cash-Back Plan, Car Leasing Scheme and more Ongoing training and development opportunities, resulting in industry recognised accreditations and qualifications Flexible working hours, occasional home office (where possible) We encourage autonomy and entrepreneurship enabling our consultants and employees to influence the strategy and direction of the business Adarma We began life in 2009, with a fierce determination to make cyber resilience a reality for every organisation, every day. This has guided us as we've adapted and grown to become one of the UK's leading threat specialists. Our journey is remarkable. But what's ahead is even more inspiring. Together, we're growing and transforming like never before. We're partnering with even more customers and creating more innovative and resilient solutions. And we're taking our thinking and our whole sector further, every single day.
Reed
Senior Systems Engineer
Reed
Senior System Engineer - (Unix & Windows) | Solaris Unix | RedHat Linux | Veritas Cluster Server (VCS) | Permanent | Job Senior System Engineer - (Storage and Backup) required to join a blue light service with offices in Oxfordshire. Main duties: • Providing 3rd line System Admin support for a Solaris Unix and RedHat Linux server infrastructure, with a focus on the day to day backup, DR, patching, compliance and monitoring of server estate. • Providing 3rd line System Engineer support for a large, distributed Microsoft Windows server infrastructure, with a focus on the day to day backup, DR, patching, compliance and monitoring of server estate. • Operation, configuration, and lifecycle management of the server compliance toolsets in use, including Tenable.sc and Symantec Data Center Security. • Act as the technical lead for internally and externally led infrastructure health check activities. • Remediation of discovered server vulnerabilities. • Producing server compliance reports for management and customers. • Broad experience of physical, virtual server and cloud-based server build and configuration best practise that will assist in vulnerability avoidance. • Document best practise and known vulnerability fixes. Essential skills required: • Good understanding of server hardware and physical server configuration. • Practical and operational experience in the support and maintenance of; o Solaris Unix/RedHat Linux Small Solaris Unix and RedHat Linux server estate. Veritas Cluster Server (VCS) on Unix. Oracle DB servers on Unix platforms, ability to triage and troubleshoot Oracle issues. Red Hat Linux 5 and 6, and knowledge of version 7 Red Hat Satellite Solaris Unix and LVM (logical volume manager) SAN storage configuration TCP/IP networking in a Unix environment Nagios monitoring and configuration o Microsoft Windows Server Large server estate comprising Microsoft Windows Server in a multi-domain environment, hosted on physical, VMware vSphere and Microsoft Azure. Microsoft server operating system build processes, including VMware templates, physical servers and Azure hosted servers. Practical experience using Microsoft Active Directory Group Policy. • Must have strong communication skills including experience in communicating to Senior Management level. • Ability to produce high quality technical documentation including; o Standard operating procedures o Knowledge base articles o Detailed troubleshooting documentation • Experience working in an ITIL focussed environment with a good understanding of the incident, service request and change management processes. Desirable technical skills: • Practical experience in the operational support and usage of Azure IaaS components including the use of Azure Monitor, Security Center and Sentinel. • Operational usage of SCCM Current Branch and SCOM 2019. • Familiar with Center for Internet Security (CIS) benchmarks and hardened images. Senior System Engineer - (Unix & Windows) | Solaris Unix | RedHat Linux | Veritas Cluster Server (VCS) | Permanent | Job
04/11/2021
Full time
Senior System Engineer - (Unix & Windows) | Solaris Unix | RedHat Linux | Veritas Cluster Server (VCS) | Permanent | Job Senior System Engineer - (Storage and Backup) required to join a blue light service with offices in Oxfordshire. Main duties: • Providing 3rd line System Admin support for a Solaris Unix and RedHat Linux server infrastructure, with a focus on the day to day backup, DR, patching, compliance and monitoring of server estate. • Providing 3rd line System Engineer support for a large, distributed Microsoft Windows server infrastructure, with a focus on the day to day backup, DR, patching, compliance and monitoring of server estate. • Operation, configuration, and lifecycle management of the server compliance toolsets in use, including Tenable.sc and Symantec Data Center Security. • Act as the technical lead for internally and externally led infrastructure health check activities. • Remediation of discovered server vulnerabilities. • Producing server compliance reports for management and customers. • Broad experience of physical, virtual server and cloud-based server build and configuration best practise that will assist in vulnerability avoidance. • Document best practise and known vulnerability fixes. Essential skills required: • Good understanding of server hardware and physical server configuration. • Practical and operational experience in the support and maintenance of; o Solaris Unix/RedHat Linux Small Solaris Unix and RedHat Linux server estate. Veritas Cluster Server (VCS) on Unix. Oracle DB servers on Unix platforms, ability to triage and troubleshoot Oracle issues. Red Hat Linux 5 and 6, and knowledge of version 7 Red Hat Satellite Solaris Unix and LVM (logical volume manager) SAN storage configuration TCP/IP networking in a Unix environment Nagios monitoring and configuration o Microsoft Windows Server Large server estate comprising Microsoft Windows Server in a multi-domain environment, hosted on physical, VMware vSphere and Microsoft Azure. Microsoft server operating system build processes, including VMware templates, physical servers and Azure hosted servers. Practical experience using Microsoft Active Directory Group Policy. • Must have strong communication skills including experience in communicating to Senior Management level. • Ability to produce high quality technical documentation including; o Standard operating procedures o Knowledge base articles o Detailed troubleshooting documentation • Experience working in an ITIL focussed environment with a good understanding of the incident, service request and change management processes. Desirable technical skills: • Practical experience in the operational support and usage of Azure IaaS components including the use of Azure Monitor, Security Center and Sentinel. • Operational usage of SCCM Current Branch and SCOM 2019. • Familiar with Center for Internet Security (CIS) benchmarks and hardened images. Senior System Engineer - (Unix & Windows) | Solaris Unix | RedHat Linux | Veritas Cluster Server (VCS) | Permanent | Job

Modal Window

  • Home
  • Contact
  • About Us
  • FAQs
  • Terms & Conditions
  • Privacy
  • Employer
  • Post a Job
  • Search Resumes
  • Sign in
  • Job Seeker
  • Find Jobs
  • Create Resume
  • Sign in
  • IT blog
  • Facebook
  • Twitter
  • LinkedIn
  • Youtube
© 2008-2026 IT Job Board