at least one year in a hands-on capacity *Strong understanding of cybersecurity principles and technologies. *Hands-on experience with security tools such as antivirus, content filtering, firewalls, and intrusiondetection systems. *Proficiency in Microsoft Azure and associated cloud security services. *Familiarity with Windows and Linux operating systems. *Experience with log management and security monitoring platforms. *Critical thinking … related subject. *Professional certifications such as CISSP, CompTIA Security+, or equivalent. *Experience with governance frameworks and risk management tools. Key Responsibilities *Operate and maintain security systems including firewalls, antivirus, intrusiondetection/prevention, and authentication platforms. *Monitor system logs and network traffic to identify suspicious activity and potential threats. *Respond to security incidents and support forensic investigations. *Develop … Adecco is acting as an Employment Agency. We are proud to be an equal opportunities employer. Keywords IT Security Specialist, Cybersecurity Analyst, SOC Analyst, Azure Security, Information Security, Firewalls, IntrusionDetection, Antivirus, ITIL, CISSP, Security Compliance, Vulnerability Management, Risk Register, Public Sector IT, Hybrid Role, Manchester Jobs, Security Awareness Training More ❯
Job Title: Cybersecurity Architect Location: London, UK Type: Perm Role (Hybrid 2 days a week) RESPONSIBILITIES Design and implement secure network architectures including firewalls intrusiondetection prevention systems and encryption technologies Adhere to enterprise governance review processes to deliver project goals deliverables Follow enterprise ITSM CMDB processes Monitor and analyze security s using Security Information and Event Management … Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto etc Experience with intrusiondetection/prevention systems as well as with SIEM tools and security incident response Excellent problem solving skills analytical thinking and the ability to communicate effectively with diverse More ❯
across the lifecycle of integrated security systems. This includes oversight of Genetec, Lenel, and other VMS platforms, as well as POS integration, video analytics, facial recognition software, access control, intrusiondetection, and CCTV surveillance technologies. The SDM will work closely with internal functions (Service Desk, NOC, PMO, Engineering and Field Teams) to deliver consistent, high-quality outcomes. They … and Safety Systems Strong technical awareness of Genetec, Lenel, and other VMS platforms , as well as POS integrations, video analytics, and facial recognition software Knowledge of access control, CCTV, intrusiondetection, and integrated security platforms Experience developing t raining programmes and technical documentation , and delivering training to customer teams Strong service management and planning skills , with the ability More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
a wide variety of stakeholders to ensure, the Leidos CSOC, a Defensive Cyber Security capability, can support a customers Cyber Resilience, protecting them with a 24 x 7 Threat Detection and Response service, mitigating their risk of Cyber Attack. The successful candidate will be able to demonstrate experience from a CSOC background or be able to demonstrate sufficient transferable … within the environments. Respond to and correlate alerts from various detective and preventative Cyber Security tools such as Security Information Event Monitoring (SIEM), End Point Protection (EPP), End Point Detection and Response (EDR), XDR (Extended DR), Web Application Firewall (WAF), and Firewalls. Proactively detect suspicious activity, vulnerabilities, and security misconfigurations before they can be exploited by adversaries impacting Confidentiality … On-Premises solutions including but not limited to Firewalls, Network Access Control Lists, Network Security Groups, DDoS Protection, VPNs, Mail Gateways, Web Proxies, Load Balancers including Web Application Firewalls, Intrusion Prevention System, and IntrusionDetection Systems. Communication and Soft Skills Good verbal and written communication skills required for hand overs, reports, and documenting events during a Cyber More ❯
Sunbury-On-Thames, London, United Kingdom Hybrid / WFH Options
BP Energy
office/remote working Skills: Automation system digital security, Client Counseling, Conformance review, Digital Forensics, Incident management, incident investigation and response, Information Assurance, Information Security, Information security behaviour change, Intrusiondetection and analysis, Legal and regulatory environment and compliance, Risk Management, Secure development, Security administration, Security architecture, Security evaluation and functionality testing, Solution Architecture, Stakeholder Management, Supplier security More ❯
sunbury, south east england, united kingdom Hybrid / WFH Options
BP Energy
office/remote working Skills: Automation system digital security, Client Counseling, Conformance review, Digital Forensics, Incident management, incident investigation and response, Information Assurance, Information Security, Information security behaviour change, Intrusiondetection and analysis, Legal and regulatory environment and compliance, Risk Management, Secure development, Security administration, Security architecture, Security evaluation and functionality testing, Solution Architecture, Stakeholder Management, Supplier security More ❯
guildford, south east england, united kingdom Hybrid / WFH Options
BP Energy
office/remote working Skills: Automation system digital security, Client Counseling, Conformance review, Digital Forensics, Incident management, incident investigation and response, Information Assurance, Information Security, Information security behaviour change, Intrusiondetection and analysis, Legal and regulatory environment and compliance, Risk Management, Secure development, Security administration, Security architecture, Security evaluation and functionality testing, Solution Architecture, Stakeholder Management, Supplier security More ❯
requirements gathering through to procurement, budgeting, vendor management , and security assessments . Security, Compliance & Governance Partner with Information Security teams to enhance network security posture , addressing vulnerabilities and implementing intrusiondetection/prevention systems. Ensure ongoing compliance with ISO 27001, PCI-DSS , and other relevant regulatory standards. Drive a proactive approach to incident response, monitoring, and continuous threat … detection . Oversee audit readiness and maintain comprehensive network documentation and asset inventories. People & Stakeholder Leadership Build, develop, and mentor a high-performing network engineering team , fostering a culture of excellence, accountability, and continuous learning. Set clear objectives, manage performance, and align team skills with evolving business and technology needs. Act as the trusted technical adviser to senior stakeholders More ❯
requirements gathering through to procurement, budgeting, vendor management , and security assessments . Security, Compliance & Governance Partner with Information Security teams to enhance network security posture , addressing vulnerabilities and implementing intrusiondetection/prevention systems. Ensure ongoing compliance with ISO 27001, PCI-DSS , and other relevant regulatory standards. Drive a proactive approach to incident response, monitoring, and continuous threat … detection . Oversee audit readiness and maintain comprehensive network documentation and asset inventories. People & Stakeholder Leadership Build, develop, and mentor a high-performing network engineering team , fostering a culture of excellence, accountability, and continuous learning. Set clear objectives, manage performance, and align team skills with evolving business and technology needs. Act as the trusted technical adviser to senior stakeholders More ❯
requirements gathering through to procurement, budgeting, vendor management , and security assessments . Security, Compliance & Governance Partner with Information Security teams to enhance network security posture , addressing vulnerabilities and implementing intrusiondetection/prevention systems. Ensure ongoing compliance with ISO 27001, PCI-DSS , and other relevant regulatory standards. Drive a proactive approach to incident response, monitoring, and continuous threat … detection . Oversee audit readiness and maintain comprehensive network documentation and asset inventories. People & Stakeholder Leadership Build, develop, and mentor a high-performing network engineering team , fostering a culture of excellence, accountability, and continuous learning. Set clear objectives, manage performance, and align team skills with evolving business and technology needs. Act as the trusted technical adviser to senior stakeholders More ❯
london (city of london), south east england, united kingdom
AirSearch
requirements gathering through to procurement, budgeting, vendor management , and security assessments . Security, Compliance & Governance Partner with Information Security teams to enhance network security posture , addressing vulnerabilities and implementing intrusiondetection/prevention systems. Ensure ongoing compliance with ISO 27001, PCI-DSS , and other relevant regulatory standards. Drive a proactive approach to incident response, monitoring, and continuous threat … detection . Oversee audit readiness and maintain comprehensive network documentation and asset inventories. People & Stakeholder Leadership Build, develop, and mentor a high-performing network engineering team , fostering a culture of excellence, accountability, and continuous learning. Set clear objectives, manage performance, and align team skills with evolving business and technology needs. Act as the trusted technical adviser to senior stakeholders More ❯
requirements gathering through to procurement, budgeting, vendor management , and security assessments . Security, Compliance & Governance Partner with Information Security teams to enhance network security posture , addressing vulnerabilities and implementing intrusiondetection/prevention systems. Ensure ongoing compliance with ISO 27001, PCI-DSS , and other relevant regulatory standards. Drive a proactive approach to incident response, monitoring, and continuous threat … detection . Oversee audit readiness and maintain comprehensive network documentation and asset inventories. People & Stakeholder Leadership Build, develop, and mentor a high-performing network engineering team , fostering a culture of excellence, accountability, and continuous learning. Set clear objectives, manage performance, and align team skills with evolving business and technology needs. Act as the trusted technical adviser to senior stakeholders More ❯
security initiatives. Extensive knowledge of techniques, approaches and processes of digital threats; ability to detect, monitor, analyse and prevent digital threats. Proven knowledge of tools, techniques and processes of intrusiondetection and prevention; ability to detect, resolve and prevent intrusion behaviours to protect organisational networks. Working knowledge of concept, issues and techniques of cloud security; ability to More ❯
security initiatives. Extensive knowledge of techniques, approaches and processes of digital threats; ability to detect, monitor, analyse and prevent digital threats. Proven knowledge of tools, techniques and processes of intrusiondetection and prevention; ability to detect, resolve and prevent intrusion behaviours to protect organisational networks. Working knowledge of concept, issues and techniques of cloud security; ability to More ❯
security initiatives. Extensive knowledge of techniques, approaches and processes of digital threats; ability to detect, monitor, analyse and prevent digital threats. Proven knowledge of tools, techniques and processes of intrusiondetection and prevention; ability to detect, resolve and prevent intrusion behaviours to protect organisational networks. Desirable Working knowledge of concept, issues and techniques of cloud security; ability More ❯
and risk assessments to identify and address potential vulnerabilities. - Develop and maintain security policies and procedures in accordance with industry standards. - Configure and manage security tools, such as firewalls, intrusiondetection systems, and encryption technologies. - Monitor network traffic and system logs for suspicious activity and respond to security incidents in a timely manner. - Stay updated on the latest More ❯
key functions: Multi-Platform Threat Hunting at Scale - Run hunting queries and analytics across large datasets using a variety of cloud-based and hybrid security solutions. Custom Analytic and Detection Development - Writing and reviewing custom rules to deploy against national monitoring solutions to provide specialised monitoring to NHS bodies against common threat actor tactics and techniques. Specialist Incident Support … support to CSOU IM function and NHS organisations where appropriate during high complexity incidents. Main duties of the job Main duties of the role include: Threat Hunt in Extended Detection and Response (XDR) and SIEM tooling. Deputies for the Cyber Security Senior Analyst (Threat Hunting) in their absence. Develop capability in support of Threat Operations requirements, including coding and … technology development. Act as a technical support in advanced forensic investigations in support of Security Operations function. Simulate adversary tactics, techniques, and procedures in support of detection development. Perform dynamic & static analysis of malicious programs and tools where relevant in support of detection development. Development of automation workflows and playbooks to support threat hunting team workload. About us More ❯
of potential cyber threats. Contextualise and interpret threats via the use of intelligence models and frame works. Accurately identify indicators of compromise within intelligence items as well as potential detection opportunities. Carry out investigations into intelligence items of significance, identifying opportunities for further lead development. Provide specialist CTI support to protective monitoring teams during high complexity incidents. Create intelligence … of and ability to utilise a variety of specific tools for collecting, analysing, and presenting digital-related evidence. Skills & Experience Essential Proven knowledge of tools, techniques and processes of intrusiondetection and prevention; ability to detect, resolve and prevent intrusion behaviours to protect organisational networks. Desirable Demonstrable knowledge of the processes, tools and techniques of information security More ❯
Birchanger, Hertfordshire, United Kingdom Hybrid / WFH Options
Solus Accident Repair Centres
security posture remains strong, compliant, and resilient. Responsibilities Conduct regular vulnerability scans and produce actionable reports Support patch deployment and software approval audits Configure and maintain firewalls, VPNs, and intrusiondetection systems Respond swiftly to security breaches and assist in recovery efforts Maintain detailed records of investigations and patch cycles Stay current with cybersecurity trends and threat intelligence … control, and delivery of cyber security workstreams Collaborate with internal teams and third-party suppliers to maximise resources Qualifications Desired qualifications and experience: Minimum 2 years' experience in incident detection, response, and forensics Strong understanding of Azure, Zero Trust Estates, DLP, IDS/IPS, Web-Proxy, and Security Audits Analytical mindset with excellent problem-solving skills Excellent communication and More ❯
Stansted, Birchanger, Essex, United Kingdom Hybrid / WFH Options
Solus Accident Repair Centres
security posture remains strong, compliant, and resilient. Responsibilities Conduct regular vulnerability scans and produce actionable reports Support patch deployment and software approval audits Configure and maintain firewalls, VPNs, and intrusiondetection systems Respond swiftly to security breaches and assist in recovery efforts Maintain detailed records of investigations and patch cycles Stay current with cybersecurity trends and threat intelligence … control, and delivery of cyber security workstreams Collaborate with internal teams and third-party suppliers to maximise resources Qualifications Desired qualifications and experience: Minimum 2 years' experience in incident detection, response, and forensics Strong understanding of Azure, Zero Trust Estates, DLP, IDS/IPS, Web-Proxy, and Security Audits Analytical mindset with excellent problem-solving skills Excellent communication and More ❯
Jenkins). Exposure to monitoring tools like Prometheus, Grafana, or ELK stack. Experience supporting enterprise customers in a B2B SaaS or software product company. Experience with access control and intrusiondetection systems. Familiarity with virtualization technologies (e.g., VMware, Hyper-V). Knowledge of database systems (e.g., PostgreSQL, MS SQL). Relevant industry certifications (e.g., CompTIA Network+, Security+, CCNA More ❯
Jenkins). Exposure to monitoring tools like Prometheus, Grafana, or ELK stack. Experience supporting enterprise customers in a B2B SaaS or software product company. Experience with access control and intrusiondetection systems. Familiarity with virtualization technologies (e.g., VMware, Hyper-V). Knowledge of database systems (e.g., PostgreSQL, MS SQL). Relevant industry certifications (e.g., CompTIA Network+, Security+, CCNA More ❯
industry-recognized certifications (e.g., Cisco CCNA/CCNP, Juniper JNCIS-ENT). Experience with routing protocols, virtual routing instances, VPNs, and security zones. Experience with network security products including IntrusionDetection Systems (IDS) and Intrusion Prevention Systems (IPS). Proficiency in F5, Cisco Secure Firewall, and Gigamon technology. Demonstrable design experience with global network vendors (e.g., Cisco More ❯
Employment Type: Permanent
Salary: £50000 - £55000/annum £6k car + 20% bonuses
the Cyber Fusion Centre. You will report directly to the Head of Insider Risk Management and manage a team of investigators, overseeing complex security investigations, and enhancing insider risk detection and response capabilities. You will play an important leadership role in developing programmes, driving continuous improvement, and encouraging collaboration. Summary of Primary Responsibilities Collaborate with the Head of Insider … documented case summaries. Analyze data from technical and behavioral sources to detect and respond to insider risk incidents. Develop & maintain insider threat indicators and use case scenarios to improve detection accuracy. Manage and mentor a geographically dispersed team of investigators. Support professional development and foster expertise in insider risk and investigative practices. Work closely with partner teams (e.g., HR … Legal, Threat Detection Engineering, etc.) on threat detection and response initiatives to ensure coordinated and effective risk mitigation. Create and deliver insider risk awareness content, highlighting emerging trends and fostering a culture of vigilance and shared responsibility. Produce executive-level documentation, including SOPs, playbooks, process Qualifications Experience at management level working in insider risk, counterintelligence, or law enforcement More ❯
Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Michael Page
Practical experience and understanding of ISO27001 Familiar with NIST and GDPR is preferred Solid experience in threat, risk and vulnerabilities management process Experience with security tools such as SIEM, intrusiondetection systems, and endpoint protection. Strong analytical and problem-solving skills. Hold at least one security related professional certification is desirable Job Offer 24 days of holiday leave More ❯